last executing test programs: 12m34.264991472s ago: executing program 1 (id=354): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000380)='kmem_cache_free\x00', r1, 0x0, 0x7}, 0x18) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @local, 0x1}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000780)="f4000900062b2c25fe80000000000000dc8b850f238466cc00007a000000ad6e911b51818462b4003a", 0x29}], 0x1}, 0x40) 12m33.004750552s ago: executing program 1 (id=355): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/diskstats\x00', 0x0, 0x0) lseek(r2, 0xc6c3, 0x0) 12m32.786547719s ago: executing program 1 (id=356): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r2, 0x80045505, &(0x7f0000000000)=@usbdevfs_connect) 12m32.402568338s ago: executing program 1 (id=357): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000400)='kfree\x00', r1, 0x0, 0x8}, 0x18) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000640)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7d0, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local, [@srh={0x0, 0x0, 0x4, 0x0, 0x20}]}}}}}}}, 0x0) 12m31.792016915s ago: executing program 1 (id=358): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'macvtap0\x00', 0x0}) sendto$packet(r0, &(0x7f00000002c0)="14043600d3fc03fc01004788031c09100628", 0xfd35, 0x4, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 12m31.470096166s ago: executing program 1 (id=359): inotify_init1(0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x15, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x511a03, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r5) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r6, 0x9c3fa077fa966179, 0x0, 0x1, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x4000054) 11m46.223495268s ago: executing program 32 (id=359): inotify_init1(0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x15, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x511a03, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r5) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r6, 0x9c3fa077fa966179, 0x0, 0x1, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x4000054) 11m25.730395444s ago: executing program 0 (id=410): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x5, 0xb, &(0x7f00000001c0)=ANY=[@ANYRESOCT=0x0], 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sys_enter\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xd, 0x0, &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='kfree\x00', r0, 0x0, 0x20}, 0x18) r1 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r1, 0xc0105500, &(0x7f0000000040)=@usbdevfs_connect={0x6a0}) 11m24.89202931s ago: executing program 0 (id=411): bpf$MAP_CREATE(0x0, 0x0, 0x50) wait4(0x0, 0x0, 0x8, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xd9, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz', 0x1, 0xc}, &(0x7f0000000080)='R\x10suse\x00\x00\x00\x00\x00\x00\x00ex:\x00\x00', 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) getpgid(0x0) 11m24.361058928s ago: executing program 0 (id=412): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000201010100000000000000000a0000003c0001802c0001"], 0x5c}}, 0x0) 11m24.212550407s ago: executing program 0 (id=413): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r2}, 0x18) mq_open(&(0x7f0000001880)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\x1c`\xbd\xe1e\x80\x7f\xd2&l0\xc1b\xac\x8b\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL%Jw\x99y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3\x05\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\x81W\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xc8\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xc7\xa7\x82\xb9V}`\xb7\xfc@\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5m\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v>\x9b\n0\xb2 h\xad5\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\'/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f9\xce\x1eYV\xa2\xc4\x03PV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x9b\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xd1\x06F\xef\xbd\xeb\xf0\'\f\f\x003\xecp\x18\x9e\x1d\xeaH\xdaQ%+\xf4\xae\xab0\b\x17W\xba\xaf4E\xe62\xefm\xdd+\xb2\x1b:\xc0cc\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x97s\x03`\xba\xf1\xdb\x05\xe5C)\x8f\xbchyL1:\xc2\xea\x8a\xfc\tq\xfa\xec&\xc7\xde\xf4\xf2\xb9\xe1\xa1\x80)1\xbe@Bt\xb7\xce\xc9\xee\xa8v\t\xfa,\xa2\x9a\xa3\\\xfbM\xb5\xfd\xa9\xe3\x9f\xf7\x85\x87w\x1d]& 8\xb5\xba\xea\xad\xa9\xd4V\xf1\xe9\xaaT\xc8\xff\xaf\xef\x91\xca\x9c\x80\xbeYd]\xfb\x1a\x96?\xb6\xd7{X\xa1H\xeb\xce\xd7\xb7\xf7\x15\xd6\x88\x91\xef{\xf8K@\xb6ch\x1e\x16\xd5m@\xa8\x91\xa5\xc5@\xa7\x00\xab\xc5\xc8\xc8\x9c\xe3:\xac\x1eG\xa0e\'/\x15G\x8e\xe5\x16\xd5S ]\xf8\xa1\xa46\x9a\xf0d!\xc8\x81S\xbc\x18\xdf\xa0\xfek\xb0(\xf7\xba5\x8e\xe5A\xd5l\xfbp\xcb\xa8\xf0b\x91\xc4\xd3+)Sy\x81\xe3\r%C\x03enM\xf1\xdf\xe3b\xb7\x9b\f\x82\xb1z\xcf^\x06\xcd\xa2\x96\xe3\xd5\xbd@1\xbe\x02\xad\\\x89\xd0\xe0\xa8\x11\xb4B\\\x14\\\xed5\x9c\xd7n\x8d\xec\xb5\xcc\xf8q', 0x42, 0x0, 0x0) 11m23.636841059s ago: executing program 0 (id=415): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000001480)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='kfree\x00', r0, 0x0, 0x4804}, 0x18) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000003580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xffffffffffffffff}], 0x9, 0x0) 11m23.137387963s ago: executing program 0 (id=416): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x204000, &(0x7f0000000000), 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x13f, 0x8}}, 0x20) close(r1) 10m38.189154817s ago: executing program 33 (id=416): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x204000, &(0x7f0000000000), 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x13f, 0x8}}, 0x20) close(r1) 6m50.933148457s ago: executing program 2 (id=911): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYBLOB, @ANYRES32, @ANYBLOB="5c1b3683036447d9723f9cea24a738663d20fb0c8b3c0da92963fc0d35433c84ad2764922abe4dc086b03d7d492578639418349ea21a", @ANYRESDEC=r0, @ANYBLOB="a791ae3fb18efefbe585075fe0b3affc7147938b7eb75782bac58750c11586efe837814130fd5fe679b31ea350cc755b97ca257f5074c6f917c0b82ea75a8ae9ed761926bc6188193444042a41ddd048", @ANYRES64, @ANYBLOB="f4a43ac2fbfbc4ee1f3a1e10a7a47936b1f55e2ead2bf0aeb3b00e2b762688b34c0092b0d50fb3926e2b00928a5869f52c09d6f171b29ad127013ae674c2a4b6f776c4853d730758c9c1b61bb1", @ANYRESHEX], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x0, 0x2b8, 0xb0000010, 0x0, 0x5c8f0200, 0x378, 0x3a8, 0x3a8, 0x378, 0x3a8, 0x3, 0x0, {[{{@ipv6={@private1, @local, [], [], 'vlan1\x00', 'veth0_to_team\x00'}, 0x0, 0x200, 0x238, 0x700, {}, [@common=@inet=@hashlimit3={{0x158}, {'geneve1\x00', {0xf1, 0x0, 0x33, 0x0, 0x0, 0x1, 0x7fffffff}}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff, 0x2, 0x1}, {0xffffffffffffffff, 0x1, 0x2}, {0x1, 0x2, 0x2}, 0x4f6, 0x5}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) sched_setscheduler(0x0, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xf, &(0x7f0000000580)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fsopen(0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcdb) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) close(r2) r4 = open(&(0x7f0000000300)='./file0\x00', 0x400, 0x0) fcntl$setlease(r4, 0x400, 0x1) r5 = memfd_create(&(0x7f0000000180)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xecz\xabq\x95t*T9\xa9\b X \x04\"\x17\xbf\xcb\xccF\xda\xcf\xdd^\xa0\x15\xc0\xcb^h>\x1b\xb5d\xc7\x7f0\x9a&\xb0\x12#\x9c`\xa6\xed\x05\x95g\a\xccYb\xaf\xe9\xb6G?\x9f\xf5\xfe\xc1\xc0JJ\xc8\xd9d\x80\x13\x8fX\xb4\x19\xc4\\\xcb\x89-)\x90\x01\v\xac^\xdbBQ|\xaej;\x92\\\xf8u\x19Y\xee\x99EI\xf1t\xadn<\x9b\xc9\x87\xd0\xa7\x1a\x81\xb9\xc87sq\xd7\x15\xd6\x91O\x9c\x99!9>\xff\xa8\xfa\xe6=d\xcf\xca\xa9\xc61!\xc6P\x13\xd0\x88gZ\xbe\xdfl\xfa\xff\xb0m;d07tx\xbb\xabd\xe5\x16\xc4\xae\xf0', 0x0) write$binfmt_script(r5, &(0x7f0000000340)={'#! ', './file0'}, 0xb) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x0) unshare(0x60600) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 6m48.201398474s ago: executing program 2 (id=912): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) flistxattr(r1, 0x0, 0x0) 6m47.871827525s ago: executing program 2 (id=913): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x378, 0x0, 0x111, 0x4b4, 0x170, 0x700, 0x2a8, 0x278, 0x278, 0x2a8, 0x278, 0x3, 0x0, {[{{@ipv6={@private1={0xfc, 0x1, '\x00', 0x1}, @empty, [], [], 'wg0\x00', 'team_slave_0\x00', {}, {}, 0x88, 0x0, 0x0, 0x48}, 0x0, 0x108, 0x170, 0x0, {}, [@common=@inet=@length={{0x28}, {0x9, 0x7, 0x1}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x8, {0x9}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8) 6m47.723827374s ago: executing program 2 (id=914): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x34, 0x3, 0xffffffffffffffff, 0x0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0, 0x40000000}) r2 = syz_io_uring_setup(0x64d, &(0x7f0000000100)={0x0, 0x11f8, 0x8, 0x2, 0x801e7}, &(0x7f0000000300)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/201, 0xc9}], 0x1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x30, 0x4, 0x0, 0x2}]}, 0xffffffffffffff0e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x0, 0x0, 0xffffffffffffffff, 0x0, r2}) io_uring_enter(r2, 0x749d, 0x4, 0x0, 0x0, 0x0) 6m47.272805811s ago: executing program 2 (id=915): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000130a0102000c6df69c4308ccb7"], 0x14}}, 0x20000000) 6m46.993844146s ago: executing program 2 (id=916): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0xb) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000100)=0x1800, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_link_settings={0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x20, 0x8, [0x0, 0x0, 0x0, 0x100, 0x5, 0x0, 0x0, 0x2]}}) 6m1.851666535s ago: executing program 34 (id=916): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0xb) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000100)=0x1800, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_link_settings={0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x20, 0x8, [0x0, 0x0, 0x0, 0x100, 0x5, 0x0, 0x0, 0x2]}}) 5m54.021280707s ago: executing program 3 (id=999): r0 = syz_io_uring_setup(0x56f, &(0x7f00000000c0)={0x0, 0x6601, 0x400, 0x3, 0x8a}, &(0x7f0000000040), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 5m53.811666294s ago: executing program 3 (id=1000): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x1, 0x0, 0x0, 0x7ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_DETACH(0x22, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5m53.111894352s ago: executing program 3 (id=1001): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c3"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x4000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r0}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) 5m51.990996864s ago: executing program 3 (id=1002): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0xb, &(0x7f00000012c0)=ANY=[@ANYBLOB="18000000000400000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) shmat(0x0, &(0x7f0000caa000/0x3000)=nil, 0x7000) 5m51.605492643s ago: executing program 3 (id=1003): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000400)=ANY=[@ANYBLOB="54020000170001000000000000000000200100000000000000000000000000010000000000000000ac141400000000000000000000000000fc020000000000000003000000000000e000000200001000000000000000000000000000000000080a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="1242ffff040000000000000000000037660b6aff000000000000000000000000000000000000000002"], 0x254}}, 0x0) 5m51.408239238s ago: executing program 3 (id=1004): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x149a82, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0xfe8e, 0x12) 5m5.704791828s ago: executing program 35 (id=1004): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x149a82, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0xfe8e, 0x12) 3m43.612588348s ago: executing program 4 (id=1177): r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000080)="da", 0x1}], 0x1, &(0x7f0000000040)=ANY=[], 0xd0}}], 0x1, 0x48001) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001380)={&(0x7f00000012c0)='kmem_cache_free\x00', r1, 0x0, 0x7}, 0x18) close(r0) 3m43.219900268s ago: executing program 4 (id=1178): capset(&(0x7f00000020c0)={0x20080522}, &(0x7f0000000500)={0x0, 0x3, 0x647, 0x0, 0x40000, 0x1000}) setrlimit(0x40000000000008, &(0x7f0000000000)) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r0, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @local}, 0x1c) 3m42.849605925s ago: executing program 4 (id=1179): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) 3m42.528813895s ago: executing program 4 (id=1180): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2042, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b0000000700000008000000a6ad6a1a05"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) ioctl$AUTOFS_IOC_FAIL(r0, 0x4c80, 0x7000000) 3m42.158240042s ago: executing program 4 (id=1181): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000fddbdf251b0000000c00018008000100", @ANYRES32=r5], 0x20}}, 0x0) 3m41.725837567s ago: executing program 4 (id=1183): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x12, 0xffffffffffffffff, 0x4e652000) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d88c19e9ace5ffb2e9fc603dd282100000002ff02000000000000000000000000000104004e200023b0"], 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 2m56.162780349s ago: executing program 36 (id=1183): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x12, 0xffffffffffffffff, 0x4e652000) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d88c19e9ace5ffb2e9fc603dd282100000002ff02000000000000000000000000000104004e200023b0"], 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 2m50.898365986s ago: executing program 5 (id=1222): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000404000009"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={r0, 0x0, 0x0}, 0x20) 2m50.421902776s ago: executing program 5 (id=1223): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000400)=ANY=[@ANYBLOB="54020000170001000000000000000000200100000000000000000000000000010000000000000000ac141400000000000000000000000000fc020000000000000003000000000000e000000200001000000000000000000000000000000000080a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="1242ffff040000000000000000000037660b6aff000000000000000000000000000000000000000002"], 0x254}}, 0x0) 2m49.944113337s ago: executing program 5 (id=1224): syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$packet(0x11, 0x2, 0x300) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x4, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r2, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r4, 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000480), 0xffffffffffffffff) 2m49.6821849s ago: executing program 5 (id=1225): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40000) 2m48.618613965s ago: executing program 5 (id=1226): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) syz_clone(0x41200111, 0x0, 0x0, 0x0, 0x0, 0x0) 2m25.543945648s ago: executing program 5 (id=1228): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_CLEAR_HALT(r1, 0xc0105502, &(0x7f0000000300)={0x1, 0x1}) 1m40.387225549s ago: executing program 37 (id=1228): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_CLEAR_HALT(r1, 0xc0105502, &(0x7f0000000300)={0x1, 0x1}) 3.531823457s ago: executing program 7 (id=1460): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000240)=ANY=[@ANYBLOB="7c02000021000100000000000100000000000000000000000000000000000000fe8000000000000000000000000000bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="b46b6e0000000000cc011100e0"], 0x27c}}, 0x0) 3.282491809s ago: executing program 7 (id=1462): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xf, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000ffff953300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @cgroup_device=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='7'], 0x50) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000080)={'team0\x00', @random='\x00\x00\x00\x00\x00 '}) 2.893435687s ago: executing program 6 (id=1464): bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x22c7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x18) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) execve(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085006d28b5a4bba683bb0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f00000010c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa3) 2.71219615s ago: executing program 7 (id=1465): r0 = socket$nl_rdma(0x10, 0x3, 0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x60, 0x1403, 0x1, 0x70bd2a, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'bond0\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'virt_wifi0\x00'}}]}, 0x60}, 0x1, 0x0, 0x0, 0x800}, 0x20000800) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x38, 0x1410, 0x8b7fbbc5948fecd9, 0x70bd29, 0x25dfd9fc, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x3}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004085}, 0x4004080) 2.509488405s ago: executing program 7 (id=1466): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000300)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d004892e822a6abc02ad2602a5ad6f7007ea60864160af365935cfaea3f49d8df1931a0e64ffc4c78029ee517d34460bc06000000938037e70e457ae2bb24ef6697070000000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)=""/99, 0x63}, {&(0x7f0000000b00)=""/210, 0xd2}, {&(0x7f0000000280)=""/105, 0x69}, {&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/167, 0xa7}], 0x6}, 0x40010022) 2.408073489s ago: executing program 6 (id=1467): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000900)={{0x14, 0x10, 0x1, 0x0, 0x0, {0xa}}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x5c}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) 2.161451779s ago: executing program 6 (id=1468): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum64={0x1, 0x0, 0x0, 0x13, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x8}, 0x28) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x2, 0x300) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}}, &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r1}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x20, 0x39, 0x1, 0x7fffa, 0x4, {0x1}, [@typed={0x9, 0xec, 0x0, 0x0, @str='\x02A+/\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) 2.023156557s ago: executing program 7 (id=1469): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 1.453087288s ago: executing program 6 (id=1470): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 1.181212152s ago: executing program 6 (id=1471): bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x22c7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) execve(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085006d28b5a4bba683bb0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f00000010c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa3) 287.03µs ago: executing program 7 (id=1472): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000fcffffff000000000000000095"], &(0x7f0000000300)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='contention_end\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r3, 0x0, 0x0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) 0s ago: executing program 6 (id=1473): r0 = socket$kcm(0xa, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2}, 0x80, 0x0}, 0xb80b) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x4000, 0x0}, 0x80) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, 0x0}, 0xb80b) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x80) kernel console output (not intermixed with test programs): rsing attributes in process `syz.2.436'. [ 501.131500][ T5840] netlink: 104 bytes leftover after parsing attributes in process `syz.2.436'. [ 502.555920][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 502.557124][ T29] audit: type=1400 audit(502.480:365): avc: denied { setopt } for pid=5849 comm="syz.2.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 502.694135][ T5852] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 502.695836][ T5852] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 503.628256][ T5860] netlink: 12 bytes leftover after parsing attributes in process `syz.2.443'. [ 503.867762][ T5860] netlink: 12 bytes leftover after parsing attributes in process `syz.2.443'. [ 504.211388][ T5864] netlink: 12 bytes leftover after parsing attributes in process `syz.2.443'. [ 504.256147][ T5860] netlink: 12 bytes leftover after parsing attributes in process `syz.2.443'. [ 504.521300][ T5864] netlink: 12 bytes leftover after parsing attributes in process `syz.2.443'. [ 505.098626][ T5864] netlink: 12 bytes leftover after parsing attributes in process `syz.2.443'. [ 505.750740][ T5871] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 505.754253][ T5871] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 507.744193][ T29] audit: type=1400 audit(507.670:366): avc: denied { create } for pid=5879 comm="syz.2.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 508.884488][ T5886] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 508.886862][ T5886] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 509.655157][ T29] audit: type=1326 audit(509.580:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.2.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 509.659673][ T29] audit: type=1326 audit(509.580:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.2.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 509.660266][ T29] audit: type=1326 audit(509.580:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.2.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 509.675905][ T29] audit: type=1326 audit(509.600:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.2.452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 509.676264][ T29] audit: type=1326 audit(509.600:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.2.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 509.676494][ T29] audit: type=1326 audit(509.600:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.2.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 509.682479][ T29] audit: type=1326 audit(509.610:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.2.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 509.703182][ T29] audit: type=1326 audit(509.620:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.2.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 509.703584][ T29] audit: type=1326 audit(509.620:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.2.452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 511.177931][ T5911] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 511.179850][ T5911] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 512.138142][ T5926] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 512.138983][ T5926] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 512.986356][ T5938] netlink: 'syz.2.463': attribute type 1 has an invalid length. [ 513.068479][ T5938] 8021q: adding VLAN 0 to HW filter on device bond1 [ 513.125935][ T5938] netlink: 4 bytes leftover after parsing attributes in process `syz.2.463'. [ 513.206352][ T5938] bond1 (unregistering): Released all slaves [ 517.322741][ T6028] mmap: syz.2.471 (6028) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 519.453546][ T6030] netlink: 'syz.2.472': attribute type 4 has an invalid length. [ 524.218180][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 524.218799][ T29] audit: type=1326 audit(524.140:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.483" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 524.219058][ T29] audit: type=1326 audit(524.140:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.483" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 524.231039][ T29] audit: type=1326 audit(524.150:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.483" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 524.233276][ T29] audit: type=1326 audit(524.160:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.483" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 524.233645][ T29] audit: type=1326 audit(524.160:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.483" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 524.251161][ T29] audit: type=1326 audit(524.170:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.483" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 524.251613][ T29] audit: type=1326 audit(524.170:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.483" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 524.251976][ T29] audit: type=1326 audit(524.170:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.483" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 524.252186][ T29] audit: type=1326 audit(524.170:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.483" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132970 code=0x7ffc0000 [ 524.252440][ T29] audit: type=1326 audit(524.170:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.483" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 528.783574][ T6083] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 528.784457][ T6083] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 529.527600][ T6093] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 529.528592][ T6093] SELinux: failed to load policy [ 532.848354][ T6115] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 532.849390][ T6115] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 534.916534][ T29] kauditd_printk_skb: 667 callbacks suppressed [ 534.917078][ T29] audit: type=1326 audit(534.840:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.2.508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 534.932898][ T29] audit: type=1326 audit(534.860:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.2.508" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 534.937128][ T29] audit: type=1326 audit(534.860:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.2.508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 534.978783][ T29] audit: type=1326 audit(534.900:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.2.508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 535.079182][ T29] audit: type=1326 audit(535.000:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.2.508" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 535.083482][ T29] audit: type=1326 audit(535.000:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.2.508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 535.087703][ T29] audit: type=1326 audit(535.000:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.2.508" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 535.092567][ T29] audit: type=1326 audit(535.000:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.2.508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 535.115288][ T29] audit: type=1326 audit(535.040:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.2.508" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 535.228151][ T29] audit: type=1326 audit(535.150:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6125 comm="syz.2.508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 541.290187][ T6122] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 541.344080][ T6122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 543.217062][ T6122] hsr_slave_0: entered promiscuous mode [ 543.218846][ T6122] hsr_slave_1: entered promiscuous mode [ 543.220189][ T6122] debugfs: 'hsr0' already exists in 'hsr' [ 543.241727][ T6122] Cannot create hsr debugfs directory [ 544.407250][ T6122] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 544.442228][ T6122] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 544.502852][ T6122] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 544.518295][ T6122] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 546.979828][ T6122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 555.682602][ T6122] veth0_vlan: entered promiscuous mode [ 555.724785][ T6122] veth1_vlan: entered promiscuous mode [ 556.118873][ T6122] veth0_macvtap: entered promiscuous mode [ 556.174157][ T6122] veth1_macvtap: entered promiscuous mode [ 556.417985][ T5672] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 556.418459][ T5672] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 556.418904][ T5672] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 556.419195][ T5672] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 557.945650][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 557.948658][ T29] audit: type=1326 audit(557.870:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6498 comm="syz.3.514" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 557.962784][ T29] audit: type=1326 audit(557.890:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6498 comm="syz.3.514" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 558.023057][ T29] audit: type=1326 audit(557.950:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6498 comm="syz.3.514" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 558.025095][ T29] audit: type=1326 audit(557.950:1103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6498 comm="syz.3.514" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 558.029545][ T29] audit: type=1326 audit(557.950:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6498 comm="syz.3.514" exe="/syz-executor" sig=0 arch=40000028 syscall=70 compat=0 ip=0x132970 code=0x7ffc0000 [ 558.073357][ T29] audit: type=1326 audit(557.950:1105): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6498 comm="syz.3.514" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 558.093599][ T29] audit: type=1326 audit(558.020:1106): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6498 comm="syz.3.514" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 562.736718][ T6527] IPv6: NLM_F_CREATE should be specified when creating new route [ 563.106330][ T29] audit: type=1400 audit(563.030:1107): avc: denied { create } for pid=6531 comm="syz.2.