last executing test programs: 1m28.046728129s ago: executing program 0 (id=4967): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r4, r3, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r4, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r2}, 0x20) sendmsg$SOCK_DESTROY(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000740)={0xbc, 0x15, 0x0, 0x0, 0x0, {0x25}, [@INET_DIAG_REQ_BYTECODE={0x2d, 0x1, "d5cf07583ff8676f50cd0930a32b6216f0dd25f1e66d40aa63a3b76b58c54b7c1bb87ef8fbb6d31083"}, @INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x19, 0x1, "a9a08897c0afd91d90e34641fe08abfd3ff75d63b3"}, @INET_DIAG_REQ_BYTECODE={0x55, 0x1, "2f80fea4a635d3dc32e34ae94fd5f95b5202f0387eda45227ded97fa10cc80e2d609f7ecec34171fcace0fff80f426a39c75bdc69d61236196b42a5b4c286f82e18bf02977172e524426ba185fb8efe0c8"}]}, 0xbc}}, 0x4000841) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) 1m27.517858301s ago: executing program 0 (id=4970): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) 1m27.219674559s ago: executing program 0 (id=4972): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0186415, &(0x7f0000000140)={&(0x7f0000ffd000/0x2000)=nil}) 1m26.777033744s ago: executing program 0 (id=4974): r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = openat$dlm_control(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) r4 = dup3(r2, r3, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000140)='hsr0\x00', 0x10) connect$l2tp(r1, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x3, 0x0}, 0x1}, 0x10) ioctl$IOMMU_TEST_OP_ACCESS_REPLACE_IOAS(r4, 0x3ba0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, 0x0) write$sysctl(r4, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r4, 0xc01064bd, 0x0) 1m23.289230419s ago: executing program 0 (id=4977): r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$AUDIT_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x3c}, 0x3c}}, 0x0) 1m22.932527329s ago: executing program 0 (id=4979): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0x5450, 0x0) 3.304742531s ago: executing program 1 (id=5065): r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f00000001c0)={0x0, 0x0, 0x0}) 2.399805446s ago: executing program 1 (id=5066): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000080), 0x4) 2.006860992s ago: executing program 1 (id=5067): r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = openat$dlm_control(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) r4 = dup3(r2, r3, 0x0) connect$l2tp(r1, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x3, 0x0}, 0x1}, 0x10) ioctl$IOMMU_TEST_OP_ACCESS_REPLACE_IOAS(r4, 0x3ba0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r4, 0xc01064bd, 0x0) 1.408245288s ago: executing program 1 (id=5068): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmmsg$alg(r0, &(0x7f00000067c0), 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="aee5b9", 0x3}], 0x1, 0x0, 0x0, 0x8081}, 0x20040000) 785.740298ms ago: executing program 1 (id=5069): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r4, r3, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r4, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r2}, 0x20) sendmmsg(r1, &(0x7f0000002f40)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000140)="e43d04fd2170bd50125ffa6d1e179f98984b2c72ca3bffd4871a112972963a9b524958b63a1619122acc32a1e1c81a85", 0x30}, {&(0x7f0000000480)="149d044c07e578f48f6e7fb65172a61b0316e20d92e71c834e31de4335c697b4f63ff06e8ef72792bc9e4d188015c40f05384741eea7303566305add", 0x3c}], 0x2}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000001140)="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", 0x7c7}], 0x1}}], 0x2, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000740)={0x18c, 0x15, 0x0, 0x0, 0x0, {0x25}, [@INET_DIAG_REQ_BYTECODE={0x2d, 0x1, "d5cf07583ff8676f50cd0930a32b6216f0dd25f1e66d40aa63a3b76b58c54b7c1bb87ef8fbb6d31083"}, @INET_DIAG_REQ_BYTECODE={0xd2, 0x1, "2fb016ae2d2f2bd7b733f89b9ee24e9933d517f13eb9fe07ffe2ba135da1167da690e541dad06c72742c62d780e6be426aaccdf414ba131fc86c4304e1b2fe7c1307f8a9ecd189addd7b4a4738092ff617b1fe314bf72728afa34be2ea535ec0a659b149af1f8d0316a1f3c6f117f124715294d8f1335bb4624fd1771074b65792db0e3bca8f336832b2142a16583cbf96967904e41a212060cf56fa5a102ecb4ee926276aacdfbeb4344fae0daa1c0b9e2db1eca5d5f14a3097f1a34b6c5e00010f47d512e597aef2746c2a96f5"}, @INET_DIAG_REQ_BYTECODE={0x19, 0x1, "a9a08897c0afd91d90e34641fe08abfd3ff75d63b3"}, @INET_DIAG_REQ_BYTECODE={0x55, 0x1, "2f80fea4a635d3dc32e34ae94fd5f95b5202f0387eda45227ded97fa10cc80e2d609f7ecec34171fcace0fff80f426a39c75bdc69d61236196b42a5b4c286f82e18bf02977172e524426ba185fb8efe0c8"}]}, 0x18c}}, 0x4000841) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) 0s ago: executing program 1 (id=5070): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)={@map=r4, r3, 0x7}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r4, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r2}, 0x20) sendmmsg(r1, &(0x7f0000002f40)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000140)="e43d04fd2170bd50125ffa6d1e179f98984b2c72ca3bffd4871a112972963a9b524958b63a1619122acc32a1e1c81a85", 0x30}, {&(0x7f0000000480)="149d044c07e578f48f6e7fb65172a61b0316e20d92e71c834e31de4335c697b4f63ff06e8ef72792bc9e4d1880", 0x2d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000001140)="2cd30c74459fd7f3868040d841d76b181fd9307ab6160bd199a50b64e09d2a5950fd97de7cca2e06d14a95362b04715a1e666884f00b754fad3ad29f4366148e8225d6b51c6eeb3707e5c2c09b866c08712ab96b3bfb9eca390527d3bd24b8ac8fbefb0646220dda67b50fefa28662fef769962f3c93b3839bb04a79ed46426bc4a3849806a1e8fb0038997c4088a27caf953ce6c52507d307e8b78d70c3feb2c0b6bbac1a346a689f033de570e01bcfa23ae90b294f254f8671ce0d6832a3fcbf48fa9618bf49edec47ba1e0725e5d8ad32a746e05ead482c38b34d52efff0858932471f0be04f67222eca8dbea65c41eff6ea0b0eb0bd45fa2e8ddb2fc5dd17904238a5864e80225a6e6e67212c9f8cc445025d9da9a7f26f2b03a8b4696e093a6581a06fc6506e98d900acbb20a4ef7f3751ac72b3c9168eea221ed96bd1365e973ae45f5b7c1d89223d999beda3d2b4fe38a2e371336afa01cb78112fdf7997803d0f73dabb24076edb16315ebf5a90171314e8fcdfec74b46c83fa3481e0c575e78bac158ac4f4e368233f5da9b11c9df11c6f2a12bde1759d93d6cfe3a435d16063905f0e187de92e714b59243c86caeb1958a46fdeb76fa49dc24a7fa3a43287d282593cb7121bf9fc89b9acb5096636390a511fd0bab546c3bd7bb1b5f80aba51dcf2891029838b9fbf350bb56e696b943c011dbc18d58cdef23738f84b792832aad2924eb32f4016f83ef722b2e55c74d9daaf2a8a6aac0c365470710a3a6f881b060b82f5c6392a8ac82a5b7d3b8d2ea36d7d4fb53780ce198aa7800fa5649a586c6cf740d595e8f18de8cd0bfe7f9ee7aae66d9e938f7f70151071137c32829062a99b6f0785d8eec2a1dd0caf3b9e7030e44574cdacd4e8e6e3cf241e0eefc7d959f495d8172ccb0fd668475db4e842f1105e621ee7ae847845dc0e87ffc7fb129a911a1d7f460a9746f64fdc85101d7d02ae7aeb24f0bcd622102c373f4d3a365adb3fb659ccf3e229e63d0726410dca82f7cbc9aace60b065f6fd52e690478a11135a42894f4de546ab09b6671cb25a32f79b925a97dfaa610721292b0eeae29b0dfff73c9ad0bf215ca6dc2bbd34ffdb096b9405d341380afbb26c46d86968b973a62c4b1e5a93ef43ab8ea86562ff88cf0e2aab581a7b4da39dc45a990ee2c4af7e8fb54f7475cc9776e9a0634b05a26725cea0b5bece95791f3493f5ed77cd40cc0cfab09c0f91e4c615d9d03c385508c672b04a425cdbdc428e5f9b64d09f8d1e856a68059dc662f685ca819380efe8eeb7e6f088ac46350f72321433bf0ea9809fb8738c384afada472ae3392e8d9492d5858075da00ee867cdbf8ead8a11a0d45f1664f7c20c2373f5c283a1a12df9fac3a43f185c2ff6c2492d266888f77eb23ecea2c1a618284fe7f55ca6a47f298e7e6501f31897c8c6a19f77bb072a0d0ba1395e0f3d6e7c20c3283b34ab1427d9494fed54052d59f2eaebe0671a6ed1555908f8ceded0451e895513989496438ecf0089a1c49d75e65d08567ec0fa24299ca5a9d1630ac1cf95896aa2caedd84fb5eb776ad6e0800af1c5b45ed54659665e5a8f4a5f1586e6bb97dd09ca257ab680931050c80ac1f259df4d647cb5adeff9d3b026cb84917cfbcf2f8e21044b4af5383e2ad1dc6086b1012ee007820be74a0e87e717942237f1129cf2a1cad3d101f2888aca96e770cd9bb45e2c9ec9c28be744317a71d8db21b5c29cf1e25d7ba1aea4d333b54d0462f13f1940ea8a7b6c8f553d7fe1a4d210cd5c376e6f196c2d2715271e6700a84b67a6854fb5210083de0f76627d949017a37748e5eed9c05bad06c1314031ef1596cba1e25f0f8c75198d10f369fecc57fbc78896962b6c024013fe2e4ea673888eceb4aac93b6b23c3dedd0c7438db58282df9ad3ab449d2199f4fe1d51c548084389353a9ed4c1962f66a80a04e43c5c514b10e6c0099c3926d10f91a3c4b54422e68a004883f68663c4f4503c3ac79af0f46f06c9858a57a7b64010460d6268bbe5cd919ed469eec7f9bf4494afb8ce6b2890679dff6f3a5fb713fa8876c7750ea19c6ad8ba27c0ab382a816f7450ed15f3aaeb906f4c62f0c11ef3f99bdd5d703cb94c3cab42122088039631daaac7b294e17ced609ea741a19a0cfd9c8f454094d21077815f366ea9ad6cc0c72567ff98f5e99e379588b3cb0844be56250a550025986c239d6c0a4c9cd55b326b298386ccedc59d230b531ea3fea2b48f97e64508015496a3aa401ba16569d8d68e4347334d358b9d124b6f775d43ada7bd0e43524bb4555833129ddbd5ef6df7cbbb8e3a77a82369b07b7fc97d993392fa52c2f20dfc25aa2bb614be03e39c6a067dac2fee393573ff10701ecbae920b4cf2dcf41149634fd4e4cde6fc2d3f660902e884ab269a3321557557c75533cc0404488d05fdf3d5083ef5b86c58e43035559b43e41640c368d5b7c8d6a0951245c35dbef5ca9ffc77655d89680bb958d056524d0df0dc0ec604dd95d9ae9cfabdb5b30d022b62018725c31adc207cbda9147aa18f5d87a087cf0b430be3dd90e0add262e285b6e609dbcb7215c260618134242e4b70164e87a93d87e1b591618f1b279575857c56285f2b0cbe4bc3c1656b5d3bf9a8177914fcb202117ffe9f40f6a842855d3dc98e09a19740965527ef318ca23fd7ba1028af25a1dee4e0b76475d9b42b706f7502917aa6596a5eb34f72ec2c64b4cc49bb6ba8f9a87b2c2546e1c848c394fb61b1ecf137525954249e2c9db0af55e684d9d9e2eb48b16547a9823813137fe8205287fd8f6cab91801d5f253f4d1f9a3d0bd93e975c310e28532bdf9b9c680cc7273dca17f5016820033a3254887b44e7a42db56ddf757e2214b613e3ebe26acad6bfb4122a79576b65e6562aab019aac513e39bd9352f7e1bc5aa0e58a4975485bcff98cb28034baa6e448ce0341c229d6dafacf6bb1afbde1bdfd606af6c2387f0fbcd3c9cc50691413fc9", 0x856}], 0x1}}], 0x2, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000740)={0x18c, 0x15, 0x0, 0x0, 0x0, {0x25}, [@INET_DIAG_REQ_BYTECODE={0x2d, 0x1, "d5cf07583ff8676f50cd0930a32b6216f0dd25f1e66d40aa63a3b76b58c54b7c1bb87ef8fbb6d31083"}, @INET_DIAG_REQ_BYTECODE={0xd2, 0x1, "2fb016ae2d2f2bd7b733f89b9ee24e9933d517f13eb9fe07ffe2ba135da1167da690e541dad06c72742c62d780e6be426aaccdf414ba131fc86c4304e1b2fe7c1307f8a9ecd189addd7b4a4738092ff617b1fe314bf72728afa34be2ea535ec0a659b149af1f8d0316a1f3c6f117f124715294d8f1335bb4624fd1771074b65792db0e3bca8f336832b2142a16583cbf96967904e41a212060cf56fa5a102ecb4ee926276aacdfbeb4344fae0daa1c0b9e2db1eca5d5f14a3097f1a34b6c5e00010f47d512e597aef2746c2a96f5"}, @INET_DIAG_REQ_BYTECODE={0x19, 0x1, "a9a08897c0afd91d90e34641fe08abfd3ff75d63b3"}, @INET_DIAG_REQ_BYTECODE={0x55, 0x1, "2f80fea4a635d3dc32e34ae94fd5f95b5202f0387eda45227ded97fa10cc80e2d609f7ecec34171fcace0fff80f426a39c75bdc69d61236196b42a5b4c286f82e18bf02977172e524426ba185fb8efe0c8"}]}, 0x18c}}, 0x4000841) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) kernel console output (not intermixed with test programs): ump_stack) from [<808be628>] (should_fail_ex+0x18c/0x1dc) [ 685.229096][ T7391] [<808be49c>] (should_fail_ex) from [<808be68c>] (should_fail+0x14/0x18) [ 685.229438][ T7391] r6:00000000 r5:ed701f68 r4:00000002 [ 685.229654][ T7391] [<808be678>] (should_fail) from [<808be6ac>] (should_fail_usercopy+0x1c/0x20) [ 685.229997][ T7391] [<808be690>] (should_fail_usercopy) from [<8053f564>] (simple_read_from_buffer+0x8c/0x134) [ 685.230445][ T7391] [<8053f4d8>] (simple_read_from_buffer) from [<805b4354>] (proc_fail_nth_read+0xb8/0x100) [ 685.230861][ T7391] r10:00000001 r9:805b429c r8:00000002 r7:ed701f68 r6:0000000f r5:76bf5f30 [ 685.231186][ T7391] r4:835b6000 r3:ed701e9f [ 685.231405][ T7391] [<805b429c>] (proc_fail_nth_read) from [<8050748c>] (vfs_read+0x98/0x324) [ 685.231770][ T7391] r8:76bf5f30 r7:ed701f68 r6:835b6000 r5:0000000f r4:84216e40 [ 685.232065][ T7391] [<805073f4>] (vfs_read) from [<8050813c>] (ksys_read+0x78/0xf8) [ 685.232443][ T7391] r10:00000003 r9:835b6000 r8:8020029c r7:00000000 r6:00000000 r5:84216e40 [ 685.232753][ T7391] r4:84216e43 [ 685.232949][ T7391] [<805080c4>] (ksys_read) from [<805081cc>] (sys_read+0x10/0x14) [ 685.233310][ T7391] r7:00000003 r6:00000005 r5:76bf5f30 r4:0000000f [ 685.233569][ T7391] [<805081bc>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 685.233988][ T7391] Exception stack(0xed701fa8 to 0xed701ff0) [ 685.234294][ T7391] 1fa0: 0000000f 76bf5f30 00000005 76bf5f30 0000000f 00000000 [ 685.234628][ T7391] 1fc0: 0000000f 76bf5f30 00000005 00000003 00000000 00006364 003d0f00 76bf60bc [ 685.234959][ T7391] 1fe0: 00000158 76bf5ed0 000d8318 00130ca4 [ 701.599946][ T7496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5126 sclass=netlink_route_socket pid=7496 comm=syz.1.1002 [ 713.879290][ T7549] FAULT_INJECTION: forcing a failure. [ 713.879290][ T7549] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 713.880083][ T7549] CPU: 1 UID: 0 PID: 7549 Comm: syz.1.1012 Not tainted 6.11.0-rc6-syzkaller #0 [ 713.880394][ T7549] Hardware name: ARM-Versatile Express [ 713.880594][ T7549] Call trace: [ 713.880783][ T7549] [<8195d0d8>] (dump_backtrace) from [<8195d1d4>] (show_stack+0x18/0x1c) [ 713.881155][ T7549] r7:00000000 r6:00000000 r5:60000013 r4:8200ca84 [ 713.881463][ T7549] [<8195d1bc>] (show_stack) from [<8197af14>] (dump_stack_lvl+0x70/0x7c) [ 713.881799][ T7549] [<8197aea4>] (dump_stack_lvl) from [<8197af38>] (dump_stack+0x18/0x1c) [ 713.882272][ T7549] r5:00000000 r4:8274a3d4 [ 713.882648][ T7549] [<8197af20>] (dump_stack) from [<808be628>] (should_fail_ex+0x18c/0x1dc) [ 713.883135][ T7549] [<808be49c>] (should_fail_ex) from [<808be68c>] (should_fail+0x14/0x18) [ 713.883639][ T7549] r6:00000000 r5:df9a9f68 r4:00000002 [ 713.883901][ T7549] [<808be678>] (should_fail) from [<808be6ac>] (should_fail_usercopy+0x1c/0x20) [ 713.884354][ T7549] [<808be690>] (should_fail_usercopy) from [<8053f564>] (simple_read_from_buffer+0x8c/0x134) [ 713.886755][ T7549] [<8053f4d8>] (simple_read_from_buffer) from [<805b4354>] (proc_fail_nth_read+0xb8/0x100) [ 713.887669][ T7549] r10:00000001 r9:805b429c r8:00000002 r7:df9a9f68 r6:0000000f r5:76bf5f30 [ 713.887964][ T7549] r4:84a82400 r3:df9a9e9f [ 713.888170][ T7549] [<805b429c>] (proc_fail_nth_read) from [<8050748c>] (vfs_read+0x98/0x324) [ 713.888528][ T7549] r8:76bf5f30 r7:df9a9f68 r6:84a82400 r5:0000000f r4:84216840 [ 713.888805][ T7549] [<805073f4>] (vfs_read) from [<8050813c>] (ksys_read+0x78/0xf8) [ 713.889105][ T7549] r10:00000003 r9:84a82400 r8:8020029c r7:00000000 r6:00000000 r5:84216840 [ 713.889460][ T7549] r4:84216843 [ 713.889614][ T7549] [<805080c4>] (ksys_read) from [<805081cc>] (sys_read+0x10/0x14) [ 713.890002][ T7549] r7:00000003 r6:00000005 r5:76bf5f30 r4:0000000f [ 713.890270][ T7549] [<805081bc>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 713.890700][ T7549] Exception stack(0xdf9a9fa8 to 0xdf9a9ff0) [ 713.891151][ T7549] 9fa0: 0000000f 76bf5f30 00000005 76bf5f30 0000000f 00000000 [ 713.891563][ T7549] 9fc0: 0000000f 76bf5f30 00000005 00000003 00000000 00006364 003d0f00 76bf60bc [ 713.891976][ T7549] 9fe0: 00000158 76bf5ed0 000d8318 00130ca4 [ 717.711978][ T7563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7563 comm=syz.0.1016 [ 719.559595][ T7572] input: syz1 as /devices/virtual/input/input7 [ 720.827169][ T31] audit: type=1400 audit(720.720:448): avc: denied { create } for pid=7571 comm="syz.1.1020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 749.977993][ T31] audit: type=1400 audit(749.870:449): avc: denied { execute } for pid=7675 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 749.981424][ T31] audit: type=1400 audit(749.880:450): avc: denied { execute_no_trans } for pid=7675 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 750.028148][ T31] audit: type=1400 audit(749.920:451): avc: denied { mounton } for pid=7678 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 750.037861][ T31] audit: type=1400 audit(749.930:452): avc: denied { mounton } for pid=7678 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 750.314862][ T1069] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 750.356010][ T1069] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 750.432693][ T1069] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 750.485583][ T1069] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 750.860918][ T1069] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 750.872350][ T1069] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 750.879484][ T1069] bond0 (unregistering): Released all slaves [ 751.043532][ T1069] hsr_slave_0: left promiscuous mode [ 751.068461][ T1069] hsr_slave_1: left promiscuous mode [ 751.077806][ T1069] veth1_macvtap: left promiscuous mode [ 751.078485][ T1069] veth0_macvtap: left promiscuous mode [ 751.078971][ T1069] veth1_vlan: left promiscuous mode [ 751.079280][ T1069] veth0_vlan: left promiscuous mode [ 751.235412][ T1069] pimreg (unregistering): left allmulticast mode [ 752.259781][ T7678] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 752.263074][ T7678] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 752.902664][ T7678] hsr_slave_0: entered promiscuous mode [ 752.904714][ T7678] hsr_slave_1: entered promiscuous mode [ 753.392088][ T7678] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 753.404077][ T7678] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 753.414934][ T7678] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 753.425612][ T7678] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 754.376581][ T7678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 755.681358][ T8074] FAULT_INJECTION: forcing a failure. [ 755.681358][ T8074] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 755.682254][ T8074] CPU: 0 UID: 0 PID: 8074 Comm: syz.0.1053 Not tainted 6.11.0-rc6-syzkaller #0 [ 755.683029][ T8074] Hardware name: ARM-Versatile Express [ 755.683340][ T8074] Call trace: [ 755.683872][ T8074] [<8195d0d8>] (dump_backtrace) from [<8195d1d4>] (show_stack+0x18/0x1c) [ 755.684642][ T8074] r7:00000000 r6:00000000 r5:60000013 r4:8200ca84 [ 755.684996][ T8074] [<8195d1bc>] (show_stack) from [<8197af14>] (dump_stack_lvl+0x70/0x7c) [ 755.685529][ T8074] [<8197aea4>] (dump_stack_lvl) from [<8197af38>] (dump_stack+0x18/0x1c) [ 755.685997][ T8074] r5:00000000 r4:8274a3d4 [ 755.686706][ T8074] [<8197af20>] (dump_stack) from [<808be628>] (should_fail_ex+0x18c/0x1dc) [ 755.687374][ T8074] [<808be49c>] (should_fail_ex) from [<808be68c>] (should_fail+0x14/0x18) [ 755.687738][ T8074] r6:00000000 r5:e03e1f68 r4:00000002 [ 755.688355][ T8074] [<808be678>] (should_fail) from [<808be6ac>] (should_fail_usercopy+0x1c/0x20) [ 755.688861][ T8074] [<808be690>] (should_fail_usercopy) from [<8053f564>] (simple_read_from_buffer+0x8c/0x134) [ 755.689435][ T8074] [<8053f4d8>] (simple_read_from_buffer) from [<805b4354>] (proc_fail_nth_read+0xb8/0x100) [ 755.689909][ T8074] r10:00000001 r9:805b429c r8:00000002 r7:e03e1f68 r6:0000000f r5:76bc4f30 [ 755.690490][ T8074] r4:83db3c00 r3:e03e1e9f [ 755.690946][ T8074] [<805b429c>] (proc_fail_nth_read) from [<8050748c>] (vfs_read+0x98/0x324) [ 755.691605][ T8074] r8:76bc4f30 r7:e03e1f68 r6:83db3c00 r5:0000000f r4:8503d900 [ 755.691986][ T8074] [<805073f4>] (vfs_read) from [<8050813c>] (ksys_read+0x78/0xf8) [ 755.692382][ T8074] r10:00000003 r9:83db3c00 r8:8020029c r7:00000000 r6:00000000 r5:8503d900 [ 755.692916][ T8074] r4:8503d903 [ 755.693092][ T8074] [<805080c4>] (ksys_read) from [<805081cc>] (sys_read+0x10/0x14) [ 755.693469][ T8074] r7:00000003 r6:00000004 r5:76bc4f30 r4:0000000f [ 755.693800][ T8074] [<805081bc>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 755.694236][ T8074] Exception stack(0xe03e1fa8 to 0xe03e1ff0) [ 755.694523][ T8074] 1fa0: 0000000f 76bc4f30 00000004 76bc4f30 0000000f 00000000 [ 755.694912][ T8074] 1fc0: 0000000f 76bc4f30 00000004 00000003 00000000 00006364 003d0f00 76bc50bc [ 755.695276][ T8074] 1fe0: 00000158 76bc4ed0 000d8318 00130ca4 [ 757.589523][ T7678] veth0_vlan: entered promiscuous mode [ 757.613016][ T7678] veth1_vlan: entered promiscuous mode [ 757.684474][ T7678] veth0_macvtap: entered promiscuous mode [ 757.697668][ T7678] veth1_macvtap: entered promiscuous mode [ 757.774149][ T7678] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.774742][ T7678] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.775423][ T7678] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.777757][ T7678] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.871596][ T31] audit: type=1400 audit(757.760:453): avc: denied { mounton } for pid=7678 comm="syz-executor" path="/syzkaller.wMk8HP/syz-tmp" dev="vda" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 757.886991][ T31] audit: type=1400 audit(757.780:454): avc: denied { mount } for pid=7678 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 757.908922][ T31] audit: type=1400 audit(757.810:455): avc: denied { unmount } for pid=7678 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 757.918724][ T31] audit: type=1400 audit(757.810:456): avc: denied { mounton } for pid=7678 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 757.919412][ T31] audit: type=1400 audit(757.810:457): avc: denied { mount } for pid=7678 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 759.311953][ T7738] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 759.352795][ T7738] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 759.412343][ T7738] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 759.481345][ T7738] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 759.794782][ T7738] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 759.806366][ T7738] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 759.817511][ T7738] bond0 (unregistering): Released all slaves [ 759.949449][ T7738] hsr_slave_0: left promiscuous mode [ 759.952359][ T7738] hsr_slave_1: left promiscuous mode [ 759.968954][ T7738] veth1_macvtap: left promiscuous mode [ 759.969490][ T7738] veth0_macvtap: left promiscuous mode [ 759.969893][ T7738] veth1_vlan: left promiscuous mode [ 759.970239][ T7738] veth0_vlan: left promiscuous mode [ 761.954149][ T8148] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 761.959240][ T8148] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 762.623544][ T8148] hsr_slave_0: entered promiscuous mode [ 762.625134][ T8148] hsr_slave_1: entered promiscuous mode [ 762.627266][ T8148] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 762.627750][ T8148] Cannot create hsr debugfs directory [ 763.174446][ T8148] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 763.189858][ T8148] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 763.199289][ T8148] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 763.209477][ T8148] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 764.070271][ T8148] 8021q: adding VLAN 0 to HW filter on device bond0 [ 764.698847][ T31] audit: type=1400 audit(764.600:458): avc: denied { getopt } for pid=8529 comm="syz.1.1059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 767.490397][ T8148] veth0_vlan: entered promiscuous mode [ 767.516027][ T8148] veth1_vlan: entered promiscuous mode [ 767.601291][ T8148] veth0_macvtap: entered promiscuous mode [ 767.615715][ T8148] veth1_macvtap: entered promiscuous mode [ 767.695264][ T8148] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 767.695967][ T8148] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 767.696380][ T8148] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 767.707200][ T8148] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 773.693969][ T8614] FAULT_INJECTION: forcing a failure. [ 773.693969][ T8614] name failslab, interval 1, probability 0, space 0, times 0 [ 773.694721][ T8614] CPU: 1 UID: 0 PID: 8614 Comm: syz.1.1067 Not tainted 6.11.0-rc6-syzkaller #0 [ 773.695092][ T8614] Hardware name: ARM-Versatile Express [ 773.695303][ T8614] Call trace: [ 773.695603][ T8614] [<8195d0d8>] (dump_backtrace) from [<8195d1d4>] (show_stack+0x18/0x1c) [ 773.695997][ T8614] r7:00000cc0 r6:00000006 r5:60000013 r4:8200ca84 [ 773.696292][ T8614] [<8195d1bc>] (show_stack) from [<8197af14>] (dump_stack_lvl+0x70/0x7c) [ 773.696667][ T8614] [<8197aea4>] (dump_stack_lvl) from [<8197af38>] (dump_stack+0x18/0x1c) [ 773.697067][ T8614] r5:00000000 r4:8271619c [ 773.697347][ T8614] [<8197af20>] (dump_stack) from [<808be628>] (should_fail_ex+0x18c/0x1dc) [ 773.697704][ T8614] [<808be49c>] (should_fail_ex) from [<804dafc8>] (should_failslab+0x6c/0x94) [ 773.698126][ T8614] r6:00000006 r5:00000006 r4:82c01240 [ 773.698398][ T8614] [<804daf5c>] (should_failslab) from [<804c1a1c>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 773.698823][ T8614] [<804c197c>] (__kmalloc_node_track_caller_noprof) from [<80461308>] (kstrdup+0x38/0x5c) [ 773.701466][ T8614] r10:840ec800 r9:00000000 r8:826f304c r7:802f1b18 r6:00000006 r5:00000cc0 [ 773.701941][ T8614] r4:df999d40 [ 773.703500][ T8614] [<804612d0>] (kstrdup) from [<802f1b18>] (__request_module+0xfc/0x2c0) [ 773.707567][ T8614] r7:840ec800 r6:814bae88 r5:00000002 r4:84fbdd00 [ 773.708095][ T8614] [<802f1a1c>] (__request_module) from [<814bae88>] (dev_load+0x68/0x8c) [ 773.708835][ T8614] r3:00400140 r2:df999e28 r1:8207c8e8 [ 773.709140][ T8614] r8:df999e38 r7:00008916 r6:00000000 r5:00000000 r4:df999e28 [ 773.709733][ T8614] [<814bae20>] (dev_load) from [<816777b0>] (devinet_ioctl+0x70/0x7e8) [ 773.710657][ T8614] r5:84a38d00 r4:df999e28 [ 773.710894][ T8614] [<81677740>] (devinet_ioctl) from [<8167a748>] (inet_ioctl+0x1b0/0x268) [ 773.711419][ T8614] r10:840ec800 r9:81c63934 r8:df999ecc r7:84a38d00 r6:20000000 r5:83506a00 [ 773.711761][ T8614] r4:00008916 [ 773.712365][ T8614] [<8167a598>] (inet_ioctl) from [<81451698>] (sock_ioctl+0x450/0x608) [ 773.712864][ T8614] r7:84501680 r6:84a38d00 r5:20000000 r4:00008916 [ 773.713136][ T8614] [<81451248>] (sock_ioctl) from [<80520d44>] (sys_ioctl+0x134/0xda4) [ 773.713534][ T8614] r9:00000005 r8:8503de40 r7:20000000 r6:8503de41 r5:00000000 r4:00008916 [ 773.714057][ T8614] [<80520c10>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 773.714463][ T8614] Exception stack(0xdf999fa8 to 0xdf999ff0) [ 773.714772][ T8614] 9fa0: 00000000 00000000 00000005 00008916 20000000 00000000 [ 773.715164][ T8614] 9fc0: 00000000 00000000 00130d80 00000036 00000000 00006364 003d0f00 76bc30bc [ 773.715515][ T8614] 9fe0: 76bc2ec0 76bc2eb0 000189f0 00132dd0 [ 773.715837][ T8614] r10:00000036 r9:840ec800 r8:8020029c r7:00000036 r6:00130d80 r5:00000000 [ 773.716298][ T8614] r4:00000000 [ 777.340592][ T1069] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 777.504950][ T1069] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 777.633675][ T1069] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 777.761814][ T1069] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 778.328191][ T1069] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 778.361668][ T1069] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 778.369316][ T1069] bond0 (unregistering): Released all slaves [ 778.493625][ T1069] hsr_slave_0: left promiscuous mode [ 778.495643][ T1069] hsr_slave_1: left promiscuous mode [ 778.501608][ T1069] veth1_macvtap: left promiscuous mode [ 778.501874][ T1069] veth0_macvtap: left promiscuous mode [ 778.502138][ T1069] veth1_vlan: left promiscuous mode [ 778.502320][ T1069] veth0_vlan: left promiscuous mode [ 784.857434][ T31] audit: type=1326 audit(784.750:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8839 comm="syz.1.1090" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 784.887699][ T31] audit: type=1326 audit(784.750:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8839 comm="syz.1.1090" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 784.889722][ T31] audit: type=1326 audit(784.750:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8839 comm="syz.1.1090" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 785.080299][ T31] audit: type=1326 audit(784.970:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8861 comm="syz.1.1090" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x160114 code=0x7ffc0000 [ 785.462165][ T8679] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 785.509042][ T8679] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 786.588274][ T31] audit: type=1326 audit(786.490:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8861 comm="syz.1.1090" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 786.605998][ T31] audit: type=1326 audit(786.500:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8839 comm="syz.1.1090" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 786.607221][ T31] audit: type=1326 audit(786.500:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8839 comm="syz.1.1090" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 788.242492][ T8679] hsr_slave_0: entered promiscuous mode [ 788.259615][ T8679] hsr_slave_1: entered promiscuous mode [ 788.263669][ T8679] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 788.264182][ T8679] Cannot create hsr debugfs directory [ 789.786327][ T8679] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 789.810810][ T8679] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 789.831842][ T8679] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 789.850964][ T8679] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 790.327420][ T31] audit: type=1326 audit(790.220:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9085 comm="syz.1.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 790.329438][ T31] audit: type=1326 audit(790.220:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9085 comm="syz.1.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 790.358041][ T31] audit: type=1326 audit(790.220:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9085 comm="syz.1.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 790.359108][ T31] audit: type=1326 audit(790.230:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9085 comm="syz.1.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 790.360719][ T31] audit: type=1326 audit(790.240:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9085 comm="syz.1.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 790.361655][ T31] audit: type=1326 audit(790.240:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9085 comm="syz.1.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 790.363788][ T31] audit: type=1326 audit(790.250:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9085 comm="syz.1.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 790.372940][ T9087] syz.1.1097[9087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 790.373400][ T9087] syz.1.1097[9087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 790.379686][ T31] audit: type=1326 audit(790.260:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9085 comm="syz.1.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 790.381223][ T31] audit: type=1326 audit(790.270:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9085 comm="syz.1.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 790.382237][ T31] audit: type=1326 audit(790.270:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9085 comm="syz.1.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 791.902343][ T9108] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1101'. [ 792.082838][ T8679] 8021q: adding VLAN 0 to HW filter on device bond0 [ 796.047444][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 796.047545][ T31] audit: type=1326 audit(795.940:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9138 comm="syz.1.1107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 796.051273][ T31] audit: type=1326 audit(795.950:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9138 comm="syz.1.1107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 796.069645][ T31] audit: type=1326 audit(795.960:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9138 comm="syz.1.1107" exe="/syz-executor" sig=0 arch=40000028 syscall=314 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 796.071102][ T31] audit: type=1326 audit(795.960:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9138 comm="syz.1.1107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 796.071950][ T31] audit: type=1326 audit(795.960:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9138 comm="syz.1.1107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 796.072688][ T31] audit: type=1326 audit(795.970:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9138 comm="syz.1.1107" exe="/syz-executor" sig=0 arch=40000028 syscall=449 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 796.073216][ T31] audit: type=1326 audit(795.970:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9138 comm="syz.1.1107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 796.073973][ T31] audit: type=1326 audit(795.970:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9138 comm="syz.1.1107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 796.553076][ T9148] bond1: entered promiscuous mode [ 796.553569][ T9148] bond1: entered allmulticast mode [ 796.554703][ T9148] 8021q: adding VLAN 0 to HW filter on device bond1 [ 800.015505][ T31] audit: type=1400 audit(799.890:493): avc: denied { write } for pid=9219 comm="syz.1.1117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 800.980921][ T9227] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1118'. [ 800.981883][ T9227] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1118'. [ 801.012447][ T9227] bond_slave_0: entered promiscuous mode [ 801.049502][ T9227] bond_slave_0: left promiscuous mode [ 802.631326][ T9243] capability: warning: `syz.1.1119' uses deprecated v2 capabilities in a way that may be insecure [ 803.302715][ T8679] veth0_vlan: entered promiscuous mode [ 803.330998][ T8679] veth1_vlan: entered promiscuous mode [ 803.441505][ T8679] veth0_macvtap: entered promiscuous mode [ 803.471230][ T8679] veth1_macvtap: entered promiscuous mode [ 803.566086][ T8679] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 803.566589][ T8679] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 803.598218][ T8679] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 803.598623][ T8679] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 804.025204][ T9255] bond2: entered promiscuous mode [ 804.025644][ T9255] bond2: entered allmulticast mode [ 804.026515][ T9255] 8021q: adding VLAN 0 to HW filter on device bond2 [ 804.112069][ T9255] bond2 (unregistering): Released all slaves [ 804.865804][ T31] audit: type=1400 audit(804.760:494): avc: denied { name_bind } for pid=9328 comm="syz.0.1123" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 805.580523][ T9336] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1125'. [ 807.430508][ T9353] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1127'. [ 818.703957][ T9452] pim6reg1: entered promiscuous mode [ 818.705853][ T9452] pim6reg1: entered allmulticast mode [ 839.419607][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 870.369862][ T9650] dvmrp0: entered allmulticast mode [ 870.403111][ T9650] pimreg3: entered allmulticast mode [ 870.423485][ T9650] netlink: 'syz.0.1219': attribute type 10 has an invalid length. [ 870.480025][ T31] audit: type=1400 audit(870.370:495): avc: denied { setopt } for pid=9648 comm="syz.0.1219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 870.933822][ T31] audit: type=1400 audit(870.830:496): avc: denied { setcheckreqprot } for pid=9661 comm="syz.1.1223" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 871.567428][ T31] audit: type=1400 audit(871.460:497): avc: denied { block_suspend } for pid=9669 comm="syz.0.1226" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 872.379065][ T9680] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 64993 [ 879.029725][ T9698] mmap: syz.1.1225 (9698) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 886.855252][ T9708] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 886.855924][ T9708] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 886.856150][ T9708] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 886.856358][ T9708] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 895.804953][ T31] audit: type=1400 audit(895.700:498): avc: denied { getopt } for pid=9722 comm="syz.0.1237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 915.688370][ T9735] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1242'. [ 917.710050][ T9747] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1246'. [ 921.989397][ T31] audit: type=1400 audit(921.890:499): avc: denied { bind } for pid=9778 comm="syz.1.1249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 922.109792][ T31] audit: type=1400 audit(921.970:500): avc: denied { setopt } for pid=9778 comm="syz.1.1249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 925.079637][ T31] audit: type=1400 audit(924.980:501): avc: denied { shutdown } for pid=9791 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 925.139682][ T31] audit: type=1400 audit(925.040:502): avc: denied { write } for pid=9791 comm="syz.1.1252" path="socket:[15763]" dev="sockfs" ino=15763 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 953.360277][ T9830] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1262'. [ 968.537492][ T31] audit: type=1400 audit(968.430:503): avc: denied { bind } for pid=9850 comm="syz.1.1267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 968.549715][ T31] audit: type=1400 audit(968.450:504): avc: denied { setopt } for pid=9850 comm="syz.1.1267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 968.559705][ T9851] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1267'. [ 970.115418][ T31] audit: type=1400 audit(970.010:505): avc: denied { relabelfrom } for pid=9858 comm="syz.1.1270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 970.116422][ T31] audit: type=1400 audit(970.010:506): avc: denied { relabelto } for pid=9858 comm="syz.1.1270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1002.458335][ T9887] binder: 9876:9887 ioctl c0306201 0 returned -14 [ 1023.610283][ T31] audit: type=1400 audit(1023.510:507): avc: denied { mounton } for pid=9899 comm="syz.1.1280" path="/proc/293/task" dev="proc" ino=17065 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1028.253711][ T31] audit: type=1400 audit(1028.150:508): avc: denied { read } for pid=9917 comm="syz.0.1287" path="socket:[15892]" dev="sockfs" ino=15892 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1028.284708][ T31] audit: type=1400 audit(1028.180:509): avc: denied { shutdown } for pid=9917 comm="syz.0.1287" lport=53395 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1029.208590][ T9923] trusted_key: encrypted_key: insufficient parameters specified [ 1029.959923][ T9924] netlink: 48 bytes leftover after parsing attributes in process `syz.1.1283'. [ 1054.087633][ T9425] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 1054.285255][ T9425] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1054.285853][ T9425] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1054.286244][ T9425] usb 2-1: New USB device found, idVendor=1e7d, idProduct=30d4, bcdDevice= 0.00 [ 1054.286635][ T9425] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1054.298238][ T9425] usb 2-1: config 0 descriptor?? [ 1058.179017][ T9425] arvo 0003:1E7D:30D4.0002: unknown main item tag 0x0 [ 1058.179676][ T9425] arvo 0003:1E7D:30D4.0002: unknown main item tag 0x0 [ 1058.181698][ T9425] arvo 0003:1E7D:30D4.0002: hidraw0: USB HID v0.00 Device [HID 1e7d:30d4] on usb-dummy_hcd.1-1/input0 [ 1061.799765][ T9195] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 1061.987449][ T9195] usb 1-1: Using ep0 maxpacket: 16 [ 1061.993208][ T9195] usb 1-1: config 0 has no interfaces? [ 1061.993797][ T9195] usb 1-1: New USB device found, idVendor=045e, idProduct=05da, bcdDevice= 0.00 [ 1061.994212][ T9195] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1062.000117][ T9195] usb 1-1: config 0 descriptor?? [ 1062.212028][ T9425] usb 1-1: USB disconnect, device number 4 [ 1062.716248][ T31] audit: type=1400 audit(1062.610:510): avc: denied { map } for pid=9963 comm="syz.0.1295" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1062.730432][ T31] audit: type=1400 audit(1062.630:511): avc: denied { call } for pid=9963 comm="syz.0.1295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1069.448325][ T9251] usb 2-1: USB disconnect, device number 6 [ 1104.398580][ T9410] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 1104.681821][ T9410] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1104.697626][ T9410] usb 1-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 1104.798194][ T9410] usb 1-1: New USB device found, idVendor=2294, idProduct=425b, bcdDevice=a2.10 [ 1104.800251][ T9410] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1104.800606][ T9410] usb 1-1: Product: syz [ 1104.800841][ T9410] usb 1-1: Manufacturer: syz [ 1104.801097][ T9410] usb 1-1: SerialNumber: syz [ 1104.818380][ T9410] usb 1-1: config 0 descriptor?? [ 1104.841552][ T9410] usb 1-1: ucan: probing device on interface #0 [ 1104.842218][ T9410] usb 1-1: ucan: invalid EP count (0) [ 1104.842642][ T9410] usb 1-1: ucan: probe failed; try to update the device firmware [ 1107.302490][ T9425] usb 1-1: USB disconnect, device number 5 [ 1112.747392][ T9410] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 1113.037460][ T9410] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1113.038241][ T9410] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1113.038799][ T9410] usb 1-1: New USB device found, idVendor=046d, idProduct=c70e, bcdDevice= 0.00 [ 1113.039189][ T9410] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1113.063905][ T9410] usb 1-1: config 0 descriptor?? [ 1113.640615][ T9410] logitech-djreceiver 0003:046D:C70E.0003: unknown main item tag 0x0 [ 1113.641335][ T9410] logitech-djreceiver 0003:046D:C70E.0003: unknown main item tag 0x0 [ 1113.641751][ T9410] logitech-djreceiver 0003:046D:C70E.0003: unknown main item tag 0x0 [ 1113.642215][ T9410] logitech-djreceiver 0003:046D:C70E.0003: unknown main item tag 0x0 [ 1113.642636][ T9410] logitech-djreceiver 0003:046D:C70E.0003: unknown main item tag 0x0 [ 1113.643050][ T9410] logitech-djreceiver 0003:046D:C70E.0003: unknown main item tag 0x0 [ 1113.643451][ T9410] logitech-djreceiver 0003:046D:C70E.0003: unknown main item tag 0x0 [ 1113.833810][ T9226] usb 1-1: USB disconnect, device number 6 [ 1117.287401][T10122] syz.0.1316[10122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1117.287829][T10122] syz.0.1316[10122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1124.769604][T10138] tap0: tun_chr_ioctl cmd 1074025677 [ 1124.771817][T10138] tap0: linktype set to 1 [ 1136.740433][T10144] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1136.745976][T10144] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1137.909653][ T1069] netdevsim netdevsim1 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1137.910426][ T1069] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1138.045987][ T1069] netdevsim netdevsim1 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1138.046624][ T1069] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1138.143194][ T1069] netdevsim netdevsim1 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1138.143831][ T1069] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1138.281102][ T1069] netdevsim netdevsim1 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1138.281818][ T1069] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1139.252593][ T1069] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1139.272821][ T1069] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1139.291623][ T1069] bond0 (unregistering): Released all slaves [ 1139.298915][ T1069] bond1 (unregistering): Released all slaves [ 1139.546248][ T1069] hsr_slave_0: left promiscuous mode [ 1139.573487][ T1069] hsr_slave_1: left promiscuous mode [ 1139.649525][ T1069] veth1_macvtap: left promiscuous mode [ 1139.650781][ T1069] veth0_macvtap: left promiscuous mode [ 1139.651267][ T1069] veth1_vlan: left promiscuous mode [ 1139.651672][ T1069] veth0_vlan: left promiscuous mode [ 1141.014093][T10144] hsr_slave_0: entered promiscuous mode [ 1141.056308][T10144] hsr_slave_1: entered promiscuous mode [ 1143.175523][T10144] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1143.230359][T10144] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1143.254340][T10144] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1143.315709][T10144] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1145.840900][T10144] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1156.214367][T10144] veth0_vlan: entered promiscuous mode [ 1156.290276][T10144] veth1_vlan: entered promiscuous mode [ 1156.479203][T10144] veth0_macvtap: entered promiscuous mode [ 1156.502829][T10144] veth1_macvtap: entered promiscuous mode [ 1156.621541][T10144] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1156.621880][T10144] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1156.622142][T10144] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1156.622354][T10144] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1171.786508][T10593] input: syz1 as /devices/virtual/input/input10 [ 1173.941881][T10615] fuse: Bad value for 'fd' [ 1177.712262][T10635] fuse: Bad value for 'fd' [ 1185.261994][T10653] fuse: Bad value for 'fd' [ 1208.581773][T10690] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1208.603157][T10690] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1210.850078][T10690] hsr_slave_0: entered promiscuous mode [ 1210.859547][T10690] hsr_slave_1: entered promiscuous mode [ 1210.861593][T10690] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1210.862066][T10690] Cannot create hsr debugfs directory [ 1211.471971][T10690] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1211.568690][T10690] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1211.643854][T10690] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1211.733696][T10690] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1211.911916][T10690] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1211.929365][T10690] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1211.949368][T10690] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1211.972418][T10690] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1213.148166][T10690] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1214.471544][T11061] fuse: Bad value for 'fd' [ 1216.859586][T10690] veth0_vlan: entered promiscuous mode [ 1216.896473][T10690] veth1_vlan: entered promiscuous mode [ 1216.986298][T10690] veth0_macvtap: entered promiscuous mode [ 1217.012699][T10690] veth1_macvtap: entered promiscuous mode [ 1217.109083][T10690] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1217.109732][T10690] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1217.110143][T10690] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1217.110512][T10690] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1231.712553][T11161] input: syz1 as /devices/virtual/input/input11 [ 1234.057814][T10342] dvmrp0 (unregistering): left allmulticast mode [ 1234.073849][T10342] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1234.082224][T10342] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1234.085181][T10342] bond0 (unregistering): Released all slaves [ 1234.179562][T10342] hsr_slave_0: left promiscuous mode [ 1234.182702][T10342] hsr_slave_1: left promiscuous mode [ 1234.195038][T10342] veth1_macvtap: left promiscuous mode [ 1234.195449][T10342] veth0_macvtap: left promiscuous mode [ 1234.195817][T10342] veth1_vlan: left promiscuous mode [ 1234.196159][T10342] veth0_vlan: left promiscuous mode [ 1234.308096][T10342] pimreg3 (unregistering): left allmulticast mode [ 1261.721817][T11256] fuse: Bad value for 'fd' [ 1264.617865][T11254] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1264.629663][T11254] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1265.289017][T11446] input: syz1 as /devices/virtual/input/input12 [ 1265.663344][T11254] hsr_slave_0: entered promiscuous mode [ 1265.666163][T11254] hsr_slave_1: entered promiscuous mode [ 1265.669008][T11254] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1265.669271][T11254] Cannot create hsr debugfs directory [ 1265.991278][T11254] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1266.063289][T11254] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1266.119008][T11254] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1266.196494][T11254] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1266.384306][T11254] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1266.401006][T11254] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1266.414870][T11254] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1266.429433][T11254] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1267.790739][T11254] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1272.541828][T11254] veth0_vlan: entered promiscuous mode [ 1272.571684][T11254] veth1_vlan: entered promiscuous mode [ 1272.661773][T11254] veth0_macvtap: entered promiscuous mode [ 1272.670656][T11254] veth1_macvtap: entered promiscuous mode [ 1272.814058][T11254] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1272.814719][T11254] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1272.816266][T11254] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1272.818416][T11254] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1274.219918][T10342] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1274.232232][T10342] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1274.244274][T10342] bond0 (unregistering): Released all slaves [ 1274.348091][T10342] hsr_slave_0: left promiscuous mode [ 1274.352251][T10342] hsr_slave_1: left promiscuous mode [ 1274.366964][T10342] veth1_macvtap: left promiscuous mode [ 1274.368590][T10342] veth0_macvtap: left promiscuous mode [ 1274.375290][T10342] veth1_vlan: left promiscuous mode [ 1274.375976][T10342] veth0_vlan: left promiscuous mode [ 1281.297968][ T31] audit: type=1400 audit(1281.190:512): avc: denied { getopt } for pid=11663 comm="syz.0.1444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1286.283167][T11689] FAULT_INJECTION: forcing a failure. [ 1286.283167][T11689] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1286.283892][T11689] CPU: 0 UID: 0 PID: 11689 Comm: syz.0.1449 Not tainted 6.11.0-rc6-syzkaller #0 [ 1286.284246][T11689] Hardware name: ARM-Versatile Express [ 1286.284474][T11689] Call trace: [ 1286.284668][T11689] [<8195d0d8>] (dump_backtrace) from [<8195d1d4>] (show_stack+0x18/0x1c) [ 1286.285054][T11689] r7:76b33e1c r6:0000000c r5:60000013 r4:8200ca84 [ 1286.285285][T11689] [<8195d1bc>] (show_stack) from [<8197af14>] (dump_stack_lvl+0x70/0x7c) [ 1286.285591][T11689] [<8197aea4>] (dump_stack_lvl) from [<8197af38>] (dump_stack+0x18/0x1c) [ 1286.286160][T11689] r5:00000000 r4:8274a3d4 [ 1286.286484][T11689] [<8197af20>] (dump_stack) from [<808be628>] (should_fail_ex+0x18c/0x1dc) [ 1286.287544][T11689] [<808be49c>] (should_fail_ex) from [<808be68c>] (should_fail+0x14/0x18) [ 1286.288408][T11689] r6:0000000c r5:e04a1ee4 r4:0000000c [ 1286.288623][T11689] [<808be678>] (should_fail) from [<808be6ac>] (should_fail_usercopy+0x1c/0x20) [ 1286.289343][T11689] [<808be690>] (should_fail_usercopy) from [<81451100>] (move_addr_to_kernel+0x3c/0xe4) [ 1286.289769][T11689] [<814510c4>] (move_addr_to_kernel) from [<814526b4>] (__sys_sendto+0xc0/0x14c) [ 1286.290191][T11689] r9:840ec800 r8:00000004 r7:8319c000 r6:76b33e1c r5:00000000 r4:00000000 [ 1286.290517][T11689] [<814525f4>] (__sys_sendto) from [<8145275c>] (sys_sendto+0x1c/0x24) [ 1286.290992][T11689] r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76b33e1c [ 1286.291298][T11689] [<81452740>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1286.291682][T11689] Exception stack(0xe04a1fa8 to 0xe04a1ff0) [ 1286.291974][T11689] 1fa0: 76b33e1c 0000000c 00000004 76b33eb0 00000020 00000000 [ 1286.292338][T11689] 1fc0: 76b33e1c 0000000c 00000000 00000122 00000004 00000000 76b33eb0 76b350bc [ 1286.292695][T11689] 1fe0: 00000000 76b33df0 000d8318 00135268 [ 1288.441589][T11692] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1450'. [ 1296.070093][T11724] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1455'. [ 1298.586616][T11725] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1298.596118][T11725] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1299.955450][T11725] hsr_slave_0: entered promiscuous mode [ 1299.964293][T11725] hsr_slave_1: entered promiscuous mode [ 1299.966341][T11725] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1299.971469][T11725] Cannot create hsr debugfs directory [ 1300.525064][T12028] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1460'. [ 1300.620604][T11725] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1300.707677][T11725] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1300.737091][T12050] input: syz1 as /devices/virtual/input/input13 [ 1300.810200][T11725] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1300.911141][T11725] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1301.045909][T11725] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1301.052976][T11725] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1301.063377][T11725] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1301.068788][T11725] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1302.284608][T11725] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1304.850404][ T1069] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1304.855833][ T1069] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1304.871441][ T1069] bond0 (unregistering): Released all slaves [ 1304.986461][ T1069] hsr_slave_0: left promiscuous mode [ 1305.000009][ T1069] hsr_slave_1: left promiscuous mode [ 1305.005451][ T1069] veth1_macvtap: left promiscuous mode [ 1305.005862][ T1069] veth0_macvtap: left promiscuous mode [ 1305.006229][ T1069] veth1_vlan: left promiscuous mode [ 1305.006561][ T1069] veth0_vlan: left promiscuous mode [ 1306.920643][T11725] veth0_vlan: entered promiscuous mode [ 1306.960631][T11725] veth1_vlan: entered promiscuous mode [ 1307.042119][T11725] veth0_macvtap: entered promiscuous mode [ 1307.059011][T11725] veth1_macvtap: entered promiscuous mode [ 1307.136283][T11725] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.140448][T11725] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.140963][T11725] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.141415][T11725] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1311.870446][T12124] FAULT_INJECTION: forcing a failure. [ 1311.870446][T12124] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.871168][T12124] CPU: 1 UID: 0 PID: 12124 Comm: syz.1.1464 Not tainted 6.11.0-rc6-syzkaller #0 [ 1311.871520][T12124] Hardware name: ARM-Versatile Express [ 1311.871750][T12124] Call trace: [ 1311.871974][T12124] [<8195d0d8>] (dump_backtrace) from [<8195d1d4>] (show_stack+0x18/0x1c) [ 1311.872402][T12124] r7:00000c40 r6:84217670 r5:60000013 r4:8200ca84 [ 1311.872668][T12124] [<8195d1bc>] (show_stack) from [<8197af14>] (dump_stack_lvl+0x70/0x7c) [ 1311.873025][T12124] [<8197aea4>] (dump_stack_lvl) from [<8197af38>] (dump_stack+0x18/0x1c) [ 1311.873380][T12124] r5:00000000 r4:8271619c [ 1311.873991][T12124] [<8197af20>] (dump_stack) from [<808be628>] (should_fail_ex+0x18c/0x1dc) [ 1311.874429][T12124] [<808be49c>] (should_fail_ex) from [<804dafc8>] (should_failslab+0x6c/0x94) [ 1311.874905][T12124] r6:84217670 r5:00001000 r4:82c016c0 [ 1311.875142][T12124] [<804daf5c>] (should_failslab) from [<804c0d68>] (__kmalloc_noprof+0x9c/0x458) [ 1311.875527][T12124] [<804c0ccc>] (__kmalloc_noprof) from [<80728ae0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1311.875990][T12124] r10:84e7e000 r9:82f90800 r8:00000000 r7:832d1880 r6:84217670 r5:00001000 [ 1311.876323][T12124] r4:00000000 [ 1311.876496][T12124] [<80728aa4>] (tomoyo_realpath_from_path) from [<80724c24>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1311.877318][T12124] r10:84e7e000 r9:00000000 r8:84217600 r7:000089e1 r6:00000004 r5:81ad0e68 [ 1311.877825][T12124] r4:84217670 r3:824b7380 [ 1311.878088][T12124] [<80724b58>] (tomoyo_path_number_perm) from [<807294f0>] (tomoyo_file_ioctl+0x1c/0x20) [ 1311.878640][T12124] r9:00000005 r8:84217600 r7:84217600 r6:000089e1 r5:00000000 r4:822071e4 [ 1311.879057][T12124] [<807294d4>] (tomoyo_file_ioctl) from [<806ec4a8>] (security_file_ioctl+0x40/0x5c) [ 1311.879446][T12124] [<806ec468>] (security_file_ioctl) from [<80520c60>] (sys_ioctl+0x50/0xda4) [ 1311.879841][T12124] r7:00000000 r6:84217601 r5:00000000 r4:000089e1 [ 1311.880108][T12124] [<80520c10>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1311.880474][T12124] Exception stack(0xea96dfa8 to 0xea96dff0) [ 1311.880741][T12124] dfa0: 00000000 00000000 00000005 000089e1 00000000 00000000 [ 1311.881101][T12124] dfc0: 00000000 00000000 00130d80 00000036 00000000 00006364 003d0f00 76af30bc [ 1311.881439][T12124] dfe0: 76af2ec0 76af2eb0 000189f0 00132dd0 [ 1311.881712][T12124] r10:00000036 r9:84e7e000 r8:8020029c r7:00000036 r6:00130d80 r5:00000000 [ 1311.882103][T12124] r4:00000000 [ 1311.883709][T12124] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1313.389805][T12127] input: syz1 as /devices/virtual/input/input14 [ 1334.574052][T12133] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1334.588915][T12133] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1336.255663][T12133] hsr_slave_0: entered promiscuous mode [ 1336.274915][T12133] hsr_slave_1: entered promiscuous mode [ 1337.029808][T12133] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1337.131288][T12133] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1337.215666][T12133] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1337.302434][T12133] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1337.483186][T12133] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1337.497360][T12133] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1337.504852][T12133] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1337.519018][T12133] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1338.460518][T10342] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1338.471704][T10342] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1338.475548][T10342] bond0 (unregistering): Released all slaves [ 1338.589312][T10342] hsr_slave_0: left promiscuous mode [ 1338.590886][T10342] hsr_slave_1: left promiscuous mode [ 1338.593946][T10342] veth1_macvtap: left promiscuous mode [ 1338.594475][T10342] veth0_macvtap: left promiscuous mode [ 1338.595007][T10342] veth1_vlan: left promiscuous mode [ 1338.595254][T10342] veth0_vlan: left promiscuous mode [ 1338.944231][T12133] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1342.724322][T12133] veth0_vlan: entered promiscuous mode [ 1342.754604][T12133] veth1_vlan: entered promiscuous mode [ 1342.881172][T12133] veth0_macvtap: entered promiscuous mode [ 1342.904559][T12133] veth1_macvtap: entered promiscuous mode [ 1343.015122][T12133] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1343.015538][T12133] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1343.015925][T12133] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1343.016210][T12133] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1344.695539][T12484] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1344.715085][T12484] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1345.960238][T12484] hsr_slave_0: entered promiscuous mode [ 1345.962624][T12484] hsr_slave_1: entered promiscuous mode [ 1345.963932][T12484] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1345.964311][T12484] Cannot create hsr debugfs directory [ 1346.343676][T12484] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1346.390405][T12484] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1346.448878][T12484] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1346.531470][T12484] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1346.725529][T12484] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1346.751863][T12484] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1346.770160][T12484] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1346.799831][T12484] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1348.204913][T12484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1357.101066][T10342] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1357.180242][T10342] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1357.220446][T10342] bond0 (unregistering): Released all slaves [ 1357.471211][T10342] hsr_slave_0: left promiscuous mode [ 1357.474194][T10342] hsr_slave_1: left promiscuous mode [ 1357.487951][T10342] veth1_macvtap: left promiscuous mode [ 1357.488498][T10342] veth0_macvtap: left promiscuous mode [ 1357.488917][T10342] veth1_vlan: left promiscuous mode [ 1357.490419][T10342] veth0_vlan: left promiscuous mode [ 1359.170092][T12484] veth0_vlan: entered promiscuous mode [ 1359.200588][T12484] veth1_vlan: entered promiscuous mode [ 1359.281068][T12484] veth0_macvtap: entered promiscuous mode [ 1359.289445][T12484] veth1_macvtap: entered promiscuous mode [ 1359.350819][T12484] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1359.351331][T12484] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1359.351655][T12484] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1359.351991][T12484] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1362.018924][T12895] input: syz1 as /devices/virtual/input/input15 [ 1363.291835][T12901] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12901 comm=syz.0.1477 [ 1370.258796][T12920] input: syz1 as /devices/virtual/input/input16 [ 1393.870588][T12926] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1393.888258][T12926] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1395.596074][T12926] hsr_slave_0: entered promiscuous mode [ 1395.611484][T12926] hsr_slave_1: entered promiscuous mode [ 1395.614791][T12926] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1395.615337][T12926] Cannot create hsr debugfs directory [ 1396.004478][T12926] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1396.076244][T12926] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1396.137001][T12926] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1396.196928][T12926] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1396.349950][T12926] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1396.369596][T12926] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1396.385632][T12926] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1396.400326][T12926] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1397.640651][T12926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1398.920918][T11634] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1398.942083][T11634] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1398.953264][T11634] bond0 (unregistering): Released all slaves [ 1399.065167][T11634] hsr_slave_0: left promiscuous mode [ 1399.072138][T11634] hsr_slave_1: left promiscuous mode [ 1399.078130][T11634] veth1_macvtap: left promiscuous mode [ 1399.078618][T11634] veth0_macvtap: left promiscuous mode [ 1399.079018][T11634] veth1_vlan: left promiscuous mode [ 1399.079366][T11634] veth0_vlan: left promiscuous mode [ 1403.434703][T12926] veth0_vlan: entered promiscuous mode [ 1403.471441][T12926] veth1_vlan: entered promiscuous mode [ 1403.541019][T12926] veth0_macvtap: entered promiscuous mode [ 1403.552790][T12926] veth1_macvtap: entered promiscuous mode [ 1403.595725][T12926] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1403.596372][T12926] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1403.600902][T12926] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1403.601241][T12926] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1404.111830][T13271] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1404.120183][T13271] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1405.178571][T13271] hsr_slave_0: entered promiscuous mode [ 1405.180336][T13271] hsr_slave_1: entered promiscuous mode [ 1405.181506][T13271] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1405.181719][T13271] Cannot create hsr debugfs directory [ 1405.611954][T13271] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1405.686545][T13271] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1405.768934][T13271] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1405.849261][T13271] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1406.025469][T13271] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1406.043785][T13271] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1406.045793][T13605] FAULT_INJECTION: forcing a failure. [ 1406.045793][T13605] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1406.046404][T13605] CPU: 0 UID: 0 PID: 13605 Comm: syz.1.1484 Not tainted 6.11.0-rc6-syzkaller #0 [ 1406.047481][T13605] Hardware name: ARM-Versatile Express [ 1406.047976][T13605] Call trace: [ 1406.048224][T13605] [<8195d0d8>] (dump_backtrace) from [<8195d1d4>] (show_stack+0x18/0x1c) [ 1406.048673][T13605] r7:e006ddec r6:00000000 r5:60000113 r4:8200ca84 [ 1406.049032][T13605] [<8195d1bc>] (show_stack) from [<8197af14>] (dump_stack_lvl+0x70/0x7c) [ 1406.049456][T13605] [<8197aea4>] (dump_stack_lvl) from [<8197af38>] (dump_stack+0x18/0x1c) [ 1406.049874][T13605] r5:00000000 r4:827161f0 [ 1406.050125][T13605] [<8197af20>] (dump_stack) from [<808be628>] (should_fail_ex+0x18c/0x1dc) [ 1406.050555][T13605] [<808be49c>] (should_fail_ex) from [<804db058>] (should_fail_alloc_page+0x68/0x74) [ 1406.051017][T13605] r6:00000000 r5:00140cca r4:e006ddf8 [ 1406.051306][T13605] [<804daff0>] (should_fail_alloc_page) from [<804acb94>] (prepare_alloc_pages.constprop.0+0x88/0x198) [ 1406.051784][T13605] [<804acb0c>] (prepare_alloc_pages.constprop.0) from [<804b3230>] (__alloc_pages_noprof+0xb4/0x1170) [ 1406.052275][T13605] r10:00000000 r9:83f08000 r8:00000000 r7:84e82400 r6:00140cca r5:84e82400 [ 1406.052653][T13605] r4:00000000 r3:e006ddf8 [ 1406.052904][T13605] [<804b317c>] (__alloc_pages_noprof) from [<804b48d8>] (__folio_alloc_noprof+0x14/0x2c) [ 1406.053407][T13605] r10:e006dfb0 r9:83f08000 r8:00000000 r7:00000040 r6:76b57e84 r5:84e82400 [ 1406.053787][T13605] r4:00001255 [ 1406.054124][T13605] [<804b48c4>] (__folio_alloc_noprof) from [<80489734>] (handle_mm_fault+0xcf8/0x12fc) [ 1406.054676][T13605] r5:84e82400 r4:00001255 [ 1406.054938][T13605] [<80488a3c>] (handle_mm_fault) from [<80214270>] (do_page_fault+0x1c8/0x3d8) [ 1406.057224][T13605] r10:00000002 r9:83f08000 r8:00000255 r7:84e82400 r6:00000a07 r5:76b57e84 [ 1406.057638][T13605] r4:e006dfb0 [ 1406.057901][T13605] [<802140a8>] (do_page_fault) from [<80214668>] (do_DataAbort+0x38/0xa8) [ 1406.058483][T13605] r10:003d0f00 r9:00006364 r8:802140a8 r7:e006dfb0 r6:76b57e84 r5:00000a07 [ 1406.059006][T13605] r4:8261cb44 [ 1406.059380][T13605] [<80214630>] (do_DataAbort) from [<80200ebc>] (__dabt_usr+0x5c/0x60) [ 1406.059826][T13605] Exception stack(0xe006dfb0 to 0xe006dff8) [ 1406.060100][T13605] dfa0: 20000040 00000004 00000000 00000000 [ 1406.060473][T13605] dfc0: 76b57eb0 20000040 00000000 00188a94 00000000 00006364 003d0f00 76b590bc [ 1406.061532][T13605] dfe0: 00000000 76b57e80 000189d0 0001b3a4 20000010 ffffffff [ 1406.061910][T13605] r8:824ae044 r7:84e82400 r6:ffffffff r5:20000010 r4:0001b3a4 [ 1406.069614][T13605] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1406.072148][T13271] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1406.082818][T13271] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1407.159737][T13271] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1407.634971][T11634] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1407.644247][T11634] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1407.652604][T11634] bond0 (unregistering): Released all slaves [ 1407.787794][T11634] hsr_slave_0: left promiscuous mode [ 1407.791275][T11634] hsr_slave_1: left promiscuous mode [ 1407.801210][T11634] veth1_macvtap: left promiscuous mode [ 1407.801764][T11634] veth0_macvtap: left promiscuous mode [ 1407.802196][T11634] veth1_vlan: left promiscuous mode [ 1407.802533][T11634] veth0_vlan: left promiscuous mode [ 1410.651888][ T31] audit: type=1326 audit(1410.550:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13644 comm="syz.1.1488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1410.655689][ T31] audit: type=1326 audit(1410.550:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13644 comm="syz.1.1488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1410.661719][ T31] audit: type=1326 audit(1410.550:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13644 comm="syz.1.1488" exe="/syz-executor" sig=0 arch=40000028 syscall=171 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1410.662419][ T31] audit: type=1326 audit(1410.550:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13644 comm="syz.1.1488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1410.662944][ T31] audit: type=1326 audit(1410.550:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13644 comm="syz.1.1488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1412.168024][ T31] audit: type=1400 audit(1412.040:518): avc: denied { create } for pid=13653 comm="syz.1.1491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1412.174315][ T31] audit: type=1400 audit(1412.070:519): avc: denied { write } for pid=13653 comm="syz.1.1491" name="file0" dev="tmpfs" ino=47 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1412.507497][ T31] audit: type=1326 audit(1412.400:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13656 comm="syz.1.1492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1412.508603][ T31] audit: type=1326 audit(1412.400:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13656 comm="syz.1.1492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1412.529561][ T31] audit: type=1326 audit(1412.420:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13656 comm="syz.1.1492" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1413.193957][T13271] veth0_vlan: entered promiscuous mode [ 1413.260471][T13271] veth1_vlan: entered promiscuous mode [ 1413.424122][T13271] veth0_macvtap: entered promiscuous mode [ 1413.454192][T13271] veth1_macvtap: entered promiscuous mode [ 1413.625825][T13271] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1413.626567][T13271] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1413.642124][T13271] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1413.643696][T13271] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1415.976129][T13679] syzkaller0: entered promiscuous mode [ 1415.976410][T13679] syzkaller0: entered allmulticast mode [ 1416.666358][T13685] syz.0.1500[13685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1416.676287][T13685] syz.0.1500[13685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1416.957453][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 1416.957530][ T31] audit: type=1326 audit(1416.850:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13686 comm="syz.0.1501" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1416.959689][ T31] audit: type=1326 audit(1416.860:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13686 comm="syz.0.1501" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1416.962381][ T31] audit: type=1326 audit(1416.860:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13686 comm="syz.0.1501" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1416.964404][ T31] audit: type=1326 audit(1416.860:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13686 comm="syz.0.1501" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1416.973292][ T31] audit: type=1326 audit(1416.870:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13686 comm="syz.0.1501" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1416.987575][ T31] audit: type=1326 audit(1416.880:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13686 comm="syz.0.1501" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1416.993916][ T31] audit: type=1326 audit(1416.890:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13686 comm="syz.0.1501" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1416.998926][ T31] audit: type=1326 audit(1416.900:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13686 comm="syz.0.1501" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1417.002754][ T31] audit: type=1326 audit(1416.900:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13686 comm="syz.0.1501" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1417.003560][ T31] audit: type=1326 audit(1416.900:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13686 comm="syz.0.1501" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1422.958460][T13720] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1512'. [ 1424.033373][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 1424.033517][ T31] audit: type=1400 audit(1423.930:575): avc: denied { mount } for pid=13726 comm="syz.0.1513" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1424.059895][T13727] ======================================================= [ 1424.059895][T13727] WARNING: The mand mount option has been deprecated and [ 1424.059895][T13727] and is ignored by this kernel. Remove the mand [ 1424.059895][T13727] option from the mount to silence this warning. [ 1424.059895][T13727] ======================================================= [ 1424.061328][ T31] audit: type=1400 audit(1423.960:576): avc: denied { remount } for pid=13726 comm="syz.0.1513" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1424.061368][T13727] devtmpfs: Unknown parameter 'mp' [ 1424.150417][ T31] audit: type=1400 audit(1424.050:577): avc: denied { unmount } for pid=13271 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1424.263234][ T31] audit: type=1326 audit(1424.160:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13730 comm="syz.1.1514" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x0 [ 1424.914235][ T31] audit: type=1326 audit(1424.810:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13730 comm="syz.1.1514" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1424.957934][ T31] audit: type=1326 audit(1424.850:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13730 comm="syz.1.1514" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1424.959432][ T31] audit: type=1326 audit(1424.850:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13730 comm="syz.1.1514" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1424.988201][ T31] audit: type=1326 audit(1424.880:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13730 comm="syz.1.1514" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1425.151709][T13738] syzkaller0: entered promiscuous mode [ 1425.158370][T13738] syzkaller0: entered allmulticast mode [ 1425.937082][ T31] audit: type=1326 audit(1425.830:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13745 comm="syz.0.1517" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1425.947858][ T31] audit: type=1326 audit(1425.830:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13745 comm="syz.0.1517" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1426.860341][T13752] block device autoloading is deprecated and will be removed. [ 1426.861848][T13752] syz.0.1519: attempt to access beyond end of device [ 1426.861848][T13752] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 1428.204293][T13770] syz.1.1524[13770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1428.217873][T13770] syz.1.1524[13770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1430.917552][ T31] kauditd_printk_skb: 79 callbacks suppressed [ 1430.917680][ T31] audit: type=1326 audit(1430.810:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13789 comm="syz.0.1530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1430.920977][ T31] audit: type=1326 audit(1430.820:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13789 comm="syz.0.1530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1430.927829][ T31] audit: type=1326 audit(1430.820:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13789 comm="syz.0.1530" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1430.947366][ T31] audit: type=1326 audit(1430.830:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13789 comm="syz.0.1530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1430.948588][ T31] audit: type=1326 