last executing test programs: 7m37.671654626s ago: executing program 1 (id=305): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7b, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000002240)="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", 0xb0a, 0x4004085, 0x0, 0x0) 7m36.941877945s ago: executing program 1 (id=307): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='kfree\x00', r2, 0x0, 0xbc3}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0x8}}, 0x20) close(r0) 7m36.444043299s ago: executing program 1 (id=309): r0 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000580)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) r2 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3380, 0x1, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_setup(0x10a, &(0x7f0000000680)={0x0, 0x80334c, 0x10, 0x3, 0x3d3}, &(0x7f0000000200)=0x0, &(0x7f0000000300)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x1, 0x7}) write$UHID_CREATE2(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="06"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r6, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x60, 0x185100, 0x23456}) io_uring_enter(r2, 0x627, 0xc1040000, 0x43, 0x0, 0x0) io_uring_enter(r0, 0x6e2, 0x3900, 0x43, 0x0, 0x0) 7m33.553265152s ago: executing program 1 (id=314): unshare(0x22020600) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = open_tree(0xffffffffffffff9c, 0x0, 0x89801) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socket$nl_netfilter(0x10, 0x3, 0xc) renameat2(r2, 0x0, r2, 0x0, 0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000003c0)={0x70002004}) 7m32.911689104s ago: executing program 1 (id=316): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="270e28bd70000000000004"], 0x14}, 0x1, 0x40030000000000}, 0x4000) 7m32.162434325s ago: executing program 1 (id=318): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000001a0000000c00018008000100", @ANYRES32=r4], 0x20}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 6m46.733469761s ago: executing program 32 (id=318): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000001a0000000c00018008000100", @ANYRES32=r4], 0x20}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 5m57.702221339s ago: executing program 0 (id=433): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x7, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000001000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000006c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) getpgrp(0x0) 5m57.512961311s ago: executing program 0 (id=434): ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000002480)=0x3) close(0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r3) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x305200, 0x0) close(r5) r6 = socket$unix(0x1, 0x2, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0x0, 0xb}, {0xffff, 0xffff}, {0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xa, 0x7f61, 0x1, 0xc5, 0xe23, 0x3, 0x1, 0x7fff, 0x1}}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008001}, 0x60000) sendmsg$nl_route_sched(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x80000, {0x0, 0x0, 0x0, r8, {0x0, 0x9}, {0xffe6, 0xb}, {0x6, 0xd}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x0, 0x1, 0x406, 0x0, 0xffffffff, 0x9}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004060}, 0x4008000) ioctl$SIOCSIFHWADDR(r5, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r3) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_OCB(r3, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)={0x48, r9, 0x400, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r10}, @val={0xc, 0x99, {0xff, 0x2e}}}}, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x161c}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4524}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x30}]}, 0x48}, 0x1, 0x0, 0x0, 0x8044804}, 0x800) r11 = syz_open_dev$usbfs(&(0x7f0000000040), 0x12, 0x80801) ioctl$USBDEVFS_CONTROL(r11, 0xc0185500, &(0x7f0000000080)={0x0, 0x1, 0xd, 0x8, 0x0, 0xfffffff7, 0x0}) 5m55.692367793s ago: executing program 0 (id=441): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r1, 0x0, 0xffff}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000080)=0x654a, 0x4) bind$inet(r2, &(0x7f0000000200)={0x2, 0x0, @local}, 0x6b) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) 5m52.386286924s ago: executing program 0 (id=444): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$sysfs(0xffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 5m51.883737958s ago: executing program 0 (id=445): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001100)=@newsa={0x154, 0x10, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in=@private, 0x0, 0xecdf}, {@in=@broadcast, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, {0x0, 0x800}, {}, 0xffffffff, 0x0, 0x2, 0x2, 0x0, 0xcd}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x70bd2a}}]}, 0x154}}, 0x4050) 5m51.69965142s ago: executing program 0 (id=446): unshare(0x6a040000) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000100000000000a20000000000a01010000000000000000010000000900010073797a300000000068000000090a010400000000000000000100000008000a4000000000200011800e000100636f6e6e6c696d69740000000c00028008000140000000000900010073797a30000000000900020073797a3200000000080005400000001f0c000980080001400037"], 0xb0}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000440)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002dbd7000fedbdf252c000000180001801400020064756d6d7930"], 0x2c}, 0x1, 0x0, 0x0, 0x20048881}, 0x2000c800) openat$selinux_policy(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) 5m6.362076191s ago: executing program 33 (id=446): unshare(0x6a040000) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000100000000000a20000000000a01010000000000000000010000000900010073797a300000000068000000090a010400000000000000000100000008000a4000000000200011800e000100636f6e6e6c696d69740000000c00028008000140000000000900010073797a30000000000900020073797a3200000000080005400000001f0c000980080001400037"], 0xb0}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc0200000000000000ae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fc40848228567ffb400000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df2624f56da648d28ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71400fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada10eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff00000000000f000000ef0000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18aba6b16455a66c3b84b138efc20a546d3d5227e23b03f2a834391ade2ff3e93ee296c4082ee73e7c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0847a1ff2f7fc3c2b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f05c7f0be31491eb8c9ff68236c8600040000000000000000000066e034c81c3cab64e4fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f224baf1221c15fa12313ffbfa7c2730309f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca205081173bd03c4754fc4674812daab482fd390a1c903b5d28a1eb247b5837d7603b92495d5c569f6433c3fca5206cb0000003fdbbd3892c52c2e7612e05de32322e980a3d69931e2c9312dd517c96f2ee90362476ed853c4c9b7d4ebf13cbaa795860e92a3d7d004f2c491db38eb769f094d5d48b262cc35c40682138cf13a49aa9f27abec00002f01ba1251aaf2385416ca719300"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000440)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002dbd7000fedbdf252c000000180001801400020064756d6d7930"], 0x2c}, 0x1, 0x0, 0x0, 0x20048881}, 0x2000c800) openat$selinux_policy(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) 3m30.714116484s ago: executing program 3 (id=643): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/current\x00') write$cgroup_subtree(r2, 0x0, 0x4c) 3m30.133123863s ago: executing program 3 (id=644): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff9ce}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000840), 0x81, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a31000000002c0003800800014000000000180003801400010076657468315f746f5f626f6e6400000008000240000000006c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a30000000004000038008000140000000002c0003801400010067656e657665300000000000000000001400010076657468315f746f5f626f6e64000000080002"], 0x10c}}, 0x0) 3m29.481612537s ago: executing program 3 (id=646): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="06000000040000000c00000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008008000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x7, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x1000000000000008}, 0x18) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port1\x00', 0x62, 0x811, 0x0, 0x8000007, 0x3, 0xfffffffe, 0x1, 0x0, 0x7cce8c743ee810dd}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x40505330, &(0x7f00000001c0)={0x800100, 0xfffffffd, 0x22, 0x6, 0x1101, 0x280}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x40505330, &(0x7f0000000500)={0x800000, 0x210002, 0xffffffdd, 0x7fffffff, 0x2, 0x69}) 3m29.113181111s ago: executing program 3 (id=648): sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x4, 0x8001, 0x0, 0x3, 0x200000000002, 0x7, 0x8, 0x3}, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) ftruncate(r0, 0x2007ffb) sendfile(r0, r0, 0x0, 0x1000000201005) 3m28.450808166s ago: executing program 3 (id=649): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0x1ffffffffffffffd}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd2d, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{0x0, 0x300}, 0x93}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {0x0, 0x0, 0x0, 0x0, 0x3000000, 0x40000000}, {0x1, 0x0, 0x0, 0x4000000, 0x7, 0x80000}, {0x8000, 0x5, 0x0, 0xfffffffc, 0x5}, {0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x800000, 0x0, 0x6}, {0x0, 0xc3}, {0x0, 0x5}, {0x5}, {}, {0x800, 0x10}, {0x0, 0x470a, 0x9, 0x8000000}, {}, {0x2, 0x0, 0x0, 0x0, 0x6, 0x6}, {}, {}, {0x0, 0x0, 0x0, 0x1, 0x0, 0xfff}, {0x0, 0x0, 0x0, 0x8000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x20}, {0x101, 0x4, 0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {0x20000}, {}, {0x0, 0x7, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x3}, {0x0, 0x8000, 0x0, 0x0, 0x5}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x60569add}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2b25}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xffffffff, 0x9}, {0x0, 0x0, 0x0, 0x0, 0xfffff800, 0xfffffffd}, {0x3}, {}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0xfffffffd}, {0x1, 0x0, 0x0, 0x0, 0x0, 0x40}, {0x0, 0x9, 0x0, 0xffffffff, 0x80000000, 0x2}, {}, {0x80}, {0x80}, {0x0, 0x0, 0x0, 0x5, 0x5}, {}, {0x0, 0x0, 0x8}, {0x0, 0x2, 0x0, 0x0, 0x9, 0x1}, {0x0, 0x0, 0x7, 0x0, 0x3, 0x4}, {0xfffffffc}, {0x0, 0x5, 0xfff}, {0x0, 0x0, 0x0, 0x8510}, {0xffff, 0x8}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x0, 0xe9b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0xfffefffd}, {0x0, 0x0, 0x0, 0x1}, {}, {0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, {0x0, 0x7}, {0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb}, {0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x9}, {0x0, 0xfffffffc, 0x200}, {0x0, 0x0, 0x0, 0x200}, {0xffffffff}, {0x4}, {}, {0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x101, 0x0, 0xfffffffe, 0x0, 0xffffffff}, {}, {0x3, 0xfffffffe}, {0x0, 0x0, 0x0, 0x4, 0x9}, {}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x7}, {0x0, 0xb}, {0x0, 0x0, 0x0, 0xffffffff}, {}, {0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, {0x0, 0x0, 0x0, 0xec33, 0x0, 0x4}, {}, {0xb, 0x0, 0x0, 0x0, 0x0, 0xfe1}, {0x0, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x0, 0xfffffffc}, {}, {0x0, 0xfffffffd}, {0x6}, {0x7f}, {}, {0x0, 0x8, 0x0, 0x0, 0xfffffffe}, {0x4, 0x2, 0x2000000, 0x2, 0x0, 0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0xe9d, 0x58a}, {0x2}, {0x2, 0x9, 0x20000000}, {0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0xe600, 0x0, 0x0, 