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 564.570153][ T29] audit: type=1326 audit(564.490:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 564.574685][ T29] audit: type=1326 audit(564.490:1109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 564.581807][ T29] audit: type=1326 audit(564.490:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 564.592350][ T29] audit: type=1326 audit(564.520:1111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 564.597630][ T29] audit: type=1326 audit(564.520:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 564.624243][ T29] audit: type=1326 audit(564.540:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 564.704425][ T29] audit: type=1326 audit(564.610:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 564.833861][ T29] audit: type=1326 audit(564.750:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 564.835810][ T29] audit: type=1326 audit(564.760:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6547 comm="syz.2.533" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 565.856594][ T6549] netlink: 4 bytes leftover after parsing attributes in process `syz.2.533'. [ 567.713285][ T6540] random: crng reseeded on system resumption [ 567.744033][ T6540] Restarting kernel threads ... [ 567.752366][ T6540] Done restarting kernel threads. [ 573.594586][ T6586] pimreg: entered allmulticast mode [ 573.611704][ T6586] pimreg: left allmulticast mode [ 575.509747][ T6594] netlink: 32 bytes leftover after parsing attributes in process `syz.2.545'. [ 575.542727][ T6594] netlink: 32 bytes leftover after parsing attributes in process `syz.2.545'. [ 575.889454][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 575.891473][ T29] audit: type=1400 audit(575.810:1242): avc: denied { bind } for pid=6598 comm="syz.2.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 579.555577][ T6618] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 579.556418][ T6618] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 580.175745][ T29] audit: type=1400 audit(580.100:1243): avc: denied { setopt } for pid=6623 comm="syz.2.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 583.808706][ T6631] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 583.821215][ T6631] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 583.948931][ T6635] netlink: 2184 bytes leftover after parsing attributes in process `syz.2.559'. [ 583.950067][ T6635] netlink: 144 bytes leftover after parsing attributes in process `syz.2.559'. [ 585.254622][ T6649] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 585.265824][ T6649] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 585.883542][ T6659] netlink: 19 bytes leftover after parsing attributes in process `syz.2.566'. [ 586.681145][ T6664] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 586.701402][ T6664] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 586.982031][ T29] audit: type=1326 audit(586.910:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6667 comm="syz.2.569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 587.006998][ T29] audit: type=1326 audit(586.930:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6667 comm="syz.2.569" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 587.011701][ T29] audit: type=1400 audit(586.930:1246): avc: denied { create } for pid=6667 comm="syz.2.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 587.339315][ T29] audit: type=1326 audit(587.260:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6667 comm="syz.2.569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 587.344842][ T29] audit: type=1326 audit(587.260:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6667 comm="syz.2.569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 587.353353][ T29] audit: type=1326 audit(587.280:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6667 comm="syz.2.569" exe="/syz-executor" sig=0 arch=40000028 syscall=295 compat=0 ip=0x132970 code=0x7ffc0000 [ 587.358762][ T29] audit: type=1326 audit(587.280:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6667 comm="syz.2.569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 587.363667][ T29] audit: type=1326 audit(587.280:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6667 comm="syz.2.569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 591.307440][ T6684] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 591.308545][ T6684] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 591.621989][ T6688] netlink: 12 bytes leftover after parsing attributes in process `syz.3.574'. [ 593.395028][ T6701] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 593.409825][ T6701] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 596.781569][ T6722] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 596.792703][ T6722] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 601.521842][ T29] audit: type=1326 audit(601.440:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6737 comm="syz.3.587" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 601.550864][ T29] audit: type=1326 audit(601.450:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6737 comm="syz.3.587" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 601.551392][ T29] audit: type=1326 audit(601.470:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6737 comm="syz.3.587" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 601.555700][ T29] audit: type=1326 audit(601.480:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6737 comm="syz.3.587" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 601.571511][ T29] audit: type=1326 audit(601.490:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6737 comm="syz.3.587" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 601.592846][ T29] audit: type=1326 audit(601.510:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6737 comm="syz.3.587" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 601.606691][ T29] audit: type=1326 audit(601.530:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6737 comm="syz.3.587" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 601.609655][ T29] audit: type=1326 audit(601.530:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6737 comm="syz.3.587" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 601.621994][ T29] audit: type=1326 audit(601.550:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6737 comm="syz.3.587" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 601.630816][ T29] audit: type=1326 audit(601.550:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6737 comm="syz.3.587" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 601.824125][ T6743] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 601.826024][ T6743] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 603.249656][ T6761] netlink: 8 bytes leftover after parsing attributes in process `syz.2.593'. [ 603.731260][ T6764] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 603.733285][ T6764] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 604.753039][ T6768] netlink: 20 bytes leftover after parsing attributes in process `syz.2.595'. [ 605.543641][ T6776] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 605.545471][ T6776] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 606.008697][ T6784] netlink: 224 bytes leftover after parsing attributes in process `syz.3.601'. [ 607.498830][ T6796] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 607.499778][ T6796] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 608.722973][ T6807] syz.3.608 uses obsolete (PF_INET,SOCK_PACKET) [ 609.148557][ T6816] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 609.156445][ T6816] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 609.622094][ T6821] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.738792][ T6821] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.816934][ T6821] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.914207][ T6821] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 610.018863][ T5672] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 610.064515][ T5673] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 610.103544][ T5672] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 610.139689][ T5672] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 610.613314][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 610.617224][ T29] audit: type=1326 audit(610.540:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6843 comm="syz.2.614" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 610.641285][ T29] audit: type=1326 audit(610.550:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6843 comm="syz.2.614" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 610.645254][ T29] audit: type=1326 audit(610.570:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6843 comm="syz.2.614" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 610.650663][ T29] audit: type=1326 audit(610.570:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6843 comm="syz.2.614" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 610.654422][ T29] audit: type=1326 audit(610.570:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6843 comm="syz.2.614" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 610.659215][ T29] audit: type=1326 audit(610.580:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6843 comm="syz.2.614" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 610.659732][ T29] audit: type=1326 audit(610.580:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6843 comm="syz.2.614" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 610.674119][ T29] audit: type=1326 audit(610.600:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6843 comm="syz.2.614" exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x132970 code=0x7ffc0000 [ 610.743661][ T29] audit: type=1326 audit(610.670:1288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6843 comm="syz.2.614" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 610.744077][ T29] audit: type=1326 audit(610.670:1289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6843 comm="syz.2.614" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 611.535349][ T6850] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 611.543907][ T6850] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 612.722699][ T6866] netlink: 24 bytes leftover after parsing attributes in process `syz.3.620'. [ 614.349605][ T6893] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 614.434505][ T6893] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 614.536221][ T6893] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 614.683292][ T6893] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 614.856458][ T5673] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 614.856925][ T5673] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 614.910812][ T5672] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 614.937334][ T5661] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 616.941730][ T6941] netlink: 20 bytes leftover after parsing attributes in process `syz.2.638'. [ 617.776775][ T6956] netlink: 24 bytes leftover after parsing attributes in process `syz.3.643'. [ 617.853895][ T6956] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=6956 comm=syz.3.643 [ 618.844960][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 618.848004][ T29] audit: type=1400 audit(618.770:1294): avc: denied { ioctl } for pid=6978 comm="syz.3.647" path="socket:[7926]" dev="sockfs" ino=7926 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 621.018374][ T7003] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 621.023407][ T7003] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 621.255291][ T29] audit: type=1326 audit(621.180:1295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.3.655" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 621.261480][ T29] audit: type=1326 audit(621.180:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.3.655" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 621.273363][ T29] audit: type=1326 audit(621.200:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.3.655" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 621.294957][ T29] audit: type=1326 audit(621.220:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.3.655" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 621.298959][ T29] audit: type=1326 audit(621.220:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.3.655" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 621.304105][ T29] audit: type=1326 audit(621.220:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.3.655" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 621.308420][ T29] audit: type=1326 audit(621.220:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.3.655" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 621.313490][ T29] audit: type=1326 audit(621.240:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.3.655" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x132970 code=0x7ffc0000 [ 621.318805][ T29] audit: type=1326 audit(621.240:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7007 comm="syz.3.655" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 621.766933][ T7016] netlink: 244 bytes leftover after parsing attributes in process `syz.3.657'. [ 621.934813][ T7018] bond0: option packets_per_slave: invalid value (18446744072268814746) [ 621.937886][ T7018] bond0: option packets_per_slave: allowed values 0 - 65535 [ 622.070257][ T7021] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 622.075093][ T7021] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 622.893199][ T7035] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 622.902800][ T7035] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 625.609223][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 625.609826][ T29] audit: type=1326 audit(625.530:1339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7068 comm="syz.3.676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 625.633059][ T29] audit: type=1326 audit(625.560:1340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7068 comm="syz.3.676" exe="/syz-executor" sig=0 arch=40000028 syscall=225 compat=0 ip=0x132970 code=0x7ffc0000 [ 625.635743][ T29] audit: type=1326 audit(625.560:1341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7068 comm="syz.3.676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 625.661376][ T29] audit: type=1326 audit(625.580:1342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7068 comm="syz.3.676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 626.122026][ T7078] netlink: 'syz.3.678': attribute type 10 has an invalid length. [ 626.139033][ T7078] netlink: 'syz.3.678': attribute type 10 has an invalid length. [ 626.273271][ T29] audit: type=1326 audit(626.200:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7079 comm="syz.3.679" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 626.278521][ T29] audit: type=1326 audit(626.200:1344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7079 comm="syz.3.679" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 626.282298][ T29] audit: type=1326 audit(626.210:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7079 comm="syz.3.679" exe="/syz-executor" sig=0 arch=40000028 syscall=247 compat=0 ip=0x132970 code=0x7ffc0000 [ 626.285712][ T29] audit: type=1326 audit(626.210:1346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7079 comm="syz.3.679" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 626.288210][ T29] audit: type=1326 audit(626.210:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7079 comm="syz.3.679" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 626.747822][ T7085] SELinux: unknown common [ 626.750236][ T7085] SELinux: failed to load policy [ 629.816319][ T7123] netlink: 12 bytes leftover after parsing attributes in process `syz.2.691'. [ 632.811284][ T7153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7153 comm=syz.2.704 [ 634.113595][ T29] audit: type=1326 audit(634.040:1348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7163 comm="syz.2.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.156741][ T29] audit: type=1326 audit(634.040:1349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7163 comm="syz.2.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.167306][ T29] audit: type=1326 audit(634.040:1350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7163 comm="syz.2.707" exe="/syz-executor" sig=0 arch=40000028 syscall=136 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.184223][ T29] audit: type=1326 audit(634.040:1351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7163 comm="syz.2.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.211592][ T29] audit: type=1326 audit(634.040:1352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7163 comm="syz.2.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.213982][ T29] audit: type=1326 audit(634.050:1353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7163 comm="syz.2.707" exe="/syz-executor" sig=0 arch=40000028 syscall=354 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.216581][ T29] audit: type=1326 audit(634.050:1354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7163 comm="syz.2.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.218712][ T29] audit: type=1326 audit(634.050:1355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7163 comm="syz.2.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 635.005812][ T29] audit: type=1326 audit(634.930:1356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7180 comm="syz.2.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 635.007940][ T29] audit: type=1326 audit(634.930:1357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7180 comm="syz.2.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 637.884793][ T7205] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 637.983694][ T7205] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.078450][ T7205] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.226632][ T7205] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.356188][ T5661] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 638.382567][ T5661] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 638.409135][ T5661] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 638.439166][ T5661] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 638.749000][ T7229] syzkaller0: entered promiscuous mode [ 638.749908][ T7229] syzkaller0: entered allmulticast mode [ 642.235166][ T7255] netlink: 'syz.2.725': attribute type 5 has an invalid length. [ 643.887234][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 643.887593][ T29] audit: type=1326 audit(643.810:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7268 comm="syz.3.728" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 643.890628][ T29] audit: type=1326 audit(643.810:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7268 comm="syz.3.728" exe="/syz-executor" sig=0 arch=40000028 syscall=11 compat=0 ip=0x132970 code=0x7ffc0000 [ 643.890944][ T29] audit: type=1326 audit(643.810:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7268 comm="syz.3.728" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 684.193820][ T7449] netlink: 'syz.3.763': attribute type 21 has an invalid length. [ 684.194204][ T7449] netlink: 128 bytes leftover after parsing attributes in process `syz.3.763'. [ 684.195099][ T7449] netlink: 'syz.3.763': attribute type 5 has an invalid length. [ 684.195303][ T7449] netlink: 3 bytes leftover after parsing attributes in process `syz.3.763'. [ 684.424837][ T29] audit: type=1326 audit(684.350:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7452 comm="syz.2.765" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 684.435218][ T29] audit: type=1326 audit(684.360:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7452 comm="syz.2.765" exe="/syz-executor" sig=0 arch=40000028 syscall=164 compat=0 ip=0x132970 code=0x7ffc0000 [ 684.437124][ T29] audit: type=1326 audit(684.360:1375): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7452 comm="syz.2.765" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 684.440833][ T29] audit: type=1326 audit(684.360:1376): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7452 comm="syz.2.765" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 684.447663][ T7455] netlink: 40 bytes leftover after parsing attributes in process `syz.3.766'. [ 684.814249][ T7458] netlink: 4 bytes leftover after parsing attributes in process `syz.2.768'. [ 684.868665][ T7459] bond0: (slave bond_slave_0): Releasing backup interface [ 684.888092][ T7459] bond0: (slave bond_slave_1): Releasing backup interface [ 684.963448][ T7459] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 685.172100][ T7462] netlink: 'syz.2.769': attribute type 4 has an invalid length. [ 685.225196][ T7462] netlink: 'syz.2.769': attribute type 4 has an invalid length. [ 685.609343][ T7471] syzkaller1: entered promiscuous mode [ 685.612882][ T7471] syzkaller1: entered allmulticast mode [ 687.194094][ T7494] netlink: 68 bytes leftover after parsing attributes in process `syz.3.779'. [ 688.168792][ T29] audit: type=1326 audit(688.090:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7505 comm="syz.3.783" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 688.177261][ T29] audit: type=1326 audit(688.090:1378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7505 comm="syz.3.783" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 688.181153][ T29] audit: type=1326 audit(688.090:1379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7505 comm="syz.3.783" exe="/syz-executor" sig=0 arch=40000028 syscall=114 compat=0 ip=0x132970 code=0x7ffc0000 [ 688.714047][ T29] audit: type=1400 audit(688.630:1380): avc: denied { accept } for pid=7505 comm="syz.3.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 689.897040][ T29] audit: type=1326 audit(689.820:1381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7505 comm="syz.3.783" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 689.922301][ T29] audit: type=1326 audit(689.820:1382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7505 comm="syz.3.783" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 690.603352][ T29] audit: type=1326 audit(690.510:1383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7523 comm="syz.3.790" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 690.618185][ T29] audit: type=1326 audit(690.510:1384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7523 comm="syz.3.790" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x132970 code=0x7ffc0000 [ 690.701976][ T29] audit: type=1326 audit(690.620:1385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7523 comm="syz.3.790" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 690.741249][ T29] audit: type=1326 audit(690.620:1386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7523 comm="syz.3.790" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 691.642989][ T29] audit: type=1400 audit(691.570:1387): avc: denied { create } for pid=7535 comm="syz.2.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 692.090729][ T29] audit: type=1400 audit(692.010:1388): avc: granted { setsecparam } for pid=7538 comm="syz.2.795" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 695.696501][ T29] audit: type=1400 audit(695.620:1389): avc: denied { create } for pid=7587 comm="syz.2.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 696.980298][ T29] audit: type=1400 audit(696.900:1390): avc: denied { create } for pid=7604 comm="syz.2.817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 698.417989][ T29] audit: type=1400 audit(698.340:1391): avc: denied { setattr } for pid=7612 comm="syz.2.818" name="/" dev="configfs" ino=35 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 700.631869][ T7621] netlink: 20 bytes leftover after parsing attributes in process `syz.2.821'. [ 701.871615][ T7626] ALSA: seq fatal error: cannot create timer (-19) [ 703.698657][ T7661] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 703.699277][ T7661] SELinux: failed to load policy [ 704.093689][ T29] audit: type=1400 audit(704.020:1392): avc: denied { connect } for pid=7662 comm="syz.2.828" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 704.145571][ T29] audit: type=1400 audit(704.070:1393): avc: denied { ioctl } for pid=7662 comm="syz.2.828" path="socket:[9938]" dev="sockfs" ino=9938 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 704.221418][ T29] audit: type=1400 audit(704.120:1394): avc: denied { write } for pid=7662 comm="syz.2.828" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 704.272980][ T29] audit: type=1400 audit(704.200:1395): avc: denied { write } for pid=7662 comm="syz.2.828" laddr=::1 lport=6 faddr=::1 fport=20011 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 706.823416][ T7681] netlink: 60 bytes leftover after parsing attributes in process `syz.2.832'. [ 706.828578][ T7681] netlink: 60 bytes leftover after parsing attributes in process `syz.2.832'. [ 708.016780][ T7690] syzkaller0: entered promiscuous mode [ 708.041698][ T7690] syzkaller0: entered allmulticast mode [ 717.669332][ T7730] syzkaller0: entered promiscuous mode [ 717.669804][ T7730] syzkaller0: entered allmulticast mode [ 718.076895][ T29] audit: type=1326 audit(718.000:1396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7735 comm="syz.2.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 718.081171][ T29] audit: type=1326 audit(718.000:1397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7735 comm="syz.2.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 718.110231][ T29] audit: type=1326 audit(718.030:1398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7735 comm="syz.2.842" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 718.135495][ T29] audit: type=1326 audit(718.060:1399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7735 comm="syz.2.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 718.135865][ T29] audit: type=1326 audit(718.060:1400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7735 comm="syz.2.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 718.136883][ T29] audit: type=1326 audit(718.060:1401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7735 comm="syz.2.842" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 718.148816][ T29] audit: type=1326 audit(718.070:1402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7735 comm="syz.2.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 718.152952][ T29] audit: type=1326 audit(718.080:1403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7735 comm="syz.2.842" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 718.177956][ T29] audit: type=1326 audit(718.100:1404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7735 comm="syz.2.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 718.178309][ T29] audit: type=1326 audit(718.100:1405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7735 comm="syz.2.842" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 721.034746][ T7749] smc: net device hsr0 applied user defined pnetid SYZ2 [ 721.045172][ T7749] smc: net device hsr0 erased user defined pnetid SYZ2 [ 721.796075][ T7756] IPv6: NLM_F_CREATE should be specified when creating new route [ 723.929700][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 723.930192][ T29] audit: type=1400 audit(723.850:1411): avc: denied { validate_trans } for pid=7777 comm="syz.2.857" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 726.825311][ T29] audit: type=1400 audit(726.750:1412): avc: denied { mount } for pid=7794 comm="syz.3.863" name="/" dev="ramfs" ino=10454 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 727.291247][ T7799] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7799 comm=syz.3.864 [ 727.291727][ T7799] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=7799 comm=syz.3.864 [ 727.589746][ T29] audit: type=1326 audit(727.510:1413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7801 comm="syz.2.866" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 727.635065][ T29] audit: type=1326 audit(727.560:1414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7801 comm="syz.2.866" exe="/syz-executor" sig=0 arch=40000028 syscall=382 compat=0 ip=0x132970 code=0x7ffc0000 [ 727.636047][ T29] audit: type=1326 audit(727.560:1415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7801 comm="syz.2.866" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 727.659033][ T29] audit: type=1326 audit(727.580:1416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7801 comm="syz.2.866" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 727.926024][ T7812] netlink: 4 bytes leftover after parsing attributes in process `syz.2.869'. [ 727.926494][ T7812] netlink: 348 bytes leftover after parsing attributes in process `syz.2.869'. [ 734.716751][ T29] audit: type=1326 audit(734.640:1417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7879 comm="syz.3.884" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 734.723558][ T29] audit: type=1326 audit(734.640:1418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7879 comm="syz.3.884" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132970 code=0x7ffc0000 [ 734.726337][ T29] audit: type=1326 audit(734.650:1419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7879 comm="syz.3.884" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1329a8 code=0x7ffc0000 [ 734.735168][ T29] audit: type=1326 audit(734.660:1420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7879 comm="syz.3.884" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1329a8 code=0x7ffc0000 [ 734.738224][ T29] audit: type=1326 audit(734.660:1421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7879 comm="syz.3.884" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 734.746943][ T29] audit: type=1326 audit(734.670:1422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7879 comm="syz.3.884" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 734.749824][ T29] audit: type=1326 audit(734.670:1423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7879 comm="syz.3.884" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 734.887365][ T29] audit: type=1326 audit(734.810:1424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7879 comm="syz.3.884" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 734.888710][ T29] audit: type=1326 audit(734.810:1425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7879 comm="syz.3.884" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 734.915401][ T29] audit: type=1326 audit(734.810:1426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7879 comm="syz.3.884" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132970 code=0x7ffc0000 [ 740.381100][ T7905] netlink: 16 bytes leftover after parsing attributes in process `syz.3.890'. [ 742.824662][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 742.825114][ T29] audit: type=1326 audit(742.750:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7921 comm="syz.3.895" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 742.829392][ T29] audit: type=1326 audit(742.750:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7921 comm="syz.3.895" exe="/syz-executor" sig=0 arch=40000028 syscall=61 compat=0 ip=0x132970 code=0x7ffc0000 [ 742.838355][ T29] audit: type=1326 audit(742.750:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7921 comm="syz.3.895" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 742.860992][ T29] audit: type=1326 audit(742.770:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7921 comm="syz.3.895" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 743.900175][ T29] audit: type=1400 audit(743.820:1456): avc: denied { connect } for pid=7936 comm="syz.3.900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 749.042858][ T7942] netlink: 256 bytes leftover after parsing attributes in process `syz.3.901'. [ 759.795829][ T7983] ip6gre1: entered promiscuous mode [ 759.797063][ T7983] ip6gre1: entered allmulticast mode [ 764.192440][ T29] audit: type=1326 audit(764.100:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 764.202945][ T29] audit: type=1326 audit(764.110:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 764.205132][ T29] audit: type=1326 audit(764.110:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 764.207179][ T29] audit: type=1326 audit(764.110:1460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 764.209051][ T29] audit: type=1326 audit(764.110:1461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 764.213945][ T29] audit: type=1326 audit(764.140:1462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 764.216646][ T29] audit: type=1326 audit(764.140:1463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 764.223998][ T29] audit: type=1326 audit(764.150:1464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 764.226237][ T29] audit: type=1326 audit(764.150:1465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 764.242073][ T29] audit: type=1326 audit(764.150:1466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7994 comm="syz.2.