[ 63.932103][ T28] audit: type=1400 audit(1655231219.094:180): avc: denied { search } for pid=3916 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 63.934270][ T28] audit: type=1400 audit(1655231219.094:181): avc: denied { read } for pid=3917 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=1433 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 63.934411][ T28] audit: type=1400 audit(1655231219.094:182): avc: denied { open } for pid=3917 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1433 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 63.934576][ T28] audit: type=1400 audit(1655231219.094:183): avc: denied { getattr } for pid=3917 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1433 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 64.050383][ T28] audit: type=1400 audit(1655231219.214:184): avc: denied { write } for pid=3916 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1432 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 64.050471][ T28] audit: type=1400 audit(1655231219.214:185): avc: denied { add_name } for pid=3916 comm="dhcpcd-run-hook" name="resolv.conf.eth2.ipv4ll" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 64.101433][ T28] audit: type=1400 audit(1655231219.254:186): avc: denied { remove_name } for pid=3927 comm="rm" name="resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=1550 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.10.19' (ECDSA) to the list of known hosts. 2022/06/14 18:27:01 parsed 1 programs [ 66.593013][ T28] audit: type=1400 audit(1655231221.754:187): avc: denied { mounton } for pid=3999 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.596706][ T28] audit: type=1400 audit(1655231221.754:188): avc: denied { mount } for pid=3999 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.623519][ T28] audit: type=1400 audit(1655231221.794:189): avc: denied { create } for pid=3999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.623716][ T28] audit: type=1400 audit(1655231221.794:190): avc: denied { write } for pid=3999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.623968][ T28] audit: type=1400 audit(1655231221.794:191): avc: denied { read } for pid=3999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.666570][ T28] audit: type=1400 audit(1655231221.824:192): avc: denied { read } for pid=4004 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=1476 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 66.671232][ T28] audit: type=1400 audit(1655231221.824:193): avc: denied { open } for pid=4004 comm="sed" path="/run/dhcpcd/hook-state/ntp.conf/eth0.dhcp" dev="tmpfs" ino=1476 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 2022/06/14 18:27:02 executed programs: 0 [ 70.127194][ T3646] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 71.643231][ T6] cfg80211: failed to load regulatory.db [ 74.277192][ T3646] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 76.368088][ T48] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 76.368992][ T48] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 76.369409][ T48] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 76.370390][ T48] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 76.370898][ T48] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 76.371134][ T48] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 76.377072][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 76.377080][ T28] audit: type=1400 audit(1655231231.534:200): avc: denied { read } for pid=4105 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.377107][ T28] audit: type=1400 audit(1655231231.534:201): avc: denied { open } for pid=4105 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.378195][ T28] audit: type=1400 audit(1655231231.544:202): avc: denied { mounton } for pid=4105 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 76.501417][ T4105] chnl_net:caif_netlink_parms(): no params data found [ 76.532330][ T4105] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.532387][ T4105] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.532938][ T4105] device bridge_slave_0 entered promiscuous mode [ 76.534285][ T4105] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.534331][ T4105] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.534841][ T4105] device bridge_slave_1 entered promiscuous mode [ 76.575793][ T4105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.579547][ T4105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.604281][ T4105] team0: Port device team_slave_0 added [ 76.614641][ T4105] team0: Port device team_slave_1 added [ 76.628562][ T4105] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 76.628571][ T4105] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.628577][ T4105] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 76.629678][ T4105] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 76.629682][ T4105] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.629688][ T4105] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 76.684250][ T4105] device hsr_slave_0 entered promiscuous mode [ 76.688843][ T4105] device hsr_slave_1 entered promiscuous mode [ 76.785395][ T4105] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.785416][ T4105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.785498][ T4105] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.785518][ T4105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.825027][ T4105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.830769][ T3372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.834093][ T3372] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.842488][ T3372] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.855793][ T3372] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 76.868472][ T4105] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.884079][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.884324][ T14] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.884341][ T14] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.884494][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.884665][ T14] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.884678][ T14] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.891380][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.891953][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.896345][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.901286][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.905632][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.911867][ T4105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.926304][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 76.926413][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 76.934441][ T4105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.119115][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 77.119538][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.119872][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.120140][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 77.121641][ T4105] device veth0_vlan entered promiscuous mode [ 77.125403][ T4105] device veth1_vlan entered promiscuous mode [ 77.141702][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 77.142215][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 77.142740][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 77.145968][ T4105] device veth0_macvtap entered promiscuous mode [ 77.151538][ T4105] device veth1_macvtap entered promiscuous mode [ 77.164150][ T4105] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 77.164222][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 77.168538][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 77.172793][ T4105] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.173012][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 77.274223][ T1057] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.274233][ T1057] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.275980][ T3655] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 77.303601][ T174] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.303609][ T174] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.304919][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 77.361718][ T28] audit: type=1400 audit(1655231232.524:203): avc: denied { open } for pid=4124 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 