0x2}, {0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x101}, {0x0, 0x5, 0x0, 0x7, 0x1}, {0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x80}, {0x10000000, 0x0, 0x0, 0x0, 0x3, 0xfffffffd}, {}, {0xffffffff, 0x0, 0x0, 0x1, 0xfffffffc}, {0x100}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {}, {0x0, 0x0, 0x0, 0x8, 0x6}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, {0xfffffffb, 0x0, 0x0, 0x0, 0x8000}, {0x6, 0xffffffff, 0xfffffffe, 0x0, 0x0, 0xfffffffe}, {0x2d, 0x0, 0x10000}, {0x0, 0x0, 0x8000}, {0x0, 0x8000, 0x0, 0xe}, {0x3, 0x0, 0x10000}, {0x0, 0x80000000, 0x0, 0x7fff800, 0x3}, {0x0, 0x3, 0x0, 0x0, 0x200}, {0xffffffff, 0x0, 0x0, 0x0, 0xd}], [{}, {}, {0x0, 0x1}, {0x1}, {}, {0x3}, {}, {0x0, 0x1}, {}, {}, {0x2}, {}, {}, {}, {0x0, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x1}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x1}, {0x2}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x1}, {}, {0x5}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x2, 0x1}, {}, {}, {}, {}, {0x5, 0x1}, {}, {0x1}, {0x0, 0x1}, {0x2}, {}, {}, {0x5}, {0x3, 0x1}, {}, {}, {0x5}, {}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) 3m28.030018124s ago: executing program 3 (id=650): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = syz_io_uring_setup(0xbc3, &(0x7f0000000100)={0x0, 0x1568, 0x10000, 0x2, 0x285}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x10000000000002a8, 0x8, 0x1, {0x2}}) io_uring_enter(r1, 0x29ab, 0xd480, 0x0, 0x0, 0x0) 2m42.480819869s ago: executing program 34 (id=650): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = syz_io_uring_setup(0xbc3, &(0x7f0000000100)={0x0, 0x1568, 0x10000, 0x2, 0x285}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x10000000000002a8, 0x8, 0x1, {0x2}}) io_uring_enter(r1, 0x29ab, 0xd480, 0x0, 0x0, 0x0) 16.882478621s ago: executing program 2 (id=783): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x5, 0x4f, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000003}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) open$dir(0x0, 0xc402, 0x0) mknodat(r1, 0x0, 0x80, 0xffffff81) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000480)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fsopen(&(0x7f0000000000)='rpc_pipefs\x00', 0x0) 7.058981708s ago: executing program 4 (id=799): r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps_rollup\x00') mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, r0, 0x0) bind$can_j1939(0xffffffffffffffff, &(0x7f0000001140), 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) read$FUSE(r0, &(0x7f00000005c0)={0x2020}, 0x2020) 6.861107602s ago: executing program 4 (id=800): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = syz_io_uring_setup(0x44cd, &(0x7f00000004c0)={0x0, 0x5331, 0x10100, 0x1000006, 0xfffefffe}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='8'], 0x38}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}) io_uring_enter(r0, 0x2d3e, 0xec84, 0x0, 0x0, 0x0) 6.58062136s ago: executing program 4 (id=801): syz_emit_ethernet(0x36, &(0x7f0000000340)={@local, @random="fad1e048716e", @void, {@ipv4={0x800, @udp={{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty, {[@timestamp_addr={0x44, 0xc, 0xa, 0x1, 0x8, [{@remote, 0x4}]}]}}, {0x0, 0x4e20, 0x8}}}}}, 0x0) 6.42918s ago: executing program 4 (id=802): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = getpid() r2 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) getgroups(0x4, &(0x7f0000000380)=[0xee00, 0xee01, 0x0, 0xee00]) sendmmsg$unix(r0, &(0x7f0000003080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[@cred={{0x1c, 0x1, 0x2, {r1, r3, r4}}}], 0x20, 0x4040}}], 0x1, 0x0) 6.191157136s ago: executing program 4 (id=803): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') syz_fuse_handle_req(r0, &(0x7f0000000cc0)="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", 0x2000, &(0x7f0000003ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) 6.021763058s ago: executing program 4 (id=804): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x9, 0x89}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = socket$unix(0x1, 0x5, 0x0) bind$unix(r4, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x2) 4.456012742s ago: executing program 2 (id=805): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(aes))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="b19ccccf84f531d9ec214627c11430c1", 0x10) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000600)=""/124, 0x7c}], 0x1}, 0x102) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000004"], 0x50) io_uring_enter(r2, 0x2219, 0x7721, 0x16, 0x0, 0x0) 3.580902591s ago: executing program 2 (id=806): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000900)='T', 0x1}], 0x1}, 0x4048841) recvmmsg$unix(r0, &(0x7f0000004ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x100, 0x0) 734.70204ms ago: executing program 2 (id=807): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000004000000040000000700000000000000", @ANYRES32, @ANYBLOB="80245aeb1efd3d92000000000000", @ANYRES32=0x0, @ANYRES32], 0x48) 325.786798ms ago: executing program 2 (id=808): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=@allocspi={0x100, 0x16, 0x1, 0x70bd28, 0x25dfdbfb, {{{@in6=@local, @in=@rand_addr=0x64010101, 0x4e23, 0xf, 0x4e23, 0xe, 0xa, 0x20, 0x0, 0x5e}, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d6, 0x6c}, @in=@private=0xa010100, {0x8, 0x4000000000100, 0x5, 0x7, 0x1004, 0xffff, 0x0, 0x10000}, {0x2, 0x9, 0x8, 0x195d}, {0x109, 0x6, 0xfffff800}, 0x70bd25, 0x3505, 0xa, 0x1, 0xda, 0xec}, 0x3, 0x32b}, [@XFRMA_SET_MARK={0x8, 0x1d, 0xef}]}, 0x100}, 0x1, 0x0, 0x0, 0x4004}, 0x24000014) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03000000000000000000020000000900020073797a310000000008000340000000010900010073797a30"], 0x34}}, 0x0) 0s ago: executing program 2 (id=809): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x5, 0x4f, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000003}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) open$dir(0x0, 0xc402, 0x0) mknodat(r1, 0x0, 0x80, 0xffffff81) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000480)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fsopen(&(0x7f0000000000)='rpc_pipefs\x00', 0x0) kernel console output (not intermixed with test programs): t(120.830:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3756 comm="syz.0.17" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 120.977995][ T29] audit: type=1326 audit(120.850:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3756 comm="syz.0.17" exe="/syz-executor" sig=0 arch=40000028 syscall=85 compat=0 ip=0x132320 code=0x7ffc0000 [ 120.978595][ T29] audit: type=1326 audit(120.850:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3756 comm="syz.0.17" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 120.983194][ T29] audit: type=1326 audit(120.850:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3756 comm="syz.0.17" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 125.943930][ T3810] netlink: 'syz.1.20': attribute type 6 has an invalid length. [ 126.398240][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 126.417264][ T29] audit: type=1400 audit(126.270:169): avc: denied { create } for pid=3811 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 126.507057][ T29] audit: type=1400 audit(126.380:170): avc: denied { write } for pid=3811 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 127.609887][ T29] audit: type=1326 audit(127.480:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3816 comm="syz.1.23" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 127.610378][ T29] audit: type=1326 audit(127.480:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3816 comm="syz.1.23" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 127.625046][ T29] audit: type=1326 audit(127.500:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3816 comm="syz.1.23" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132320 code=0x7ffc0000 [ 127.657240][ T29] audit: type=1326 audit(127.530:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3816 comm="syz.1.23" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 127.666419][ T29] audit: type=1326 audit(127.540:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3816 comm="syz.1.23" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 127.673608][ T29] audit: type=1326 audit(127.550:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3816 comm="syz.1.23" exe="/syz-executor" sig=0 arch=40000028 syscall=377 compat=0 ip=0x132320 code=0x7ffc0000 [ 127.692546][ T29] audit: type=1326 audit(127.550:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.1.23" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 127.692974][ T29] audit: type=1326 audit(127.560:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3816 comm="syz.1.23" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 133.061591][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 133.064807][ T29] audit: type=1400 audit(132.930:183): avc: denied { create } for pid=3857 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 133.075823][ T29] audit: type=1400 audit(132.950:184): avc: denied { wake_alarm } for pid=3858 comm="syz.1.36" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 133.084380][ T29] audit: type=1400 audit(132.960:185): avc: denied { getopt } for pid=3857 comm="syz.0.35" lport=13 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 133.824885][ T29] audit: type=1400 audit(133.690:186): avc: denied { watch watch_reads } for pid=3867 comm="gtp" path="/19/file0" dev="tmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 133.918130][ T29] audit: type=1326 audit(133.790:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3867 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 133.938911][ T29] audit: type=1326 audit(133.810:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3867 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=424 compat=0 ip=0x132320 code=0x7ffc0000 [ 133.939682][ T29] audit: type=1326 audit(133.810:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3867 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 133.947563][ T29] audit: type=1326 audit(133.820:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3867 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 134.343761][ T29] audit: type=1400 audit(134.210:191): avc: denied { bind } for pid=3872 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 134.400806][ T29] audit: type=1400 audit(134.270:192): avc: denied { setopt } for pid=3874 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 136.166715][ T3899] netlink: 28 bytes leftover after parsing attributes in process `syz.0.49'. [ 136.176335][ T3899] netlink: 28 bytes leftover after parsing attributes in process `syz.0.49'. [ 137.639910][ T3919] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x4 [ 137.641556][ T3919] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x2 [ 137.648475][ T3919] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x3 [ 137.667914][ T3919] hid-generic 0000:3000000:0000.0001: hidraw0: HID v0.00 Device [sy] on syz0 [ 138.880942][ T3939] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 138.957624][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 138.961174][ T29] audit: type=1400 audit(138.830:197): avc: denied { write } for pid=3938 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.496813][ T29] audit: type=1326 audit(139.370:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3941 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 139.498041][ T29] audit: type=1326 audit(139.370:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3941 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 139.516063][ T29] audit: type=1326 audit(139.390:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3941 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 139.520360][ T29] audit: type=1326 audit(139.390:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3941 