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 771.394573][ T8019] netlink: 8 bytes leftover after parsing attributes in process `syz.3.920'. [ 772.897727][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 772.898239][ T29] audit: type=1326 audit(772.820:1471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8026 comm="syz.3.923" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 772.901467][ T29] audit: type=1326 audit(772.820:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8026 comm="syz.3.923" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 772.903929][ T29] audit: type=1326 audit(772.830:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8026 comm="syz.3.923" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 772.906423][ T29] audit: type=1326 audit(772.830:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8026 comm="syz.3.923" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 772.908469][ T29] audit: type=1326 audit(772.830:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8026 comm="syz.3.923" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 772.911966][ T29] audit: type=1326 audit(772.840:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8026 comm="syz.3.923" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 772.920943][ T29] audit: type=1326 audit(772.840:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8026 comm="syz.3.923" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 772.923829][ T29] audit: type=1326 audit(772.840:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8026 comm="syz.3.923" exe="/syz-executor" sig=0 arch=40000028 syscall=302 compat=0 ip=0x132970 code=0x7ffc0000 [ 772.926649][ T29] audit: type=1326 audit(772.840:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8026 comm="syz.3.923" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 772.929050][ T29] audit: type=1326 audit(772.850:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8026 comm="syz.3.923" exe="/syz-executor" sig=0 arch=40000028 syscall=304 compat=0 ip=0x132970 code=0x7ffc0000 [ 775.849169][ T8046] SELinux: failed to load policy [ 778.026707][ T8062] netlink: 4 bytes leftover after parsing attributes in process `syz.3.936'. [ 778.034038][ T8062] netlink: 16 bytes leftover after parsing attributes in process `syz.3.936'. [ 778.065999][ T8062] netlink: 224 bytes leftover after parsing attributes in process `syz.3.936'. [ 778.363449][ T8067] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.938'. [ 778.636929][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 778.650959][ T29] audit: type=1326 audit(778.560:1482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8069 comm="syz.3.939" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 778.652202][ T29] audit: type=1326 audit(778.560:1483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8069 comm="syz.3.939" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 778.654076][ T29] audit: type=1326 audit(778.580:1484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8069 comm="syz.3.939" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 778.683184][ T29] audit: type=1326 audit(778.610:1485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8069 comm="syz.3.939" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 778.693786][ T29] audit: type=1326 audit(778.620:1486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8069 comm="syz.3.939" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 778.705825][ T29] audit: type=1326 audit(778.620:1487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8069 comm="syz.3.939" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 778.718428][ T29] audit: type=1326 audit(778.620:1488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8069 comm="syz.3.939" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 778.722682][ T29] audit: type=1326 audit(778.620:1489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8069 comm="syz.3.939" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 778.725565][ T29] audit: type=1326 audit(778.650:1490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8069 comm="syz.3.939" exe="/syz-executor" sig=0 arch=40000028 syscall=153 compat=0 ip=0x132970 code=0x7ffc0000 [ 778.734460][ T29] audit: type=1326 audit(778.650:1491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8069 comm="syz.3.939" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 792.414358][ T29] audit: type=1326 audit(792.330:1492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8112 comm="syz.3.953" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 792.414826][ T29] audit: type=1326 audit(792.330:1493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8112 comm="syz.3.953" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 792.415227][ T29] audit: type=1326 audit(792.340:1494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8112 comm="syz.3.953" exe="/syz-executor" sig=0 arch=40000028 syscall=277 compat=0 ip=0x132970 code=0x7ffc0000 [ 792.415460][ T29] audit: type=1326 audit(792.340:1495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8112 comm="syz.3.953" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 796.602120][ T8127] netlink: 12 bytes leftover after parsing attributes in process `wÞ£ÿ'. [ 797.181073][ T8129] netlink: 20 bytes leftover after parsing attributes in process `syz.3.960'. [ 809.878176][ T29] audit: type=1400 audit(809.800:1496): avc: denied { module_load } for pid=8186 comm="syz.3.978" path="/sys/kernel/notes" dev="sysfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 811.967689][ T29] audit: type=1400 audit(811.890:1497): avc: denied { watch watch_reads } for pid=8212 comm="syz.3.984" path="/249/file0" dev="tmpfs" ino=1280 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 812.154597][ T8213] netlink: 4 bytes leftover after parsing attributes in process `syz.3.984'. [ 819.774565][ T8197] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 819.813912][ T8197] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 820.777058][ T8472] netlink: 300 bytes leftover after parsing attributes in process `syz.3.1003'. [ 821.686311][ T8500] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 824.624487][ T8197] hsr_slave_0: entered promiscuous mode [ 824.633854][ T8197] hsr_slave_1: entered promiscuous mode [ 824.635260][ T8197] debugfs: 'hsr0' already exists in 'hsr' [ 824.635329][ T8197] Cannot create hsr debugfs directory [ 826.824043][ T8197] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 827.332341][ T8197] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 827.387298][ T8197] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 827.482851][ T8197] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 831.297341][ T8197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 839.231926][ T8197] veth0_vlan: entered promiscuous mode [ 839.482571][ T8197] veth1_vlan: entered promiscuous mode [ 839.584439][ T8197] veth0_macvtap: entered promiscuous mode [ 839.603482][ T8197] veth1_macvtap: entered promiscuous mode [ 839.669218][ T5662] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 839.671029][ T5662] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 839.674870][ T5662] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 839.678018][ T5662] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 840.126698][ T29] audit: type=1400 audit(840.040:1498): avc: denied { create } for pid=8655 comm="syz.4.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 840.378178][ T8659] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8659 comm=syz.4.1006 [ 847.896545][ T8698] can0: slcan on ptm0. [ 848.312859][ T8697] can0 (unregistered): slcan off ptm0. [ 848.614491][ T29] audit: type=1400 audit(848.520:1499): avc: denied { bind } for pid=8708 comm="syz.4.1025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 849.083180][ T8712] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1026'. [ 872.028488][ T8859] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1031'. [ 872.815083][ T8731] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 872.846126][ T8731] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 873.505082][ T29] audit: type=1326 audit(873.430:1500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8921 comm="syz.4.1036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 873.507773][ T29] audit: type=1326 audit(873.430:1501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8921 comm="syz.4.1036" exe="/syz-executor" sig=0 arch=40000028 syscall=71 compat=0 ip=0x132970 code=0x7ffc0000 [ 873.512365][ T29] audit: type=1326 audit(873.440:1502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8921 comm="syz.4.1036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 873.522123][ T29] audit: type=1326 audit(873.450:1503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8921 comm="syz.4.1036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 873.524044][ T29] audit: type=1326 audit(873.450:1504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8921 comm="syz.4.1036" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132970 code=0x7ffc0000 [ 873.525474][ T29] audit: type=1326 audit(873.450:1505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8921 comm="syz.4.1036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 873.526700][ T29] audit: type=1326 audit(873.450:1506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8921 comm="syz.4.1036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 873.532086][ T29] audit: type=1326 audit(873.460:1507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8921 comm="syz.4.1036" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 873.535213][ T29] audit: type=1326 audit(873.460:1508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8921 comm="syz.4.1036" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 873.544189][ T29] audit: type=1326 audit(873.470:1509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8921 comm="syz.4.1036" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 876.394362][ T8731] hsr_slave_0: entered promiscuous mode [ 876.403548][ T8731] hsr_slave_1: entered promiscuous mode [ 876.406598][ T8731] debugfs: 'hsr0' already exists in 'hsr' [ 876.406986][ T8731] Cannot create hsr debugfs directory [ 876.911383][ T9030] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1040'. [ 877.271246][ T8731] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 877.325011][ T8731] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 877.346389][ T8731] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 877.355313][ T8731] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 879.543960][ T8731] 8021q: adding VLAN 0 to HW filter on device bond0 [ 889.759199][ T8731] veth0_vlan: entered promiscuous mode [ 889.796970][ T8731] veth1_vlan: entered promiscuous mode [ 889.975763][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 889.977919][ T29] audit: type=1326 audit(889.900:1546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9172 comm="syz.4.1061" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 889.982968][ T29] audit: type=1326 audit(889.910:1547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9172 comm="syz.4.1061" exe="/syz-executor" sig=0 arch=40000028 syscall=118 compat=0 ip=0x132970 code=0x7ffc0000 [ 890.081142][ T29] audit: type=1326 audit(890.000:1548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9172 comm="syz.4.1061" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 890.082298][ T29] audit: type=1326 audit(890.010:1549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9172 comm="syz.4.1061" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 890.092985][ T8731] veth0_macvtap: entered promiscuous mode [ 890.104576][ T8731] veth1_macvtap: entered promiscuous mode [ 890.223143][ T5652] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.231426][ T5652] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.231725][ T5652] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.231866][ T5652] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.591062][ T29] audit: type=1400 audit(890.500:1550): avc: denied { write } for pid=9174 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 891.225238][ T29] audit: type=1400 audit(891.130:1551): avc: denied { accept } for pid=9178 comm="syz.5.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 893.218499][ T29] audit: type=1326 audit(893.140:1552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.4.1068" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 893.225925][ T29] audit: type=1326 audit(893.150:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.4.1068" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 893.227283][ T29] audit: type=1326 audit(893.150:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.4.1068" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 893.235601][ T29] audit: type=1326 audit(893.150:1555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9188 comm="syz.4.1068" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 893.771200][ T9197] binfmt_misc: register: failed to install interpreter file ./file0 [ 897.122686][ T9221] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1083'. [ 897.513205][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 897.517542][ T29] audit: type=1326 audit(897.440:1585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9222 comm="syz.5.1084" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 897.524263][ T29] audit: type=1326 audit(897.440:1586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9222 comm="syz.5.1084" exe="/syz-executor" sig=0 arch=40000028 syscall=311 compat=0 ip=0x132970 code=0x7ffc0000 [ 897.524673][ T29] audit: type=1326 audit(897.450:1587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9222 comm="syz.5.1084" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 897.542372][ T29] audit: type=1326 audit(897.450:1588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9222 comm="syz.5.1084" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 920.226079][ T9242] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1091'. [ 920.262639][ T9242] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1091'. [ 920.263168][ T9242] netlink: 'syz.4.1091': attribute type 13 has an invalid length. [ 920.263346][ T9242] netlink: 'syz.4.1091': attribute type 12 has an invalid length. [ 923.228804][ T29] audit: type=1326 audit(923.150:1589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9256 comm="syz.5.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 923.245984][ T29] audit: type=1326 audit(923.170:1590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9256 comm="syz.5.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 923.281055][ T29] audit: type=1326 audit(923.200:1591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9256 comm="syz.5.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 923.281318][ T29] audit: type=1326 audit(923.200:1592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9256 comm="syz.5.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 923.297619][ T29] audit: type=1326 audit(923.220:1593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9256 comm="syz.5.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 923.300876][ T29] audit: type=1326 audit(923.220:1594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9256 comm="syz.5.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 923.304340][ T29] audit: type=1326 audit(923.230:1595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9256 comm="syz.5.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=346 compat=0 ip=0x132970 code=0x7ffc0000 [ 923.308860][ T29] audit: type=1326 audit(923.230:1596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9256 comm="syz.5.1097" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 924.161379][ T29] audit: type=1326 audit(924.080:1597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9267 comm="syz.4.1102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 924.161788][ T29] audit: type=1326 audit(924.080:1598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9267 comm="syz.4.1102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 924.806239][ T9279] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 926.957260][ T9291] serio: Serial port ptm0 [ 930.636748][ T9308] SELinux: failed to load policy [ 931.931325][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 931.951969][ T29] audit: type=1400 audit(931.820:1609): avc: denied { associate } for pid=9311 comm="syz.5.1119" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 935.983582][ T9335] *** NOT YET: opcode c3 *** [ 936.831329][ T29] audit: type=1400 audit(936.750:1610): avc: denied { read } for pid=9346 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 936.845012][ T29] audit: type=1400 audit(936.770:1611): avc: denied { prog_load } for pid=9346 comm="syz.4.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 936.846921][ T29] audit: type=1400 audit(936.770:1612): avc: denied { bpf } for pid=9346 comm="syz.4.1134" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 936.852620][ T29] audit: type=1400 audit(936.780:1613): avc: denied { perfmon } for pid=9346 comm="syz.4.1134" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 936.862951][ T29] audit: type=1400 audit(936.790:1614): avc: denied { prog_run } for pid=9346 comm="syz.4.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 936.997759][ T29] audit: type=1400 audit(936.890:1615): avc: denied { map_create } for pid=9348 comm="syz.4.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 937.009522][ T29] audit: type=1400 audit(936.930:1616): avc: denied { map_read map_write } for pid=9348 comm="syz.4.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 937.643220][ T9354] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1137'. [ 938.175847][ T29] audit: type=1400 audit(938.100:1617): avc: denied { create } for pid=9357 comm="syz.5.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 938.204852][ T29] audit: type=1400 audit(938.130:1618): avc: denied { getopt } for pid=9357 comm="syz.5.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 938.443427][ T29] audit: type=1400 audit(938.370:1619): avc: denied { read } for pid=9360 comm="syz.5.1141" name="binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 938.456398][ T29] audit: type=1400 audit(938.380:1620): avc: denied { open } for pid=9359 comm="syz.4.1140" path="/dev/snd/timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.462859][ T29] audit: type=1400 audit(938.390:1621): avc: denied { open } for pid=9360 comm="syz.5.1141" path="/dev/binderfs/binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 938.480206][ T29] audit: type=1400 audit(938.400:1622): avc: denied { ioctl } for pid=9359 comm="syz.4.1140" path="/dev/snd/timer" dev="devtmpfs" ino=718 ioctlcmd=0x5410 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 941.148280][ T29] audit: type=1400 audit(941.070:1623): avc: denied { create } for pid=9367 comm="syz.4.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 941.170174][ T29] audit: type=1400 audit(941.090:1624): avc: denied { write } for pid=9367 comm="syz.4.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 942.264348][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 942.266570][ T29] audit: type=1326 audit(942.190:1633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9380 comm="syz.5.1149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 942.282829][ T29] audit: type=1326 audit(942.200:1634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9380 comm="syz.5.1149" exe="/syz-executor" sig=0 arch=40000028 syscall=24 compat=0 ip=0x132970 code=0x7ffc0000 [ 942.285059][ T29] audit: type=1326 audit(942.210:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9380 comm="syz.5.1149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 942.289618][ T29] audit: type=1326 audit(942.210:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9380 comm="syz.5.1149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 942.365695][ T29] audit: type=1400 audit(942.290:1637): avc: denied { write } for pid=9382 comm="syz.4.1150" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 942.446086][ T29] audit: type=1400 audit(942.370:1638): avc: denied { read } for pid=9384 comm="syz.5.1151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 943.823849][ T29] audit: type=1400 audit(943.750:1639): avc: denied { name_bind } for pid=9398 comm="syz.4.1159" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 943.826240][ T29] audit: type=1400 audit(943.750:1640): avc: denied { node_bind } for pid=9398 comm="syz.4.1159" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 944.223865][ T9408] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1162'. [ 945.121084][ T29] audit: type=1400 audit(945.040:1641): avc: denied { create } for pid=9416 comm="syz.5.1167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 945.149965][ T29] audit: type=1400 audit(945.070:1642): avc: denied { setopt } for pid=9416 comm="syz.5.1167" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 946.425569][ T9430] netlink: 172 bytes leftover after parsing attributes in process `syz.4.1174'. [ 946.464396][ T9431] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 946.464876][ T9431] IPv6: NLM_F_CREATE should be set when creating new route [ 946.465077][ T9431] IPv6: NLM_F_CREATE should be set when creating new route [ 948.762127][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 948.765745][ T29] audit: type=1400 audit(948.680:1671): avc: denied { create } for pid=9436 comm="syz.4.1177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 948.791154][ T29] audit: type=1400 audit(948.680:1672): avc: denied { write } for pid=9436 comm="syz.4.1177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 951.083359][ T29] audit: type=1400 audit(951.000:1673): avc: denied { bind } for pid=9446 comm="syz.4.1183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 951.087923][ T29] audit: type=1400 audit(951.000:1674): avc: denied { name_bind } for pid=9446 comm="syz.4.1183" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 951.093659][ T29] audit: type=1400 audit(951.000:1675): avc: denied { node_bind } for pid=9446 comm="syz.4.1183" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 952.908598][ T29] audit: type=1400 audit(952.820:1676): avc: denied { create } for pid=9460 comm="syz.5.1188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 952.999442][ T29] audit: type=1400 audit(952.830:1677): avc: denied { ioctl } for pid=9460 comm="syz.5.1188" path="socket:[13680]" dev="sockfs" ino=13680 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 953.699143][ T29] audit: type=1400 audit(953.620:1678): avc: denied { allowed } for pid=9464 comm="syz.5.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 953.763009][ T29] audit: type=1400 audit(953.680:1679): avc: denied { create } for pid=9464 comm="syz.5.1190" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 953.825375][ T9465] veth0: entered promiscuous mode [ 953.829376][ T29] audit: type=1400 audit(953.740:1680): avc: denied { setopt } for pid=9464 comm="syz.5.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 953.978162][ T9465] veth0: left promiscuous mode [ 954.506645][ T29] audit: type=1400 audit(954.430:1681): avc: denied { read } for pid=9466 comm="syz.5.1191" dev="nsfs" ino=4026533397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 954.531988][ T29] audit: type=1400 audit(954.440:1682): avc: denied { open } for pid=9466 comm="syz.5.1191" path="net:[4026533397]" dev="nsfs" ino=4026533397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 954.556136][ T9467] smc: net device bond0 applied user defined pnetid SYZ0 [ 954.595925][ T9467] smc: net device bond0 erased user defined pnetid SYZ0 [ 954.896917][ T29] audit: type=1400 audit(954.820:1683): avc: denied { create } for pid=9468 comm="syz.5.1192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 965.505209][ T29] audit: type=1400 audit(965.430:1684): avc: denied { execmem } for pid=9488 comm="syz.5.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 984.506828][ T5649] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 984.581630][ T5649] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 984.648204][ T5649] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 984.776623][ T5649] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 985.285636][ T5649] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 985.314417][ T5649] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 985.334867][ T5649] bond0 (unregistering): Released all slaves [ 985.605118][ T5649] hsr_slave_0: left promiscuous mode [ 985.627844][ T5649] hsr_slave_1: left promiscuous mode [ 985.749037][ T5649] veth1_macvtap: left promiscuous mode [ 985.753268][ T5649] veth0_macvtap: left promiscuous mode [ 987.256774][ T29] audit: type=1400 audit(987.180:1685): avc: denied { map } for pid=9526 comm="syz.5.1202" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15061 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 987.266109][ T29] audit: type=1400 audit(987.180:1686): avc: denied { read write } for pid=9526 comm="syz.5.1202" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15061 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 987.501776][ T29] audit: type=1400 audit(987.410:1687): avc: denied { write } for pid=9527 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 987.502202][ T29] audit: type=1400 audit(987.410:1688): avc: denied { open } for pid=9527 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 987.961275][ T29] audit: type=1400 audit(987.880:1689): avc: denied { search } for pid=9529 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 987.961957][ T29] audit: type=1400 audit(987.880:1690): avc: denied { search } for pid=9529 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 987.962049][ T29] audit: type=1400 audit(987.880:1691): avc: denied { search } for pid=9529 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 987.962106][ T29] audit: type=1400 audit(987.880:1692): avc: denied { search } for pid=9529 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 988.034590][ T29] audit: type=1400 audit(987.960:1693): avc: denied { read open } for pid=9530 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 988.038736][ T29] audit: type=1400 audit(987.960:1694): avc: denied { getattr } for pid=9530 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 989.225630][ T9533] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1203'. [ 993.765180][ T7560] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 993.784244][ T7560] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz0 [ 996.355665][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 996.356106][ T29] audit: type=1400 audit(996.280:1705): avc: denied { execute } for pid=9597 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 996.433265][ T29] audit: type=1400 audit(996.360:1706): avc: denied { execute_no_trans } for pid=9597 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 996.660931][ T29] audit: type=1400 audit(996.580:1707): avc: denied { mounton } for pid=9599 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 997.101013][ T29] audit: type=1400 audit(997.020:1708): avc: denied { sys_module } for pid=9599 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1000.000717][ T29] audit: type=1400 audit(999.920:1709): avc: denied { bind } for pid=9625 comm="syz.5.1220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1000.082840][ T29] audit: type=1400 audit(1000.000:1710): avc: denied { setopt } for pid=9625 comm="syz.5.1220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1000.345436][ T9626] netlink: 24 bytes leftover after parsing attributes in process `syz.5.1220'. [ 1002.051265][ T29] audit: type=1400 audit(1001.970:1711): avc: denied { create } for pid=9720 comm="syz.5.