77.361828][ T28] audit: type=1400 audit(1655231232.524:204): avc: denied { perfmon } for pid=4124 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 77.361906][ T28] audit: type=1400 audit(1655231232.524:205): avc: denied { kernel } for pid=4124 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 77.368625][ T28] audit: type=1400 audit(1655231232.534:206): avc: denied { tracepoint } for pid=4124 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 77.392366][ T28] audit: type=1400 audit(1655231232.554:207): avc: denied { read } for pid=4124 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 77.394210][ T28] audit: type=1400 audit(1655231232.554:208): avc: denied { write } for pid=4124 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 2022/06/14 18:27:13 executed programs: 1 [ 78.438295][ T3655] Bluetooth: hci0: command 0x0409 tx timeout [ 80.517296][ T6] Bluetooth: hci0: command 0x041b tx timeout [ 82.597539][ T4111] Bluetooth: hci0: command 0x040f tx timeout 2022/06/14 18:27:19 executed programs: 7 [ 84.677199][ T6] Bluetooth: hci0: command 0x0419 tx timeout 2022/06/14 18:27:24 executed programs: 13 2022/06/14 18:27:30 executed programs: 19 2022/06/14 18:27:36 executed programs: 25 [ 106.611309][ T4275] [ 106.611315][ T4275] ====================================================== [ 106.611317][ T4275] WARNING: possible circular locking dependency detected [ 106.611320][ T4275] 5.19.0-rc2-syzkaller #0 Not tainted [ 106.611324][ T4275] ------------------------------------------------------ [ 106.611325][ T4275] syz-executor.0/4275 is trying to acquire lock: [ 106.611330][ T4275] ffffffff8afecb08 (event_mutex){+.+.}-{3:3}, at: perf_trace_destroy+0x17/0xf0 [ 106.611353][ T4275] [ 106.611353][ T4275] but task is already holding lock: [ 106.611354][ T4275] ffff888016f1a968 (&mm->mmap_lock#2){++++}-{3:3}, at: vm_mmap_pgoff+0x12e/0x210 [ 106.611367][ T4275] [ 106.611367][ T4275] which lock already depends on the new lock. [ 106.611367][ T4275] [ 106.611369][ T4275] [ 106.611369][ T4275] the existing dependency chain (in reverse order) is: [ 106.611370][ T4275] [ 106.611370][ T4275] -> #3 (&mm->mmap_lock#2){++++}-{3:3}: [ 106.611376][ T4275] down_write_killable+0x93/0x170 2022/06/14 18:27:41 executed programs: 31 [ 106.611383][ T4275] dup_mm+0x112/0x10e0 [ 106.611388][ T4275] copy_process+0x3490/0x6670 [ 106.611391][ T4275] kernel_clone+0xb8/0x7f0 [ 106.611393][ T4275] __do_sys_clone+0xa1/0xe0 [ 106.611396][ T4275] do_syscall_64+0x35/0x80 [ 106.611400][ T4275] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 106.611405][ T4275] [ 106.611405][ T4275] -> #2 (dup_mmap_sem){++++}-{0:0}: [ 106.611409][ T4275] percpu_down_write+0x4d/0x340 [ 106.611412][ T4275] register_for_each_vma+0x2f/0xaa0 [ 106.611415][ T4275] __uprobe_register+0x4e4/0x740 [ 106.611418][ T4275] probe_event_enable+0x2a9/0x920 [ 106.611424][ T4275] perf_trace_event_init+0x429/0x8a0 [ 106.611431][ T4275] perf_uprobe_init+0x10b/0x180 [ 106.611434][ T4275] perf_uprobe_event_init+0xbd/0x150 [ 106.611438][ T4275] perf_try_init_event+0xf6/0x470 [ 106.611441][ T4275] perf_event_alloc+0xe5a/0x32d0 [ 106.611444][ T4275] __do_sys_perf_event_open+0x26d/0x2470 [ 106.611448][ T4275] do_syscall_64+0x35/0x80 [ 106.611450][ T4275] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 106.611454][ T4275] [ 106.611454][ T4275] -> #1 (&uprobe->register_rwsem){+.+.}-{3:3}: [ 106.611459][ T4275] down_write+0x90/0x150 [ 106.611461][ T4275] __uprobe_register+0x46b/0x740 [ 106.611464][ T4275] probe_event_enable+0x2a9/0x920 [ 106.611467][ T4275] perf_trace_event_init+0x429/0x8a0 [ 106.611470][ T4275] perf_uprobe_init+0x10b/0x180 [ 106.611473][ T4275] perf_uprobe_event_init+0xbd/0x150 [ 106.611476][ T4275] perf_try_init_event+0xf6/0x470 [ 106.611478][ T4275] perf_event_alloc+0xe5a/0x32d0 [ 106.611481][ T4275] __do_sys_perf_event_open+0x26d/0x2470 [ 106.611484][ T4275] do_syscall_64+0x35/0x80 [ 106.611486][ T4275] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 106.611490][ T4275] [ 106.611490][ T4275] -> #0 (event_mutex){+.+.