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 139.573093][ T29] audit: type=1326 audit(139.410:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3941 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 139.574104][ T29] audit: type=1326 audit(139.430:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3941 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 139.697305][ T29] audit: type=1326 audit(139.550:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3941 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 139.715579][ T29] audit: type=1326 audit(139.580:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3941 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 139.832745][ T29] audit: type=1326 audit(139.610:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3941 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 143.085926][ T3972] netlink: 'syz.1.68': attribute type 10 has an invalid length. [ 143.173895][ T3972] netlink: 'syz.1.68': attribute type 10 has an invalid length. [ 144.007434][ T3989] Zero length message leads to an empty skb [ 144.521016][ T3993] netlink: 196 bytes leftover after parsing attributes in process `syz.0.75'. [ 144.658333][ T3995] Driver unsupported XDP return value 0 on prog (id 52) dev N/A, expect packet loss! [ 144.962785][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 144.965024][ T29] audit: type=1400 audit(144.830:223): avc: denied { getopt } for pid=4001 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 145.986296][ T29] audit: type=1400 audit(145.850:224): avc: denied { nlmsg_read } for pid=4011 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 145.988280][ T29] audit: type=1400 audit(145.860:225): avc: denied { audit_write } for pid=4011 comm="syz.1.82" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 145.989802][ T29] audit: type=1107 audit(145.860:226): pid=4011 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 146.435373][ T4019] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 146.469295][ T29] audit: type=1400 audit(146.330:227): avc: denied { ioctl } for pid=4017 comm=2BB0E740 path="socket:[2582]" dev="sockfs" ino=2582 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 146.957459][ T4019] netlink: 4 bytes leftover after parsing attributes in process `+°ç@'. [ 147.024905][ T4027] netlink: 'syz.0.86': attribute type 2 has an invalid length. [ 147.868033][ T29] audit: type=1326 audit(147.740:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4034 comm="syz.0.89" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 147.873152][ T29] audit: type=1326 audit(147.740:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4034 comm="syz.0.89" exe="/syz-executor" sig=0 arch=40000028 syscall=250 compat=0 ip=0x132320 code=0x7ffc0000 [ 147.875059][ T29] audit: type=1326 audit(147.750:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4034 comm="syz.0.89" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 148.494783][ T4039] netlink: 96 bytes leftover after parsing attributes in process `syz.0.90'. [ 149.494354][ T4046] netlink: 40 bytes leftover after parsing attributes in process `syz.0.93'. [ 149.839715][ T29] audit: type=1400 audit(149.710:231): avc: denied { write } for pid=4048 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 150.213584][ T29] audit: type=1326 audit(150.080:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.0.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 150.233223][ T29] audit: type=1326 audit(150.090:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.0.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 150.242351][ T29] audit: type=1326 audit(150.110:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.0.95" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 150.242887][ T29] audit: type=1326 audit(150.110:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.0.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 150.243183][ T29] audit: type=1326 audit(150.110:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.0.95" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132320 code=0x7ffc0000 [ 150.264913][ T29] audit: type=1326 audit(150.140:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.0.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 150.283725][ T29] audit: type=1326 audit(150.160:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.0.95" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=0 ip=0x132320 code=0x7ffc0000 [ 150.292906][ T29] audit: type=1326 audit(150.160:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.0.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 150.319778][ T29] audit: type=1326 audit(150.180:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.0.95" exe="/syz-executor" sig=0 arch=40000028 syscall=374 compat=0 ip=0x132320 code=0x7ffc0000 [ 151.733347][ T29] audit: type=1326 audit(151.600:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.0.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 155.317349][ T4083] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4083 comm=syz.1.103 [ 156.527920][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 156.530246][ T29] audit: type=1400 audit(156.400:243): avc: denied { load_policy } for pid=4090 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 156.549692][ T4092] SELinux: failed to load policy [ 157.675913][ T29] audit: type=1400 audit(157.550:244): avc: denied { bind } for pid=4108 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 157.699590][ T4109] netlink: 4 bytes leftover after parsing attributes in process `syz.0.112'. [ 157.701374][ T4107] syz.1.111 uses obsolete (PF_INET,SOCK_PACKET) [ 158.583965][ T4115] wg2: entered promiscuous mode [ 158.584579][ T4115] wg2: entered allmulticast mode [ 159.657223][ T4126] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 159.826211][ T4126] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 159.947373][ T4126] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.068998][ T4126] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 160.527778][ T127] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.591268][ T1317] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.637374][ T1317] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 160.692572][ T53] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 161.369705][ T29] audit: type=1400 audit(161.240:245): avc: denied { setcheckreqprot } for pid=4159 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 161.817916][ T29] audit: type=1400 audit(161.690:246): avc: denied { unmount } for pid=4166 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 161.847608][ T29] audit: type=1400 audit(161.720:247): avc: denied { mount } for pid=4166 comm="syz.0.124" name="/" dev="ramfs" ino=2745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 163.888612][ T4182] netlink: 32 bytes leftover after parsing attributes in process `syz.1.128'. [ 164.886668][ T29] audit: type=1326 audit(164.760:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4192 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 164.903323][ T29] audit: type=1326 audit(164.780:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4192 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 164.908673][ T29] audit: type=1326 audit(164.780:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4192 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132320 code=0x7ffc0000 [ 164.913248][ T29] audit: type=1326 audit(164.790:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4192 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 164.933259][ T29] audit: type=1326 audit(164.800:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4192 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 164.933644][ T29] audit: type=1326 audit(164.800:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4192 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 164.934123][ T29] audit: type=1326 audit(164.800:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4192 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 164.939472][ T29] audit: type=1326 audit(164.800:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4192 comm="syz.1.132" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132320 code=0x7ffc0000 [ 165.574987][ T4200] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.687713][ T4200] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.756333][ T4200] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.894073][ T4200] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.150692][ T53] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.245910][ T127] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.383983][ T53] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.405683][ T127] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.584869][ T4223] netlink: 8 bytes leftover after parsing attributes in process `syz.1.137'. [ 167.536221][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 167.536824][ T29] audit: type=1326 audit(167.410:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.136" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132320 code=0x7ffc0000 [ 168.199731][ T29] audit: type=1326 audit(168.070:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.0.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 168.201097][ T29] audit: type=1326 audit(168.070:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.0.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 168.206787][ T29] audit: type=1326 audit(168.080:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.0.145" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 168.256080][ T29] audit: type=1326 audit(168.100:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.0.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 168.299750][ T29] audit: type=1326 audit(168.170:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.0.145" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 168.350379][ T29] audit: type=1326 audit(168.220:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.0.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 168.361575][ T29] audit: type=1326 audit(168.230:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.0.145" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 168.370146][ T29] audit: type=1326 audit(168.240:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.0.