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1002.056696][ T9723] netlink: 300 bytes leftover after parsing attributes in process `syz.5.1223'. [ 1002.061484][ T29] audit: type=1400 audit(1001.980:1712): avc: denied { write } for pid=9720 comm="syz.5.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1002.061839][ T29] audit: type=1400 audit(1001.980:1713): avc: denied { nlmsg_write } for pid=9720 comm="syz.5.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1003.684722][ T9599] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1003.714521][ T9599] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1005.675188][ T9599] hsr_slave_0: entered promiscuous mode [ 1005.676344][ T9599] hsr_slave_1: entered promiscuous mode [ 1005.689007][ T9599] debugfs: 'hsr0' already exists in 'hsr' [ 1005.702144][ T9599] Cannot create hsr debugfs directory [ 1007.257292][ T9599] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1007.356608][ T9599] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1007.433331][ T9599] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1007.475733][ T9599] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1010.272501][ T9599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1022.587925][ T9599] veth0_vlan: entered promiscuous mode [ 1022.630133][ T9599] veth1_vlan: entered promiscuous mode [ 1022.774592][ T9599] veth0_macvtap: entered promiscuous mode [ 1022.804900][ T9599] veth1_macvtap: entered promiscuous mode [ 1022.914860][ T38] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1022.916971][ T38] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1022.917872][ T38] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1022.917924][ T38] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1023.131233][ T29] audit: type=1400 audit(1023.050:1714): avc: denied { mounton } for pid=9599 comm="syz-executor" path="/syzkaller.8WxBSx/syz-tmp" dev="vda" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1023.149462][ T29] audit: type=1400 audit(1023.070:1715): avc: denied { mount } for pid=9599 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1023.149904][ T29] audit: type=1400 audit(1023.070:1716): avc: denied { mounton } for pid=9599 comm="syz-executor" path="/syzkaller.8WxBSx/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1023.159208][ T29] audit: type=1400 audit(1023.080:1717): avc: denied { mount } for pid=9599 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1023.172889][ T29] audit: type=1400 audit(1023.090:1718): avc: denied { mounton } for pid=9599 comm="syz-executor" path="/syzkaller.8WxBSx/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1023.186051][ T29] audit: type=1400 audit(1023.110:1719): avc: denied { mounton } for pid=9599 comm="syz-executor" path="/syzkaller.8WxBSx/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=15653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1023.198800][ T29] audit: type=1400 audit(1023.120:1720): avc: denied { unmount } for pid=9599 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1023.215803][ T29] audit: type=1400 audit(1023.140:1721): avc: denied { mounton } for pid=9599 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1023.216273][ T29] audit: type=1400 audit(1023.140:1722): avc: denied { mount } for pid=9599 comm="syz-executor" name="/" dev="gadgetfs" ino=2513 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1023.230105][ T29] audit: type=1400 audit(1023.150:1723): avc: denied { mount } for pid=9599 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1027.396966][T10060] futex_wake_op: syz.6.1227 tries to shift op by -1; fix this program [ 1032.047062][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1032.051764][ T29] audit: type=1400 audit(1031.970:1726): avc: denied { execute } for pid=10076 comm="syz.6.1233" dev="tmpfs" ino=1072 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1032.091138][ T29] audit: type=1400 audit(1031.980:1727): avc: denied { execute_no_trans } for pid=10076 comm="syz.6.1233" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1072 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1034.901942][T10082] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1235'. [ 1035.064103][ T29] audit: type=1326 audit(1034.990:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10085 comm="syz.6.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1035.068996][ T29] audit: type=1326 audit(1034.990:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10085 comm="syz.6.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1035.074271][ T29] audit: type=1326 audit(1035.000:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10085 comm="syz.6.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1035.078370][ T29] audit: type=1326 audit(1035.000:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10085 comm="syz.6.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1035.081869][ T29] audit: type=1326 audit(1035.010:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10085 comm="syz.6.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1035.087066][ T29] audit: type=1326 audit(1035.010:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10085 comm="syz.6.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 1035.091364][ T29] audit: type=1400 audit(1035.020:1734): avc: denied { create } for pid=10085 comm="syz.6.1237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1035.164445][ T29] audit: type=1326 audit(1035.090:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10085 comm="syz.6.1237" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1039.252099][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 1039.252590][ T29] audit: type=1400 audit(1039.170:1788): avc: denied { write } for pid=10094 comm="syz.6.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1039.258897][ T29] audit: type=1400 audit(1039.180:1789): avc: denied { read } for pid=10094 comm="syz.6.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1039.602477][ T29] audit: type=1400 audit(1039.530:1790): avc: denied { create } for pid=10098 comm="syz.6.1242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1039.639018][ T29] audit: type=1400 audit(1039.560:1791): avc: denied { getopt } for pid=10098 comm="syz.6.1242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1040.278875][T10101] syzkaller0: entered promiscuous mode [ 1040.281342][T10101] syzkaller0: entered allmulticast mode [ 1049.150084][ T29] audit: type=1404 audit(1049.060:1792): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1049.405475][ T29] audit: type=1404 audit(1049.330:1793): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1049.901398][ T29] audit: type=1400 audit(1049.810:1794): avc: denied { prog_load } for pid=10123 comm="syz.6.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1049.916030][ T29] audit: type=1400 audit(1049.810:1795): avc: denied { bpf } for pid=10123 comm="syz.6.1252" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1049.930932][ T29] audit: type=1400 audit(1049.820:1796): avc: denied { perfmon } for pid=10123 comm="syz.6.1252" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1049.971381][ T29] audit: type=1400 audit(1049.820:1797): avc: denied { prog_run } for pid=10123 comm="syz.6.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1050.230987][ T29] audit: type=1400 audit(1050.150:1798): avc: denied { map_create } for pid=10125 comm="syz.6.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1050.240708][ T29] audit: type=1400 audit(1050.160:1799): avc: denied { map_read map_write } for pid=10125 comm="syz.6.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1050.602714][ T29] audit: type=1400 audit(1050.530:1800): avc: denied { create } for pid=10127 comm="syz.6.1254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1050.663676][ T29] audit: type=1400 audit(1050.590:1801): avc: denied { write } for pid=10127 comm="syz.6.1254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1050.688404][ T6056] hid-generic 0000:0100:0006.000A: unknown main item tag 0x0 [ 1050.695838][ T6056] hid-generic 0000:0100:0006.000A: unknown main item tag 0x0 [ 1050.700031][ T6056] hid-generic 0000:0100:0006.000A: unknown main item tag 0x0 [ 1050.711772][ T6056] hid-generic 0000:0100:0006.000A: unknown main item tag 0x0 [ 1050.717609][ T6056] hid-generic 0000:0100:0006.000A: hidraw0: HID v0.28 Device [syz1] on [ 1057.097585][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1057.109349][ T29] audit: type=1400 audit(1057.020:1805): avc: denied { create } for pid=10140 comm="syz.6.1257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1057.109796][ T29] audit: type=1400 audit(1057.030:1806): avc: denied { write } for pid=10140 comm="syz.6.1257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1057.116013][ T29] audit: type=1400 audit(1057.030:1807): avc: denied { module_request } for pid=10140 comm="syz.6.1257" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1058.825571][ T29] audit: type=1400 audit(1058.750:1808): avc: denied { create } for pid=10151 comm="syz.6.1261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1058.829183][ T29] audit: type=1400 audit(1058.750:1809): avc: denied { write } for pid=10151 comm="syz.6.1261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1060.396265][ T29] audit: type=1400 audit(1060.290:1810): avc: denied { read } for pid=10153 comm="syz.6.1262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1061.111722][ T29] audit: type=1400 audit(1061.030:1811): avc: denied { bind } for pid=10159 comm="syz.6.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1061.116297][ T29] audit: type=1400 audit(1061.040:1812): avc: denied { setopt } for pid=10159 comm="syz.6.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1061.312182][T10160] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1061.532126][T10160] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1061.746729][T10160] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1061.934798][T10160] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1062.131679][ T1246] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.147987][ T5650] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.184021][ T5650] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.206167][ T1246] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.733976][ T29] audit: type=1400 audit(1062.660:1813): avc: denied { create } for pid=10180 comm="syz.6.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1062.744204][ T29] audit: type=1400 audit(1062.670:1814): avc: denied { write } for pid=10180 comm="syz.6.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1062.877698][T10183] netlink: 16402 bytes leftover after parsing attributes in process `syz.6.1267'. [ 1063.131672][ T29] audit: type=1400 audit(1063.050:1815): avc: denied { create } for pid=10184 comm="syz.6.1268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1063.134069][ T29] audit: type=1400 audit(1063.060:1816): avc: denied { setopt } for pid=10184 comm="syz.6.1268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1063.142076][ T29] audit: type=1400 audit(1063.070:1817): avc: denied { write } for pid=10184 comm="syz.6.1268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1063.184664][ T29] audit: type=1326 audit(1063.110:1818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10184 comm="syz.6.1268" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x0 [ 1064.227405][ T29] audit: type=1400 audit(1064.150:1819): avc: denied { read } for pid=10184 comm="syz.6.1268" lport=44867 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1065.980143][ T29] audit: type=1400 audit(1065.900:1820): avc: denied { allowed } for pid=10187 comm="syz.6.1269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1066.042131][ T29] audit: type=1400 audit(1065.960:1821): avc: denied { create } for pid=10187 comm="syz.6.1269" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1066.054038][ T29] audit: type=1400 audit(1065.960:1822): avc: denied { map } for pid=10187 comm="syz.6.1269" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15821 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1071.863367][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 1071.863787][ T29] audit: type=1400 audit(1071.790:1824): avc: denied { execute } for pid=10189 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1071.869438][ T29] audit: type=1400 audit(1071.790:1825): avc: denied { execute_no_trans } for pid=10189 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1071.980900][ T29] audit: type=1400 audit(1071.900:1826): avc: denied { read } for pid=10190 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1072.002747][ T29] audit: type=1400 audit(1071.910:1827): avc: denied { open } for pid=10190 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1072.003101][ T29] audit: type=1400 audit(1071.920:1828): avc: denied { mounton } for pid=10190 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1072.246110][ T29] audit: type=1400 audit(1072.170:1829): avc: denied { sys_module } for pid=10190 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1073.681536][ T29] audit: type=1400 audit(1073.600:1830): avc: denied { audit_write } for pid=10197 comm="syz.6.1272" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1073.700940][ T29] audit: type=1107 audit(1073.610:1831): pid=10197 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='ÊÃå' [ 1074.254513][ T29] audit: type=1400 audit(1074.180:1832): avc: denied { ioctl } for pid=10200 comm="syz.6.1273" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=688 ioctlcmd=0x5512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1074.255600][T10201] usb usb1: usbfs: interface 0 claimed by hub while 'syz.6.1273' sets config #1 [ 1078.057093][T10190] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1078.095391][T10190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1078.836309][ T29] audit: type=1400 audit(1078.760:1833): avc: denied { create } for pid=10382 comm="syz.6.1275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1078.853228][ T29] audit: type=1400 audit(1078.780:1834): avc: denied { connect } for pid=10382 comm="syz.6.1275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1079.671463][ T29] audit: type=1400 audit(1079.590:1835): avc: denied { connect } for pid=10388 comm="syz.6.1277" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1081.996136][T10190] hsr_slave_0: entered promiscuous mode [ 1081.999232][T10190] hsr_slave_1: entered promiscuous mode [ 1082.006490][T10190] debugfs: 'hsr0' already exists in 'hsr' [ 1082.009163][T10190] Cannot create hsr debugfs directory [ 1082.926082][T10190] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1082.951284][T10190] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1082.983874][T10190] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1083.005764][T10190] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1085.239824][T10190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1086.456005][ T29] audit: type=1400 audit(1086.380:1836): avc: denied { create } for pid=10544 comm="syz.6.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1086.476377][ T29] audit: type=1400 audit(1086.400:1837): avc: denied { ioctl } for pid=10544 comm="syz.6.1283" path="socket:[16598]" dev="sockfs" ino=16598 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1086.481237][ T29] audit: type=1400 audit(1086.400:1838): avc: denied { bind } for pid=10544 comm="syz.6.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1086.565289][ T29] audit: type=1400 audit(1086.490:1839): avc: denied { setopt } for pid=10544 comm="syz.6.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1086.569204][ T29] audit: type=1400 audit(1086.490:1840): avc: denied { write } for pid=10544 comm="syz.6.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1086.958088][ T29] audit: type=1400 audit(1086.880:1841): avc: denied { mounton } for pid=10546 comm="syz.6.1284" path="/56" dev="tmpfs" ino=298 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1087.561880][ T29] audit: type=1326 audit(1087.480:1842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10552 comm="syz.6.1285" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1087.562259][ T29] audit: type=1326 audit(1087.490:1843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10552 comm="syz.6.1285" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1087.565961][ T29] audit: type=1326 audit(1087.490:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10552 comm="syz.6.1285" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1087.568255][ T29] audit: type=1326 audit(1087.490:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10552 comm="syz.6.1285" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1095.106208][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1095.151518][ T29] audit: type=1400 audit(1095.030:1857): avc: denied { name_bind } for pid=10588 comm="syz.6.1291" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1095.152708][ T29] audit: type=1400 audit(1095.040:1858): avc: denied { node_bind } for pid=10588 comm="syz.6.1291" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1095.885450][ T29] audit: type=1400 audit(1095.810:1859): avc: denied { write } for pid=10592 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1095.885875][ T29] audit: type=1400 audit(1095.810:1860): avc: denied { open } for pid=10592 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1095.931520][ T29] audit: type=1400 audit(1095.850:1861): avc: denied { search } for pid=10592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1095.931928][ T29] audit: type=1400 audit(1095.860:1862): avc: denied { search } for pid=10592 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1095.939567][ T29] audit: type=1400 audit(1095.860:1863): avc: denied { search } for pid=10592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1095.940014][ T29] audit: type=1400 audit(1095.860:1864): avc: denied { search } for pid=10592 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1096.279181][ T29] audit: type=1400 audit(1096.200:1865): avc: denied { read open } for pid=10596 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1096.323659][ T29] audit: type=1400 audit(1096.220:1866): avc: denied { getattr } for pid=10596 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1097.022586][T10190] veth0_vlan: entered promiscuous mode [ 1097.058719][T10190] veth1_vlan: entered promiscuous mode [ 1097.603269][T10190] veth0_macvtap: entered promiscuous mode [ 1098.098474][T10190] veth1_macvtap: entered promiscuous mode [ 1098.296316][ T52] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.297415][ T52] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.299580][ T52] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1098.301833][ T52] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1102.675438][T10611] futex_wake_op: syz.6.1295 tries to shift op by -1; fix this program [ 1103.628075][T10613] netlink: 14 bytes leftover after parsing attributes in process `syz.6.1296'. [ 1104.404212][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 1104.404548][ T29] audit: type=1400 audit(1104.330:1890): avc: denied { create } for pid=10631 comm="syz.6.1297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1105.023701][T10634] netlink: 'syz.6.1297': attribute type 10 has an invalid length. [ 1105.413731][ T29] audit: type=1400 audit(1105.330:1891): avc: denied { create } for pid=10607 comm="syz.7.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1105.515503][ T29] audit: type=1400 audit(1105.440:1892): avc: denied { bind } for pid=10607 comm="syz.7.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1105.518326][ T29] audit: type=1400 audit(1105.440:1893): avc: denied { write } for pid=10607 comm="syz.7.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1105.708090][ T29] audit: type=1400 audit(1105.630:1894): avc: denied { accept } for pid=10607 comm="syz.7.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1105.773935][ T29] audit: type=1400 audit(1105.700:1895): avc: denied { create } for pid=10607 comm="syz.7.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1105.951044][ T29] audit: type=1400 audit(1105.860:1896): avc: denied { write } for pid=10607 comm="syz.7.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1106.041768][T10634] wireguard0: entered promiscuous mode [ 1106.042230][T10634] wireguard0: entered allmulticast mode [ 1108.161738][ T7503] page_pool_release_retry() stalled pool shutdown: id 45, 1 inflight 60 sec [ 1115.293063][ T29] audit: type=1400 audit(1115.220:1897): avc: denied { create } for pid=10667 comm="syz.6.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1115.297188][ T29] audit: type=1400 audit(1115.220:1898): avc: denied { write } for pid=10667 comm="syz.6.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1115.315263][ T29] audit: type=1400 audit(1115.240:1899): avc: denied { nlmsg_write } for pid=10667 comm="syz.6.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1117.776761][ T29] audit: type=1326 audit(1117.690:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10678 comm="syz.6.1300" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 1117.833441][ T29] audit: type=1326 audit(1117.700:1901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10678 comm="syz.6.1300" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefa48 code=0x7ffc0000 [ 1117.835475][ T29] audit: type=1326 audit(1117.760:1902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10678 comm="syz.6.1300" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1117.837411][ T29] audit: type=1326 audit(1117.760:1903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10678 comm="syz.6.1300" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 1117.844585][ T29] audit: type=1326 audit(1117.770:1904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10678 comm="syz.6.1300" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefa48 code=0x7ffc0000 [ 1117.852716][ T29] audit: type=1326 audit(1117.770:1905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10678 comm="syz.6.1300" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 1117.873191][ T29] audit: type=1326 audit(1117.790:1906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10678 comm="syz.6.1300" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefa48 code=0x7ffc0000 [ 1120.623212][ T29] kauditd_printk_skb: 131 callbacks suppressed [ 1120.624385][ T29] audit: type=1400 audit(1120.550:2038): avc: denied { create } for pid=10684 comm="syz.6.1302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1124.272208][T10701] netlink: 'syz.6.1306': attribute type 39 has an invalid length. [ 1125.357061][T10711] netlink: 'syz.6.1310': attribute type 10 has an invalid length. [ 1125.358476][T10711] netlink: 40 bytes leftover after parsing attributes in process `syz.6.1310'. [ 1126.162305][T10718] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1313'. [ 1126.175821][T10718] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1313'. [ 1130.125107][T10738] netlink: 92 bytes leftover after parsing attributes in process `syz.7.1318'. [ 1131.138741][T10757] netlink: 132 bytes leftover after parsing attributes in process `syz.7.1327'. [ 1137.436572][ T29] audit: type=1107 audit(1137.360:2039): pid=10788 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='y' [ 1137.599446][T10791] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1343'. [ 1137.616392][T10791] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1343'. [ 1139.984848][T10811] pim6reg: tun_chr_ioctl cmd 1074025684 [ 1140.938598][ T29] audit: type=1400 audit(1140.850:2040): avc: denied { create } for pid=10821 comm="syz.6.1354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1144.525850][T10854] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1367'. [ 1144.527577][T10854] sch_tbf: burst 0 is lower than device veth1_macvtap mtu (1514) ! [ 1145.054400][T10864] netlink: 'syz.7.1369': attribute type 6 has an invalid length. [ 1148.082994][T10917] netlink: 124 bytes leftover after parsing attributes in process `syz.7.1389'. [ 1148.831542][T10928] netlink: 32 bytes leftover after parsing attributes in process `syz.6.1394'. [ 1150.241106][T10942] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1399'. [ 1150.245746][T10942] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1399'. [ 1150.249960][T10942] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1399'. [ 1152.187214][T10962] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1408'. [ 1152.353024][ T29] audit: type=1400 audit(1152.280:2041): avc: denied { nlmsg_read } for pid=10963 comm="syz.6.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1152.377902][T10965] netlink: 104 bytes leftover after parsing attributes in process `syz.6.1409'. [ 1154.359237][T10987] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1418'. [ 1154.387585][T10987] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1418'. [ 1157.247626][T11002] netlink: 12 bytes leftover after parsing attributes in process `syz.6.1422'. [ 1158.456236][T11020] netlink: 9275 bytes leftover after parsing attributes in process `syz.6.1429'. [ 1162.643682][ T29] audit: type=1400 audit(1162.570:2042): avc: denied { create } for pid=11057 comm="syz.6.1444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1162.666515][ T29] audit: type=1400 audit(1162.580:2043): avc: denied { nlmsg_read } for pid=11057 comm="syz.6.1444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1162.677300][ T29] audit: type=1107 audit(1162.600:2044): pid=11057 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1167.344027][ T29] audit: type=1400 audit(1167.270:2045): avc: denied { execute } for pid=11082 comm="syz.7.1454" dev="tmpfs" ino=34 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1167.402142][ T29] audit: type=1400 audit(1167.290:2046): avc: denied { execute_no_trans } for pid=11082 comm="syz.7.1454" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=34 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1168.164972][ T29] audit: type=1400 audit(1168.090:2047): avc: denied { remount } for pid=11089 comm="syz.7.1457" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1168.822313][T11100] netlink: 96 bytes leftover after parsing attributes in process `syz.7.1460'. [ 1169.985452][T11116] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1466'. [ 1170.095696][T11116] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1466'. [ 1172.404585][ T30] INFO: task kworker/1:16:4924 blocked for more than 430 seconds. [ 1172.405361][ T30] Not tainted syzkaller #0 [ 1172.405439][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1172.405632][ T30] task:kworker/1:16 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.406050][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.406995][ T30] Call trace: [ 1172.407275][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1172.414260][ T30] r10:ea319d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea319d8c r5:8422ec00 [ 1172.414588][ T30] r4:8422ec00 [ 1172.414805][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1172.414928][ T30] r5:8422ec00 r4:8291719c [ 1172.414977][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1172.415135][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1172.415222][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea319e08 [ 1172.415244][ T30] r4:00000000 [ 1172.415259][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1172.415313][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1172.415383][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.415451][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86225600 [ 1172.415515][ T30] r4:00000000 [ 1172.415540][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.415614][ T30] r9:83018605 r8:8422ec00 r7:00000000 r6:83018600 r5:00001000 r4:7f232000 [ 1172.415633][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.415720][ T30] r5:00001000 r4:dfbfb000 [ 1172.415742][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.415808][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.415877][ T30] r5:863bff8c r4:84a16980 [ 1172.415896][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.415970][ T30] r7:ddde3d80 r6:83018600 r5:863bff8c r4:84a16980 [ 1172.415988][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.416061][ T30] r10:61c88647 r9:8422ec00 r8:84a169ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1172.416081][ T30] r4:84a16980 [ 1172.416098][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.416185][ T30] r10:00000000 r9:84a16980 r8:80278fec r7:e018de60 r6:8549c500 r5:8422ec00 [ 1172.416210][ T30] r4:00000001 [ 1172.416228][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.416376][ T30] Exception stack(0xea319fb0 to 0xea319ff8) [ 1172.416557][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1172.416637][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.416674][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.416757][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.416781][ T30] r4:85571f80 [ 1172.418054][ T30] INFO: task kworker/1:16:4924 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1172.418268][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.418469][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.418547][ T30] Call trace: [ 1172.418585][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1172.418670][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1172.418693][ T30] r4:00000000 [ 1172.418710][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1172.418764][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1172.418805][ T30] 1d20: a0a7e000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1172.418883][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1172.418915][ T30] 1d60: 80010013 ffffffff [ 1172.418942][ T30] r5:80010013 r4:80239c10 [ 1172.418996][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1172.419084][ T30] r4:82acb1e4 [ 1172.419129][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1172.419238][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1172.419353][ T30] r4:ea7b1dc0 [ 1172.419381][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.419452][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1172.419473][ T30] r4:00000000 [ 1172.419582][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.419662][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1172.419702][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.419776][ T30] r5:00001000 r4:ea8cd000 [ 1172.419823][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.419885][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.420028][ T30] r5:862c138c r4:86477680 [ 1172.420050][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.420150][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1172.420368][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.434784][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1172.434845][ T30] r4:86477680 [ 1172.434863][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.434973][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1172.435089][ T30] r4:00000001 [ 1172.435151][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.435209][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1172.435248][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1172.435283][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.435317][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.435365][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.435407][ T30] r4:86478700 [ 1172.436878][ T30] INFO: task kworker/1:139:7775 blocked for more than 430 seconds. [ 1172.436958][ T30] Not tainted syzkaller #0 [ 1172.436984][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1172.437003][ T30] task:kworker/1:139 state:D stack:0 pid:7775 tgid:7775 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.437084][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.437159][ T30] Call trace: [ 1172.437223][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1172.437313][ T30] r10:e421dd84 r9:00000002 r8:60000113 r7:829171a0 r6:e421dd8c r5:85434800 [ 1172.437346][ T30] r4:85434800 [ 1172.437362][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1172.437419][ T30] r5:85434800 r4:8291719c [ 1172.437436][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1172.437493][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1172.437563][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e421de08 [ 1172.437586][ T30] r4:00000000 [ 1172.437603][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1172.437699][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1172.437764][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.437828][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca7880 [ 1172.437849][ T30] r4:00000000 [ 1172.437866][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.437931][ T30] r9:83018605 r8:85434800 r7:00000000 r6:83018600 r5:00001000 r4:7f25e000 [ 1172.437948][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.438064][ T30] r5:00001000 r4:eaa0b000 [ 1172.438089][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.438149][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.438243][ T30] r5:8633e38c r4:8649a300 [ 1172.438265][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.438350][ T30] r7:ddde3d80 r6:83018600 r5:8633e38c r4:8649a300 [ 1172.438369][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.438448][ T30] r10:61c88647 r9:85434800 r8:8649a32c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1172.438703][ T30] r4:8649a300 [ 1172.438721][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.438796][ T30] r10:00000000 r9:8649a300 r8:80278fec r7:ea4ade60 r6:8647fa80 r5:85434800 [ 1172.438821][ T30] r4:00000001 [ 1172.438837][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.438886][ T30] Exception stack(0xe421dfb0 to 0xe421dff8) [ 1172.438920][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1172.438994][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.439033][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.439075][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.439097][ T30] r4:8607c100 [ 1172.440311][ T30] INFO: task kworker/1:139:7775 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1172.452660][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.452928][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.453089][ T30] Call trace: [ 1172.453165][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1172.453284][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1172.455955][ T30] r4:00000000 [ 1172.456076][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1172.456198][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1172.456255][ T30] 1d20: a0df2000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1172.456385][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1172.456422][ T30] 1d60: 80010013 ffffffff [ 1172.456578][ T30] r5:80010013 r4:80239c10 [ 1172.459968][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1172.460143][ T30] r4:82acb1e4 [ 1172.460252][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1172.465387][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1172.465473][ T30] r4:ea7b1dc0 [ 1172.465496][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.465613][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1172.465639][ T30] r4:00000000 [ 1172.465758][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.465868][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1172.465896][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.466021][ T30] r5:00001000 r4:ea8cd000 [ 1172.466141][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.466207][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.472433][ T30] r5:862c138c r4:86477680 [ 1172.472504][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.472619][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1172.472639][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.472755][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1172.472784][ T30] r4:86477680 [ 1172.472804][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.472882][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1172.472905][ T30] r4:00000001 [ 1172.472924][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.472976][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1172.473020][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1172.473065][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.473103][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.473146][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.473198][ T30] r4:86478700 [ 1172.477724][ T30] INFO: task kworker/0:171:7807 blocked for more than 430 seconds. [ 1172.477830][ T30] Not tainted syzkaller #0 [ 1172.477860][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1172.477881][ T30] task:kworker/0:171 state:D stack:0 pid:7807 tgid:7807 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.478043][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.478208][ T30] Call trace: [ 1172.478243][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1172.480852][ T30] r10:ea351d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea351d8c r5:86836c00 [ 1172.480891][ T30] r4:86836c00 [ 1172.480902][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1172.480951][ T30] r5:86836c00 r4:8291719c [ 1172.480960][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1172.480989][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1172.481027][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea351e08 [ 1172.481037][ T30] r4:00000000 [ 1172.481044][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1172.481070][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1172.481099][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.481131][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86225300 [ 1172.481141][ T30] r4:00000000 [ 1172.481149][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.481183][ T30] r9:83018405 r8:86836c00 r7:00000000 r6:83018400 r5:00001000 r4:7f24c000 [ 1172.481192][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.481224][ T30] r5:00001000 r4:e00cd000 [ 1172.481231][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.481259][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.481290][ T30] r5:863bdb8c r4:86477480 [ 1172.481297][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.481340][ T30] r7:dddcfd80 r6:83018400 r5:863bdb8c r4:86477480 [ 1172.481349][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.481385][ T30] r10:61c88647 r9:86836c00 r8:864774ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1172.481395][ T30] r4:86477480 [ 1172.481403][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.481437][ T30] r10:00000000 r9:86477480 r8:80278fec r7:eaeb5e60 r6:86477700 r5:86836c00 [ 1172.481448][ T30] r4:00000001 [ 1172.481455][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.481479][ T30] Exception stack(0xea351fb0 to 0xea351ff8) [ 1172.481499][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1172.481516][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.481532][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.481551][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.481561][ T30] r4:85c7e780 [ 1172.482068][ T30] INFO: task kworker/0:171:7807 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1172.482090][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.482141][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.482171][ T30] Call trace: [ 1172.482184][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1172.482293][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1172.482308][ T30] r4:00000000 [ 1172.482396][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1172.482428][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1172.482448][ T30] 1d20: a1033000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1172.482468][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1172.482521][ T30] 1d60: 80010013 ffffffff [ 1172.482551][ T30] r5:80010013 r4:80239c10 [ 1172.482964][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1172.483133][ T30] r4:82acb1e4 [ 1172.483161][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1172.483250][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1172.483343][ T30] r4:ea7b1dc0 [ 1172.483433][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.483502][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1172.483766][ T30] r4:00000000 [ 1172.483789][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.483856][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1172.483882][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.483941][ T30] r5:00001000 r4:ea8cd000 [ 1172.483974][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.484040][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.484105][ T30] r5:862c138c r4:86477680 [ 1172.484120][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.484193][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1172.484297][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.484420][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1172.484446][ T30] r4:86477680 [ 1172.484460][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.484651][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1172.484679][ T30] r4:00000001 [ 1172.484694][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.484739][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1172.484777][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1172.484812][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.484840][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.484879][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.484899][ T30] r4:86478700 [ 1172.484976][ T30] INFO: task kworker/0:173:7819 blocked for more than 430 seconds. [ 1172.485019][ T30] Not tainted syzkaller #0 [ 1172.485041][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1172.485056][ T30] task:kworker/0:173 state:D stack:0 pid:7819 tgid:7819 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.485122][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.485429][ T30] Call trace: [ 1172.485463][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1172.485552][ T30] r10:ea989d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea989d8c r5:85ec3c00 [ 1172.485582][ T30] r4:85ec3c00 [ 1172.485602][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1172.485678][ T30] r5:85ec3c00 r4:8291719c [ 1172.485697][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1172.485754][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1172.485912][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea989e08 [ 1172.485938][ T30] r4:00000000 [ 1172.485955][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1172.486009][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1172.486058][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.486121][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86225480 [ 1172.486141][ T30] r4:00000000 [ 1172.486154][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.486218][ T30] r9:83018405 r8:85ec3c00 r7:00000000 r6:83018400 r5:00001000 r4:7f22c000 [ 1172.486237][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.486289][ T30] r5:00001000 r4:dfb73000 [ 1172.486350][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.486474][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.486595][ T30] r5:863bf78c r4:86246a80 [ 1172.486619][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.486683][ T30] r7:dddcfd80 r6:83018400 r5:863bf78c r4:86246a80 [ 1172.486803][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.486875][ T30] r10:61c88647 r9:85ec3c00 r8:86246aac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1172.486895][ T30] r4:86246a80 [ 1172.486914][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.487007][ T30] r10:00000000 r9:86246a80 r8:80278fec r7:ea351e60 r6:86246b00 r5:85ec3c00 [ 1172.487039][ T30] r4:00000001 [ 1172.487155][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.487205][ T30] Exception stack(0xea989fb0 to 0xea989ff8) [ 1172.487238][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1172.487274][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.487305][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.487353][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.487375][ T30] r4:8617f6c0 [ 1172.487941][ T30] INFO: task kworker/0:173:7819 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1172.487977][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.488149][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.488280][ T30] Call trace: [ 1172.488303][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1172.488409][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1172.488438][ T30] r4:00000000 [ 1172.488454][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1172.488506][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1172.488549][ T30] 1d20: a1033000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1172.488637][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1172.488672][ T30] 1d60: 80010013 ffffffff [ 1172.488696][ T30] r5:80010013 r4:80239c10 [ 1172.488758][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1172.488820][ T30] r4:82acb1e4 [ 1172.488872][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1172.488942][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1172.489001][ T30] r4:ea7b1dc0 [ 1172.489022][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.489081][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1172.489108][ T30] r4:00000000 [ 1172.489146][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.489216][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1172.489332][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.489405][ T30] r5:00001000 r4:ea8cd000 [ 1172.489428][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.489489][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.489547][ T30] r5:862c138c r4:86477680 [ 1172.489689][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.489762][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1172.489813][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.489882][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1172.489943][ T30] r4:86477680 [ 1172.490056][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.490123][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1172.490145][ T30] r4:00000001 [ 1172.490163][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.490207][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1172.490235][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1172.490275][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.490351][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.512444][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.512617][ T30] r4:86478700 [ 1172.514847][ T30] INFO: task kworker/0:174:7837 blocked for more than 430 seconds. [ 1172.514936][ T30] Not tainted syzkaller #0 [ 1172.514964][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1172.515058][ T30] task:kworker/0:174 state:D stack:0 pid:7837 tgid:7837 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.515178][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.515269][ T30] Call trace: [ 1172.515449][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1172.598645][ T30] r10:ea999d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea999d8c r5:85622400 [ 1172.598747][ T30] r4:85622400 [ 1172.598879][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1172.598980][ T30] r5:85622400 r4:8291719c [ 1172.599002][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1172.599078][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1172.599203][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08 [ 1172.599228][ T30] r4:00000000 [ 1172.599343][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1172.599422][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1172.599490][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.599560][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86225dc0 [ 1172.599585][ T30] r4:00000000 [ 1172.599601][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.599664][ T30] r9:83018405 r8:85622400 r7:00000000 r6:83018400 r5:00001000 r4:7f234000 [ 1172.599686][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.599744][ T30] r5:00001000 r4:dfc7f000 [ 1172.599786][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.599845][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.599907][ T30] r5:863bef8c r4:8647fc80 [ 1172.599926][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.600033][ T30] r7:dddcfd80 r6:83018400 r5:863bef8c r4:8647fc80 [ 1172.600057][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.600248][ T30] r10:61c88647 r9:85622400 r8:8647fcac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1172.600380][ T30] r4:8647fc80 [ 1172.691678][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.691970][ T30] r10:00000000 r9:8647fc80 r8:80278fec r7:ea351e60 r6:8647fc00 r5:85622400 [ 1172.692091][ T30] r4:00000001 [ 1172.692117][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.692170][ T30] Exception stack(0xea999fb0 to 0xea999ff8) [ 1172.692207][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1172.692243][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.692273][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.692392][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.692417][ T30] r4:862250c0 [ 1172.693255][ T30] INFO: task kworker/0:174:7837 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1172.693303][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.693601][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.693669][ T30] Call trace: [ 1172.693696][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1172.693778][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1172.693820][ T30] r4:00000000 [ 1172.693838][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1172.693893][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1172.693931][ T30] 1d20: a191a000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1172.694006][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1172.694036][ T30] 1d60: 80010013 ffffffff [ 1172.694061][ T30] r5:80010013 r4:80239c10 [ 1172.694077][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1172.694139][ T30] r4:82acb1e4 [ 1172.694158][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1172.694221][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1172.694242][ T30] r4:ea7b1dc0 [ 1172.694258][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.694335][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1172.694360][ T30] r4:00000000 [ 1172.694493][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.694642][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1172.694667][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.694727][ T30] r5:00001000 r4:ea8cd000 [ 1172.694743][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.694796][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.694855][ T30] r5:862c138c r4:86477680 [ 1172.694942][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.695059][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1172.695129][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.695213][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1172.695238][ T30] r4:86477680 [ 1172.695300][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.695381][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1172.695443][ T30] r4:00000001 [ 1172.695461][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.695512][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1172.695544][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1172.695579][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.695614][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.695673][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.695703][ T30] r4:86478700 [ 1172.695765][ T30] INFO: task kworker/1:141:7842 blocked for more than 430 seconds. [ 1172.695808][ T30] Not tainted syzkaller #0 [ 1172.695950][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1172.695973][ T30] task:kworker/1:141 state:D stack:0 pid:7842 tgid:7842 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.696030][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.696075][ T30] Call trace: [ 1172.696166][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1172.696265][ T30] r10:ea8f1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8f1d8c r5:864e2400 [ 1172.696293][ T30] r4:864e2400 [ 1172.696317][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1172.696378][ T30] r5:864e2400 r4:8291719c [ 1172.696394][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1172.696471][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1172.696546][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f1e08 [ 1172.696568][ T30] r4:00000000 [ 1172.696586][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1172.696714][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1172.696774][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.696848][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8618fc00 [ 1172.696870][ T30] r4:00000000 [ 1172.696886][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.696971][ T30] r9:83018605 r8:864e2400 r7:00000000 r6:83018600 r5:00001000 r4:7f260000 [ 1172.696991][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.697067][ T30] r5:00001000 r4:eaa33000 [ 1172.697085][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.697143][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.697244][ T30] r5:862c378c r4:85cde000 [ 1172.697294][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.697430][ T30] r7:ddde3d80 r6:83018600 r5:862c378c r4:85cde000 [ 1172.697452][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.697522][ T30] r10:61c88647 r9:864e2400 r8:85cde02c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1172.697542][ T30] r4:85cde000 [ 1172.697572][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.697719][ T30] r10:00000000 r9:85cde000 r8:80278fec r7:ea4f9e60 r6:85cdee80 r5:864e2400 [ 1172.697745][ T30] r4:00000001 [ 1172.697760][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.697806][ T30] Exception stack(0xea8f1fb0 to 0xea8f1ff8) [ 1172.697837][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1172.697872][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.697905][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.697941][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.698004][ T30] r4:85ca7b00 [ 1172.698751][ T30] INFO: task kworker/1:141:7842 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1172.698796][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.699033][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.699161][ T30] Call trace: [ 1172.699198][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1172.699277][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1172.699298][ T30] r4:00000000 [ 1172.699322][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1172.699459][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1172.699518][ T30] 1d20: a191a000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1172.699558][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1172.699585][ T30] 1d60: 80010013 ffffffff [ 1172.699610][ T30] r5:80010013 r4:80239c10 [ 1172.699631][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1172.699689][ T30] r4:82acb1e4 [ 1172.699792][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1172.699867][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1172.699888][ T30] r4:ea7b1dc0 [ 1172.699903][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1172.699963][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1172.700049][ T30] r4:00000000 [ 1172.700071][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1172.700165][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1172.700182][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1172.700237][ T30] r5:00001000 r4:ea8cd000 [ 1172.700253][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1172.700426][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1172.948461][ T30] r5:862c138c r4:86477680 [ 1172.948520][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1172.948670][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1172.948695][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1172.948769][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1172.948790][ T30] r4:86477680 [ 1172.948807][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1172.948936][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1172.948962][ T30] r4:00000001 [ 1172.948980][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1172.949031][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1172.949071][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1172.949107][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1172.949136][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1172.949208][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1172.949276][ T30] r4:86478700 [ 1172.949347][ T30] INFO: task kworker/1:142:7848 blocked for more than 430 seconds. [ 1172.949413][ T30] Not tainted syzkaller #0 [ 1172.949443][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1172.949461][ T30] task:kworker/1:142 state:D stack:0 pid:7848 tgid:7848 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1172.949543][ T30] Workqueue: events bpf_prog_free_deferred [ 1172.949615][ T30] Call trace: [ 1172.949652][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1172.949871][ T30] r10:eaa79d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaa79d8c r5:864e6000 [ 1172.949901][ T30] r4:864e6000 [ 1172.949918][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1172.949977][ T30] r5:864e6000 r4:8291719c [ 1172.949994][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1172.950051][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1172.950124][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa79e08 [ 1172.950145][ T30] r4:00000000 [ 1172.950160][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1172.950287][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1173.009429][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1173.014357][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86498e80 [ 1173.151050][ T30] r4:00000000 [ 1173.151405][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1173.151772][ T30] r9:83018605 r8:864e6000 r7:00000000 r6:83018600 r5:00001000 r4:7f270000 [ 1173.151994][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1173.152333][ T30] r5:00001000 r4:eabca000 [ 1173.152511][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1173.152741][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1173.153047][ T30] r5:8635bf8c r4:85cde800 [ 1173.153229][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1173.153545][ T30] r7:ddde3d80 r6:83018600 r5:8635bf8c r4:85cde800 [ 1173.153728][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1173.154016][ T30] r10:61c88647 r9:864e6000 r8:85cde82c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1173.154268][ T30] r4:85cde800 [ 1173.154436][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1173.154700][ T30] r10:00000000 r9:85cde800 r8:80278fec r7:ea4f9e60 r6:85cdec80 r5:864e6000 [ 1173.154980][ T30] r4:00000001 [ 1173.155240][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1173.155774][ T30] Exception stack(0xeaa79fb0 to 0xeaa79ff8) [ 1173.156176][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1173.156423][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1173.156669][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1173.156912][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1173.157103][ T30] r4:86498a00 [ 1173.158209][ T30] INFO: task kworker/1:142:7848 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1173.158453][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1173.159158][ T30] Workqueue: events bpf_prog_free_deferred [ 1173.159693][ T30] Call trace: [ 1173.160132][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1173.218671][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1173.222809][ T30] r4:00000000 [ 1173.224008][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1173.225956][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1173.231419][ T30] 1d20: a193a000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1173.231795][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1173.232002][ T30] 1d60: 80010013 ffffffff [ 1173.232191][ T30] r5:80010013 