[ 53.854985][ T255] device veth1_macvtap left promiscuous mode [ 53.861353][ T255] device veth0_macvtap left promiscuous mode [ 53.868717][ T255] device veth1_vlan left promiscuous mode [ 53.876381][ T255] device veth0_vlan left promiscuous mode [ 54.068728][ T255] team0 (unregistering): Port device team_slave_1 removed [ 54.081620][ T255] team0 (unregistering): Port device team_slave_0 removed [ 54.093417][ T255] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 54.107048][ T255] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 54.152960][ T255] bond0 (unregistering): Released all slaves [ 59.302274][ T27] audit: type=1400 audit(1657824517.165:179): avc: denied { transition } for pid=3905 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 64.390572][ T27] audit: type=1400 audit(1657824522.255:180): avc: denied { search } for pid=3920 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 64.414487][ T27] audit: type=1400 audit(1657824522.285:181): avc: denied { read } for pid=3921 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=1433 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 64.438201][ T27] audit: type=1400 audit(1657824522.285:182): avc: denied { open } for pid=3921 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1433 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 64.463770][ T27] audit: type=1400 audit(1657824522.285:183): avc: denied { getattr } for pid=3921 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1433 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 64.511465][ T27] audit: type=1400 audit(1657824522.375:184): avc: denied { write } for pid=3920 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1432 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 64.534662][ T27] audit: type=1400 audit(1657824522.375:185): avc: denied { add_name } for pid=3920 comm="dhcpcd-run-hook" name="resolv.conf.eth3.ipv4ll" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 64.568519][ T27] audit: type=1400 audit(1657824522.435:186): avc: denied { remove_name } for pid=3931 comm="rm" name="resolv.conf.eth3.ipv4ll" dev="tmpfs" ino=1552 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.10.40' (ECDSA) to the list of known hosts. 2022/07/14 18:48:44 parsed 1 programs [ 66.798674][ T27] audit: type=1400 audit(1657824524.665:187): avc: denied { mounton } for pid=4033 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.832217][ T27] audit: type=1400 audit(1657824524.665:188): avc: denied { mount } for pid=4033 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.860151][ T27] audit: type=1400 audit(1657824524.665:189): avc: denied { create } for pid=4033 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/07/14 18:48:45 executed programs: 0 [ 70.323499][ T3646] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 71.286497][ T140] cfg80211: failed to load regulatory.db [ 74.483480][ T3646] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 78.643421][ T3646] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 80.728037][ T3643] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 80.736502][ T3643] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 80.744673][ T3643] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 80.752337][ T3643] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 80.760281][ T3643] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 80.767500][ T3643] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 80.781494][ T27] kauditd_printk_skb: 10 callbacks suppressed [ 80.781503][ T27] audit: type=1400 audit(1657824538.645:200): avc: denied { read } for pid=4112 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.817657][ T27] audit: type=1400 audit(1657824538.645:201): avc: denied { open } for pid=4112 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.841608][ T27] audit: type=1400 audit(1657824538.645:202): avc: denied { mounton } for pid=4112 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 80.858615][ T4112] chnl_net:caif_netlink_parms(): no params data found [ 80.901862][ T4112] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.909042][ T4112] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.916842][ T4112] device bridge_slave_0 entered promiscuous mode [ 80.925364][ T4112] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.932485][ T4112] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.940586][ T4112] device bridge_slave_1 entered promiscuous mode [ 80.958837][ T4112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.969604][ T4112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.990829][ T4112] team0: Port device team_slave_0 added [ 80.997942][ T4112] team0: Port device team_slave_1 added [ 81.013244][ T4112] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 81.022403][ T4112] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.050309][ T4112] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 81.062277][ T4112] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 81.069334][ T4112] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.095354][ T4112] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 81.119843][ T4112] device hsr_slave_0 entered promiscuous mode [ 81.126613][ T4112] device hsr_slave_1 entered promiscuous mode [ 81.180472][ T4112] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.187572][ T4112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.194932][ T4112] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.202323][ T4112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.238092][ T4112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.249660][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.257852][ T140] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.266192][ T140] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.274123][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 81.285708][ T4112] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.295804][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.304184][ T14] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.311208][ T14] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.322047][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 81.330487][ T14] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.337674][ T14] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.360419][ T4112] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 81.371732][ T4112] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 81.386046][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 81.395776][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 81.404146][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 81.412553][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 81.420980][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 81.428659][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 81.446888][ T4112] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 81.454877][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 81.462371][ T143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 81.624605][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 81.633394][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 81.641491][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 81.649530][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 81.659712][ T4112] device veth0_vlan entered promiscuous mode [ 81.670502][ T4112] device veth1_vlan entered promiscuous mode [ 81.687198][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 81.697064][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 81.705197][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 81.716571][ T4112] device veth0_macvtap entered promiscuous mode [ 81.727165][ T4112] device veth1_macvtap entered promiscuous mode [ 81.741356][ T4112] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.750114][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 81.759648][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 81.772016][ T4112] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.779667][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 81.828452][ T255] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.842989][ T255] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.856792][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 81.866261][ T967] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.874947][ T967] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.885165][ T140] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 81.930771][ T27] audit: type=1400 audit(1657824539.795:203): avc: denied { open } for pid=4130 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 81.952532][ T27] audit: type=1400 audit(1657824539.825:204): avc: denied { perfmon } for pid=4130 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 81.974585][ T27] audit: type=1400 audit(1657824539.825:205): avc: denied { kernel } for pid=4130 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 82.000107][ T27] audit: type=1400 audit(1657824539.865:206): avc: denied { tracepoint } for pid=4130 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 82.026266][ T27] audit: type=1400 audit(1657824539.895:207): avc: denied { read } for pid=4130 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 82.046622][ T27] audit: type=1400 audit(1657824539.895:208): avc: denied { write } for pid=4130 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 2022/07/14 18:49:00 executed programs: 1 [ 82.804247][ T143] Bluetooth: hci0: command 0x0409 tx timeout [ 84.884089][ T22] Bluetooth: hci0: command 0x041b tx timeout [ 86.963777][ T22] Bluetooth: hci0: command 0x040f tx timeout 2022/07/14 18:49:05 executed programs: 7 [ 89.043506][ T140] Bluetooth: hci0: command 0x0419 tx timeout 2022/07/14 18:49:11 executed programs: 13 [ 97.126855][ T4216] [ 97.129295][ T4216] ====================================================== [ 97.136297][ T4216] WARNING: possible circular locking dependency detected [ 97.143304][ T4216] 5.19.0-rc6-syzkaller #0 Not tainted [ 97.148659][ T4216] ------------------------------------------------------ [ 97.155816][ T4216] syz-executor.0/4216 is trying to acquire lock: [ 97.162217][ T4216] ffffffff8afecec8 (event_mutex){+.+.}-{3:3}, at: perf_trace_destroy+0x17/0xf0 [ 97.171316][ T4216] [ 97.171316][ T4216] but task is already holding lock: [ 97.178741][ T4216] ffff88801e52e8e8 (&mm->mmap_lock#2){++++}-{3:3}, at: vm_mmap_pgoff+0x12e/0x210 [ 97.187840][ T4216] [ 97.187840][ T4216] which lock already depends on the new lock. [ 97.187840][ T4216] [ 97.198231][ T4216] [ 97.198231][ T4216] the existing dependency chain (in reverse order) is: [ 97.207303][ T4216] [ 97.207303][ T4216] -> #3 (&mm->mmap_lock#2){++++}-{3:3}: [ 97.215091][ T4216] down_write_killable+0x93/0x170 [ 97.221412][ T4216] dup_mm+0x112/0x10e0 [ 97.226161][ T4216] copy_process+0x3490/0x6670 [ 97.231420][ T4216] kernel_clone+0xb8/0x7f0 [ 97.236345][ T4216] __do_sys_clone+0xa1/0xe0 [ 97.241515][ T4216] do_syscall_64+0x35/0x80 [ 97.246439][ T4216] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 97.252829][ T4216] [ 97.252829][ T4216] -> #2 (dup_mmap_sem){++++}-{0:0}: [ 97.260189][ T4216] percpu_down_write+0x4d/0x340 [ 97.265530][ T4216] register_for_each_vma+0x2f/0xaa0 [ 97.271216][ T4216] __uprobe_register+0x4e4/0x740 [ 97.276727][ T4216] probe_event_enable+0x2a9/0x920 [ 97.282277][ T4216] perf_trace_event_init+0x429/0x8a0 [ 97.288059][ T4216] perf_uprobe_init+0x10b/0x180 [ 97.293401][ T4216] perf_uprobe_event_init+0xbd/0x150 [ 97.299175][ T4216] perf_try_init_event+0xf6/0x470 [ 97.305133][ T4216] perf_event_alloc+0xe5a/0x32d0 [ 97.310569][ T4216] __do_sys_perf_event_open+0x26d/0x2470 [ 97.316694][ T4216] do_syscall_64+0x35/0x80 [ 97.321687][ T4216] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 97.328070][ T4216] [ 97.328070][ T4216] -> #1 (&uprobe->register_rwsem){+.+.}-{3:3}: [ 97.336469][ T4216] down_write+0x90/0x150 [ 97.341211][ T4216] __uprobe_register+0x46b/0x740 [ 97.346639][ T4216] probe_event_enable+0x2a9/0x920 [ 97.352167][ T4216] perf_trace_event_init+0x429/0x8a0 [ 97.357941][ T4216] perf_uprobe_init+0x10b/0x180 [ 97.363382][ T4216] perf_uprobe_event_init+0xbd/0x150 [ 97.369443][ T4216] perf_try_init_event+0xf6/0x470 [ 97.374968][ T4216] perf_event_alloc+0xe5a/0x32d0 [ 97.380530][ T4216] __do_sys_perf_event_open+0x26d/0x2470 [ 97.386693][ T4216] do_syscall_64+0x35/0x80 [ 97.391773][ T4216] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 97.398690][ T4216] [ 97.398690][ T4216] -> #0 (event_mutex){+.+.