audit(1430.830:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13789 comm="syz.0.1530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1430.957535][ T31] audit: type=1326 audit(1430.850:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13789 comm="syz.0.1530" exe="/syz-executor" sig=0 arch=40000028 syscall=324 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1430.958838][ T31] audit: type=1326 audit(1430.850:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13789 comm="syz.0.1530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1430.959531][ T31] audit: type=1326 audit(1430.850:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13789 comm="syz.0.1530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1431.395747][ T31] audit: type=1400 audit(1431.290:672): avc: denied { relabelfrom } for pid=13794 comm="syz.0.1532" name="TCPv6" dev="sockfs" ino=22071 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1431.492139][ T31] audit: type=1326 audit(1431.390:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13796 comm="syz.1.1533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1431.850461][T13801] netlink: 'syz.0.1534': attribute type 10 has an invalid length. [ 1437.031486][T13846] syz.1.1549[13846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1437.037508][T13846] syz.1.1549[13846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1438.640234][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 1438.640332][ T31] audit: type=1326 audit(1438.520:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13852 comm="syz.1.1552" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x0 [ 1439.703139][ T31] audit: type=1326 audit(1439.600:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13852 comm="syz.1.1552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1439.718430][ T31] audit: type=1326 audit(1439.610:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13852 comm="syz.1.1552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1439.721108][ T31] audit: type=1326 audit(1439.610:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13852 comm="syz.1.1552" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1439.778604][ T31] audit: type=1326 audit(1439.640:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13852 comm="syz.1.1552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1439.780229][ T31] audit: type=1326 audit(1439.680:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13852 comm="syz.1.1552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1441.536464][ T31] audit: type=1326 audit(1441.430:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13860 comm="syz.1.1553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1441.539206][ T31] audit: type=1326 audit(1441.430:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13860 comm="syz.1.1553" exe="/syz-executor" sig=0 arch=40000028 syscall=157 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1441.540082][ T31] audit: type=1326 audit(1441.440:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13860 comm="syz.1.1553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1443.372941][ T31] audit: type=1400 audit(1443.270:739): avc: denied { map } for pid=13869 comm="syz.1.1555" path="socket:[22138]" dev="sockfs" ino=22138 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1444.475511][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 1444.475632][ T31] audit: type=1326 audit(1444.370:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13873 comm="syz.1.1556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1444.488053][ T31] audit: type=1326 audit(1444.380:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13873 comm="syz.1.1556" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1444.493506][ T31] audit: type=1326 audit(1444.390:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13873 comm="syz.1.1556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1444.494513][ T31] audit: type=1326 audit(1444.390:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13873 comm="syz.1.1556" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1444.495183][ T31] audit: type=1326 audit(1444.390:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13873 comm="syz.1.1556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1444.496197][ T31] audit: type=1326 audit(1444.390:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13873 comm="syz.1.1556" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1444.505355][ T31] audit: type=1326 audit(1444.390:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13873 comm="syz.1.1556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1444.513352][ T31] audit: type=1326 audit(1444.400:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13873 comm="syz.1.1556" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1444.517254][ T31] audit: type=1326 audit(1444.410:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13873 comm="syz.1.1556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1444.522834][ T31] audit: type=1326 audit(1444.420:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13873 comm="syz.1.1556" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1447.609762][T13886] IPv6: Can't replace route, no match found [ 1455.117665][T13905] raw_sendmsg: syz.1.1567 forgot to set AF_INET. Fix it! [ 1460.075608][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1460.075769][ T31] audit: type=1400 audit(1459.970:763): avc: denied { write } for pid=13923 comm="syz.1.1574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1464.920496][T13945] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1582'. [ 1469.289651][T13854] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 1469.292135][T13854] syz.0.1544: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 1469.302261][T13854] CPU: 0 UID: 0 PID: 13854 Comm: syz.0.1544 Not tainted 6.11.0-rc6-syzkaller #0 [ 1469.302563][T13854] Hardware name: ARM-Versatile Express [ 1469.302690][T13854] Call trace: [ 1469.302798][T13854] [<8195d0d8>] (dump_backtrace) from [<8195d1d4>] (show_stack+0x18/0x1c) [ 1469.303095][T13854] r7:ff800000 r6:82025a1c r5:60000013 r4:8200ca84 [ 1469.303268][T13854] [<8195d1bc>] (show_stack) from [<8197af14>] (dump_stack_lvl+0x70/0x7c) [ 1469.303567][T13854] [<8197aea4>] (dump_stack_lvl) from [<8197af38>] (dump_stack+0x18/0x1c) [ 1469.303902][T13854] r5:84a82400 r4:00000000 [ 1469.304108][T13854] [<8197af20>] (dump_stack) from [<804b30dc>] (warn_alloc+0xd8/0x178) [ 1469.304456][T13854] [<804b3004>] (warn_alloc) from [<804aa2a0>] (__vmalloc_node_range_noprof+0xcc/0x56c) [ 1469.305132][T13854] r3:20000000 r2:82025a1c [ 1469.305298][T13854] r6:00000dc0 r5:00000001 r4:20000000 [ 1469.305446][T13854] [<804aa1d4>] (__vmalloc_node_range_noprof) from [<80461654>] (__kvmalloc_node_noprof+0xc0/0x110) [ 1469.305742][T13854] r10:dfa41d00 r9:84f6e800 r8:81606050 r7:ffffffff r6:00000dc0 r5:20000000 [ 1469.305984][T13854] r4:00000000 [ 1469.306119][T13854] [<80461594>] (__kvmalloc_node_noprof) from [<81606050>] (xt_alloc_entry_offsets+0x24/0x30) [ 1469.306406][T13854] r8:b5403587 r7:00000000 r6:20000360 r5:84f6e840 r4:08000000 [ 1469.306666][T13854] [<8160602c>] (xt_alloc_entry_offsets) from [<816bea2c>] (translate_table+0x70/0x78c) [ 1469.306953][T13854] [<816be9bc>] (translate_table) from [<816bfbe8>] (do_replace+0xe8/0x5a0) [ 1469.307215][T13854] r10:00000126 r9:84f6e840 r8:b5403587 r7:00000238 r6:20000360 r5:84f6e800 [ 1469.307370][T13854] r4:84920000 [ 1469.307454][T13854] [<816bfb00>] (do_replace) from [<816c01d4>] (do_ipt_set_ctl+0x134/0x2a0) [ 1469.307666][T13854] r10:00000126 r9:81453f00 r8:8485e840 r7:00000298 r6:dfa41da8 r5:840fe4c0 [ 1469.307819][T13854] r4:00000040 [ 1469.307905][T13854] [<816c00a0>] (do_ipt_set_ctl) from [<81593b10>] (nf_setsockopt+0x60/0x7c) [ 1469.308166][T13854] r10:00000126 r9:81453f00 r8:8485e840 r7:00000298 r6:840fe4c0 r5:816c00a0 [ 1469.308387][T13854] r4:827e0520 [ 1469.308506][T13854] [<81593ab4>] (nf_setsockopt) from [<8162bcec>] (ip_setsockopt+0x88/0x98) [ 1469.308776][T13854] r6:840fe4c0 r5:00000298 r4:00000040 [ 1469.309018][T13854] [<8162bc68>] (ip_setsockopt) from [<8163b790>] (tcp_setsockopt+0x3c/0x58) [ 1469.309398][T13854] r6:00000000 r5:8485e400 r4:8162bc64 [ 1469.309614][T13854] [<8163b758>] (tcp_setsockopt) from [<81453f38>] (sock_common_setsockopt+0x38/0x40) [ 1469.309882][T13854] r4:8163b754 [ 1469.310108][T13854] [<81453f04>] (sock_common_setsockopt) from [<81867640>] (smc_setsockopt+0xa8/0x3c8) [ 1469.310430][T13854] r4:00000040 [ 1469.310541][T13854] [<8186759c>] (smc_setsockopt) from [<8144f554>] (do_sock_setsockopt+0xb0/0x17c) [ 1469.310861][T13854] r9:84a82400 r8:8020029c r7:00000000 r6:8445cc80 r5:00000000 r4:81867598 [ 1469.311174][T13854] [<8144f4a4>] (do_sock_setsockopt) from [<81452a54>] (sys_setsockopt+0x78/0xbc) [ 1469.311733][T13854] r6:8445cc80 r5:00000040 r4:00000000 [ 1469.312157][T13854] [<814529dc>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1469.312549][T13854] Exception stack(0xdfa41fa8 to 0xdfa41ff0) [ 1469.312854][T13854] 1fa0: 00000298 00000000 00000008 00000000 00000040 20000300 [ 1469.313773][T13854] 1fc0: 00000298 00000000 00286388 00000126 00000000 00006364 003d0f00 76b6f0bc [ 1469.314144][T13854] 1fe0: 76b6eec0 76b6eeb0 000189f0 00132dd0 [ 1469.314324][T13854] r7:00000126 r6:00286388 r5:00000000 r4:00000298 [ 1469.320398][T13854] Mem-Info: [ 1469.320684][T13854] active_anon:1305 inactive_anon:0 isolated_anon:0 [ 1469.320684][T13854] active_file:145 inactive_file:38797 isolated_file:0 [ 1469.320684][T13854] unevictable:768 dirty:12 writeback:0 [ 1469.320684][T13854] slab_reclaimable:1016 slab_unreclaimable:6068 [ 1469.320684][T13854] mapped:1741 shmem:862 pagetables:205 [ 1469.320684][T13854] sec_pagetables:0 bounce:0 [ 1469.320684][T13854] kernel_misc_reclaimable:0 [ 1469.320684][T13854] free:439088 free_pcp:694 free_cma:4032 [ 1469.321588][T13854] Node 0 active_anon:5220kB inactive_anon:0kB active_file:580kB inactive_file:155188kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:6964kB dirty:48kB writeback:0kB shmem:3448kB writeback_tmp:0kB kernel_stack:1952kB pagetables:820kB sec_pagetables:0kB all_unreclaimable? no [ 1469.322359][T13854] Normal free:1388536kB boost:0kB min:4776kB low:6204kB high:7632kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:2384kB unevictable:0kB writepending:28kB present:1556480kB managed:1430068kB mlocked:0kB bounce:0kB free_pcp:2776kB local_pcp:1276kB free_cma:0kB [ 1469.323265][T13854] lowmem_reserve[]: 0 4224 0 [ 1469.323428][T13854] Normal: 0*4kB 1*8kB (M) 3*16kB (UME) 8*32kB (UE) 7*64kB (E) 4*128kB (UE) 3*256kB (UE) 6*512kB (UME) 5*1024kB (UM) 3*2048kB (ME) 335*4096kB (UM) = 1388536kB [ 1469.324004][T13854] 39806 total pagecache pages [ 1469.324099][T13854] 0 pages in swap cache [ 1469.324180][T13854] Free swap = 124996kB [ 1469.324337][T13854] Total swap = 124996kB [ 1469.329740][T13854] 524288 pages RAM [ 1469.329976][T13854] 135168 pages HighMem/MovableOnly [ 1469.330167][T13854] 31603 pages reserved [ 1469.330318][T13854] 4096 pages cma reserved [ 1469.390416][T13933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1469.420122][T13933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1469.651691][T10342] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.708085][T10342] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.798471][T10342] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.845023][T10342] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1470.213083][T10342] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1470.223569][T10342] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1470.232547][T10342] bond0 (unregistering): Released all slaves [ 1470.375566][T10342] hsr_slave_0: left promiscuous mode [ 1470.379887][T10342] hsr_slave_1: left promiscuous mode [ 1470.386346][T10342] veth1_macvtap: left promiscuous mode [ 1470.398217][T10342] veth0_macvtap: left promiscuous mode [ 1470.399052][T10342] veth1_vlan: left promiscuous mode [ 1470.399562][T10342] veth0_vlan: left promiscuous mode [ 1471.090105][T13933] hsr_slave_0: entered promiscuous mode [ 1471.094699][T13933] hsr_slave_1: entered promiscuous mode [ 1472.024194][T13933] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1472.052057][T13933] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1472.070902][T13933] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1472.089823][T13933] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1473.532373][T13933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1476.633869][T13933] veth0_vlan: entered promiscuous mode [ 1476.661507][T13933] veth1_vlan: entered promiscuous mode [ 1476.757550][T13933] veth0_macvtap: entered promiscuous mode [ 1476.772337][T13933] veth1_macvtap: entered promiscuous mode [ 1476.853753][T13933] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1476.854361][T13933] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1476.854948][T13933] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1476.855472][T13933] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1480.140001][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1489.650609][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1493.303030][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1520.137939][T14484] bridge_slave_0: default FDB implementation only supports local addresses [ 1523.594572][ T31] audit: type=1400 audit(1523.490:764): avc: denied { connect } for pid=14488 comm="syz.0.1646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1523.615849][ T31] audit: type=1400 audit(1523.510:765): avc: denied { bind } for pid=14488 comm="syz.0.1646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1526.848078][T14501] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1649'. [ 1526.848948][T14501] netlink: 356 bytes leftover after parsing attributes in process `syz.0.1649'. [ 1533.408477][T14511] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1653'. [ 1544.343864][ T31] audit: type=1326 audit(1544.240:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14541 comm="syz.1.1664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1544.361855][ T31] audit: type=1326 audit(1544.250:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14541 comm="syz.1.1664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1544.363019][ T31] audit: type=1326 audit(1544.260:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14541 comm="syz.1.1664" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1544.378169][ T31] audit: type=1326 audit(1544.270:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14541 comm="syz.1.1664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1544.387507][ T31] audit: type=1326 audit(1544.280:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14541 comm="syz.1.1664" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1544.404567][ T31] audit: type=1326 audit(1544.300:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14541 comm="syz.1.1664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1544.405553][ T31] audit: type=1326 audit(1544.300:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14541 comm="syz.1.1664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1544.406682][ T31] audit: type=1326 audit(1544.300:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14541 comm="syz.1.1664" exe="/syz-executor" sig=0 arch=40000028 syscall=332 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1544.419233][ T31] audit: type=1326 audit(1544.300:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14541 comm="syz.1.1664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1544.421008][ T31] audit: type=1326 audit(1544.300:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14541 comm="syz.1.1664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1544.721086][T14544] syz.1.1665[14544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1544.726529][T14544] syz.1.1665[14544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1545.462748][T13797] usb 2-1: new full-speed USB device number 7 using dummy_hcd [ 1545.739595][T13797] usb 2-1: config 17 interface 0 altsetting 0 endpoint 0x8B has invalid maxpacket 65535, setting to 64 [ 1545.744448][T13797] usb 2-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 1545.747857][T13797] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1545.785559][T14546] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1546.937644][T13797] aiptek 2-1:17.0: Aiptek using 400 ms programming speed [ 1546.941766][T13797] input: Aiptek as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:17.0/input/input17 [ 1547.039815][T13797] usb 2-1: USB disconnect, device number 7 [ 1547.040045][ C1] aiptek 2-1:17.0: aiptek_irq - usb_submit_urb failed with result -19 [ 1591.037177][T13772] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 1591.229317][T13772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1591.231290][T13772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1591.250271][T13772] usb 2-1: New USB device found, idVendor=046d, idProduct=c086, bcdDevice= 0.00 [ 1591.250762][T13772] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1591.299426][T13772] usb 2-1: config 0 descriptor?? [ 1592.017661][T13772] logitech-hidpp-device 0003:046D:C086.0004: hidraw0: USB HID v0.00 Device [HID 046d:c086] on usb-dummy_hcd.1-1/input0 [ 1592.138003][T13821] usb 2-1: USB disconnect, device number 8 [ 1597.453089][T14632] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1678'. [ 1605.978535][T14640] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1681'. [ 1614.998102][T13773] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 1615.197574][T13773] usb 2-1: Using ep0 maxpacket: 32 [ 1615.233881][T13773] usb 2-1: config 4 has an invalid descriptor of length 0, skipping remainder of the config [ 1615.234277][T13773] usb 2-1: config 4 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 1615.234544][T13773] usb 2-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 1615.234760][T13773] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1615.262116][T13773] hub 2-1:4.0: bad descriptor, ignoring hub [ 1615.262411][T13773] hub 2-1:4.0: probe with driver hub failed with error -5 [ 1615.263604][T13773] usbhid 2-1:4.0: couldn't find an input interrupt endpoint [ 1615.469329][T14642] ptrace attach of "/syz-executor exec"[12926] was attempted by "/syz-executor exec"[14642] [ 1615.508182][T14642] input: syz0 as /devices/virtual/input/input18 [ 1626.367779][T13779] usb 2-1: USB disconnect, device number 9 [ 1640.732399][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 1640.732510][ T31] audit: type=1400 audit(1640.630:777): avc: denied { setopt } for pid=14679 comm="syz.0.1689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1642.337139][ T31] audit: type=1326 audit(1642.230:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14685 comm="syz.0.1691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1642.347664][ T31] audit: type=1326 audit(1642.240:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14685 