r4:80239c10 [ 1173.232352][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1173.232625][ T30] r4:82acb1e4 [ 1173.232769][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1173.233041][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1173.233257][ T30] r4:ea7b1dc0 [ 1173.233451][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1173.233713][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1173.233894][ T30] r4:00000000 [ 1173.234044][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1173.234321][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1173.234522][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1173.234807][ T30] r5:00001000 r4:ea8cd000 [ 1173.234959][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1173.235203][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1173.235465][ T30] r5:862c138c r4:86477680 [ 1173.235708][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1173.235963][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1173.236110][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1173.236372][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1173.236613][ T30] r4:86477680 [ 1173.236829][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1173.237077][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1173.237246][ T30] r4:00000001 [ 1173.237411][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1173.237602][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1173.237800][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1173.237988][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1173.307703][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1173.311510][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1173.314392][ T30] r4:86478700 [ 1173.321499][ T30] INFO: task kworker/0:175:7855 blocked for more than 431 seconds. [ 1173.324525][ T30] Not tainted syzkaller #0 [ 1173.326718][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1173.329789][ T30] task:kworker/0:175 state:D stack:0 pid:7855 tgid:7855 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1173.339014][ T30] Workqueue: events bpf_prog_free_deferred [ 1173.344323][ T30] Call trace: [ 1173.351808][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1173.352367][ T30] r10:ea8d5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8d5d8c r5:84fdec00 [ 1173.352537][ T30] r4:84fdec00 [ 1173.352699][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1173.353271][ T30] r5:84fdec00 r4:8291719c [ 1173.353443][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1173.353662][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1173.353916][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d5e08 [ 1173.354074][ T30] r4:00000000 [ 1173.354255][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1173.354457][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1173.354646][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1173.354892][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86225540 [ 1173.355098][ T30] r4:00000000 [ 1173.355284][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1173.355536][ T30] r9:83018405 r8:84fdec00 r7:00000000 r6:83018400 r5:00001000 r4:7f23c000 [ 1173.355695][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1173.355912][ T30] r5:00001000 r4:dffd5000 [ 1173.356091][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1173.356317][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1173.356581][ T30] r5:863bc38c r4:8647f900 [ 1173.356733][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1173.356969][ T30] r7:dddcfd80 r6:83018400 r5:863bc38c r4:8647f900 [ 1173.357129][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1173.357445][ T30] r10:61c88647 r9:84fdec00 r8:8647f92c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1173.357639][ T30] r4:8647f900 [ 1173.357776][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1173.358045][ T30] r10:00000000 r9:8647f900 r8:80278fec r7:ea351e60 r6:8647ff80 r5:84fdec00 [ 1173.358215][ T30] r4:00000001 [ 1173.358427][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1173.358607][ T30] Exception stack(0xea8d5fb0 to 0xea8d5ff8) [ 1173.358757][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1173.358991][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1173.359215][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1173.359310][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1173.359570][ T30] r4:86225c40 [ 1173.412609][ T30] INFO: task kworker/0:175:7855 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1173.415053][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1173.420239][ T30] Workqueue: events bpf_prog_free_deferred [ 1173.429066][ T30] Call trace: [ 1173.434978][ T30] [<8028d908>] (preempt_count_sub) from [<81a657b0>] (preempt_schedule_irq+0x4c/0xa8) [ 1173.444234][ T30] [<81a31094>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 1173.450685][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1173.455422][ T30] 1d20: a1c20000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1173.457639][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1173.459662][ T30] 1d60: 80010013 ffffffff [ 1173.463950][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1173.466999][ T30] r4:82acb1e4 [ 1173.471285][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1173.471695][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1173.471906][ T30] r4:ea7b1dc0 [ 1173.472054][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1173.472807][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1173.472969][ T30] r4:00000000 [ 1173.473126][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1173.473377][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1173.473561][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1173.473814][ T30] r5:00001000 r4:ea8cd000 [ 1173.473991][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1173.474214][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1173.474439][ T30] r5:862c138c r4:86477680 [ 1173.474565][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1173.474804][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1173.474971][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1173.475246][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1173.475418][ T30] r4:86477680 [ 1173.475605][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1173.475877][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1173.476032][ T30] r4:00000001 [ 1173.476216][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1173.476456][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1173.476640][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1173.476871][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1173.477079][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1173.477373][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1173.477560][ T30] r4:86478700 [ 1173.507868][ T30] INFO: task kworker/0:176:7862 blocked for more than 431 seconds. [ 1173.509381][ T30] Not tainted syzkaller #0 [ 1173.510221][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1173.512346][ T30] task:kworker/0:176 state:D stack:0 pid:7862 tgid:7862 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1173.513906][ T30] Workqueue: events bpf_prog_free_deferred [ 1173.515015][ T30] Call trace: [ 1173.516120][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1173.517104][ T30] r10:eaa99d84 r9:00000002 r8:60010113 r7:829171a0 r6:eaa99d8c r5:865cb000 [ 1173.517985][ T30] r4:865cb000 [ 1173.518696][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1173.519406][ T30] r5:865cb000 r4:8291719c [ 1173.519974][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1173.520969][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1173.528280][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08 [ 1173.531684][ T30] r4:00000000 [ 1173.532046][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1173.533026][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1173.533990][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1173.535000][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8605b9c0 [ 1173.535967][ T30] r4:00000000 [ 1173.536524][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1173.537499][ T30] r9:83018405 r8:865cb000 r7:00000000 r6:83018400 r5:00001000 r4:7f262000 [ 1173.538547][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1173.539594][ T30] r5:00001000 r4:e014d000 [ 1173.540247][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1173.541374][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1173.542499][ T30] r5:863bcf8c r4:86203e80 [ 1173.543044][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1173.544178][ T30] r7:dddcfd80 r6:83018400 r5:863bcf8c r4:86203e80 [ 1173.544957][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1173.546011][ T30] r10:61c88647 r9:865cb000 r8:86203eac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1173.546977][ T30] r4:86203e80 [ 1173.547679][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1173.548776][ T30] r10:00000000 r9:86203e80 r8:80278fec r7:ea351e60 r6:86203f80 r5:865cb000 [ 1173.549609][ T30] r4:00000001 [ 1173.550112][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1173.551233][ T30] Exception stack(0xeaa99fb0 to 0xeaa99ff8) [ 1173.552113][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1173.552739][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1173.553219][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1173.553671][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1173.554115][ T30] r4:8648d300 [ 1173.555021][ T30] INFO: task kworker/0:176:7862 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1173.556086][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1173.557848][ T30] Workqueue: events bpf_prog_free_deferred [ 1173.558853][ T30] Call trace: [ 1173.559658][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1173.561161][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1173.561757][ T30] r4:00000000 [ 1173.562358][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1173.563101][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1173.563897][ T30] 1d20: a1f64000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1173.565122][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1173.566033][ T30] 1d60: 80010013 ffffffff [ 1173.566716][ T30] r5:80010013 r4:80239c10 [ 1173.567953][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1173.569984][ T30] r4:82acb1e4 [ 1173.570944][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1173.572922][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1173.574298][ T30] r4:ea7b1dc0 [ 1173.575173][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1173.576722][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1173.578150][ T30] r4:00000000 [ 1173.578987][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1173.580965][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1173.582619][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1173.584390][ T30] r5:00001000 r4:ea8cd000 [ 1173.585379][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1173.587126][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1173.588908][ T30] r5:862c138c r4:86477680 [ 1173.589624][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1173.591382][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1173.592498][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1173.594362][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1173.596091][ T30] r4:86477680 [ 1173.597115][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1173.598835][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1173.600915][ T30] r4:00000001 [ 1173.602039][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1173.603736][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1173.604517][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1173.606372][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1173.608626][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1173.611324][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1173.613257][ T30] r4:86478700 [ 1173.614647][ T30] INFO: task kworker/0:177:7863 blocked for more than 431 seconds. [ 1173.616349][ T30] Not tainted syzkaller #0 [ 1173.617451][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1173.619201][ T30] task:kworker/0:177 state:D stack:0 pid:7863 tgid:7863 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1173.721757][ T30] Workqueue: events bpf_prog_free_deferred [ 1173.722317][ T30] Call trace: [ 1173.722691][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1173.722996][ T30] r10:e00a5d84 r9:00000002 r8:60000113 r7:829171a0 r6:e00a5d8c r5:865c9800 [ 1173.723190][ T30] r4:865c9800 [ 1173.723368][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1173.723674][ T30] r5:865c9800 r4:8291719c [ 1173.723823][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1173.724064][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1173.724368][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a5e08 [ 1173.724539][ T30] r4:00000000 [ 1173.804461][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1173.805950][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1173.808080][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1173.811572][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca6bc0 [ 1173.814744][ T30] r4:00000000 [ 1173.816064][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1173.818639][ T30] r9:83018405 r8:865c9800 r7:00000000 r6:83018400 r5:00001000 r4:7f264000 [ 1173.821846][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1173.825933][ T30] r5:00001000 r4:ea8db000 [ 1173.827445][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1173.829684][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1173.831890][ T30] r5:863bc78c r4:86203280 [ 1173.833447][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1173.837329][ T30] r7:dddcfd80 r6:83018400 r5:863bc78c r4:86203280 [ 1173.839194][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1173.842618][ T30] r10:61c88647 r9:865c9800 r8:862032ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1173.844724][ T30] r4:86203280 [ 1173.846131][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1173.849448][ T30] r10:00000000 r9:86203280 r8:80278fec r7:eaa99e60 r6:86203c00 r5:865c9800 [ 1173.852020][ T30] r4:00000001 [ 1173.853565][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1173.855467][ T30] Exception stack(0xe00a5fb0 to 0xe00a5ff8) [ 1173.857404][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1173.859928][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1173.859989][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1173.860035][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1173.860074][ T30] r4:86188b00 [ 1173.861185][ T30] INFO: task kworker/0:177:7863 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1173.861250][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1173.861360][ T30] Workqueue: events bpf_prog_free_deferred [ 1173.861466][ T30] Call trace: [ 1173.861500][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1173.861598][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1173.861621][ T30] r4:00000000 [ 1173.861638][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1173.861697][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1173.861774][ T30] 1d20: a1f6f000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1173.861817][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1173.861858][ T30] 1d60: 80010013 ffffffff [ 1173.861889][ T30] r5:80010013 r4:80239c10 [ 1173.861909][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1173.886801][ T30] r4:82acb1e4 [ 1173.887692][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1173.889680][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1173.891908][ T30] r4:ea7b1dc0 [ 1173.892895][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1173.894779][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1173.897356][ T30] r4:00000000 [ 1173.898223][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1173.899902][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1173.903318][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1173.904277][ T30] r5:00001000 r4:ea8cd000 [ 1173.905344][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1173.908182][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1173.910238][ T30] r5:862c138c r4:86477680 [ 1173.913872][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1173.915832][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1173.917495][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1173.921035][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1173.922935][ T30] r4:86477680 [ 1173.924032][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1173.925914][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1173.927686][ T30] r4:00000001 [ 1173.928683][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1173.930613][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1173.940911][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1173.942322][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1173.942592][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1173.942766][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1173.942904][ T30] r4:86478700 [ 1173.943149][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1173.943566][ T30] INFO: task kworker/1:143:7865 blocked for more than 431 seconds. [ 1173.943767][ T30] Not tainted syzkaller #0 [ 1173.943948][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1173.944088][ T30] task:kworker/1:143 state:D stack:0 pid:7865 tgid:7865 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1173.944469][ T30] Workqueue: events bpf_prog_free_deferred [ 1173.944846][ T30] Call trace: [ 1173.945151][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1173.945390][ T30] r10:eaaa5d84 r9:00000002 r8:60010013 r7:829171a0 r6:eaaa5d8c r5:865ce000 [ 1173.945549][ T30] r4:865ce000 [ 1173.945677][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1173.945897][ T30] r5:865ce000 r4:8291719c [ 1173.946080][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1173.970063][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1173.974189][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 [ 1173.976530][ T30] r4:00000000 [ 1173.977437][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1173.979176][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1173.982059][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1173.983970][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0f40 [ 1173.986282][ T30] r4:00000000 [ 1173.989047][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1173.991303][ T30] r9:83018605 r8:865ce000 r7:00000000 r6:83018600 r5:00001000 r4:7f266000 [ 1173.993028][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1173.996738][ T30] r5:00001000 r4:eaacf000 [ 1173.997701][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.000041][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.003073][ T30] r5:862ca38c r4:861fa900 [ 1174.005502][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.008893][ T30] r7:ddde3d80 r6:83018600 r5:862ca38c r4:861fa900 [ 1174.026068][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.029795][ T30] r10:61c88647 r9:865ce000 r8:861fa92c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1174.042827][ T30] r4:861fa900 [ 1174.043609][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.045589][ T30] r10:00000000 r9:861fa900 r8:80278fec r7:eaa79e60 r6:859fe600 r5:865ce000 [ 1174.046143][ T30] r4:00000001 [ 1174.047773][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.048070][ T30] Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) [ 1174.048981][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1174.072310][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.074264][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.076427][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.078212][ T30] r4:863d8bc0 [ 1174.081398][ T30] INFO: task kworker/1:143:7865 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1174.083771][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.087240][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.089100][ T30] Call trace: [ 1174.090283][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1174.092968][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1174.093117][ T30] r4:00000000 [ 1174.093213][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1174.093394][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1174.093495][ T30] 1d20: a239a000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1174.093614][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1174.093734][ T30] 1d60: 80010013 ffffffff [ 1174.093828][ T30] r5:80010013 r4:80239c10 [ 1174.093928][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1174.094058][ T30] r4:82acb1e4 [ 1174.094135][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1174.094263][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1174.094387][ T30] r4:ea7b1dc0 [ 1174.094462][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.094604][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1174.094689][ T30] r4:00000000 [ 1174.094804][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.094950][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1174.095019][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.095177][ T30] r5:00001000 r4:ea8cd000 [ 1174.095299][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.095438][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.095580][ T30] r5:862c138c r4:86477680 [ 1174.095674][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.095816][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1174.095980][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.096117][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1174.096211][ T30] r4:86477680 [ 1174.096389][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.096540][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1174.096632][ T30] r4:00000001 [ 1174.096698][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.096790][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1174.096872][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1174.096950][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.097026][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.097130][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.097202][ T30] r4:86478700 [ 1174.097268][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1174.097410][ T30] INFO: task kworker/0:178:7869 blocked for more than 431 seconds. [ 1174.097513][ T30] Not tainted syzkaller #0 [ 1174.097586][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1174.097651][ T30] task:kworker/0:178 state:D stack:0 pid:7869 tgid:7869 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.097809][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.097957][ T30] Call trace: [ 1174.098082][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1174.098192][ T30] r10:eaaa1d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaaa1d8c r5:84fdb000 [ 1174.098264][ T30] r4:84fdb000 [ 1174.098411][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1174.098653][ T30] r5:84fdb000 r4:8291719c [ 1174.098769][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1174.098897][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1174.099078][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 [ 1174.099256][ T30] r4:00000000 [ 1174.099416][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1174.099610][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1174.099799][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.100106][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86480700 [ 1174.179063][ T30] r4:00000000 [ 1174.179435][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.179776][ T30] r9:83018405 r8:84fdb000 r7:00000000 r6:83018400 r5:00001000 r4:7f268000 [ 1174.179927][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.181107][ T30] r5:00001000 r4:eab00000 [ 1174.181305][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.181505][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.181723][ T30] r5:861d5f8c r4:8647f180 [ 1174.181860][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.182142][ T30] r7:dddcfd80 r6:83018400 r5:861d5f8c r4:8647f180 [ 1174.182283][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.182523][ T30] r10:61c88647 r9:84fdb000 r8:8647f1ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1174.182687][ T30] r4:8647f180 [ 1174.182871][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.183190][ T30] r10:00000000 r9:8647f180 r8:80278fec r7:eaa99e60 r6:8647f780 r5:84fdb000 [ 1174.183413][ T30] r4:00000001 [ 1174.183577][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.183806][ T30] Exception stack(0xeaaa1fb0 to 0xeaaa1ff8) [ 1174.183978][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1174.184140][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.184297][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.184467][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.184615][ T30] r4:85f71440 [ 1174.185693][ T30] INFO: task kworker/0:178:7869 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1174.185862][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.186299][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.186622][ T30] Call trace: [ 1174.186903][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1174.187171][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1174.187319][ T30] r4:00000000 [ 1174.187453][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1174.187652][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1174.187829][ T30] 1d20: a26c7000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1174.187992][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1174.188139][ T30] 1d60: 80010013 ffffffff [ 1174.188288][ T30] r5:80010013 r4:80239c10 [ 1174.188420][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1174.188637][ T30] r4:82acb1e4 [ 1174.188769][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1174.188986][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1174.189135][ T30] r4:ea7b1dc0 [ 1174.189267][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.189489][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1174.189642][ T30] r4:00000000 [ 1174.189775][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.190109][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1174.190233][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.228623][ T30] r5:00001000 r4:ea8cd000 [ 1174.229491][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.231806][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.234189][ T30] r5:862c138c r4:86477680 [ 1174.234929][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.236083][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1174.236904][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.237939][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1174.238844][ T30] r4:86477680 [ 1174.239480][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.241072][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1174.242203][ T30] r4:00000001 [ 1174.243661][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.251646][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1174.252974][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1174.254377][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.255670][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.257353][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.258491][ T30] r4:86478700 [ 1174.259230][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1174.261180][ T30] INFO: task kworker/0:179:7871 blocked for more than 431 seconds. [ 1174.262746][ T30] Not tainted syzkaller #0 [ 1174.263536][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1174.264958][ T30] task:kworker/0:179 state:D stack:0 pid:7871 tgid:7871 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.266471][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.267683][ T30] Call trace: [ 1174.268551][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1174.269631][ T30] r10:eaab1d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaab1d8c r5:865cc800 [ 1174.271424][ T30] r4:865cc800 [ 1174.272102][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1174.273851][ T30] r5:865cc800 r4:8291719c [ 1174.275145][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1174.277167][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1174.279940][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 [ 1174.282423][ T30] r4:00000000 [ 1174.283789][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1174.286539][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1174.288768][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.291186][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86226400 [ 1174.293086][ T30] r4:00000000 [ 1174.293993][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.295561][ T30] r9:83018405 r8:865cc800 r7:00000000 r6:83018400 r5:00001000 r4:7f26e000 [ 1174.297631][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.299720][ T30] r5:00001000 r4:eab85000 [ 1174.301633][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.304212][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.306972][ T30] r5:863bfb8c r4:8647fd80 [ 1174.308683][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.311765][ T30] r7:dddcfd80 r6:83018400 r5:863bfb8c r4:8647fd80 [ 1174.313150][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.315366][ T30] r10:61c88647 r9:865cc800 r8:8647fdac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1174.317858][ T30] r4:8647fd80 [ 1174.319020][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.321934][ T30] r10:00000000 r9:8647fd80 r8:80278fec r7:eaaa1e60 r6:8647fe00 r5:865cc800 [ 1174.324445][ T30] r4:00000001 [ 1174.325650][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.327583][ T30] Exception stack(0xeaab1fb0 to 0xeaab1ff8) [ 1174.329223][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1174.332645][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.335180][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.337419][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.339698][ T30] r4:85f71440 [ 1174.342189][ T30] INFO: task kworker/0:179:7871 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1174.345199][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.350058][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.352619][ T30] Call trace: [ 1174.353978][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1174.356363][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1174.358205][ T30] r4:00000000 [ 1174.359163][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1174.361771][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1174.363436][ T30] 1d20: a2d28000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1174.365889][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1174.367988][ T30] 1d60: 80010013 ffffffff [ 1174.369250][ T30] r5:80010013 r4:80239c10 [ 1174.370891][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1174.373490][ T30] r4:82acb1e4 [ 1174.374710][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1174.377197][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1174.379219][ T30] r4:ea7b1dc0 [ 1174.380136][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.382551][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1174.384101][ T30] r4:00000000 [ 1174.385168][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.387217][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1174.389129][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.390324][ T30] r5:00001000 r4:ea8cd000 [ 1174.391016][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.393007][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.399672][ T30] r5:862c138c r4:86477680 [ 1174.401567][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.404480][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1174.405997][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.408636][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1174.410248][ T30] r4:86477680 [ 1174.411624][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.413680][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1174.415345][ T30] r4:00000001 [ 1174.416043][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.416943][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1174.417688][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1174.418822][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.421045][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.422312][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.424177][ T30] r4:86478700 [ 1174.425073][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1174.426679][ T30] INFO: task kworker/0:180:7878 blocked for more than 432 seconds. [ 1174.428247][ T30] Not tainted syzkaller #0 [ 1174.429441][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1174.430423][ T30] task:kworker/0:180 state:D stack:0 pid:7878 tgid:7878 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.431961][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.433606][ T30] Call trace: [ 1174.434101][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1174.434672][ T30] r10:ea8d1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8d1d8c r5:865bbc00 [ 1174.435656][ T30] r4:865bbc00 [ 1174.436087][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1174.437095][ T30] r5:865bbc00 r4:8291719c [ 1174.437738][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1174.439386][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1174.449543][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d1e08 [ 1174.451091][ T30] r4:00000000 [ 1174.452545][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1174.455009][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1174.457231][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.459211][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca7680 [ 1174.461996][ T30] r4:00000000 [ 1174.462988][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.465270][ T30] r9:83018405 r8:865bbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f274000 [ 1174.467696][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.470922][ T30] r5:00001000 r4:eac43000 [ 1174.473060][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.475351][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.477678][ T30] r5:863beb8c r4:85f05a80 [ 1174.479137][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.481520][ T30] r7:dddcfd80 r6:83018400 r5:863beb8c r4:85f05a80 [ 1174.483258][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.485462][ T30] r10:61c88647 r9:865bbc00 r8:85f05aac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1174.487467][ T30] r4:85f05a80 [ 1174.488594][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.491260][ T30] r10:00000000 r9:85f05a80 r8:80278fec r7:eaab1e60 r6:85f05f80 r5:865bbc00 [ 1174.493439][ T30] r4:00000001 [ 1174.494676][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.496586][ T30] Exception stack(0xea8d1fb0 to 0xea8d1ff8) [ 1174.498281][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1174.501505][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.503808][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.505621][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.507885][ T30] r4:85f5a640 [ 1174.509828][ T30] INFO: task kworker/0:180:7878 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1174.512024][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.516215][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.518104][ T30] Call trace: [ 1174.519823][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1174.522475][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1174.524335][ T30] r4:00000000 [ 1174.525347][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1174.528133][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1174.529959][ T30] 1d20: a2d30000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1174.533675][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1174.535911][ T30] 1d60: 80010013 ffffffff [ 1174.536917][ T30] r5:80010013 r4:80239c10 [ 1174.538293][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1174.541447][ T30] r4:82acb1e4 [ 1174.542425][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1174.544913][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1174.546446][ T30] r4:ea7b1dc0 [ 1174.547426][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.549057][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1174.581371][ T30] r4:00000000 [ 1174.581646][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.581793][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1174.581815][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.581885][ T30] r5:00001000 r4:ea8cd000 [ 1174.581905][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.581964][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.582032][ T30] r5:862c138c r4:86477680 [ 1174.582048][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.582120][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1174.582140][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.582386][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1174.583164][ T30] r4:86477680 [ 1174.583204][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.583319][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1174.583344][ T30] r4:00000001 [ 1174.583360][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.583412][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1174.583450][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1174.583485][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.583517][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.583556][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.583581][ T30] r4:86478700 [ 1174.583604][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1174.583685][ T30] INFO: task kworker/1:144:7881 blocked for more than 432 seconds. [ 1174.583726][ T30] Not tainted syzkaller #0 [ 1174.583751][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1174.583769][ T30] task:kworker/1:144 state:D stack:0 pid:7881 tgid:7881 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.583848][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.583901][ T30] Call trace: [ 1174.583930][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1174.584005][ T30] r10:eab4dd84 r9:00000002 r8:60000113 r7:829171a0 r6:eab4dd8c r5:864e6c00 [ 1174.584026][ T30] r4:864e6c00 [ 1174.584044][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1174.584105][ T30] r5:864e6c00 r4:8291719c [ 1174.584211][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1174.585716][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1174.585846][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 [ 1174.585868][ T30] r4:00000000 [ 1174.585883][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1174.585933][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1174.585991][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.586060][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861f57c0 [ 1174.586122][ T30] r4:00000000 [ 1174.642646][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.645969][ T30] r9:83018605 r8:864e6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f26a000 [ 1174.649165][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.652994][ T30] r5:00001000 r4:eab06000 [ 1174.655202][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.657763][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.661203][ T30] r5:863bdf8c r4:86203980 [ 1174.663149][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.663626][ T30] r7:ddde3d80 r6:83018600 r5:863bdf8c r4:86203980 [ 1174.663830][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.664129][ T30] r10:61c88647 r9:864e6c00 r8:862039ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1174.664334][ T30] r4:86203980 [ 1174.664523][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.664845][ T30] r10:00000000 r9:86203980 r8:80278fec r7:eaa79e60 r6:86203580 r5:864e6c00 [ 1174.665031][ T30] r4:00000001 [ 1174.665171][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.665405][ T30] Exception stack(0xeab4dfb0 to 0xeab4dff8) [ 1174.665615][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1174.665812][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.665998][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.666191][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.666400][ T30] r4:859300c0 [ 1174.667413][ T30] INFO: task kworker/1:144:7881 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1174.667641][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.668296][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.668659][ T30] Call trace: [ 1174.668998][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1174.669283][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1174.669519][ T30] r4:00000000 [ 1174.669731][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1174.669960][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1174.670186][ T30] 1d20: a2d60000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1174.702024][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1174.704217][ T30] 1d60: 80010013 ffffffff [ 1174.705679][ T30] r5:80010013 r4:80239c10 [ 1174.706783][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1174.708993][ T30] r4:82acb1e4 [ 1174.709832][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1174.712012][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1174.714030][ T30] r4:ea7b1dc0 [ 1174.715220][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.717202][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1174.718891][ T30] r4:00000000 [ 1174.719918][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.722022][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1174.724027][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.727268][ T30] r5:00001000 r4:ea8cd000 [ 1174.728563][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.730700][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.732440][ T30] r5:862c138c r4:86477680 [ 1174.733697][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.736046][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1174.737658][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.739903][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1174.742225][ T30] r4:86477680 [ 1174.743369][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.745336][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1174.748449][ T30] r4:00000001 [ 1174.749372][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.751676][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1174.753285][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1174.755622][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.758035][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.759811][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.762013][ T30] r4:86478700 [ 1174.763184][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1174.765511][ T30] INFO: task kworker/1:145:7883 blocked for more than 432 seconds. [ 1174.767437][ T30] Not tainted syzkaller #0 [ 1174.768209][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1174.769684][ T30] task:kworker/1:145 state:D stack:0 pid:7883 tgid:7883 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.773811][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.775934][ T30] Call trace: [ 1174.777556][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1174.779635][ T30] r10:eab51d84 r9:00000002 r8:60000113 r7:829171a0 r6:eab51d8c r5:864e0c00 [ 1174.782216][ T30] r4:864e0c00 [ 1174.783324][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1174.785528][ T30] r5:864e0c00 r4:8291719c [ 1174.787203][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1174.789803][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1174.792176][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 [ 1174.794302][ T30] r4:00000000 [ 1174.795397][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1174.797485][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1174.799676][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.801675][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86494400 [ 1174.803874][ T30] r4:00000000 [ 1174.804897][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.806885][ T30] r9:83018605 r8:864e0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f26c000 [ 1174.808707][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.810110][ T30] r5:00001000 r4:eab31000 [ 1174.811695][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.814120][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.815853][ T30] r5:863bd38c r4:85cdec00 [ 1174.816987][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.818980][ T30] r7:ddde3d80 r6:83018600 r5:863bd38c r4:85cdec00 [ 1174.821049][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.823511][ T30] r10:61c88647 r9:864e0c00 r8:85cdec2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1174.825574][ T30] r4:85cdec00 [ 1174.826339][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.827873][ T30] r10:00000000 r9:85cdec00 r8:80278fec r7:ea4f9e60 r6:85cde500 r5:864e0c00 [ 1174.831937][ T30] r4:00000001 [ 1174.833878][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.836555][ T30] Exception stack(0xeab51fb0 to 0xeab51ff8) [ 1174.838512][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1174.845182][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.848406][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.850819][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.853483][ T30] r4:85a50fc0 [ 1174.855817][ T30] INFO: task kworker/1:145:7883 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1174.857506][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.860240][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.863358][ T30] Call trace: [ 1174.864890][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1174.867543][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1174.869648][ T30] r4:00000000 [ 1174.871393][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1174.874248][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1174.876139][ T30] 1d20: a2dc5000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1174.877614][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1174.878751][ T30] 1d60: 80010013 ffffffff [ 1174.880067][ T30] r5:80010013 r4:80239c10 [ 1174.882377][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1174.885219][ T30] r4:82acb1e4 [ 1174.886505][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1174.889875][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1174.892192][ T30] r4:ea7b1dc0 [ 1174.893607][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.895868][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1174.898147][ T30] r4:00000000 [ 1174.899356][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1174.902017][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1174.904787][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1174.907449][ T30] r5:00001000 r4:ea8cd000 [ 1174.909056][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1174.911715][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1174.914776][ T30] r5:862c138c r4:86477680 [ 1174.916237][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1174.918471][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1174.921848][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1174.924799][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1174.927295][ T30] r4:86477680 [ 1174.928321][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1174.930102][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1174.932566][ T30] r4:00000001 [ 1174.933885][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1174.936432][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1174.938340][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1174.951265][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1174.955064][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1174.958675][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1174.961468][ T30] r4:86478700 [ 1174.963590][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1174.966612][ T30] INFO: task kworker/0:181:7889 blocked for more than 432 seconds. [ 1174.969389][ T30] Not tainted syzkaller #0 [ 1174.971545][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1174.974493][ T30] task:kworker/0:181 state:D stack:0 pid:7889 tgid:7889 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1174.975078][ T30] Workqueue: events bpf_prog_free_deferred [ 1174.975699][ T30] Call trace: [ 1174.975998][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1174.976299][ T30] r10:eaa31d84 r9:00000002 r8:60000013 r7:829171a0 r6:eaa31d8c r5:8615d400 [ 1174.976473][ T30] r4:8615d400 [ 1174.976693][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1174.976992][ T30] r5:8615d400 r4:8291719c [ 1174.977146][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1174.977468][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1174.977745][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 [ 1174.977966][ T30] r4:00000000 [ 1174.978196][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1174.978474][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1174.978754][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1174.978994][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86106240 [ 1174.979260][ T30] r4:00000000 [ 1174.979392][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.015679][ T30] r9:83018405 r8:8615d400 r7:00000000 r6:83018400 r5:00001000 r4:7f272000 [ 1175.016119][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.016409][ T30] r5:00001000 r4:eabf1000 [ 1175.016591][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.016804][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.017045][ T30] r5:863be78c r4:85f05580 [ 1175.017215][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.017489][ T30] r7:dddcfd80 r6:83018400 r5:863be78c r4:85f05580 [ 1175.017663][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.017965][ T30] r10:61c88647 r9:8615d400 r8:85f055ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1175.018251][ T30] r4:85f05580 [ 1175.018424][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.018737][ T30] r10:00000000 r9:85f05580 r8:80278fec r7:ea8d1e60 r6:85f05400 r5:8615d400 [ 1175.018934][ T30] r4:00000001 [ 1175.019072][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.019379][ T30] Exception stack(0xeaa31fb0 to 0xeaa31ff8) [ 1175.019613][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1175.019875][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.020061][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.020255][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.020412][ T30] r4:86092c40 [ 1175.021342][ T30] INFO: task kworker/0:181:7889 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1175.021518][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.047949][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.049595][ T30] Call trace: [ 1175.051729][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1175.053847][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1175.055600][ T30] r4:00000000 [ 1175.056438][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1175.058039][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1175.060881][ T30] 1d20: a3109000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1175.062689][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1175.064529][ T30] 1d60: 80010013 ffffffff [ 1175.065674][ T30] r5:80010013 r4:80239c10 [ 1175.066845][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1175.068857][ T30] r4:82acb1e4 [ 1175.069791][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1175.071642][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1175.073458][ T30] r4:ea7b1dc0 [ 1175.074546][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.076565][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1175.078318][ T30] r4:00000000 [ 1175.079333][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.081265][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1175.082799][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.084369][ T30] r5:00001000 r4:ea8cd000 [ 1175.085387][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.087224][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.089113][ T30] r5:862c138c r4:86477680 [ 1175.090006][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.091791][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1175.093434][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.096006][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1175.097533][ T30] r4:86477680 [ 1175.098452][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.100864][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1175.102486][ T30] r4:00000001 [ 1175.103737][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.105623][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1175.107376][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1175.108519][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.109834][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.113263][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.115542][ T30] r4:86478700 [ 1175.117484][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1175.121452][ T30] INFO: task kworker/0:182:7894 blocked for more than 432 seconds. [ 1175.123632][ T30] Not tainted syzkaller #0 [ 1175.124589][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1175.125873][ T30] task:kworker/0:182 state:D stack:0 pid:7894 tgid:7894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.129186][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.131278][ T30] Call trace: [ 1175.132262][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1175.133332][ T30] r10:eabf5d84 r9:00000002 r8:60000113 r7:829171a0 r6:eabf5d8c r5:865cbc00 [ 1175.134171][ T30] r4:865cbc00 [ 1175.134768][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1175.135929][ T30] r5:865cbc00 r4:8291719c [ 1175.136556][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1175.137668][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1175.138624][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 [ 1175.139592][ T30] r4:00000000 [ 1175.140168][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1175.141627][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1175.142548][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.143452][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:863d83c0 [ 1175.144570][ T30] r4:00000000 [ 1175.145238][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.146517][ T30] r9:83018405 r8:865cbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f276000 [ 1175.148993][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.150708][ T30] r5:00001000 r4:eac73000 [ 1175.151763][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.153155][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.154269][ T30] r5:86358b8c r4:85f05680 [ 1175.155004][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.155992][ T30] r7:dddcfd80 r6:83018400 r5:86358b8c r4:85f05680 [ 1175.156840][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.158141][ T30] r10:61c88647 r9:865cbc00 r8:85f056ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1175.159289][ T30] r4:85f05680 [ 1175.160206][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.162140][ T30] r10:00000000 r9:85f05680 r8:80278fec r7:ea8d1e60 r6:85f05700 r5:865cbc00 [ 1175.164016][ T30] r4:00000001 [ 1175.165312][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.168127][ T30] Exception stack(0xeabf5fb0 to 0xeabf5ff8) [ 1175.169880][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1175.172042][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.173615][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.174587][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.175708][ T30] r4:86219640 [ 1175.177228][ T30] INFO: task kworker/0:182:7894 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1175.178305][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.181592][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.183535][ T30] Call trace: [ 1175.184788][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1175.186356][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1175.188259][ T30] r4:00000000 [ 1175.189100][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1175.191857][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1175.193131][ T30] 1d20: a3113000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1175.195142][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1175.197001][ T30] 1d60: 80010013 ffffffff [ 1175.198133][ T30] r5:80010013 r4:80239c10 [ 1175.199247][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1175.201604][ T30] r4:82acb1e4 [ 1175.202553][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1175.204497][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1175.206724][ T30] r4:ea7b1dc0 [ 1175.207860][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.209802][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1175.211161][ T30] r4:00000000 [ 1175.211924][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.213745][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1175.215595][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.217499][ T30] r5:00001000 r4:ea8cd000 [ 1175.218592][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.220072][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.222248][ T30] r5:862c138c r4:86477680 [ 1175.223585][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.225602][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1175.227165][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.229206][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1175.231433][ T30] r4:86477680 [ 1175.232464][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.234904][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1175.236164][ T30] r4:00000001 [ 1175.236664][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.237280][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1175.237829][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1175.239374][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.241069][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.242388][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.243467][ T30] r4:86478700 [ 1175.244218][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1175.245351][ T30] INFO: task kworker/0:184:7906 blocked for more than 432 seconds. [ 1175.246501][ T30] Not tainted syzkaller #0 [ 1175.247820][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1175.249599][ T30] task:kworker/0:184 state:D stack:0 pid:7906 tgid:7906 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.252861][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.255818][ T30] Call trace: [ 1175.257832][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1175.258892][ T30] r10:eac91d84 r9:00000002 r8:60000013 r7:829171a0 r6:eac91d8c r5:86832400 [ 1175.261352][ T30] r4:86832400 [ 1175.262783][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1175.265020][ T30] r5:86832400 r4:8291719c [ 1175.266784][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1175.270252][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1175.274845][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 [ 1175.277564][ T30] r4:00000000 [ 1175.278691][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1175.279859][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1175.280889][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.281698][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f5a800 [ 1175.283981][ T30] r4:00000000 [ 1175.284702][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.286043][ T30] r9:83018405 r8:86832400 r7:00000000 r6:83018400 r5:00001000 r4:7f278000 [ 1175.287612][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.289673][ T30] r5:00001000 r4:eacb7000 [ 1175.291251][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.293298][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.295559][ T30] r5:863be38c r4:85f05c80 [ 1175.296689][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.298745][ T30] r7:dddcfd80 r6:83018400 r5:863be38c r4:85f05c80 [ 1175.300845][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.303247][ T30] r10:61c88647 r9:86832400 