}-{3:3}: [ 97.405972][ T4216] __lock_acquire+0x2a3c/0x55d0 [ 97.412374][ T4216] lock_acquire+0x1ab/0x570 [ 97.417640][ T4216] __mutex_lock+0x12f/0x1350 [ 97.422731][ T4216] perf_trace_destroy+0x17/0xf0 [ 97.428078][ T4216] _free_event+0x29b/0x1000 [ 97.433183][ T4216] perf_mmap_close+0x44b/0xb70 [ 97.438435][ T4216] remove_vma+0x9b/0x140 [ 97.453861][ T4216] __do_munmap+0x5b2/0x1010 [ 97.459123][ T4216] mmap_region+0x1ae/0x11d0 [ 97.464327][ T4216] do_mmap+0x5c4/0xd70 [ 97.468905][ T4216] vm_mmap_pgoff+0x163/0x210 [ 97.474285][ T4216] ksys_mmap_pgoff+0x2e8/0x490 [ 97.481506][ T4216] do_syscall_64+0x35/0x80 [ 97.486864][ T4216] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 97.494120][ T4216] [ 97.494120][ T4216] other info that might help us debug this: [ 97.494120][ T4216] [ 97.505211][ T4216] Chain exists of: [ 97.505211][ T4216] event_mutex --> dup_mmap_sem --> &mm->mmap_lock#2 [ 97.505211][ T4216] [ 97.517785][ T4216] Possible unsafe locking scenario: [ 97.517785][ T4216] [ 97.525213][ T4216] CPU0 CPU1 [ 97.530550][ T4216] ---- ---- [ 97.535890][ T4216] lock(&mm->mmap_lock#2); [ 97.540457][ T4216] lock(dup_mmap_sem); [ 97.547105][ T4216] lock(&mm->mmap_lock#2); [ 97.554111][ T4216] lock(event_mutex); [ 97.558166][ T4216] [ 97.558166][ T4216] *** DEADLOCK *** [ 97.558166][ T4216] [ 97.566280][ T4216] 1 lock held by syz-executor.0/4216: [ 97.571631][ T4216] #0: ffff88801e52e8e8 (&mm->mmap_lock#2){++++}-{3:3}, at: vm_mmap_pgoff+0x12e/0x210 [ 97.581684][ T4216] [ 97.581684][ T4216] stack backtrace: [ 97.587632][ T4216] CPU: 0 PID: 4216 Comm: syz-executor.0 Not tainted 5.19.0-rc6-syzkaller #0 [ 97.596535][ T4216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 97.606735][ T4216] Call Trace: [ 97.609996][ T4216] [ 97.612904][ T4216] dump_stack_lvl+0x57/0x7d [ 97.617481][ T4216] check_noncircular+0x25f/0x2e0 [ 97.622570][ T4216] ? print_circular_bug+0x1e0/0x1e0 [ 97.627738][ T4216] ? add_lock_to_list+0x185/0x370 [ 97.632918][ T4216] ? __lock_acquire+0x24ff/0x55d0 [ 97.637911][ T4216] __lock_acquire+0x2a3c/0x55d0 [ 97.642915][ T4216] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 97.648867][ T4216] lock_acquire+0x1ab/0x570 [ 97.653339][ T4216] ? perf_trace_destroy+0x17/0xf0 [ 97.658335][ T4216] ? lock_release+0x780/0x780 [ 97.663005][ T4216] ? lock_downgrade+0x6e0/0x6e0 [ 97.667829][ T4216] ? rcu_read_lock_sched_held+0x3a/0x70 [ 97.673450][ T4216] __mutex_lock+0x12f/0x1350 [ 97.678011][ T4216] ? perf_trace_destroy+0x17/0xf0 [ 97.683015][ T4216] ? wait_for_completion_io_timeout+0x20/0x20 [ 97.689052][ T4216] ? perf_trace_destroy+0x17/0xf0 [ 97.694058][ T4216] ? mutex_lock_io_nested+0x1190/0x1190 [ 97.699576][ T4216] perf_trace_destroy+0x17/0xf0 [ 97.704411][ T4216] _free_event+0x29b/0x1000 [ 97.708887][ T4216] perf_mmap_close+0x44b/0xb70 [ 97.713620][ T4216] ? perf_release+0x50/0x50 [ 97.718092][ T4216] remove_vma+0x9b/0x140 [ 97.722566][ T4216] __do_munmap+0x5b2/0x1010 [ 97.727041][ T4216] mmap_region+0x1ae/0x11d0 [ 97.731684][ T4216] ? lock_release+0x780/0x780 [ 97.736340][ T4216] ? vm_munmap+0x10/0x10 [ 97.740658][ T4216] ? security_mmap_addr+0x34/0x70 [ 97.745654][ T4216] ? get_unmapped_area+0x1e7/0x2e0 [ 97.750829][ T4216] do_mmap+0x5c4/0xd70 [ 97.754889][ T4216] ? security_mmap_file+0xc3/0x160 [ 97.759971][ T4216] vm_mmap_pgoff+0x163/0x210 [ 97.764531][ T4216] ? randomize_page+0x60/0x60 [ 97.769177][ T4216] ? __fget_files+0x1bf/0x3a0 [ 97.773919][ T4216] ksys_mmap_pgoff+0x2e8/0x490 [ 97.778702][ T4216] ? syscall_enter_from_user_mode+0x21/0x70 [ 97.784596][ T4216] do_syscall_64+0x35/0x80 [ 97.789253][ T4216] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 97.795304][ T4216] RIP: 0033:0x4665f9 [ 97.799184][ T4216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 97.818760][ T4216] RSP: 002b:00007f72e6417188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 97.827140][ T4216] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665f9 [ 97.835525][ T4216] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffc000 [ 97.843504][ T4216] RBP: 00000000004bfcc4 R08: 0000000000000006 R09: 0000000000000000 [ 97.851449][ T4216] R10: 0000000000000011 R11: 0000000000000246 R12: 000000000056c0f0 [ 97.859406][ T4216] R13: 00007ffe3357668f R14: 00007f72e6417300 R15: 0000000000022000 [ 97.867363][ T4216] 2022/07/14 18:49:16 executed programs: 18 2022/07/14 18:49:22 executed programs: 24