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 168.377246][ T29] audit: type=1326 audit(168.240:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.0.145" exe="/syz-executor" sig=0 arch=40000028 syscall=36 compat=0 ip=0x132320 code=0x7ffc0000 [ 170.744613][ T4273] netlink: 96 bytes leftover after parsing attributes in process `syz.0.152'. [ 173.016637][ T4294] mmap: syz.0.158 (4294) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 174.742479][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 174.742999][ T29] audit: type=1400 audit(174.610:291): avc: denied { mount } for pid=4317 comm="syz.0.167" name="/" dev="configfs" ino=1168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 174.766695][ T29] audit: type=1400 audit(174.640:292): avc: denied { search } for pid=4317 comm="syz.0.167" name="/" dev="configfs" ino=1168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 174.788860][ T29] audit: type=1400 audit(174.660:293): avc: denied { search } for pid=4317 comm="syz.0.167" name="/" dev="configfs" ino=1168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 174.789570][ T29] audit: type=1400 audit(174.660:294): avc: denied { read open } for pid=4317 comm="syz.0.167" path="/" dev="configfs" ino=1168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 174.867295][ T29] audit: type=1400 audit(174.740:295): avc: denied { create } for pid=4310 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 174.914778][ T29] audit: type=1400 audit(174.780:296): avc: denied { setopt } for pid=4310 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 174.944400][ T29] audit: type=1400 audit(174.820:297): avc: denied { getopt } for pid=4310 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 175.900821][ T29] audit: type=1326 audit(175.770:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4332 comm="syz.0.172" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 180.173422][ T29] audit: type=1400 audit(180.040:299): avc: denied { write } for pid=4361 comm="syz.1.179" name="vlan0" dev="proc" ino=4026532920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 180.187067][ T29] audit: type=1326 audit(180.060:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4361 comm="syz.1.179" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 182.318672][ T4371] bond0: (slave bond_slave_0): Releasing backup interface [ 182.518988][ T4371] bond0: (slave bond_slave_1): Releasing backup interface [ 182.667557][ T4371] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 187.756311][ T29] audit: type=1400 audit(187.630:301): avc: denied { sqpoll } for pid=4390 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 189.752174][ C1] hrtimer: interrupt took 6808528 ns [ 189.974091][ T29] audit: type=1326 audit(189.830:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.0.194" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 189.979611][ T29] audit: type=1326 audit(189.850:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.0.194" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 190.013095][ T29] audit: type=1326 audit(189.870:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.0.194" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 190.015961][ T29] audit: type=1326 audit(189.870:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.0.194" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 190.019531][ T29] audit: type=1326 audit(189.890:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.0.194" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 190.036532][ T29] audit: type=1326 audit(189.890:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.0.194" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 190.039659][ T29] audit: type=1326 audit(189.910:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.0.194" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 190.051263][ T29] audit: type=1326 audit(189.920:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.0.194" exe="/syz-executor" sig=0 arch=40000028 syscall=219 compat=0 ip=0x132320 code=0x7ffc0000 [ 190.067040][ T29] audit: type=1326 audit(189.940:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.0.194" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 190.294977][ T4416] capability: warning: `syz.0.195' uses deprecated v2 capabilities in a way that may be insecure [ 193.617789][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 193.619280][ T29] audit: type=1400 audit(193.490:312): avc: denied { create } for pid=4443 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 194.936357][ T29] audit: type=1400 audit(194.810:313): avc: denied { create } for pid=4450 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 194.954627][ T29] audit: type=1400 audit(194.830:314): avc: denied { connect } for pid=4450 comm="syz.0.203" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 194.961244][ T29] audit: type=1400 audit(194.830:315): avc: denied { ioctl } for pid=4450 comm="syz.0.203" path="socket:[4168]" dev="sockfs" ino=4168 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 194.985190][ T29] audit: type=1400 audit(194.860:316): avc: denied { write } for pid=4450 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 199.384908][ T3706] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 199.577599][ T3706] usb 1-1: config 0 has an invalid interface number: 130 but max is 0 [ 199.577923][ T3706] usb 1-1: config 0 has no interface number 0 [ 199.581001][ T3706] usb 1-1: config 0 interface 130 altsetting 0 endpoint 0x5 has invalid maxpacket 1007, setting to 64 [ 199.593320][ T3706] usb 1-1: New USB device found, idVendor=06cd, idProduct=0108, bcdDevice=c7.5f [ 199.594388][ T3706] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 199.618572][ T3706] usb 1-1: config 0 descriptor?? [ 199.669451][ T3706] keyspan 1-1:0.130: Keyspan 1 port adapter converter detected [ 199.670401][ T3706] keyspan 1-1:0.130: found no endpoint descriptor for endpoint 87 [ 199.670588][ T3706] keyspan 1-1:0.130: found no endpoint descriptor for endpoint 7 [ 199.684539][ T3706] keyspan 1-1:0.130: found no endpoint descriptor for endpoint 81 [ 199.685499][ T3706] keyspan 1-1:0.130: found no endpoint descriptor for endpoint 1 [ 199.685657][ T3706] keyspan 1-1:0.130: unsupported endpoint type 0 [ 199.686057][ T3706] keyspan 1-1:0.130: found no endpoint descriptor for endpoint 85 [ 199.686155][ T3706] keyspan 1-1:0.130: unsupported endpoint type 0 [ 199.698852][ T3706] usb 1-1: Keyspan 1 port adapter converter now attached to ttyUSB0 [ 200.011024][ T3706] usb 1-1: USB disconnect, device number 2 [ 200.036627][ T3706] keyspan_1 ttyUSB0: Keyspan 1 port adapter converter now disconnected from ttyUSB0 [ 200.041842][ T3706] keyspan 1-1:0.130: device disconnected [ 203.041644][ T29] audit: type=1326 audit(202.910:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4501 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.059182][ T29] audit: type=1326 audit(202.930:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4501 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.067721][ T29] audit: type=1326 audit(202.940:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4501 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.075605][ T29] audit: type=1326 audit(202.950:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4501 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.100267][ T29] audit: type=1326 audit(202.970:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4501 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.113913][ T29] audit: type=1326 audit(202.980:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4501 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.126412][ T29] audit: type=1326 audit(202.990:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4501 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.137225][ T29] audit: type=1326 audit(203.010:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4501 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=461 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.174702][ T29] audit: type=1326 audit(203.030:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4501 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 203.175268][ T29] audit: type=1326 audit(203.030:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4501 comm="syz.0.212" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 208.604697][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 208.605006][ T29] audit: type=1400 audit(208.480:330): avc: denied { create } for pid=4521 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 208.619159][ T29] audit: type=1400 audit(208.490:331): avc: denied { ioctl } for pid=4521 comm="syz.0.219" path="socket:[5177]" dev="sockfs" ino=5177 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 208.629418][ T29] audit: type=1400 audit(208.500:332): avc: denied { bind } for pid=4521 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 208.650835][ T29] audit: type=1400 audit(208.520:333): avc: denied { setopt } for pid=4521 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 208.655360][ T29] audit: type=1400 audit(208.520:334): avc: denied { write } for pid=4521 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 208.685622][ T29] audit: type=1400 audit(208.560:335): avc: denied { read } for pid=4521 comm="syz.0.219" path="socket:[5177]" dev="sockfs" ino=5177 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 210.093537][ T29] audit: type=1400 audit(209.960:336): avc: denied { setopt } for pid=4531 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 215.553019][ T29] audit: type=1400 audit(215.410:337): avc: denied { write } for pid=4534 comm="syz.0.222" name="file0" dev="tmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 215.554295][ T29] audit: type=1400 audit(215.420:338): avc: denied { ioctl } for pid=4534 comm="syz.0.222" path="/126/file0" dev="tmpfs" ino=652 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 217.196901][ T29] audit: type=1326 audit(217.070:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4547 comm="syz.1.224" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 217.200672][ T29] audit: type=1326 audit(217.070:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4547 comm="syz.1.224" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 217.220295][ T29] audit: type=1326 audit(217.090:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4547 comm="syz.1.224" exe="/syz-executor" sig=0 arch=40000028 syscall=153 compat=0 ip=0x132320 code=0x7ffc0000 [ 217.236209][ T29] audit: type=1326 audit(217.110:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4547 comm="syz.1.224" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 217.238970][ T29] audit: type=1326 audit(217.110:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4547 comm="syz.1.224" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 217.946752][ T29] audit: type=1400 audit(217.820:344): avc: denied { create } for pid=4552 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 217.978527][ T29] audit: type=1400 audit(217.850:345): avc: denied { connect } for pid=4552 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 218.665906][ T29] audit: type=1400 audit(218.540:346): avc: denied { create } for pid=4552 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 225.031349][ T29] audit: type=1326 audit(224.900:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.1.231" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 225.046057][ T29] audit: type=1326 audit(224.900:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.1.231" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 225.049468][ T29] audit: type=1326 audit(224.920:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.1.231" exe="/syz-executor" sig=0 arch=40000028 syscall=46 compat=0 ip=0x132320 code=0x7ffc0000 [ 225.051613][ T29] audit: type=1326 audit(224.920:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.1.231" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 229.796970][ T29] audit: type=1400 audit(229.670:351): avc: denied { connect } for pid=4588 comm="syz.1.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 231.684465][ T4598] SELinux: policydb version -459006950 does not match my version range 15-35 [ 231.686938][ T4598] SELinux: failed to load policy [ 232.802955][ T29] audit: type=1400 audit(232.670:352): avc: denied { mount } for pid=4601 comm="syz.1.242" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 232.805799][ T29] audit: type=1400 audit(232.680:353): avc: denied { unmount } for pid=4601 comm="syz.1.242" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 233.351171][ T29] audit: type=1326 audit(233.220:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4604 comm="syz.1.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 233.484457][ T29] audit: type=1326 audit(233.320:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4604 comm="syz.1.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 233.488333][ T29] audit: type=1326 audit(233.360:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4604 comm="syz.1.243" exe="/syz-executor" sig=0 arch=40000028 syscall=256 compat=0 ip=0x132320 code=0x7ffc0000 [ 233.490704][ T29] audit: type=1326 audit(233.360:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4604 comm="syz.1.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 233.495615][ T29] audit: type=1326 audit(233.360:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4604 comm="syz.1.