}-{3:3}: [ 106.611493][ T4275] __lock_acquire+0x2a3c/0x55d0 [ 106.611499][ T4275] lock_acquire+0x1ab/0x570 [ 106.611502][ T4275] __mutex_lock+0x12f/0x1350 [ 106.611505][ T4275] perf_trace_destroy+0x17/0xf0 [ 106.611508][ T4275] _free_event+0x29b/0x1000 [ 106.611511][ T4275] perf_mmap_close+0x44b/0xb70 [ 106.611514][ T4275] remove_vma+0x9b/0x140 [ 106.611519][ T4275] __do_munmap+0x5b2/0x1010 [ 106.611522][ T4275] mmap_region+0x1ae/0x11d0 [ 106.611524][ T4275] do_mmap+0x5c4/0xd70 [ 106.611527][ T4275] vm_mmap_pgoff+0x163/0x210 [ 106.611531][ T4275] ksys_mmap_pgoff+0x2e8/0x490 [ 106.611533][ T4275] do_syscall_64+0x35/0x80 [ 106.611535][ T4275] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 106.611539][ T4275] [ 106.611539][ T4275] other info that might help us debug this: [ 106.611539][ T4275] [ 106.611540][ T4275] Chain exists of: [ 106.611540][ T4275] event_mutex --> dup_mmap_sem --> &mm->mmap_lock#2 [ 106.611540][ T4275] [ 106.611546][ T4275] Possible unsafe locking scenario: [ 106.611546][ T4275] [ 106.611547][ T4275] CPU0 CPU1 [ 106.611547][ T4275] ---- ---- [ 106.611548][ T4275] lock(&mm->mmap_lock#2); [ 106.611551][ T4275] lock(dup_mmap_sem); [ 106.611553][ T4275] lock(&mm->mmap_lock#2); [ 106.611556][ T4275] lock(event_mutex); [ 106.611557][ T4275] [ 106.611557][ T4275] *** DEADLOCK *** [ 106.611557][ T4275] [ 106.611558][ T4275] 1 lock held by syz-executor.0/4275: [ 106.611560][ T4275] #0: ffff888016f1a968 (&mm->mmap_lock#2){++++}-{3:3}, at: vm_mmap_pgoff+0x12e/0x210 [ 106.611569][ T4275] [ 106.611569][ T4275] stack backtrace: [ 106.611599][ T4275] CPU: 1 PID: 4275 Comm: syz-executor.0 Not tainted 5.19.0-rc2-syzkaller #0 [ 106.611603][ T4275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.611606][ T4275] Call Trace: [ 106.611608][ T4275] [ 106.611610][ T4275] dump_stack_lvl+0x57/0x7d [ 106.611617][ T4275] check_noncircular+0x25f/0x2e0 [ 106.611621][ T4275] ? print_circular_bug+0x1e0/0x1e0 [ 106.611624][ T4275] ? __pv_queued_spin_lock_slowpath+0x264/0xb50 [ 106.611629][ T4275] __lock_acquire+0x2a3c/0x55d0 [ 106.611633][ T4275] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 106.611637][ T4275] lock_acquire+0x1ab/0x570 [ 106.611640][ T4275] ? perf_trace_destroy+0x17/0xf0 [ 106.611644][ T4275] ? lock_release+0x780/0x780 [ 106.611647][ T4275] ? lock_downgrade+0x6e0/0x6e0 [ 106.611650][ T4275] ? rcu_read_lock_sched_held+0x3a/0x70 [ 106.611657][ T4275] __mutex_lock+0x12f/0x1350 [ 106.611660][ T4275] ? perf_trace_destroy+0x17/0xf0 [ 106.611663][ T4275] ? wait_for_completion_io_timeout+0x20/0x20 [ 106.611667][ T4275] ? perf_trace_destroy+0x17/0xf0 [ 106.611670][ T4275] ? mutex_lock_io_nested+0x1190/0x1190 [ 106.611674][ T4275] perf_trace_destroy+0x17/0xf0 [ 106.611677][ T4275] _free_event+0x29b/0x1000 [ 106.611681][ T4275] perf_mmap_close+0x44b/0xb70 [ 106.611684][ T4275] ? perf_release+0x50/0x50 [ 106.611688][ T4275] remove_vma+0x9b/0x140 [ 106.611691][ T4275] __do_munmap+0x5b2/0x1010 [ 106.611694][ T4275] mmap_region+0x1ae/0x11d0 [ 106.611697][ T4275] ? lock_release+0x780/0x780 [ 106.611701][ T4275] ? vm_munmap+0x10/0x10 [ 106.611704][ T4275] ? security_mmap_addr+0x34/0x70 [ 106.611710][ T4275] ? get_unmapped_area+0x1e7/0x2e0 [ 106.611713][ T4275] do_mmap+0x5c4/0xd70 [ 106.611716][ T4275] ? security_mmap_file+0xc3/0x160 [ 106.611719][ T4275] vm_mmap_pgoff+0x163/0x210 [ 106.611723][ T4275] ? randomize_page+0x60/0x60 [ 106.611727][ T4275] ? __fget_files+0x1bf/0x3a0 [ 106.611732][ T4275] ksys_mmap_pgoff+0x2e8/0x490 [ 106.611735][ T4275] ? syscall_enter_from_user_mode+0x21/0x70 [ 106.611740][ T4275] do_syscall_64+0x35/0x80 [ 106.611743][ T4275] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 106.611748][ T4275] RIP: 0033:0x4665f9 [ 106.611751][ T4275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.611755][ T4275] RSP: 002b:00007f418aff0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 106.611759][ T4275] RAX: ffffffffffffffda RBX: 000000000056c1a8 RCX: 00000000004665f9 [ 106.611761][ T4275] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffc000 [ 106.611763][ T4275] RBP: 00000000004bfcc4 R08: 0000000000000006 R09: 0000000000000000 [ 106.611765][ T4275] R10: 0000000000000011 R11: 0000000000000246 R12: 000000000056c1a8 [ 106.611767][ T4275] R13: 00007ffd1d13ff2f R14: 00007f418aff0300 R15: 0000000000022000 [ 106.611770][ T4275] 2022/06/14 18:27:47 executed programs: 37