comm="syz.0.1691" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1642.377399][ T31] audit: type=1326 audit(1642.270:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14685 comm="syz.0.1691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1642.379247][ T31] audit: type=1326 audit(1642.270:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14685 comm="syz.0.1691" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1642.380267][ T31] audit: type=1326 audit(1642.270:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14685 comm="syz.0.1691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1642.393934][ T31] audit: type=1326 audit(1642.290:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14685 comm="syz.0.1691" exe="/syz-executor" sig=0 arch=40000028 syscall=325 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1642.395414][ T31] audit: type=1326 audit(1642.290:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14685 comm="syz.0.1691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1642.396205][ T31] audit: type=1326 audit(1642.290:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14685 comm="syz.0.1691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1653.655407][T14794] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2052 sclass=netlink_audit_socket pid=14794 comm=syz.1.1734 [ 1689.630876][T15148] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=15148 comm=syz.1.1906 [ 1690.838435][ T31] audit: type=1400 audit(1690.740:786): avc: denied { mount } for pid=15161 comm="syz.0.1913" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1690.948285][ T31] audit: type=1400 audit(1690.840:787): avc: denied { unmount } for pid=13933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1718.198501][T15310] serio: Serial port pts0 [ 1729.511270][T15368] serio: Serial port pts0 [ 1758.731211][T15513] serio: Serial port pts0 [ 1772.859259][T15658] fuse: Bad value for 'fd' [ 1774.713460][T15668] fuse: Bad value for 'fd' [ 1781.271933][ T31] audit: type=1400 audit(1781.170:788): avc: denied { getopt } for pid=15714 comm="syz.0.2150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1792.381505][T15792] serio: Serial port pts0 [ 1800.682681][T15825] serio: Serial port pts0 [ 1814.351288][T15890] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15890 comm=syz.1.2225 [ 1819.686508][T15921] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1538 sclass=netlink_tcpdiag_socket pid=15921 comm=syz.0.2238 [ 1825.210922][T15961] fuse: Bad value for 'group_id' [ 1825.211447][T15961] fuse: Bad value for 'group_id' [ 1830.350839][T15993] serio: Serial port pts0 [ 1832.449734][T16011] serio: Serial port pts0 [ 1835.454570][T16032] serio: Serial port pts0 [ 1866.578249][T16235] fuse: Bad value for 'user_id' [ 1866.579895][T16235] fuse: Bad value for 'user_id' [ 1870.151471][T16250] fuse: Bad value for 'fd' [ 1871.710102][T16262] fuse: Bad value for 'fd' [ 1874.132462][T16276] fuse: Bad value for 'fd' [ 1875.803071][T16286] fuse: Bad value for 'fd' [ 1878.150061][T16300] fuse: Bad value for 'fd' [ 1879.973084][T16313] fuse: Bad value for 'fd' [ 1882.755913][T16330] fuse: Invalid rootmode [ 1886.112359][T16357] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16357 comm=syz.0.2421 [ 1890.966489][T16381] fuse: Bad value for 'rootmode' [ 1892.916471][T16395] fuse: Bad value for 'rootmode' [ 1895.315824][T16407] fuse: Bad value for 'rootmode' [ 1896.765605][T16422] fuse: Unknown parameter 'use00000000000000000000' [ 1905.835945][T16479] fuse: Unknown parameter 'user_i00000000000000000000' [ 1909.953508][T16505] fuse: Unknown parameter 'user_id00000000000000000000' [ 1911.835590][T16522] fuse: Unknown parameter 'user_id00000000000000000000' [ 1913.951682][T16539] fuse: Unknown parameter 'user_id00000000000000000000' [ 1918.465143][T16551] fuse: Bad value for 'fd' [ 1922.118611][T16566] fuse: Bad value for 'fd' [ 1928.766144][T16589] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 1928.767511][T16589] syz.0.2515: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 1928.768374][T16589] CPU: 0 UID: 0 PID: 16589 Comm: syz.0.2515 Not tainted 6.11.0-rc6-syzkaller #0 [ 1928.768765][T16589] Hardware name: ARM-Versatile Express [ 1928.769048][T16589] Call trace: [ 1928.769261][T16589] [<8195d0d8>] (dump_backtrace) from [<8195d1d4>] (show_stack+0x18/0x1c) [ 1928.769704][T16589] r7:ff800000 r6:82025a1c r5:60000013 r4:8200ca84 [ 1928.770042][T16589] [<8195d1bc>] (show_stack) from [<8197af14>] (dump_stack_lvl+0x70/0x7c) [ 1928.771439][T16589] [<8197aea4>] (dump_stack_lvl) from [<8197af38>] (dump_stack+0x18/0x1c) [ 1928.772282][T16589] r5:850d1800 r4:00000000 [ 1928.772589][T16589] [<8197af20>] (dump_stack) from [<804b30dc>] (warn_alloc+0xd8/0x178) [ 1928.773021][T16589] [<804b3004>] (warn_alloc) from [<804aa2a0>] (__vmalloc_node_range_noprof+0xcc/0x56c) [ 1928.773485][T16589] r3:20000000 r2:82025a1c [ 1928.773746][T16589] r6:00000dc0 r5:00000001 r4:20000000 [ 1928.774502][T16589] [<804aa1d4>] (__vmalloc_node_range_noprof) from [<80461654>] (__kvmalloc_node_noprof+0xc0/0x110) [ 1928.775176][T16589] r10:dfa59d00 r9:84f26000 r8:81606050 r7:ffffffff r6:00000dc0 r5:20000000 [ 1928.778042][T16589] r4:00000000 [ 1928.779029][T16589] [<80461594>] (__kvmalloc_node_noprof) from [<81606050>] (xt_alloc_entry_offsets+0x24/0x30) [ 1928.781566][T16589] r8:b5403587 r7:00000000 r6:20000360 r5:84f26040 r4:08000000 [ 1928.783904][T16589] [<8160602c>] (xt_alloc_entry_offsets) from [<816bea2c>] (translate_table+0x70/0x78c) [ 1928.784529][T16589] [<816be9bc>] (translate_table) from [<816bfbe8>] (do_replace+0xe8/0x5a0) [ 1928.785045][T16589] r10:00000126 r9:84f26040 r8:b5403587 r7:00000238 r6:20000360 r5:84f26000 [ 1928.785555][T16589] r4:84a38d00 [ 1928.785781][T16589] [<816bfb00>] (do_replace) from [<816c01d4>] (do_ipt_set_ctl+0x134/0x2a0) [ 1928.786269][T16589] r10:00000126 r9:81453f00 r8:8485c8c0 r7:00000298 r6:dfa59da8 r5:840fdd00 [ 1928.786670][T16589] r4:00000040 [ 1928.786890][T16589] [<816c00a0>] (do_ipt_set_ctl) from [<81593b10>] (nf_setsockopt+0x60/0x7c) [ 1928.787355][T16589] r10:00000126 r9:81453f00 r8:8485c8c0 r7:00000298 r6:840fdd00 r5:816c00a0 [ 1928.787751][T16589] r4:827e0520 [ 1928.788006][T16589] [<81593ab4>] (nf_setsockopt) from [<8162bcec>] (ip_setsockopt+0x88/0x98) [ 1928.788460][T16589] r6:840fdd00 r5:00000298 r4:00000040 [ 1928.788747][T16589] [<8162bc68>] (ip_setsockopt) from [<8163b790>] (tcp_setsockopt+0x3c/0x58) [ 1928.789218][T16589] r6:00000000 r5:8485c480 r4:8162bc64 [ 1928.789508][T16589] [<8163b758>] (tcp_setsockopt) from [<81453f38>] (sock_common_setsockopt+0x38/0x40) [ 1928.789985][T16589] r4:8163b754 [ 1928.790222][T16589] [<81453f04>] (sock_common_setsockopt) from [<81867640>] (smc_setsockopt+0xa8/0x3c8) [ 1928.790693][T16589] r4:00000040 [ 1928.790923][T16589] [<8186759c>] (smc_setsockopt) from [<8144f554>] (do_sock_setsockopt+0xb0/0x17c) [ 1928.791464][T16589] r9:850d1800 r8:8020029c r7:00000000 r6:8445ca00 r5:00000000 r4:81867598 [ 1928.791868][T16589] [<8144f4a4>] (do_sock_setsockopt) from [<81452a54>] (sys_setsockopt+0x78/0xbc) [ 1928.792340][T16589] r6:8445ca00 r5:00000040 r4:00000000 [ 1928.792709][T16589] [<814529dc>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1928.793158][T16589] Exception stack(0xdfa59fa8 to 0xdfa59ff0) [ 1928.793507][T16589] 9fa0: 00000298 00000000 00000003 00000000 00000040 20000300 [ 1928.793929][T16589] 9fc0: 00000298 00000000 002862f8 00000126 00000000 00006364 003d0f00 76b3a0bc [ 1928.794361][T16589] 9fe0: 76b39ec0 76b39eb0 000189f0 00132dd0 [ 1928.794679][T16589] r7:00000126 r6:002862f8 r5:00000000 r4:00000298 [ 1928.797067][T16589] Mem-Info: [ 1928.797515][T16589] active_anon:1284 inactive_anon:0 isolated_anon:0 [ 1928.797515][T16589] active_file:145 inactive_file:38956 isolated_file:0 [ 1928.797515][T16589] unevictable:768 dirty:17 writeback:0 [ 1928.797515][T16589] slab_reclaimable:1016 slab_unreclaimable:5867 [ 1928.797515][T16589] mapped:1748 shmem:869 pagetables:197 [ 1928.797515][T16589] sec_pagetables:0 bounce:0 [ 1928.797515][T16589] kernel_misc_reclaimable:0 [ 1928.797515][T16589] free:439112 free_pcp:1008 free_cma:4032 [ 1928.799230][T16589] Node 0 active_anon:5136kB inactive_anon:0kB active_file:580kB inactive_file:155824kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:6992kB dirty:68kB writeback:0kB shmem:3476kB writeback_tmp:0kB kernel_stack:1920kB pagetables:788kB sec_pagetables:0kB all_unreclaimable? no [ 1928.800269][T16589] Normal free:1387380kB boost:0kB min:4776kB low:6204kB high:7632kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:3020kB unevictable:0kB writepending:28kB present:1556480kB managed:1430068kB mlocked:0kB bounce:0kB free_pcp:4032kB local_pcp:2188kB free_cma:0kB [ 1928.801271][T16589] lowmem_reserve[]: 0 4224 0 [ 1928.801590][T16589] Normal: 1*4kB (M) 2*8kB (UM) 2*16kB (ME) 8*32kB (UE) 7*64kB (E) 1*128kB (E) 2*256kB (ME) 5*512kB (UME) 5*1024kB (UM) 3*2048kB (ME) 335*4096kB (UM) = 1387380kB [ 1928.802753][T16589] 39970 total pagecache pages [ 1928.802994][T16589] 0 pages in swap cache [ 1928.803222][T16589] Free swap = 124996kB [ 1928.803442][T16589] Total swap = 124996kB [ 1928.803676][T16589] 524288 pages RAM [ 1928.803872][T16589] 135168 pages HighMem/MovableOnly [ 1928.804123][T16589] 31603 pages reserved [ 1928.804334][T16589] 4096 pages cma reserved [ 1929.384623][T16603] input: syz0 as /devices/virtual/input/input19 [ 1946.262467][T16663] fuse: Unknown parameter 'fd00000000000000000003' [ 1959.650645][T13258] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1959.805755][T13258] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1960.021267][T13258] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1960.123478][T13258] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1960.958968][T13258] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1961.012894][T13258] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1961.026420][T13258] bond0 (unregistering): Released all slaves [ 1961.321084][T13258] hsr_slave_0: left promiscuous mode [ 1961.340727][T13258] hsr_slave_1: left promiscuous mode [ 1961.383479][T13258] veth1_macvtap: left promiscuous mode [ 1961.384057][T13258] veth0_macvtap: left promiscuous mode [ 1961.384497][T13258] veth1_vlan: left promiscuous mode [ 1961.384869][T13258] veth0_vlan: left promiscuous mode [ 1969.771226][T16708] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1969.802871][T16708] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1970.801286][T16714] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1970.870899][T16714] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1973.178651][T16708] hsr_slave_0: entered promiscuous mode [ 1973.195210][T16708] hsr_slave_1: entered promiscuous mode [ 1973.202739][T16708] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1973.204408][T16708] Cannot create hsr debugfs directory [ 1974.229913][T16714] hsr_slave_0: entered promiscuous mode [ 1974.268229][T16714] hsr_slave_1: entered promiscuous mode [ 1974.275821][T16714] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1974.276339][T16714] Cannot create hsr debugfs directory [ 1974.641804][T16708] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1974.672522][T16708] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1974.684436][T16708] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1974.713006][T16708] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1974.925861][T16714] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1975.015102][T16714] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1975.119612][T16714] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1975.212033][T16714] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1975.375674][T16714] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1975.390159][T16714] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1975.408361][T16714] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1975.423102][T16714] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1976.675335][T16708] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1977.323846][T16714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1984.643822][T16708] veth0_vlan: entered promiscuous mode [ 1984.685333][T16708] veth1_vlan: entered promiscuous mode [ 1984.823482][T16708] veth0_macvtap: entered promiscuous mode [ 1984.845227][T16708] veth1_macvtap: entered promiscuous mode [ 1985.008973][T16714] veth0_vlan: entered promiscuous mode [ 1985.024537][T16708] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1985.025141][T16708] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1985.025532][T16708] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1985.025908][T16708] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1985.070100][T16714] veth1_vlan: entered promiscuous mode [ 1985.270501][T16714] veth0_macvtap: entered promiscuous mode [ 1985.330631][T16714] veth1_macvtap: entered promiscuous mode [ 1985.519204][T16714] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1985.521029][T16714] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1985.522543][T16714] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1985.524172][T16714] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2021.642375][T17692] fuse: Bad value for 'group_id' [ 2021.642814][T17692] fuse: Bad value for 'group_id' [ 2023.471643][T17704] fuse: Bad value for 'group_id' [ 2023.473022][T17704] fuse: Bad value for 'group_id' [ 2025.692831][T17717] fuse: Bad value for 'group_id' [ 2025.693536][T17717] fuse: Bad value for 'group_id' [ 2044.432994][T17825] fuse: Unknown parameter 'grou00000000000000000000' [ 2046.803037][T17840] fuse: Unknown parameter 'group_i00000000000000000000' [ 2056.040361][T17904] fuse: Unknown parameter 'group_id00000000000000000000' [ 2075.850223][T18053] fuse: Invalid rootmode [ 2077.166055][T18063] fuse: Invalid rootmode [ 2082.388886][T18102] fuse: Unknown parameter 'grou00000000000000000000' [ 2083.881547][T18112] fuse: Unknown parameter 'use00000000000000000000' [ 2088.559783][T18152] fuse: Unknown parameter 'user_i00000000000000000000' [ 2089.382925][T16711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2089.438410][T16711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2089.484793][T16711] bond0 (unregistering): Released all slaves [ 2089.979934][T16711] hsr_slave_0: left promiscuous mode [ 2089.997606][T18168] fuse: Unknown parameter 'user_i00000000000000000000' [ 2090.011717][T16711] hsr_slave_1: left promiscuous mode [ 2090.018049][T16711] veth1_macvtap: left promiscuous mode [ 2090.018597][T16711] veth0_macvtap: left promiscuous mode [ 2090.020757][T16711] veth1_vlan: left promiscuous mode [ 2090.021136][T16711] veth0_vlan: left promiscuous mode [ 2091.677456][ T31] audit: type=1400 audit(2091.570:789): avc: denied { read } for pid=18185 comm="syz.0.2879" path="socket:[34221]" dev="sockfs" ino=34221 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2093.137695][T18200] fuse: Unknown parameter 'user_id00000000000000000000' [ 2093.516408][T18204] fuse: Unknown parameter 'group_id00000000000000000000' [ 2094.914420][T18217] fuse: Unknown parameter 'user_id00000000000000000000' [ 2096.650369][T18233] fuse: Unknown parameter 'user_id00000000000000000000' [ 2098.204643][T18251] fuse: Bad value for 'fd' [ 2099.405148][T18264] fuse: Bad value for 'fd' [ 2100.770332][T18276] fuse: Bad value for 'fd' [ 2101.009731][T18278] fuse: Bad value for 'fd' [ 2102.367977][T18292] fuse: Bad value for 'fd' [ 2103.584492][T18303] fuse: Bad value for 'fd' [ 2105.043151][T18319] fuse: Unknown parameter '0x0000000000000003' [ 2106.388893][T18331] fuse: Unknown parameter '0x0000000000000003' [ 2107.641605][T18348] fuse: Unknown parameter '0x0000000000000003' [ 2108.986176][T18364] fuse: Unknown parameter '0x0000000000000003' [ 2109.398361][T18369] fuse: Bad value for 'fd' [ 2110.590302][T18384] fuse: Invalid rootmode [ 2115.078865][T18437] fuse: Bad value for 'rootmode' [ 2116.513732][T18452] fuse: Bad value for 'rootmode' [ 2117.662881][T18465] fuse: Bad value for 'rootmode' [ 2122.733679][T18509] fuse: Unknown parameter 'use00000000000000000000' [ 2128.853404][T18566] fuse: Unknown parameter 'user_i00000000000000000000' [ 2130.225742][T18582] fuse: Unknown parameter 'user_id00000000000000000000' [ 2131.708012][T18596] fuse: Unknown parameter 'user_id00000000000000000000' [ 2133.242293][T18612] fuse: Unknown parameter 'user_id00000000000000000000' [ 2134.651982][T18626] fuse: Bad value for 'fd' [ 2136.071040][T18641] fuse: Bad value for 'fd' [ 2147.329220][T18735] fuse: Unknown parameter '0x0000000000000004' [ 2148.950433][T18749] fuse: Unknown parameter '0x0000000000000004' [ 2152.840842][T18788] fuse: Unknown parameter 'fd0x0000000000000004' [ 2225.607739][T19436] serio: Serial port pts0 [ 2233.839371][T19509] serio: Serial port pts0 [ 2257.840677][T19720] serio: Serial port pts0 [ 2265.782768][T19799] serio: Serial port pts0 [ 2289.906061][T19951] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19951 comm=syz.0.3581 [ 2292.831147][T19974] fuse: Bad value for 'fd' [ 2302.077492][T20061] serio: Serial port pts0 [ 2309.062206][T20102] serio: Serial port pts0 [ 2317.443808][T20146] fuse: Bad value for 'group_id' [ 2317.444191][T20146] fuse: Bad value for 'group_id' [ 2334.167162][T20279] serio: Serial port pts0 [ 2334.245264][T20281] fuse: Unknown parameter 'group_i00000000000000000000' [ 2335.753015][T20294] fuse: Unknown parameter 'group_i00000000000000000000' [ 2340.321988][T16711] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2340.552132][T16711] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2340.690308][T16711] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2340.860355][T16711] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2341.780637][T16711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2341.888386][T16711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2341.928765][T16711] bond0 (unregistering): Released all slaves [ 2342.135457][T16711] hsr_slave_0: left promiscuous mode [ 2342.164392][T16711] hsr_slave_1: left promiscuous mode [ 2342.217471][T16711] veth1_macvtap: left promiscuous mode [ 2342.217961][T16711] veth0_macvtap: left promiscuous mode [ 2342.218447][T16711] veth1_vlan: left promiscuous mode [ 2342.218786][T16711] veth0_vlan: left promiscuous mode [ 2342.367322][T20354] fuse: Unknown parameter 'group_id00000000000000000000' [ 2343.473978][T20363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20363 comm=syz.1.3756 [ 2343.887890][T20367] fuse: Bad value for 'user_id' [ 2343.888472][T20367] fuse: Bad value for 'user_id' [ 2349.490377][T20332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2349.538729][T20332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2352.650457][T20332] hsr_slave_0: entered promiscuous mode [ 2352.662964][T20332] hsr_slave_1: entered promiscuous mode [ 2354.636014][T20332] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2354.670139][T20332] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2354.706204][T20332] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2354.758579][T20332] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2357.568521][T20332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2367.305114][T20332] veth0_vlan: entered promiscuous mode [ 2367.352118][T20332] veth1_vlan: entered promiscuous mode [ 2367.590178][T20332] veth0_macvtap: entered promiscuous mode [ 2367.595479][T20332] veth1_macvtap: entered promiscuous mode [ 2367.759201][T20332] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2367.759714][T20332] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2367.760062][T20332] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2367.760362][T20332] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2368.749624][T13258] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2368.923024][T13258] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2369.111264][T13258] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2369.323612][T13258] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2369.660216][T20877] fuse: Bad value for 'rootmode' [ 2370.353961][T13258] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2370.446154][T13258] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2370.511109][T13258] bond0 (unregistering): Released all slaves [ 2370.683364][T13258] hsr_slave_0: left promiscuous mode [ 2370.692849][T13258] hsr_slave_1: left promiscuous mode [ 2370.777627][T13258] veth1_macvtap: left promiscuous mode [ 2370.778124][T13258] veth0_macvtap: left promiscuous mode [ 2370.778681][T13258] veth1_vlan: left promiscuous mode [ 2370.779076][T13258] veth0_vlan: left promiscuous mode [ 2375.008815][T20993] fuse: Unknown parameter 'use00000000000000000000' [ 2377.123274][T20870] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2377.140361][T20870] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2377.594691][T21111] fuse: Unknown parameter 'use00000000000000000000' [ 2380.522781][T20870] hsr_slave_0: entered promiscuous mode [ 2380.540428][T20870] hsr_slave_1: entered promiscuous mode [ 2380.549476][T20870] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2380.549945][T20870] Cannot create hsr debugfs directory [ 2381.881853][T20870] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2381.903835][T20870] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2381.930181][T20870] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2381.938131][T20870] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2384.754962][T20870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2394.619592][T21368] fuse: Bad value for 'fd' [ 2395.264387][T20870] veth0_vlan: entered promiscuous mode [ 2395.335845][T20870] veth1_vlan: entered promiscuous mode [ 2395.578808][T20870] veth0_macvtap: entered promiscuous mode [ 2395.594567][T20870] veth1_macvtap: entered promiscuous mode [ 2395.854695][T20870] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2395.855183][T20870] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2395.855472][T20870] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2395.855764][T20870] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2398.359575][T21388] fuse: Unknown parameter '00000000000000000003' [ 2399.665138][T21401] fuse: Unknown parameter '00000000000000000003' [ 2400.683396][T21412] fuse: Unknown parameter '00000000000000000003' [ 2408.302395][T21473] fuse: Unknown parameter 'fd00000000000000000003' [ 2426.708924][T21609] fuse: Bad value for 'fd' [ 2428.561044][T21621] fuse: Bad value for 'fd' [ 2430.168572][T21633] fuse: Bad value for 'fd' [ 2444.713355][T21771] fuse: Bad value for 'fd' [ 2462.940924][T21934] fuse: Bad value for 'group_id' [ 2462.941311][T21934] fuse: Bad value for 'group_id' [ 2472.099577][T22022] fuse: Bad value for 'fd' [ 2476.592172][T22059] serio: Serial port pts0 [ 2479.487721][T22072] fuse: Unknown parameter 'grou00000000000000000000' [ 2482.628259][T22083] fuse: Unknown parameter 'grou00000000000000000000' [ 2483.632115][T22096] fuse: Unknown parameter 'grou00000000000000000000' [ 2490.111902][T22158] fuse: Unknown parameter 'group_i00000000000000000000' [ 2491.658326][T22177] fuse: Unknown parameter 'group_i00000000000000000000' [ 2493.065054][T22193] fuse: Unknown parameter 'group_id00000000000000000000' [ 2494.434415][T22207] fuse: Unknown parameter 'group_id00000000000000000000' [ 2497.328999][T22239] fuse: Bad value for 'user_id' [ 2497.329415][T22239] fuse: Bad value for 'user_id' [ 2499.003859][T22257] fuse: Bad value for 'user_id' [ 2499.004322][T22257] fuse: Bad value for 'user_id' [ 2499.991979][T22267] serio: Serial port pts0 [ 2502.517873][T22284] fuse: Bad value for 'fd' [ 2505.328416][T22296] fuse: Bad value for 'fd' [ 2506.467359][T22309] fuse: Bad value for 'fd' [ 2510.038494][T22345] fuse: Unknown parameter 'grou00000000000000000000' [ 2511.227987][T22356] fuse: Unknown parameter 'grou00000000000000000000' [ 2512.714727][T22370] fuse: Unknown parameter 'grou00000000000000000000' [ 2516.118071][T22414] fuse: Unknown parameter 'group_i00000000000000000000' [ 2517.020564][T22427] fuse: Unknown parameter 'group_id00000000000000000000' [ 2518.240632][T22442] fuse: Invalid rootmode [ 2519.201699][T22456] fuse: Invalid rootmode [ 2520.568030][T22471] fuse: Bad value for 'rootmode' [ 2520.790548][T22473] serio: Serial port pts0 [ 2523.302424][T22486] fuse: Bad value for 'rootmode' [ 2525.834611][T22516] fuse: Bad value for 'fd' [ 2527.243131][T22532] fuse: Bad value for 'fd' [ 2529.269464][T22552] fuse: Unknown parameter 'use00000000000000000000' [ 2529.741168][T22558] fuse: Bad value for 'fd' [ 2530.724762][T22572] fuse: Bad value for 'fd' [ 2531.670076][T22586] fuse: Unknown parameter 'user_i00000000000000000000' [ 2538.508780][T22654] fuse: Bad value for 'fd' [ 2538.809742][T22657] fuse: Bad value for 'rootmode' [ 2540.584279][T22671] fuse: Bad value for 'rootmode' [ 2544.759079][T22713] fuse: Unknown parameter 'user_i00000000000000000000' [ 2545.474547][T22725] fuse: Unknown parameter 'user_i00000000000000000000' [ 2546.895477][T22744] fuse: Unknown parameter 'user_i00000000000000000000' [ 2547.488365][T22750] fuse: Unknown parameter '0x0000000000000003' [ 2550.631429][T22773] fuse: Unknown parameter 'user_id00000000000000000000' [ 2551.498682][T22786] fuse: Unknown parameter 'user_id00000000000000000000' [ 2552.357810][T22799] fuse: Bad value for 'fd' [ 2557.183605][T22874] fuse: Unknown parameter '0x0000000000000003' [ 2578.519482][T23053] serio: Serial port pts0 [ 2583.174571][T23077] serio: Serial port pts0 [ 2587.789868][T23097] serio: Serial port pts0 [ 2597.060169][ T31] audit: type=1400 audit(2596.960:790): avc: denied { getopt } for pid=23160 comm="syz.0.4631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2696.697574][T23304] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 2696.938825][T23304] usb 1-1: Using ep0 maxpacket: 16 [ 2697.029903][T23304] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2697.033026][T23304] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 16 [ 2697.037977][T23304] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 8 [ 2697.081746][T23304] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2697.084454][T23304] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2697.084670][T23304] usb 1-1: Product: syz [ 2697.084761][T23304] usb 1-1: Manufacturer: syz [ 2697.084851][T23304] usb 1-1: SerialNumber: syz [ 2697.358485][T23850] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2697.359466][T23850] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2697.863991][T23304] cdc_ncm 1-1:1.0: failed GET_NTB_PARAMETERS [ 2697.864978][T23304] cdc_ncm 1-1:1.0: bind() failure [ 2697.879888][T23304] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 2697.880378][T23304] cdc_ncm 1-1:1.1: bind() failure [ 2697.898436][T23304] usb 1-1: USB disconnect, device number 7 [ 2725.309074][T23998] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2725.369942][T23998] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2730.327331][T23998] hsr_slave_0: entered promiscuous mode [ 2730.329926][T23998] hsr_slave_1: entered promiscuous mode [ 2730.332045][T23998] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2730.332435][T23998] Cannot create hsr debugfs directory [ 2731.259240][T23998] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2745.159818][T23998] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2767.534212][ C1] vkms_vblank_simulate: vblank timer overrun [ 2799.310959][ T32] INFO: task kworker/1:38:16517 blocked for more than 430 seconds. [ 2799.367776][ T32] Not tainted 6.11.0-rc6-syzkaller #0 [ 2799.368283][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2799.369010][ T32] task:kworker/1:38 state:D stack:0 pid:16517 tgid:16517 ppid:2 flags:0x00000000 [ 2799.369868][ T32] Workqueue: events bpf_prog_free_deferred [ 2799.370532][ T32] Call trace: SYZFAIL: failed to recv rpc [ 2799.370771][ T32] [<8197ecb0>] (__schedule) from [<8197f848>] (schedule+0x2c/0xfc) [ 2799.372723][ T32] r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:dfaf5da4 r5:850d5400 [ 2799.373070][ T32] r4:850d5400 [ 2799.373258][ T32] [<8197f81c>] (schedule) from [<8197fbfc>] (schedule_preempt_disabled+0x18/0x24) [ 2799.373666][ T32] r5:850d5400 r4:82714ab4 [ 2799.373884][ T32] [<8197fbe4>] (schedule_preempt_disabled) from [<819826d4>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 2799.374397][ T32] [<819823ec>] (__mutex_lock.constprop.0) from [<81982fa0>] (__mutex_lock_slowpath+0x14/0x18) [ 2799.374992][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e20 [ 2799.375313][ T32] r4:00000000 [ 2799.375493][ T32] [<81982f8c>] (__mutex_lock_slowpath) from [<81982fe0>] (mutex_lock+0x3c/0x40) [ 2799.375903][ T32] [<81982fa4>] (mutex_lock) from [<804a63b4>] (_vm_unmap_aliases+0x68/0x240) [ 2799.376274][ T32] [<804a634c>] (_vm_unmap_aliases) from [<804aa110>] (vfree+0x170/0x1e4) [ 2799.377255][ T31] audit: type=1400 audit(2799.250:791): avc: denied { write } for pid=3106 comm="syz-executor" path="pipe:[1749]" dev="pipefs" ino=1749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2799.391707][ T32] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:839b9440 [ 2799.392442][ T32] r4:00000000 [ 2799.392635][ T32] [<804a9fa0>] (vfree) from [<805019b0>] (execmem_free+0x30/0x64) [ 2799.393342][ T32] r9:850d5400 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f24e000 [ 2799.393890][ T32] [<80501980>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14) [ 2799.394403][ T32] r5:00001000 r4:dfde3000 [ 2799.394691][ T32] [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4) [ 2799.395252][ T32] [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164) [ 2799.395846][ T32] r5:8522d754 r4:8522d400 [ 2799.396095][ T32] [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4) [ 2799.417473][ T32] r7:ddde4000 r6:82c16200 r5:8522d754 r4:8495aa00 [ 2799.418059][ T32] [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4) [ 2799.418523][ T32] r10:850d5400 r9:8495aa2c r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 2799.418928][ T32] r4:8495aa00 [ 2799.419325][ T32] [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134) [ 2799.419910][ T32] r10:00000000 r9:dfa31e78 r8:84bcc1c0 r7:8495aa00 r6:80266900 r5:850d5400 [ 2799.420433][ T32] r4:84a68a00 [ 2799.420647][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2799.421017][ T32] Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) [ 2799.421443][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2799.422062][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2799.422434][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2799.422726][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:84a68a00 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2799.423538][ T32] INFO: task kworker/0:41:17863 blocked for more than 430 seconds. [ 2799.423968][ T32] Not tainted 6.11.0-rc6-syzkaller #0 [ 2799.424218][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2799.424517][ T32] task:kworker/0:41 state:D stack:0 pid:17863 tgid:17863 ppid:2 flags:0x00000000 [ 2799.424942][ T32] Workqueue: events bpf_prog_free_deferred [ 2799.425679][ T32] Call trace: [ 2799.426104][ T32] [<8197ecb0>] (__schedule) from [<8197f848>] (schedule+0x2c/0xfc) [ 2799.448969][ T32] r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:dfc11da4 r5:84de8000 [ 2799.449701][ T32] r4:84de8000 [ 2799.449937][ T32] [<8197f81c>] (schedule) from [<8197fbfc>] (schedule_preempt_disabled+0x18/0x24) [ 2799.450624][ T32] r5:84de8000 r4:82714ab4 [ 2799.451580][ T32] [<8197fbe4>] (schedule_preempt_disabled) from [<819826d4>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 2799.452061][ T32] [<819823ec>] (__mutex_lock.constprop.0) from [<81982fa0>] (__mutex_lock_slowpath+0x14/0x18) [ 2799.452556][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e20 [ 2799.452867][ T32] r4:00000000 [ 2799.453052][ T32] [<81982f8c>] (__mutex_lock_slowpath) from [<81982fe0>] (mutex_lock+0x3c/0x40) [ 2799.453385][ T32] [<81982fa4>] (mutex_lock) from [<804a63b4>] (_vm_unmap_aliases+0x68/0x240) [ 2799.453732][ T32] [<804a634c>] (_vm_unmap_aliases) from [<804aa110>] (vfree+0x170/0x1e4) [ 2799.454162][ T32] r10:82c16005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853484c0 [ 2799.454492][ T32] r4:00000000 [ 2799.454665][ T32] [<804a9fa0>] (vfree) from [<805019b0>] (execmem_free+0x30/0x64) [ 2799.455096][ T32] r9:84de8000 r8:00800000 r7:00000000 r6:82c16000 r5:00001000 r4:7f24c000 [ 2799.455979][ T32] [<80501980>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14) [ 2799.456489][ T32] r5:00001000 r4:dfd77000 [ 2799.477572][ T32] [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4) [ 2799.478349][ T32] [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164) [ 2799.478864][ T32] r5:84936354 r4:84936000 [ 2799.479094][ T32] [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4) [ 2799.479883][ T32] r7:dddd0000 r6:82c16000 r5:84936354 r4:8521d800 [ 2799.480397][ T32] [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4) [ 2799.480800][ T32] r10:84de8000 r9:8521d82c r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 [ 2799.481108][ T32] r4:8521d800 [ 2799.481294][ T32] [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134) [ 2799.481613][ T32] r10:00000000 r9:dfa11e78 r8:853e7a40 r7:8521d800 r6:80266900 r5:84de8000 [ 2799.482132][ T32] r4:853e7940 [ 2799.482332][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2799.482675][ T32] Exception stack(0xdfc11fb0 to 0xdfc11ff8) [ 2799.482992][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2799.483312][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2799.483763][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2799.484040][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:853e7940 [ 2799.484802][ T32] INFO: task kworker/1:121:19000 blocked for more than 430 seconds. [ 2799.485166][ T32] Not tainted 6.11.0-rc6-syzkaller #0 [ 2799.485408][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2799.485857][ T32] task:kworker/1:121 state:D stack:0 pid:19000 tgid:19000 ppid:2 flags:0x00000000 [ 2799.486424][ T32] Workqueue: events bpf_prog_free_deferred [ 2799.486756][ T32] Call trace: [ 2799.507852][ T32] [<8197ecb0>] (__schedule) from [<8197f848>] (schedule+0x2c/0xfc) [ 2799.508279][ T32] r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:e0511da4 r5:843ae000 [ 2799.508592][ T32] r4:843ae000 [ 2799.508775][ T32] [<8197f81c>] (schedule) from [<8197fbfc>] (schedule_preempt_disabled+0x18/0x24) [ 2799.509141][ T32] r5:843ae000 r4:82714ab4 [ 2799.509349][ T32] [<8197fbe4>] (schedule_preempt_disabled) from [<819826d4>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 2799.509725][ T32] [<819823ec>] (__mutex_lock.constprop.0) from [<81982fa0>] (__mutex_lock_slowpath+0x14/0x18) [ 2799.510142][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0511e20 [ 2799.510453][ T32] r4:00000000 [ 2799.510602][ T32] [<81982f8c>] (__mutex_lock_slowpath) from [<81982fe0>] (mutex_lock+0x3c/0x40) [ 2799.510938][ T32] [<81982fa4>] (mutex_lock) from [<804a63b4>] (_vm_unmap_aliases+0x68/0x240) [ 2799.511305][ T32] [<804a634c>] (_vm_unmap_aliases) from [<804aa110>] (vfree+0x170/0x1e4) [ 2799.511634][ T32] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85273480 [ 2799.512113][ T32] r4:00000000 [ 2799.512292][ T32] [<804a9fa0>] (vfree) from [<805019b0>] (execmem_free+0x30/0x64) [ 2799.512635][ T32] r9:843ae000 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f252000 [ 2799.512932][ T32] [<80501980>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14) [ 2799.513305][ T32] r5:00001000 r4:dfeb9000 [ 2799.513511][ T32] [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4) [ 2799.513864][ T32] [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164) [ 2799.514260][ T32] r5:84934b54 r4:84934800 [ 2799.514525][ T32] [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4) [ 2799.515958][ T32] r7:ddde4000 r6:82c16200 r5:84934b54 r4:83f1e080 [ 2799.516211][ T32] [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4) [ 2799.516621][ T32] r10:843ae000 r9:83f1e0ac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 2799.521042][ T32] r4:83f1e080 [ 2799.521234][ T32] [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134) [ 2799.521490][ T32] r10:00000000 r9:e0531e78 r8:84acbd00 r7:83f1e080 r6:80266900 r5:843ae000 [ 2799.521628][ T32] r4:84d7b880 [ 2799.521739][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2799.521987][ T32] Exception stack(0xe0511fb0 to 0xe0511ff8) [ 2799.522210][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2799.522389][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2799.522627][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2799.522810][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:84d7b880 [ 2799.523054][ T32] INFO: task kworker/1:131:19078 blocked for more than 430 seconds. [ 2799.523245][ T32] Not tainted 6.11.0-rc6-syzkaller #0 [ 2799.523497][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2799.523730][ T32] task:kworker/1:131 state:D stack:0 pid:19078 tgid:19078 ppid:2 flags:0x00000000 [ 2799.524016][ T32] Workqueue: events bpf_prog_free_deferred [ 2799.524234][ T32] Call trace: [ 2799.524378][ T32] [<8197ecb0>] (__schedule) from [<8197f848>] (schedule+0x2c/0xfc) [ 2799.524623][ T32] r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:e05d9da4 r5:84efbc00 [ 2799.524816][ T32] r4:84efbc00 [ 2799.524941][ T32] [<8197f81c>] (schedule) from [<8197fbfc>] (schedule_preempt_disabled+0x18/0x24) [ 2799.525222][ T32] r5:84efbc00 r4:82714ab4 [ 2799.525351][ T32] [<8197fbe4>] (schedule_preempt_disabled) from [<819826d4>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 2799.525658][ T32] [<819823ec>] (__mutex_lock.constprop.0) from [<81982fa0>] (__mutex_lock_slowpath+0x14/0x18) [ 2799.525967][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d9e20 [ 2799.537080][ T32] r4:00000000 [ 2799.537283][ T32] [<81982f8c>] (__mutex_lock_slowpath) from [<81982fe0>] (mutex_lock+0x3c/0x40) [ 2799.537487][ T32] [<81982fa4>] (mutex_lock) from [<804a63b4>] (_vm_unmap_aliases+0x68/0x240) [ 2799.537696][ T32] [<804a634c>] (_vm_unmap_aliases) from [<804aa110>] (vfree+0x170/0x1e4) [ 2799.537918][ T32] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c60300 [ 2799.538223][ T32] r4:00000000 [ 2799.538312][ T32] [<804a9fa0>] (vfree) from [<805019b0>] (execmem_free+0x30/0x64) [ 2799.538580][ T32] r9:84efbc00 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f250000 [ 2799.538775][ T32] [<80501980>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14) [ 2799.539006][ T32] r5:00001000 r4:dfe5b000 [ 2799.539252][ T32] [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4) [ 2799.539610][ T32] [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164) [ 2799.540035][ T32] r5:8522df54 r4:8522dc00 [ 2799.540273][ T32] [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4) [ 2799.540767][ T32] r7:ddde4000 r6:82c16200 r5:8522df54 r4:83f1eb80 [ 2799.541041][ T32] [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4) [ 2799.541437][ T32] r10:84efbc00 r9:83f1ebac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 2799.541789][ T32] r4:83f1eb80 [ 2799.541955][ T32] [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134) [ 2799.545212][ T32] r10:00000000 r9:e0589e78 r8:84d7e540 r7:83f1eb80 r6:80266900 r5:84efbc00 [ 2799.553458][ T32] r4:84d7e5c0 [ 2799.557466][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2799.587298][ T32] Exception stack(0xe05d9fb0 to 0xe05d9ff8) [ 2799.587820][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2799.588249][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2799.588598][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2799.588976][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:84d7e5c0 [ 2799.597187][ T32] INFO: task kworker/1:134:19102 blocked for more than 430 seconds. [ 2799.600663][ T32] Not tainted 6.11.0-rc6-syzkaller #0 [ 2799.604009][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2799.621728][ T32] task:kworker/1:134 state:D stack:0 pid:19102 tgid:19102 ppid:2 flags:0x00000000 [ 2799.626463][ T32] Workqueue: events bpf_prog_free_deferred [ 2799.647665][ T32] Call trace: [ 2799.647934][ T32] [<8197ecb0>] (__schedule) from [<8197f848>] (schedule+0x2c/0xfc) [ 2799.648590][ T32] r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:e053dda4 r5:84ef8000 [ 2799.648904][ T32] r4:84ef8000 [ 2799.649083][ T32] [<8197f81c>] (schedule) from [<8197fbfc>] (schedule_preempt_disabled+0x18/0x24) [ 2799.649618][ T32] r5:84ef8000 r4:82714ab4 [ 2799.649833][ T32] [<8197fbe4>] (schedule_preempt_disabled) from [<819826d4>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 2799.650343][ T32] [<819823ec>] (__mutex_lock.constprop.0) from [<81982fa0>] (__mutex_lock_slowpath+0x14/0x18) [ 2799.650771][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de20 [ 2799.651149][ T32] r4:00000000 [ 2799.651292][ T32] [<81982f8c>] (__mutex_lock_slowpath) from [<81982fe0>] (mutex_lock+0x3c/0x40) [ 2799.651714][ T32] [<81982fa4>] (mutex_lock) from [<804a63b4>] (_vm_unmap_aliases+0x68/0x240) [ 2799.652096][ T32] [<804a634c>] (_vm_unmap_aliases) from [<804aa110>] (vfree+0x170/0x1e4) [ 2799.652469][ T32] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84218a80 [ 2799.652807][ T32] r4:00000000 [ 2799.652973][ T32] [<804a9fa0>] (vfree) from [<805019b0>] (execmem_free+0x30/0x64) [ 2799.653363][ T32] r9:84ef8000 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f24a000 [ 2799.653684][ T32] [<80501980>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14) [ 2799.654003][ T32] r5:00001000 r4:dfcfd000 [ 2799.654177][ T32] [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4) [ 2799.654525][ T32] [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164) [ 2799.654847][ T32] r5:8522cb54 r4:8522c800 [ 2799.655030][ T32] [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4) [ 2799.655503][ T32] r7:ddde4000 r6:82c16200 r5:8522cb54 r4:83f1ea80 [ 2799.655729][ T32] [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4) [ 2799.656131][ T32] r10:84ef8000 r9:83f1eaac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 2799.656428][ T32] r4:83f1ea80 [ 2799.656580][ T32] [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134) [ 2799.687336][ T32] r10:00000000 r9:e0499e78 r8:84c72640 r7:83f1ea80 r6:80266900 r5:84ef8000 [ 2799.688664][ T32] r4:84c72240 [ 2799.688812][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2799.689165][ T32] Exception stack(0xe053dfb0 to 0xe053dff8) [ 2799.689380][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2799.689752][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2799.690758][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2799.693789][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:84c72240 [ 2799.707458][ T32] INFO: task kworker/1:136:19171 blocked for more than 430 seconds. [ 2799.707850][ T32] Not tainted 6.11.0-rc6-syzkaller #0 [ 2799.708116][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2799.708423][ T32] task:kworker/1:136 state:D stack:0 pid:19171 tgid:19171 ppid:2 flags:0x00000000 [ 2799.708926][ T32] Workqueue: events bpf_prog_free_deferred [ 2799.709277][ T32] Call trace: [ 2799.709472][ T32] [<8197ecb0>] (__schedule) from [<8197f848>] (schedule+0x2c/0xfc) [ 2799.709899][ T32] r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:e0635da4 r5:84eb8c00 [ 2799.710257][ T32] r4:84eb8c00 [ 2799.710436][ T32] [<8197f81c>] (schedule) from [<8197fbfc>] (schedule_preempt_disabled+0x18/0x24) [ 2799.710849][ T32] r5:84eb8c00 r4:82714ab4 [ 2799.711042][ T32] [<8197fbe4>] (schedule_preempt_disabled) from [<819826d4>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 2799.711492][ T32] [<819823ec>] (__mutex_lock.constprop.0) from [<81982fa0>] (__mutex_lock_slowpath+0x14/0x18) [ 2799.711939][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e20 [ 2799.712225][ T32] r4:00000000 [ 2799.712394][ T32] [<81982f8c>] (__mutex_lock_slowpath) from [<81982fe0>] (mutex_lock+0x3c/0x40) [ 2799.728679][ T32] [<81982fa4>] (mutex_lock) from [<804a63b4>] (_vm_unmap_aliases+0x68/0x240) [ 2799.729351][ T32] [<804a634c>] (_vm_unmap_aliases) from [<804aa110>] (vfree+0x170/0x1e4) [ 2799.732829][ T32] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f1c0 [ 2799.735002][ T32] r4:00000000 [ 2799.736577][ T32] [<804a9fa0>] (vfree) from [<805019b0>] (execmem_free+0x30/0x64) [ 2799.741247][ T32] r9:84eb8c00 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f246000 [ 2799.742667][ T32] [<80501980>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14) [ 2799.745343][ T32] r5:00001000 r4:dfc29000 [ 2799.747247][ T32] [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4) [ 2799.749058][ T32] [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164) [ 2799.754222][ T32] r5:84d83b54 r4:84d83800 [ 2799.757145][ T32] [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4) [ 2799.757718][ T32] r7:ddde4000 r6:82c16200 r5:84d83b54 r4:84c0de80 [ 2799.760144][ T32] [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4) [ 2799.760660][ T32] r10:84eb8c00 r9:84c0deac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 2799.761005][ T32] r4:84c0de80 [ 2799.761228][ T32] [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134) [ 2799.761664][ T32] r10:00000000 r9:e05ede78 r8:84a6c580 r7:84c0de80 r6:80266900 r5:84eb8c00 [ 2799.762060][ T32] r4:84838940 [ 2799.762340][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2799.762786][ T32] Exception stack(0xe0635fb0 to 0xe0635ff8) [ 2799.763091][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2799.763633][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2799.764024][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2799.764368][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:84838940 [ 2799.764803][ T32] INFO: task kworker/1:138:19184 blocked for more than 430 seconds. [ 2799.765354][ T32] Not tainted 6.11.0-rc6-syzkaller #0 [ 2799.770365][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2799.770724][ T32] task:kworker/1:138 state:D stack:0 pid:19184 tgid:19184 ppid:2 flags:0x00000000 [ 2799.771044][ T32] Workqueue: events bpf_prog_free_deferred [ 2799.771266][ T32] Call trace: [ 2799.771374][ T32] [<8197ecb0>] (__schedule) from [<8197f848>] (schedule+0x2c/0xfc) [ 2799.771670][ T32] r10:8260ca7c r9:00000000 r8:82714ab8 r7:00000002 r6:e05e9da4 r5:84eba400 [ 2799.771881][ T32] r4:84eba400 [ 2799.772000][ T32] [<8197f81c>] (schedule) from [<8197fbfc>] (schedule_preempt_disabled+0x18/0x24) [ 2799.772247][ T32] r5:84eba400 r4:82714ab4 [ 2799.772392][ T32] [<8197fbe4>] (schedule_preempt_disabled) from [<819826d4>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 2799.772694][ T32] [<819823ec>] (__mutex_lock.constprop.0) from [<81982fa0>] (__mutex_lock_slowpath+0x14/0x18) [ 2799.773117][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e20 [ 2799.773496][ T32] r4:00000000 [ 2799.773661][ T32] [<81982f8c>] (__mutex_lock_slowpath) from [<81982fe0>] (mutex_lock+0x3c/0x40) [ 2799.776721][ T32] [<81982fa4>] (mutex_lock) from [<804a63b4>] (_vm_unmap_aliases+0x68/0x240) [ 2799.787852][ T32] [<804a634c>] (_vm_unmap_aliases) from [<804aa110>] (vfree+0x170/0x1e4) [ 2799.788330][ T32] r10:82c16205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c5cc80 [ 2799.788759][ T32] r4:00000000 [ 2799.788945][ T32] [<804a9fa0>] (vfree) from [<805019b0>] (execmem_free+0x30/0x64) [ 2799.789456][ T32] r9:84eba400 r8:01800000 r7:00000000 r6:82c16200 r5:00001000 r4:7f248000 [ 2799.789857][ T32] [<80501980>] (execmem_free) from [<80393a3c>] (bpf_jit_free_exec+0x10/0x14) [ 2799.790445][ T32] r5:00001000 r4:dfcad000 [ 2799.790671][ T32] [<80393a2c>] (bpf_jit_free_exec) from [<80393e1c>] (bpf_jit_free+0x68/0xe4) [ 2799.791122][ T32] [<80393db4>] (bpf_jit_free) from [<80394f58>] (bpf_prog_free_deferred+0x14c/0x164) [ 2799.791635][ T32] r5:8522f754 r4:8522f400 [ 2799.791874][ T32] [<80394e0c>] (bpf_prog_free_deferred) from [<80265f08>] (process_one_work+0x1b4/0x4f4) [ 2799.792335][ T32] r7:ddde4000 r6:82c16200 r5:8522f754 r4:84c0dd80 [ 2799.792591][ T32] [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4) [ 2799.793059][ T32] r10:84eba400 r9:84c0ddac r8:61c88647 r7:ddde4020 r6:82604d40 r5:ddde4000 [ 2799.793607][ T32] r4:84c0dd80 [ 2799.793778][ T32] [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134) [ 2799.794255][ T32] r10:00000000 r9:e05ede78 r8:8490c680 r7:84c0dd80 r6:80266900 r5:84eba400 [ 2799.794626][ T32] r4:85042540 [ 2799.794846][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2799.795299][ T32] Exception stack(0xe05e9fb0 to 0xe05e9ff8) [ 2799.795567][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2799.795966][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2799.796352][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2799.798356][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:85042540 [ 2799.800575][ T32] NMI backtrace for cpu 0 [ 2799.800899][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller #0 [ 2799.801265][ T32] Hardware name: ARM-Versatile Express [ 2799.801493][ T32] Call trace: [ 2799.801692][ T32] [<8195d0d8>] (dump_backtrace) from [<8195d1d4>] (show_stack+0x18/0x1c) [ 2799.802106][ T32] r7:00000000 r6:00000013 r5:60000093 r4:8200ca84 [ 2799.802371][ T32] [<8195d1bc>] (show_stack) from [<8197af14>] (dump_stack_lvl+0x70/0x7c) [ 2799.802719][ T32] [<8197aea4>] (dump_stack_lvl) from [<8197af38>] (dump_stack+0x18/0x1c) [ 2799.803147][ T32] r5:00000000 r4:00000001 [ 2799.803342][ T32] [<8197af20>] (dump_stack) from [<8194a3c8>] (nmi_cpu_backtrace+0x160/0x17c) [ 2799.803831][ T32] [<8194a268>] (nmi_cpu_backtrace) from [<8194a514>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 2799.804297][ T32] r7:00000000 r6:8260c5d0 r5:8261a88c r4:ffffffff [ 2799.804611][ T32] [<8194a3e4>] (nmi_trigger_cpumask_backtrace) from [<802103c8>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 2799.805182][ T32] r9:0003d069 r8:828b3130 r7:8260c734 r6:00007d52 r5:8261ae48 r4:8543c51c [ 2799.805551][ T32] [<802103b0>] (arch_trigger_cpumask_backtrace) from [<80350e30>] (watchdog+0x498/0x5b8) [ 2799.806030][ T32] [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134) [ 2799.806416][ T32] r10:00000000 r9:df819e58 r8:82f232c0 r7:00000000 r6:80350998 r5:82e59800 [ 2799.807028][ T32] r4:82ec6e80 [ 2799.807340][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2799.808221][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 2799.812993][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2799.817031][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2799.817826][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2799.818199][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82ec6e80 [ 2799.819804][ T32] Sending NMI from CPU 0 to CPUs 1: [ 2799.820587][ C1] NMI backtrace for cpu 1 [ 2799.820870][ C1] CPU: 1 UID: 0 PID: 2928 Comm: klogd Not tainted 6.11.0-rc6-syzkaller #0 [ 2799.820931][ C1] Hardware name: ARM-Versatile Express [ 2799.820988][ C1] PC is at __alloc_skb+0x94/0x160 [ 2799.821076][ C1] LR is at 0x0 [ 2799.821512][ C1] pc : [<8145dcd8>] lr : [<00000000>] psr: a0000013 [ 2799.821560][ C1] sp : ec229d38 ip : 83fc1800 fp : ec229d6c [ 2799.821599][ C1] r10: ec229e1c r9 : 00000000 r8 : 00400cc0 [ 2799.821645][ C1] r7 : 00000000 r6 : 82ea5000 r5 : ffffffff r4 : 8439bc00 [ 2799.821716][ C1] r3 : ec229d43 r2 : 00000000 r1 : 00000000 r0 : 8509d200 [ 2799.821851][ C1] Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 2799.821922][ C1] Control: 30c5387d Table: 841d60c0 DAC: 00000000 [ 2799.822002][ C1] Call trace: [ 2799.822103][ C1] [<8145dc44>] (__alloc_skb) from [<81465098>] (alloc_skb_with_frags+0x40/0x174) [ 2799.822184][ C1] r8:802a5144 r7:ec229dbc r6:00000000 r5:00001000 r4:00000003 [ 2799.822209][ C1] [<81465058>] (alloc_skb_with_frags) from [<81456e60>] (sock_alloc_send_pskb+0x1f4/0x228) [ 2799.822273][ C1] r10:ec229e1c r9:00000000 r8:802a5144 r7:ec229dbc r6:83fc1800 r5:7fffffff [ 2799.822296][ C1] r4:83f00000 r3:ec229e1c [ 2799.822312][ C1] [<81456c6c>] (sock_alloc_send_pskb) from [<8170e5f8>] (unix_dgram_sendmsg+0x154/0x8b8) [ 2799.822384][ C1] r10:00000000 r9:83f00000 r8:83fc1800 r7:00000000 r6:0000007f r5:83145180 [ 2799.822418][ C1] r4:ec229e98 [ 2799.822435][ C1] [<8170e4a4>] (unix_dgram_sendmsg) from [<81450134>] (__sock_sendmsg+0x44/0x78) [ 2799.822508][ C1] r10:00000121 r9:83fc1800 r8:00000003 r7:83145180 r6:83145180 r5:ec229e98 [ 2799.822526][ C1] r4:00000000 [ 2799.822540][ C1] [<814500f0>] (__sock_sendmsg) from [<814526fc>] (__sys_sendto+0x108/0x14c) [ 2799.822600][ C1] r7:83145180 r6:00000000 r5:00004000 r4:00000000 [ 2799.822615][ C1] [<814525f4>] (__sys_sendto) from [<81452784>] (sys_send+0x20/0x28) [ 2799.822677][ C1] r8:8020029c r7:00000121 r6:76fd95a0 r5:76fd95a0 r4:00ebd1a8 [ 2799.822692][ C1] [<81452764>] (sys_send) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2799.822748][ C1] Exception stack(0xec229fa8 to 0xec229ff0) [ 2799.822789][ C1] 9fa0: 00ebd1a8 76fd95a0 00000003 00ec89b0 0000007f 00004000 [ 2799.822825][ C1] 9fc0: 00ebd1a8 76fd95a0 76fd95a0 00000121 00000000 00000013 76eb0e60 00ec89b3 [ 2799.822849][ C1] 9fe0: 00000000 7ebabbc8 76e38460 76e3d918 [ 2799.824850][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 2799.844870][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller #0 [ 2799.845309][ T32] Hardware name: ARM-Versatile Express [ 2799.845585][ T32] Call trace: [ 2799.845824][ T32] [<8195d0d8>] (dump_backtrace) from [<8195d1d4>] (show_stack+0x18/0x1c) [ 2799.846294][ T32] r7:00000000 r6:826228c4 r5:00000000 r4:8200ca84 [ 2799.846615][ T32] [<8195d1bc>] (show_stack) from [<8197aef8>] (dump_stack_lvl+0x54/0x7c) [ 2799.847322][ T32] [<8197aea4>] (dump_stack_lvl) from [<8197af38>] (dump_stack+0x18/0x1c) [ 2799.847737][ T32] r5:00000000 r4:8286dd18 [ 2799.848241][ T32] [<8197af20>] (dump_stack) from [<8195dc7c>] (panic+0x120/0x368) [ 2799.851791][ T32] [<8195db5c>] (panic) from [<80350cb0>] (watchdog+0x318/0x5b8) [ 2799.856909][ T32] r3:00000000 r2:00000000 r1:00000001 r0:8200d584 [ 2799.857237][ T32] r7:8260c734 [ 2799.857508][ T32] [<80350998>] (watchdog) from [<8026fb04>] (kthread+0x104/0x134) [ 2799.857952][ T32] r10:00000000 r9:df819e58 r8:82f232c0 r7:00000000 r6:80350998 r5:82e59800 [ 2799.858319][ T32] r4:82ec6e80 [ 2799.858508][ T32] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2799.858856][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 2799.859142][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2799.859517][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2799.859964][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2799.860413][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:82ec6e80 [ 2799.862664][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 06:33:42 Registers: info registers vcpu 0 CPU#0 R00=001f3bc8 R01=829154c0 R02=001f3bc8 R03=0000ffff R04=840f8000 R05=848a13c0 R06=850969ec R07=00000014 R08=848a13d8 R09=0000028b R10=001f3ba4 R11=df8019fc R12=00000000 R13=df801930 R14=00000000 R15=8164cb60 PSR=20000113 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005327e9 s17=00000000 d08=00000000005327e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=aef4cb8e s33=8267b5e1 d16=8267b5e1aef4cb8e s34=7b189a59 s35=92273c64 d17=92273c647b189a59 s36=67e0c5d4 s37=e6fdcf6d d18=e6fdcf6d67e0c5d4 s38=725c125a s39=211d79c2 d19=211d79c2725c125a s40=82cf5de4 s41=20f1e746 d20=20f1e74682cf5de4 s42=bbb823e4 s43=3c626e39 d21=3c626e39bbb823e4 s44=9f96c862 s45=50d81b59 d22=50d81b599f96c862 s46=76568b5b s47=9ed0e191 d23=9ed0e19176568b5b s48=00000300 s49=ffea0000 d24=ffea000000000300 s50=000cffff s51=00090000 d25=00090000000cffff s52=00000000 s53=00000300 d26=0000030000000000 s54=00000000 s55=0010000a d27=0010000a00000000 s56=0008000f s57=000a0004 d28=000a00040008000f s58=000c0000 s59=000e0000 d29=000e0000000c0000 s60=00000000 s61=00000300 d30=0000030000000000 s62=ddc40000 s63=00a04bb4 d31=00a04bb4ddc40000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=c9fa7000 R01=e04d3000 R02=00000001 R03=802199d8 R04=7f23e000 R05=00000001 R06=828bdf68 R07=7f23e000 R08=e04d3000 R09=8260cad0 R10=828beb8c R11=e0499dbc R12=e0499dc0 R13=e0499d90 R14=802109bc R15=802199f0 PSR=80000113 N--- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=d9e3f4ac s05=d1c441f0 d02=d1c441f0d9e3f4ac s06=00000000 s07=00000000 d03=0000000000000000 s08=5cd90a40 s09=da19a721 d04=da19a7215cd90a40 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=2e072330 s21=deec76d5 d10=deec76d52e072330 s22=4b129b63 s23=00000000 d11=000000004b129b63 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=4b1072ab s33=c3ebd42f d16=c3ebd42f4b1072ab s34=b8fd331f s35=9a37e029 d17=9a37e029b8fd331f s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=a201c993 s41=a1a47b78 d20=a1a47b78a201c993 s42=3f9511ee s43=4b1cec92 d21=4b1cec923f9511ee s44=02807129 s45=50814b68 d22=50814b6802807129 s46=c3cf5211 s47=7c33b434 d23=7c33b434c3cf5211 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=00140000 s53=00080000 d26=0008000000140000 s54=00000008 s55=00080004 d27=0008000400000008 s56=03e60000 s57=ffbe0000 d28=ffbe000003e60000 s58=0008ffff s59=00000000 d29=000000000008ffff s60=00000300 s61=ffce0000 d30=ffce000000000300 s62=0008ffff s63=00000000 d31=000000000008ffff FPSCR: 00000000