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 242.407005][ T29] audit: type=1326 audit(242.280:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4623 comm="syz.0.248" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 242.423551][ T29] audit: type=1326 audit(242.280:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4623 comm="syz.0.248" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 242.428145][ T29] audit: type=1326 audit(242.290:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4623 comm="syz.0.248" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 242.428329][ T29] audit: type=1326 audit(242.290:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4623 comm="syz.0.248" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 242.473412][ T29] audit: type=1326 audit(242.300:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4623 comm="syz.0.248" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 242.478321][ T29] audit: type=1326 audit(242.350:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4623 comm="syz.0.248" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 242.480782][ T29] audit: type=1326 audit(242.350:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4623 comm="syz.0.248" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 242.524454][ T29] audit: type=1326 audit(242.390:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4623 comm="syz.0.248" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 242.530914][ T29] audit: type=1326 audit(242.400:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4623 comm="syz.0.248" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 242.579446][ T29] audit: type=1326 audit(242.450:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4623 comm="syz.0.248" exe="/syz-executor" sig=0 arch=40000028 syscall=252 compat=0 ip=0x132320 code=0x7ffc0000 [ 244.547347][ T4633] capability: warning: `syz.1.250' uses 32-bit capabilities (legacy support in use) [ 246.385253][ T4645] tmpfs: Unsupported parameter 'mpol' [ 249.756463][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 249.759804][ T29] audit: type=1326 audit(249.630:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.0.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 249.776888][ T29] audit: type=1326 audit(249.650:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.0.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 249.784105][ T29] audit: type=1326 audit(249.650:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.0.265" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 249.804694][ T29] audit: type=1326 audit(249.680:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.0.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 249.815119][ T29] audit: type=1326 audit(249.690:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.0.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 249.825093][ T29] audit: type=1326 audit(249.700:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.0.265" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 249.845997][ T29] audit: type=1326 audit(249.720:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.0.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 249.854563][ T29] audit: type=1326 audit(249.730:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.0.265" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 249.859877][ T29] audit: type=1326 audit(249.730:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.0.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 249.873299][ T29] audit: type=1326 audit(249.740:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.0.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 250.469867][ T4686] netlink: 400 bytes leftover after parsing attributes in process `syz.0.267'. [ 253.207308][ T4711] netlink: 20 bytes leftover after parsing attributes in process `syz.1.276'. [ 256.783796][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 256.786000][ T29] audit: type=1400 audit(256.660:442): avc: denied { kexec_image_load } for pid=4733 comm="syz.0.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 257.495648][ T29] audit: type=1400 audit(257.370:443): avc: denied { execute } for pid=4732 comm="syz.1.284" dev="tmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 257.569090][ T4740] process 'syz.1.284' launched '/dev/fd/8' with NULL argv: empty string added [ 257.632995][ T29] audit: type=1400 audit(257.480:444): avc: denied { execute_no_trans } for pid=4732 comm="syz.1.284" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 262.260973][ T4779] netlink: 24 bytes leftover after parsing attributes in process `syz.1.295'. [ 263.107565][ T29] audit: type=1400 audit(262.970:445): avc: denied { module_load } for pid=4781 comm="syz.1.296" path="/sys/kernel/notes" dev="sysfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 265.330484][ T29] audit: type=1400 audit(265.200:446): avc: denied { connect } for pid=4797 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 266.930107][ T29] audit: type=1400 audit(266.800:447): avc: denied { name_bind } for pid=4810 comm="syz.1.305" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 271.105042][ T29] audit: type=1400 audit(270.980:448): avc: denied { block_suspend } for pid=4837 comm="syz.1.314" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 271.755702][ T4842] smc: net device bond0 applied user defined pnetid SYZ0 [ 271.800922][ T4842] smc: net device bond0 erased user defined pnetid SYZ0 [ 277.086954][ T29] audit: type=1400 audit(276.960:449): avc: denied { create } for pid=4875 comm="syz.0.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 277.146727][ T29] audit: type=1400 audit(277.020:450): avc: denied { sys_admin } for pid=4875 comm="syz.0.324" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 285.428683][ T4920] netlink: 24 bytes leftover after parsing attributes in process `syz.0.332'. [ 287.475140][ T29] audit: type=1326 audit(287.350:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4927 comm="syz.0.335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 287.496966][ T29] audit: type=1326 audit(287.370:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4927 comm="syz.0.335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 287.520462][ T29] audit: type=1326 audit(287.390:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4927 comm="syz.0.335" exe="/syz-executor" sig=0 arch=40000028 syscall=460 compat=0 ip=0x132320 code=0x7ffc0000 [ 287.534944][ T29] audit: type=1326 audit(287.390:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4927 comm="syz.0.335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 287.537704][ T29] audit: type=1326 audit(287.410:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4927 comm="syz.0.335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 289.331611][ T4932] netlink: 8 bytes leftover after parsing attributes in process `syz.0.337'. [ 289.336338][ T4932] netlink: 'syz.0.337': attribute type 2 has an invalid length. [ 289.344016][ T4932] netlink: 40 bytes leftover after parsing attributes in process `syz.0.337'. [ 292.886332][ T29] audit: type=1326 audit(292.760:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4942 comm="syz.0.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 292.898063][ T29] audit: type=1326 audit(292.770:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4942 comm="syz.0.340" exe="/syz-executor" sig=0 arch=40000028 syscall=350 compat=0 ip=0x132320 code=0x7ffc0000 [ 292.898882][ T29] audit: type=1326 audit(292.770:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4942 comm="syz.0.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 292.900778][ T29] audit: type=1326 audit(292.770:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4942 comm="syz.0.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 295.602774][ T29] audit: type=1326 audit(295.320:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.0.343" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 295.603297][ T29] audit: type=1326 audit(295.450:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.0.343" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 295.603378][ T29] audit: type=1326 audit(295.450:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.0.343" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x132320 code=0x7ffc0000 [ 295.612689][ T29] audit: type=1326 audit(295.480:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.0.343" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 295.615860][ T29] audit: type=1326 audit(295.490:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.0.343" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 295.619401][ T29] audit: type=1326 audit(295.490:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.0.343" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 296.951726][ T4955] SELinux: Context system_u:object_r:modules_dep_t:s0 is not valid (left unmapped). [ 299.264089][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 299.264389][ T29] audit: type=1326 audit(299.140:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.0.343" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 299.279378][ T29] audit: type=1326 audit(299.150:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.0.343" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 300.383634][ T29] audit: type=1326 audit(300.260:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4962 comm="syz.0.344" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 308.962981][ T29] audit: type=1400 audit(308.830:499): avc: denied { watch watch_reads } for pid=4977 comm="syz.0.348" path="/195" dev="tmpfs" ino=1002 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 312.624922][ T29] audit: type=1400 audit(312.500:500): avc: denied { setopt } for pid=4987 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 320.185120][ T5016] netlink: 'syz.0.358': attribute type 4 has an invalid length. [ 320.211777][ T5016] netlink: 'syz.0.358': attribute type 4 has an invalid length. [ 324.797123][ T4997] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 324.876839][ T4997] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 327.987474][ T4997] hsr_slave_0: entered promiscuous mode [ 327.991195][ T4997] hsr_slave_1: entered promiscuous mode [ 327.994477][ T4997] debugfs: 'hsr0' already exists in 'hsr' [ 327.995301][ T4997] Cannot create hsr debugfs directory [ 328.680260][ T5274] netlink: 8 bytes leftover after parsing attributes in process `syz.0.371'. [ 328.878891][ T5274] netlink: 4 bytes leftover after parsing attributes in process `syz.0.371'. [ 329.308960][ T4997] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 329.337291][ T29] audit: type=1326 audit(329.210:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.0.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.338274][ T4997] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 329.347756][ T29] audit: type=1326 audit(329.210:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.0.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.348364][ T29] audit: type=1326 audit(329.220:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.0.372" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.349988][ T29] audit: type=1326 audit(329.220:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.0.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.350068][ T29] audit: type=1326 audit(329.220:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.0.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.376541][ T29] audit: type=1326 audit(329.250:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.0.372" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.435040][ T29] audit: type=1326 audit(329.310:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.0.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.445420][ T29] audit: type=1326 audit(329.320:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.0.