r8:85f05cac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1175.305405][ T30] r4:85f05c80 [ 1175.306498][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.308600][ T30] r10:00000000 r9:85f05c80 r8:80278fec r7:eac4de60 r6:85f05100 r5:86832400 [ 1175.310135][ T30] r4:00000001 [ 1175.311393][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.316145][ T30] Exception stack(0xeac91fb0 to 0xeac91ff8) [ 1175.317139][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1175.317944][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.319211][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.320702][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.322439][ T30] r4:8640d440 [ 1175.323965][ T30] INFO: task kworker/0:184:7906 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1175.326033][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.329043][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.331715][ T30] Call trace: [ 1175.334691][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1175.337731][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1175.341022][ T30] r4:00000000 [ 1175.342328][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1175.346378][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1175.347955][ T30] 1d20: a3134000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1175.349317][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1175.351869][ T30] 1d60: 80010013 ffffffff [ 1175.353280][ T30] r5:80010013 r4:80239c10 [ 1175.354736][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1175.357582][ T30] r4:82acb1e4 [ 1175.358583][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1175.360035][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1175.365917][ T30] r4:ea7b1dc0 [ 1175.370924][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.373100][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1175.375306][ T30] r4:00000000 [ 1175.376559][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.378622][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1175.380938][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.383504][ T30] r5:00001000 r4:ea8cd000 [ 1175.385010][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.387556][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.389730][ T30] r5:862c138c r4:86477680 [ 1175.391268][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.393730][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1175.395459][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.397918][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1175.400020][ T30] r4:86477680 [ 1175.401341][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.403547][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1175.404912][ T30] r4:00000001 [ 1175.406068][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.408004][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1175.409237][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1175.411585][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.413555][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.415377][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.417375][ T30] r4:86478700 [ 1175.418602][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1175.421086][ T30] INFO: task kworker/0:185:7910 blocked for more than 433 seconds. [ 1175.422577][ T30] Not tainted syzkaller #0 [ 1175.423675][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1175.426085][ T30] task:kworker/0:185 state:D stack:0 pid:7910 tgid:7910 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.429181][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.431587][ T30] Call trace: [ 1175.433254][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1175.435147][ T30] r10:eacb5d84 r9:00000002 r8:60000113 r7:829171a0 r6:eacb5d8c r5:857c8000 [ 1175.437253][ T30] r4:857c8000 [ 1175.438533][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1175.441063][ T30] r5:857c8000 r4:8291719c [ 1175.442288][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1175.444753][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1175.447018][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 [ 1175.449256][ T30] r4:00000000 [ 1175.450811][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1175.453037][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1175.455355][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.457375][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86494440 [ 1175.459370][ T30] r4:00000000 [ 1175.460724][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.463008][ T30] r9:83018405 r8:857c8000 r7:00000000 r6:83018400 r5:00001000 r4:7f27a000 [ 1175.465102][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.467177][ T30] r5:00001000 r4:eacdb000 [ 1175.469072][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.472224][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.474788][ T30] r5:862c878c r4:85f05280 [ 1175.475908][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.477856][ T30] r7:dddcfd80 r6:83018400 r5:862c878c r4:85f05280 [ 1175.478893][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.481069][ T30] r10:61c88647 r9:857c8000 r8:85f052ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1175.483338][ T30] r4:85f05280 [ 1175.484586][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.486782][ T30] r10:00000000 r9:85f05280 r8:80278fec r7:eac4de60 r6:85f05900 r5:857c8000 [ 1175.488967][ T30] r4:00000001 [ 1175.489997][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.492115][ T30] Exception stack(0xeacb5fb0 to 0xeacb5ff8) [ 1175.493883][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1175.495926][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.497986][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.499924][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.502219][ T30] r4:85f71340 [ 1175.504266][ T30] INFO: task kworker/0:185:7910 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1175.507248][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.512175][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.514891][ T30] Call trace: [ 1175.515743][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1175.516062][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1175.516283][ T30] r4:00000000 [ 1175.516494][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1175.516789][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1175.517005][ T30] 1d20: a3519000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1175.517212][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1175.517458][ T30] 1d60: 80010013 ffffffff [ 1175.517672][ T30] r5:80010013 r4:80239c10 [ 1175.517910][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1175.518214][ T30] r4:82acb1e4 [ 1175.518476][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1175.518750][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1175.518946][ T30] r4:ea7b1dc0 [ 1175.519185][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.519713][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1175.519984][ T30] r4:00000000 [ 1175.520164][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.549803][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1175.552106][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.554324][ T30] r5:00001000 r4:ea8cd000 [ 1175.555529][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.557464][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.559147][ T30] r5:862c138c r4:86477680 [ 1175.560716][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.563244][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1175.565196][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.567637][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1175.569570][ T30] r4:86477680 [ 1175.571286][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.572565][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1175.575013][ T30] r4:00000001 [ 1175.576130][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.578263][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1175.579854][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1175.582179][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.583824][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.585114][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.586858][ T30] r4:86478700 [ 1175.587800][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1175.589668][ T30] INFO: task kworker/0:186:7915 blocked for more than 433 seconds. [ 1175.592801][ T30] Not tainted syzkaller #0 [ 1175.594196][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1175.595230][ T30] task:kworker/0:186 state:D stack:0 pid:7915 tgid:7915 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.596628][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.597740][ T30] Call trace: [ 1175.598682][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1175.599679][ T30] r10:ead09d84 r9:00000002 r8:60000013 r7:829171a0 r6:ead09d8c r5:857c9800 [ 1175.601495][ T30] r4:857c9800 [ 1175.602565][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1175.604604][ T30] r5:857c9800 r4:8291719c [ 1175.605786][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1175.607854][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1175.610910][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08 [ 1175.612230][ T30] r4:00000000 [ 1175.612922][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1175.614999][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1175.616801][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.618774][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7e0c0 [ 1175.621194][ T30] r4:00000000 [ 1175.622349][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.624304][ T30] r9:83018405 r8:857c9800 r7:00000000 r6:83018400 r5:00001000 r4:7f27e000 [ 1175.626199][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.628494][ T30] r5:00001000 r4:ead1f000 [ 1175.629523][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.631790][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.634060][ T30] r5:863bd78c r4:85f05d00 [ 1175.635266][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.637578][ T30] r7:dddcfd80 r6:83018400 r5:863bd78c r4:85f05d00 [ 1175.639071][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.641453][ T30] r10:61c88647 r9:857c9800 r8:85f05d2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1175.643238][ T30] r4:85f05d00 [ 1175.644330][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.646481][ T30] r10:00000000 r9:85f05d00 r8:80278fec r7:eac4de60 r6:85f05b80 r5:857c9800 [ 1175.648164][ T30] r4:00000001 [ 1175.649189][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.651566][ T30] Exception stack(0xead09fb0 to 0xead09ff8) [ 1175.652792][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1175.654848][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.656819][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.658572][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.660887][ T30] r4:86494040 [ 1175.687483][ T30] INFO: task kworker/0:186:7915 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1175.689681][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.694369][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.697672][ T30] Call trace: [ 1175.701012][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1175.703935][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1175.706967][ T30] r4:00000000 [ 1175.708934][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1175.711844][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1175.714554][ T30] 1d20: a3525000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1175.717919][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1175.721842][ T30] 1d60: 80010013 ffffffff [ 1175.724737][ T30] r5:80010013 r4:80239c10 [ 1175.726537][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1175.729721][ T30] r4:82acb1e4 [ 1175.731431][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1175.735181][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1175.737922][ T30] r4:ea7b1dc0 [ 1175.737984][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.738120][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1175.738147][ T30] r4:00000000 [ 1175.738164][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.738234][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1175.738254][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.738322][ T30] r5:00001000 r4:ea8cd000 [ 1175.738346][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.738407][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.738472][ T30] r5:862c138c r4:86477680 [ 1175.738492][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.738568][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1175.738591][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.738668][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1175.738691][ T30] r4:86477680 [ 1175.738708][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.738772][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1175.738794][ T30] r4:00000001 [ 1175.738811][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.738859][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1175.738897][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1175.738933][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.738961][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.738997][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.739017][ T30] r4:86478700 [ 1175.739040][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1175.739253][ T30] INFO: task kworker/0:187:7917 blocked for more than 433 seconds. [ 1175.739304][ T30] Not tainted syzkaller #0 [ 1175.739340][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1175.739357][ T30] task:kworker/0:187 state:D stack:0 pid:7917 tgid:7917 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.739433][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.739489][ T30] Call trace: [ 1175.739521][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1175.739765][ T30] r10:eacd9d84 r9:00000002 r8:60000113 r7:829171a0 r6:eacd9d8c r5:857ca400 [ 1175.739799][ T30] r4:857ca400 [ 1175.739818][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1175.739883][ T30] r5:857ca400 r4:8291719c [ 1175.739902][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1175.739989][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1175.740095][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 [ 1175.740123][ T30] r4:00000000 [ 1175.740142][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1175.740201][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1175.812377][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.815085][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86494600 [ 1175.817763][ T30] r4:00000000 [ 1175.818408][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.819527][ T30] r9:83018405 r8:857ca400 r7:00000000 r6:83018400 r5:00001000 r4:7f27c000 [ 1175.820800][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.822050][ T30] r5:00001000 r4:eace1000 [ 1175.823318][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.825121][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.827253][ T30] r5:862cb38c r4:85f05200 [ 1175.828685][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.829970][ T30] r7:dddcfd80 r6:83018400 r5:862cb38c r4:85f05200 [ 1175.831100][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.831954][ T30] r10:61c88647 r9:857ca400 r8:85f0522c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1175.833229][ T30] r4:85f05200 [ 1175.833713][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.834711][ T30] r10:00000000 r9:85f05200 r8:80278fec r7:eac4de60 r6:85f05b00 r5:857ca400 [ 1175.836291][ T30] r4:00000001 [ 1175.837295][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.839451][ T30] Exception stack(0xeacd9fb0 to 0xeacd9ff8) [ 1175.841074][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1175.841877][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.842951][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.844623][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.846837][ T30] r4:85c7e300 [ 1175.848798][ T30] INFO: task kworker/0:187:7917 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1175.851615][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.855350][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.857506][ T30] Call trace: [ 1175.858975][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1175.861523][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1175.863692][ T30] r4:00000000 [ 1175.864927][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1175.866804][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1175.868578][ T30] 1d20: a3a16000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1175.871277][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1175.877396][ T30] 1d60: 80010013 ffffffff [ 1175.878656][ T30] r5:80010013 r4:80239c10 [ 1175.880054][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1175.882934][ T30] r4:82acb1e4 [ 1175.884000][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1175.886265][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1175.888390][ T30] r4:ea7b1dc0 [ 1175.889619][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.891631][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1175.893278][ T30] r4:00000000 [ 1175.894376][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.896396][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1175.898295][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.900839][ T30] r5:00001000 r4:ea8cd000 [ 1175.902635][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.904811][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.906859][ T30] r5:862c138c r4:86477680 [ 1175.908087][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.911854][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1175.913411][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.915907][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1175.918439][ T30] r4:86477680 [ 1175.919577][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.921615][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1175.923558][ T30] r4:00000001 [ 1175.924637][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.926636][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1175.927544][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1175.928775][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.929890][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.932398][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.932583][ T30] r4:86478700 [ 1175.932716][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1175.932945][ T30] INFO: task kworker/0:188:7918 blocked for more than 433 seconds. [ 1175.936099][ T30] Not tainted syzkaller #0 [ 1175.936855][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1175.938406][ T30] task:kworker/0:188 state:D stack:0 pid:7918 tgid:7918 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.941158][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.942130][ T30] Call trace: [ 1175.944195][ T30] [<81a643dc>] (__schedule) from [<81a65370>] (schedule+0x2c/0x130) [ 1175.945946][ T30] r10:ead45d84 r9:00000002 r8:60000113 r7:829171a0 r6:ead45d8c r5:857cbc00 [ 1175.947199][ T30] r4:857cbc00 [ 1175.948441][ T30] [<81a65344>] (schedule) from [<81a65758>] (schedule_preempt_disabled+0x18/0x24) [ 1175.950066][ T30] r5:857cbc00 r4:8291719c [ 1175.951464][ T30] [<81a65740>] (schedule_preempt_disabled) from [<81a68308>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1175.952807][ T30] [<81a67fb8>] (__mutex_lock.constprop.0) from [<81a68ab0>] (__mutex_lock_slowpath+0x14/0x18) [ 1175.954403][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 [ 1175.954567][ T30] r4:00000000 [ 1175.954740][ T30] [<81a68a9c>] (__mutex_lock_slowpath) from [<81a68af0>] (mutex_lock+0x3c/0x40) [ 1175.954919][ T30] [<81a68ab4>] (mutex_lock) from [<804ea30c>] (_vm_unmap_aliases+0x68/0x240) [ 1175.955063][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.955529][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:864815c0 [ 1175.955706][ T30] r4:00000000 [ 1175.955801][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.955995][ T30] r9:83018405 r8:857cbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f280000 [ 1175.956176][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.956374][ T30] r5:00001000 r4:ead4d000 [ 1175.956534][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.956725][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.956934][ T30] r5:863bf38c r4:85f05500 [ 1175.957083][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.957297][ T30] r7:dddcfd80 r6:83018400 r5:863bf38c r4:85f05500 [ 1175.957479][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.957701][ T30] r10:61c88647 r9:857cbc00 r8:85f0552c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1175.957867][ T30] r4:85f05500 [ 1175.958013][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.958223][ T30] r10:00000000 r9:85f05500 r8:80278fec r7:eac4de60 r6:85f05e00 r5:857cbc00 [ 1175.958397][ T30] r4:00000001 [ 1175.958561][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.958747][ T30] Exception stack(0xead45fb0 to 0xead45ff8) [ 1175.958894][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1175.959124][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.959334][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1175.959517][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1175.959722][ T30] r4:85c7e6c0 [ 1175.976182][ T30] INFO: task kworker/0:188:7918 is blocked on a mutex likely owned by task kworker/1:136:7726. [ 1175.978128][ T30] task:kworker/1:136 state:R running task stack:0 pid:7726 tgid:7726 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1175.982962][ T30] Workqueue: events bpf_prog_free_deferred [ 1175.984512][ T30] Call trace: [ 1175.985365][ T30] [<81a643dc>] (__schedule) from [<81a657a4>] (preempt_schedule_irq+0x40/0xa8) [ 1175.987167][ T30] r10:8280c9b4 r9:864e5400 r8:80200c04 r7:ea7b1d54 r6:ffffffff r5:864e5400 [ 1175.991982][ T30] r4:00000000 [ 1175.992204][ T30] [<81a65764>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1175.992906][ T30] Exception stack(0xea7b1d20 to 0xea7b1d68) [ 1175.993093][ T30] 1d20: a3a1f000 ebf29000 00000001 80239bf8 7f22e000 00000001 82acb1c4 82aca5a0 [ 1175.993337][ T30] 1d40: 7f22e000 ebf29000 8280c9b4 ea7b1d9c ea7b1da0 ea7b1d70 80230af0 80239c10 [ 1175.993509][ T30] 1d60: 80010013 ffffffff [ 1175.993734][ T30] r5:80010013 r4:80239c10 [ 1175.993866][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0d0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1175.994165][ T30] r4:82acb1e4 [ 1175.994347][ T30] [<804e9e4c>] (__purge_vmap_area_lazy) from [<804ea488>] (_vm_unmap_aliases+0x1e4/0x240) [ 1175.994603][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea7b1dc0 r5:ea7b1e08 [ 1175.994833][ T30] r4:ea7b1dc0 [ 1175.995025][ T30] [<804ea2a4>] (_vm_unmap_aliases) from [<804ee0ec>] (vfree+0x16c/0x210) [ 1175.995270][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86481b40 [ 1175.995578][ T30] r4:00000000 [ 1175.995720][ T30] [<804edf80>] (vfree) from [<80559038>] (execmem_free+0x30/0x50) [ 1175.996125][ T30] r9:83018605 r8:864e5400 r7:00000000 r6:83018600 r5:00001000 r4:7f258000 [ 1175.996346][ T30] [<80559008>] (execmem_free) from [<803c5fa0>] (bpf_jit_free_exec+0x10/0x14) [ 1175.996644][ T30] r5:00001000 r4:ea8cd000 [ 1175.996808][ T30] [<803c5f90>] (bpf_jit_free_exec) from [<803c6380>] (bpf_jit_free+0x68/0xe4) [ 1175.996974][ T30] [<803c6318>] (bpf_jit_free) from [<803c7428>] (bpf_prog_free_deferred+0x140/0x158) [ 1175.997140][ T30] r5:862c138c r4:86477680 [ 1175.997260][ T30] [<803c72e8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1175.997448][ T30] r7:ddde3d80 r6:83018600 r5:862c138c r4:86477680 [ 1175.997611][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1175.997972][ T30] r10:61c88647 r9:864e5400 r8:864776ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1175.998193][ T30] r4:86477680 [ 1175.998415][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1175.998709][ T30] r10:00000000 r9:86477680 r8:80278fec r7:eb805e60 r6:86477d00 r5:864e5400 [ 1175.998877][ T30] r4:00000001 [ 1175.999045][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1175.999335][ T30] Exception stack(0xea7b1fb0 to 0xea7b1ff8) [ 1175.999582][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1175.999804][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1175.999994][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1176.000323][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1176.000492][ T30] r4:86478700 [ 1176.000630][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1176.047043][ T30] NMI backtrace for cpu 0 [ 1176.047847][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 1176.048069][ T30] Hardware name: ARM-Versatile Express [ 1176.048240][ T30] Call trace: [ 1176.048355][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1176.048481][ T30] r7:00000000 r6:00000013 r5:60000093 r4:82252738 [ 1176.048503][ T30] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1176.048644][ T30] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1176.048770][ T30] r5:00000000 r4:00000001 [ 1176.048804][ T30] [<8021f904>] (dump_stack) from [<81a4dff4>] (nmi_cpu_backtrace+0x160/0x17c) [ 1176.048868][ T30] [<81a4de94>] (nmi_cpu_backtrace) from [<81a4e140>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 1176.048958][ T30] r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [ 1176.048978][ T30] [<81a4e010>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 1176.049127][ T30] r9:8281ba28 r8:8280c810 r7:00015622 r6:00007d53 r5:82abf7d4 r4:8411390c [ 1176.049149][ T30] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf8>] (watchdog+0x5d0/0x850) [ 1176.049260][ T30] [<8037f528>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 1176.049434][ T30] r10:00000000 r9:00000000 r8:8037f528 r7:830d5900 r6:830d5900 r5:8321ec00 [ 1176.049461][ T30] r4:00000001 [ 1176.049480][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1176.049586][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 1176.049687][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1176.049733][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1176.049817][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1176.049915][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1176.049999][ T30] r4:832cff00 [ 1176.051065][ T30] Sending NMI from CPU 0 to CPUs 1: [ 1176.051807][ C1] NMI backtrace for cpu 1 [ 1176.052143][ C1] CPU: 1 UID: 0 PID: 3097 Comm: syz-executor Not tainted syzkaller #0 PREEMPT [ 1176.052222][ C1] Hardware name: ARM-Versatile Express [ 1176.052285][ C1] PC is at selinux_socket_recvmsg+0x18/0x1c [ 1176.052382][ C1] LR is at avc_has_perm_noaudit+0xc8/0x158 [ 1176.052440][ C1] pc : [<807a4e78>] lr : [<8079e8e8>] psr: 60000013 [ 1176.052484][ C1] sp : df965e10 ip : 00000000 fp : df965e1c [ 1176.052532][ C1] r10: 00000001 r9 : 00004004 r8 : 807a4e60 [ 1176.052577][ C1] r7 : 00000040 r6 : 00000004 r5 : df965e68 r4 : 837a7900 [ 1176.052623][ C1] r3 : 8414bc00 r2 : 00000000 r1 : 00000000 r0 : 00000000 [ 1176.052749][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1176.052822][ C1] Control: 30c5387d Table: 84d4ac80 DAC: 00000000 [ 1176.052890][ C1] Call trace: [ 1176.052935][ C1] [<807a4e60>] (selinux_socket_recvmsg) from [<8079771c>] (security_socket_recvmsg+0x204/0x210) [ 1176.053002][ C1] [<80797518>] (security_socket_recvmsg) from [<81556910>] (sock_recvmsg+0x24/0x78) [ 1176.053083][ C1] r9:00004004 r8:7ecd26fc r7:00000040 r6:837a7900 r5:df965e68 r4:df965ef0 [ 1176.053105][ C1] [<815568ec>] (sock_recvmsg) from [<81556a08>] (sock_read_iter+0xa4/0xfc) [ 1176.053173][ C1] r7:837a7900 r6:8485fc00 r5:df965f08 r4:df965ef0 [ 1176.053191][ C1] [<81556964>] (sock_read_iter) from [<8055f888>] (vfs_read+0x2fc/0x324) [ 1176.053266][ C1] r7:00000000 r6:8414bc00 r5:00000004 r4:8485fc00 [ 1176.053286][ C1] [<8055f58c>] (vfs_read) from [<80560388>] (ksys_read+0xc8/0xe8) [ 1176.053363][ C1] r10:00000003 r9:8414bc00 r8:8020029c r7:00000004 r6:7ecd26fc r5:8485fc00 [ 1176.053385][ C1] r4:8485fc00 [ 1176.053401][ C1] [<805602c0>] (ksys_read) from [<805603b8>] (sys_read+0x10/0x14) [ 1176.053536][ C1] r7:00000003 r6:00000000 r5:00000000 r4:7ecd2770 [ 1176.053558][ C1] [<805603a8>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1176.053617][ C1] Exception stack(0xdf965fa8 to 0xdf965ff0) [ 1176.053662][ C1] 5fa0: 7ecd2770 00000000 00000003 7ecd26fc 00000004 00000001 [ 1176.053702][ C1] 5fc0: 7ecd2770 00000000 00000000 00000003 00000004 7ecd26fc 7ecd278c 7ecd2770 [ 1176.053735][ C1] 5fe0: 00000158 7ecd26d8 000357a8 00130800 [ 1176.136886][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 1176.139254][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 1176.140545][ T30] Hardware name: ARM-Versatile Express [ 1176.140966][ T30] Call trace: [ 1176.141253][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1176.142718][ T30] r7:8225345c r6:8321ec00 r5:00000000 r4:82252738 [ 1176.143587][ T30] [<80201b08>] (show_stack) from [<8021f8dc>] (dump_stack_lvl+0x54/0x7c) [ 1176.144405][ T30] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1176.144735][ T30] r5:00000000 r4:82a78d18 [ 1176.144917][ T30] [<8021f904>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 1176.145654][ T30] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 1176.146623][ T30] r7:00015622 [ 1176.147002][ T30] [<80202800>] (panic) from [<8037f938>] (watchdog+0x410/0x850) [ 1176.148028][ T30] r3:00000001 r2:00000000 r1:00000000 r0:8225345c [ 1176.148735][ T30] [<8037f528>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 1176.149478][ T30] r10:00000000 r9:00000000 r8:8037f528 r7:830d5900 r6:830d5900 r5:8321ec00 [ 1176.150541][ T30] r4:00000001 [ 1176.150713][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1176.151075][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 1176.151876][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1176.152742][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1176.153764][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1176.154521][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1176.155010][ T30] r4:832cff00 [ 1176.157086][ T30] Rebooting in 86400 seconds..