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.457937][ T4997] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 329.470554][ T29] audit: type=1326 audit(329.340:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.0.372" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.487641][ T4997] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 329.492742][ T29] audit: type=1326 audit(329.360:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.0.372" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 331.677677][ T4997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.287967][ T5355] SELinux: failed to load policy [ 341.018602][ T4997] veth0_vlan: entered promiscuous mode [ 341.128906][ T4997] veth1_vlan: entered promiscuous mode [ 341.404669][ T4997] veth0_macvtap: entered promiscuous mode [ 341.431480][ T4997] veth1_macvtap: entered promiscuous mode [ 341.724539][ T1708] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.727440][ T1708] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.729854][ T1708] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.731064][ T1708] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 351.056052][ T5468] netlink: 'syz.0.383': attribute type 21 has an invalid length. [ 351.058810][ T5468] netlink: 132 bytes leftover after parsing attributes in process `syz.0.383'. [ 351.391217][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 351.403176][ T29] audit: type=1400 audit(351.260:532): avc: denied { create } for pid=5473 comm="syz.2.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 351.414018][ T5474] netlink: 8 bytes leftover after parsing attributes in process `syz.2.386'. [ 351.419407][ T5474] ip_vti0: Master is either lo or non-ether device [ 351.605805][ T29] audit: type=1326 audit(351.480:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5475 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 351.613580][ T29] audit: type=1326 audit(351.480:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5475 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 351.615802][ T29] audit: type=1326 audit(351.490:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5475 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 351.640609][ T29] audit: type=1326 audit(351.510:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5475 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 351.684793][ T29] audit: type=1326 audit(351.560:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5475 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 351.823934][ T29] audit: type=1326 audit(351.660:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5475 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 351.830342][ T29] audit: type=1326 audit(351.700:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5475 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 351.844504][ T29] audit: type=1326 audit(351.720:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5475 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 351.847667][ T29] audit: type=1326 audit(351.720:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5475 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 352.979657][ T5494] netlink: 60 bytes leftover after parsing attributes in process `syz.2.391'. [ 352.980667][ T5494] netlink: 60 bytes leftover after parsing attributes in process `syz.2.391'. [ 353.600728][ T5494] netlink: 60 bytes leftover after parsing attributes in process `syz.2.391'. [ 353.601583][ T5494] netlink: 60 bytes leftover after parsing attributes in process `syz.2.391'. [ 354.275010][ T5494] netlink: 60 bytes leftover after parsing attributes in process `syz.2.391'. [ 354.281402][ T5494] netlink: 60 bytes leftover after parsing attributes in process `syz.2.391'. [ 358.239095][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 358.254252][ T29] audit: type=1326 audit(358.110:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5550 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 358.267548][ T29] audit: type=1326 audit(358.140:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5550 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 358.275094][ T29] audit: type=1326 audit(358.150:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5550 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 358.276631][ T29] audit: type=1326 audit(358.150:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5550 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 358.284118][ T29] audit: type=1326 audit(358.150:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5550 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 358.284692][ T29] audit: type=1326 audit(358.160:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5550 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 358.298638][ T29] audit: type=1326 audit(358.160:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5550 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 358.299160][ T29] audit: type=1326 audit(358.170:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5550 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 358.299384][ T29] audit: type=1326 audit(358.170:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5550 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 358.299610][ T29] audit: type=1326 audit(358.170:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5550 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 363.929031][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 363.931637][ T29] audit: type=1326 audit(363.800:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5592 comm="syz.2.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 363.937576][ T29] audit: type=1326 audit(363.800:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5592 comm="syz.2.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 363.951667][ T29] audit: type=1326 audit(363.820:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5592 comm="syz.2.423" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132320 code=0x7ffc0000 [ 363.957495][ T29] audit: type=1326 audit(363.830:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5592 comm="syz.2.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 363.998684][ T29] audit: type=1326 audit(363.870:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5592 comm="syz.2.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 363.999197][ T29] audit: type=1326 audit(363.870:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5592 comm="syz.2.423" exe="/syz-executor" sig=0 arch=40000028 syscall=15 compat=0 ip=0x132320 code=0x7ffc0000 [ 364.001784][ T29] audit: type=1326 audit(363.870:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5592 comm="syz.2.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 364.004054][ T29] audit: type=1326 audit(363.870:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5592 comm="syz.2.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 365.438807][ T5610] netlink: 4 bytes leftover after parsing attributes in process `syz.2.428'. [ 366.577503][ T29] audit: type=1326 audit(366.450:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5624 comm="syz.0.433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 366.580905][ T29] audit: type=1326 audit(366.450:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5624 comm="syz.0.433" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 367.144324][ T5630] syzkaller0: entered promiscuous mode [ 367.145157][ T5630] syzkaller0: entered allmulticast mode [ 372.131706][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 372.132782][ T29] audit: type=1326 audit(372.000:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5671 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.155735][ T29] audit: type=1326 audit(372.020:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5671 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.178232][ T29] audit: type=1326 audit(372.050:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5671 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.192559][ T29] audit: type=1326 audit(372.060:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5671 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.194505][ T29] audit: type=1326 audit(372.060:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5673 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 372.198394][ T29] audit: type=1326 audit(372.070:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5671 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.220268][ T29] audit: type=1326 audit(372.090:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5671 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.240851][ T29] audit: type=1326 audit(372.090:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5671 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.244157][ T29] audit: type=1326 audit(372.090:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5671 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.244692][ T29] audit: type=1326 audit(372.100:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5674 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 378.905217][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 378.913758][ T29] audit: type=1400 audit(378.780:672): avc: denied { nlmsg_write } for pid=5720 comm="syz.2.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 384.063013][ T29] audit: type=1400 audit(383.930:673): avc: denied { lock } for pid=5744 comm="+}[@" path="socket:[6361]" dev="sockfs" ino=6361 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 390.975331][ T5752] netlink: 'syz.2.462': attribute type 6 has an invalid length. [ 391.473204][ T29] audit: type=1326 audit(391.340:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5753 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.494585][ T29] audit: type=1326 audit(391.370:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5753 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.500244][ T29] audit: type=1326 audit(391.370:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5753 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.512998][ T29] audit: type=1326 audit(391.380:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5753 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.515692][ T29] audit: type=1326 audit(391.380:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5753 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.519889][ T29] audit: type=1326 audit(391.390:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5753 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.546240][ T29] audit: type=1326 audit(391.420:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5753 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=41 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.547025][ T29] audit: type=1326 audit(391.420:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5753 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.560264][ T29] audit: type=1326 audit(391.420:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5753 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.560374][ T29] audit: type=1326 audit(391.430:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5753 comm="syz.2.463" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132320 code=0x7ffc0000 [ 405.179394][ T5793] netlink: 8 bytes leftover after parsing attributes in process `syz.2.475'. [ 405.765065][ T5791] batadv_slave_0: entered promiscuous mode [ 405.837559][ T5791] netlink: 4 bytes leftover after parsing attributes in process `syz.2.475'. [ 406.860663][ T5806] netlink: 96 bytes leftover after parsing attributes in process `syz.2.476'. [ 410.674597][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 410.677252][ T29] audit: type=1326 audit(410.540:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5814 comm="syz.2.480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 410.682968][ T29] audit: type=1326 audit(410.550:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5814 comm="syz.2.480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 410.686177][ T29] audit: type=1326 audit(410.560:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5814 comm="syz.2.480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 410.689177][ T29] audit: type=1326 audit(410.560:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5814 comm="syz.2.480" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 410.705421][ T29] audit: type=1326 audit(410.580:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5814 comm="syz.2.480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 410.709198][ T29] audit: type=1326 audit(410.580:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5814 comm="syz.2.480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 410.717367][ T29] audit: type=1326 audit(410.580:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5814 comm="syz.2.480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 410.717927][ T29] audit: type=1326 audit(410.580:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5814 comm="syz.2.480" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 410.718404][ T29] audit: type=1326 audit(410.590:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5814 comm="syz.2.480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 410.718571][ T29] audit: type=1326 audit(410.590:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5814 comm="syz.2.480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 411.269898][ T5818] netlink: 72 bytes leftover after parsing attributes in process `syz.2.481'. [ 411.893754][ T5821] SELinux: syz.2.482 (5821) set checkreqprot to 1. This is no longer supported. [ 417.601217][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 417.613720][ T29] audit: type=1326 audit(417.470:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5834 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 417.621244][ T29] audit: type=1326 audit(417.480:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5834 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 417.634357][ T29] audit: type=1326 audit(417.490:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5834 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 417.635534][ T29] audit: type=1326 audit(417.500:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5834 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 417.688939][ T29] audit: type=1326 audit(417.560:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5834 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=24 compat=0 ip=0x132320 code=0x7ffc0000 [ 417.708236][ T29] audit: type=1326 audit(417.570:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5834 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 421.785765][ T29] audit: type=1326 audit(421.650:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5881 comm="syz.2.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 421.787635][ T29] audit: type=1326 audit(421.660:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5881 comm="syz.2.491" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 421.789476][ T29] audit: type=1326 audit(421.660:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5881 comm="syz.2.491" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 421.808012][ T29] audit: type=1326 audit(421.680:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5881 comm="syz.2.491" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.661965][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 424.673155][ T29] audit: type=1326 audit(424.530:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.496" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.676471][ T29] audit: type=1326 audit(424.550:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.496" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.681406][ T29] audit: type=1326 audit(424.550:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.496" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.705740][ T29] audit: type=1326 audit(424.580:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.496" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.710322][ T29] audit: type=1326 audit(424.580:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.496" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.720076][ T29] audit: type=1326 audit(424.590:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.496" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.731413][ T29] audit: type=1326 audit(424.590:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.496" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.733308][ T29] audit: type=1326 audit(424.590:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.496" exe="/syz-executor" sig=0 arch=40000028 syscall=302 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.735546][ T29] audit: type=1326 audit(424.590:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.496" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.736636][ T29] audit: type=1326 audit(424.590:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.496" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.776394][ T5840] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 424.793609][ T5840] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 427.574461][ T5840] hsr_slave_0: entered promiscuous mode [ 427.578638][ T5840] hsr_slave_1: entered promiscuous mode [ 427.589707][ T5840] debugfs: 'hsr0' already exists in 'hsr' [ 427.605086][ T5840] Cannot create hsr debugfs directory [ 428.539813][ T5840] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 428.568067][ T5840] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 428.588412][ T5840] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 428.621437][ T5840] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 429.846032][ T6158] netlink: 12 bytes leftover after parsing attributes in process `syz.2.503'. [ 431.395781][ T5840] 8021q: adding VLAN 0 to HW filter on device bond0 [ 434.916602][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 434.918835][ T29] audit: type=1326 audit(434.790:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6188 comm="syz.2.507" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 434.935027][ T29] audit: type=1326 audit(434.800:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6188 comm="syz.2.507" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 434.940097][ T29] audit: type=1326 audit(434.810:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6188 comm="syz.2.507" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 434.955274][ T29] audit: type=1326 audit(434.830:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6188 comm="syz.2.507" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 434.964936][ T29] audit: type=1326 audit(434.840:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6188 comm="syz.2.507" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 434.975347][ T29] audit: type=1326 audit(434.850:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6188 comm="syz.2.507" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 434.978021][ T29] audit: type=1326 audit(434.850:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6188 comm="syz.2.507" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 434.993441][ T29] audit: type=1326 audit(434.860:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6188 comm="syz.2.507" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 434.998537][ T29] audit: type=1326 audit(434.870:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6188 comm="syz.2.507" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 435.021605][ T29] audit: type=1326 audit(434.890:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6188 comm="syz.2.507" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 435.461652][ T6193] netlink: 28 bytes leftover after parsing attributes in process `syz.2.508'. [ 439.764323][ T5840] veth0_vlan: entered promiscuous mode [ 439.803519][ T5840] veth1_vlan: entered promiscuous mode [ 439.969250][ T5840] veth0_macvtap: entered promiscuous mode [ 439.995620][ T5840] veth1_macvtap: entered promiscuous mode [ 440.307857][ T102] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.308531][ T102] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.308627][ T102] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.308683][ T102] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 442.389260][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 442.391207][ T29] audit: type=1326 audit(442.260:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6233 comm="syz.3.517" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 442.391635][ T29] audit: type=1326 audit(442.260:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6233 comm="syz.3.517" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12ffa8 code=0x7ffc0000 [ 442.396913][ T29] audit: type=1326 audit(442.270:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6233 comm="syz.3.517" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 442.400109][ T29] audit: type=1326 audit(442.270:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6233 comm="syz.3.517" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 442.404354][ T29] audit: type=1326 audit(442.280:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6233 comm="syz.3.517" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 442.405833][ T29] audit: type=1326 audit(442.280:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6233 comm="syz.3.517" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 442.405947][ T29] audit: type=1326 audit(442.280:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6233 comm="syz.3.517" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 442.422641][ T29] audit: type=1326 audit(442.290:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6233 comm="syz.3.517" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 442.424087][ T29] audit: type=1326 audit(442.300:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6233 comm="syz.3.517" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 442.437796][ T29] audit: type=1326 audit(442.310:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6233 comm="syz.3.517" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 442.490335][ T6234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.517'. [ 450.353770][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 450.355134][ T29] audit: type=1326 audit(450.220:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6278 comm="syz.2.527" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 450.367465][ T29] audit: type=1326 audit(450.240:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6278 comm="syz.2.527" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 450.391008][ T29] audit: type=1326 audit(450.260:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6278 comm="syz.2.527" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 450.401508][ T29] audit: type=1326 audit(450.270:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6278 comm="syz.2.527" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 450.409418][ T29] audit: type=1326 audit(450.280:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6278 comm="syz.2.527" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 450.426961][ T29] audit: type=1326 audit(450.300:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6278 comm="syz.2.527" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 450.443811][ T29] audit: type=1326 audit(450.320:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6278 comm="syz.2.527" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 450.449722][ T29] audit: type=1326 audit(450.320:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6278 comm="syz.2.527" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132320 code=0x7ffc0000 [ 450.455402][ T29] audit: type=1326 audit(450.330:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6278 comm="syz.2.527" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 450.458294][ T29] audit: type=1326 audit(450.330:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6278 comm="syz.2.527" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132320 code=0x7ffc0000 [ 455.667968][ T6303] netlink: 4 bytes leftover after parsing attributes in process `syz.2.534'. [ 456.084248][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 456.085317][ T29] audit: type=1400 audit(455.960:851): avc: denied { create } for pid=6305 comm="syz.2.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 456.736278][ T6310] netlink: 16 bytes leftover after parsing attributes in process `syz.3.536'. [ 457.233232][ T29] audit: type=1400 audit(457.090:852): avc: denied { mounton } for pid=6315 comm="syz.2.538" path="/120/file0" dev="tmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 457.236735][ T29] audit: type=1400 audit(457.110:853): avc: denied { mount } for pid=6315 comm="syz.2.538" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 457.571590][ T29] audit: type=1400 audit(457.440:854): avc: denied { create } for pid=6317 comm="syz.3.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 457.824043][ T29] audit: type=1400 audit(457.610:855): avc: denied { load_policy } for pid=6317 comm="syz.3.539" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 457.829779][ T6319] SELinux: failed to load policy [ 458.123362][ T29] audit: type=1400 audit(458.000:856): avc: denied { create } for pid=6322 comm="syz.3.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 458.148460][ T29] audit: type=1400 audit(458.020:857): avc: denied { connect } for pid=6322 comm="syz.3.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 458.180358][ T29] audit: type=1400 audit(458.050:858): avc: denied { read } for pid=6322 comm="syz.3.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 458.461102][ T29] audit: type=1326 audit(458.330:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6324 comm="syz.3.542" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 458.464144][ T29] audit: type=1326 audit(458.330:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6324 comm="syz.3.542" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 466.539853][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 466.540779][ T29] audit: type=1400 audit(466.410:864): avc: denied { execute } for pid=6348 comm="syz.3.549" dev="tmpfs" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 466.553842][ T29] audit: type=1400 audit(466.420:865): avc: denied { execute_no_trans } for pid=6348 comm="syz.3.549" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 469.538227][ T29] audit: type=1400 audit(469.410:866): avc: denied { getopt } for pid=6354 comm="syz.2.551" lport=13 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 469.728790][ T29] audit: type=1400 audit(469.600:867): avc: denied { mount } for pid=6356 comm="syz.3.552" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 471.473031][ T29] audit: type=1326 audit(471.330:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6366 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 471.474866][ T29] audit: type=1326 audit(471.340:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6366 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 471.474971][ T29] audit: type=1326 audit(471.340:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6366 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=274 compat=0 ip=0x132320 code=0x7ffc0000 [ 471.475097][ T29] audit: type=1326 audit(471.340:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6366 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 471.475163][ T29] audit: type=1326 audit(471.340:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6366 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 471.475219][ T29] audit: type=1326 audit(471.340:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6366 comm="syz.3.556" exe="/syz-executor" sig=0 arch=40000028 syscall=275 compat=0 ip=0x132320 code=0x7ffc0000 [ 472.157750][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 472.158475][ T29] audit: type=1400 audit(472.030:876): avc: denied { create } for pid=6369 comm="syz.3.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 472.164904][ T29] audit: type=1400 audit(472.040:877): avc: denied { bind } for pid=6369 comm="syz.3.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 472.169989][ T29] audit: type=1400 audit(472.040:878): avc: denied { write } for pid=6369 comm="syz.3.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 472.824032][ T29] audit: type=1400 audit(472.700:879): avc: denied { create } for pid=6375 comm="syz.3.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 473.086151][ T29] audit: type=1400 audit(472.960:880): avc: denied { write } for pid=6375 comm="syz.3.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 473.595531][ T29] audit: type=1400 audit(473.440:881): avc: denied { bind } for pid=6380 comm="syz.2.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 473.654371][ T29] audit: type=1400 audit(473.530:882): avc: denied { setopt } for pid=6380 comm="syz.2.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 474.018772][ T29] audit: type=1400 audit(473.890:883): avc: denied { ioctl } for pid=6380 comm="syz.2.561" path="socket:[6978]" dev="sockfs" ino=6978 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 474.315424][ T29] audit: type=1400 audit(474.140:884): avc: denied { sys_module } for pid=6380 comm="syz.2.561" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 475.139094][ T29] audit: type=1326 audit(475.010:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6391 comm="syz.2.564" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 475.210190][ T6392] netlink: 'syz.2.564': attribute type 1 has an invalid length. [ 475.210709][ T6392] netlink: 224 bytes leftover after parsing attributes in process `syz.2.564'. [ 477.359682][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 477.365232][ T29] audit: type=1400 audit(477.230:929): avc: denied { create } for pid=6397 comm="syz.2.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 477.388141][ T29] audit: type=1400 audit(477.260:930): avc: denied { bind } for pid=6397 comm="syz.2.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 477.795932][ T29] audit: type=1400 audit(477.670:931): avc: denied { create } for pid=6437 comm="syz.2.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 478.496572][ T6438] netlink: 8 bytes leftover after parsing attributes in process `syz.2.567'. [ 479.383037][ T29] audit: type=1400 audit(479.250:932): avc: denied { write } for pid=6466 comm="syz.3.571" name="rt_acct" dev="proc" ino=4026533221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 479.686551][ T29] audit: type=1326 audit(479.560:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.3.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 479.689103][ T29] audit: type=1326 audit(479.560:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.3.572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 479.691145][ T29] audit: type=1326 audit(479.560:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.3.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 479.694705][ T29] audit: type=1326 audit(479.570:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.3.572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 479.703180][ T29] audit: type=1326 audit(479.570:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.3.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 479.706700][ T29] audit: type=1326 audit(479.580:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6470 comm="syz.3.572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 481.536852][ T6486] tmpfs: Unsupported parameter 'mpol' [ 481.900656][ T6488] netlink: 'syz.3.577': attribute type 4 has an invalid length. [ 481.901203][ T6488] netlink: 152 bytes leftover after parsing attributes in process `syz.3.577'. [ 482.003060][ T6488] .`: renamed from dummy0 (while UP) [ 483.296849][ T6500] random: crng reseeded on system resumption [ 483.828634][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 483.839674][ T29] audit: type=1400 audit(483.700:945): avc: denied { name_bind } for pid=6505 comm="syz.3.583" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 484.761366][ T6513] ip6gre1: entered allmulticast mode [ 485.181593][ T29] audit: type=1400 audit(485.050:946): avc: denied { create } for pid=6516 comm="syz.3.586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 487.587191][ T6531] netlink: 448 bytes leftover after parsing attributes in process `syz.2.590'. [ 487.692838][ T29] audit: type=1400 audit(487.560:947): avc: denied { ioctl } for pid=6526 comm="syz.3.589" path="socket:[7152]" dev="sockfs" ino=7152 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 487.955651][ T29] audit: type=1400 audit(487.830:948): avc: denied { create } for pid=6533 comm="syz.2.591" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 487.966290][ T29] audit: type=1400 audit(487.840:949): avc: denied { write } for pid=6533 comm="syz.2.591" name="file0" dev="tmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 487.970293][ T29] audit: type=1400 audit(487.840:950): avc: denied { open } for pid=6533 comm="syz.2.591" path="/136/file0" dev="tmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 488.086352][ T29] audit: type=1400 audit(487.960:951): avc: denied { unlink } for pid=4997 comm="syz-executor" name="file0" dev="tmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 488.250097][ T6537] netlink: 4 bytes leftover after parsing attributes in process `syz.3.589'. [ 489.496370][ T6548] netlink: 216 bytes leftover after parsing attributes in process `syz.3.594'. [ 490.019819][ T29] audit: type=1326 audit(489.890:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6552 comm="syz.3.596" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 490.045545][ T29] audit: type=1326 audit(489.920:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6552 comm="syz.3.596" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 490.056134][ T29] audit: type=1326 audit(489.930:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6552 comm="syz.3.596" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12ffa8 code=0x7ffc0000 [ 490.067269][ T29] audit: type=1326 audit(489.930:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6552 comm="syz.3.596" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 490.069449][ T29] audit: type=1326 audit(489.930:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6552 comm="syz.3.596" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 490.077729][ T29] audit: type=1326 audit(489.950:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6552 comm="syz.3.596" exe="/syz-executor" sig=0 arch=40000028 syscall=3 compat=0 ip=0x132320 code=0x7ffc0000 [ 490.086747][ T29] audit: type=1326 audit(489.950:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6552 comm="syz.3.596" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 490.286039][ T29] audit: type=1400 audit(490.160:959): avc: denied { create } for pid=6554 comm="syz.3.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 490.302690][ T29] audit: type=1400 audit(490.170:960): avc: denied { write } for pid=6554 comm="syz.3.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 490.303142][ T29] audit: type=1400 audit(490.170:961): avc: denied { nlmsg_write } for pid=6554 comm="syz.3.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 490.775024][ T6557] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 490.886936][ T6557] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 491.126859][ T6557] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 491.211479][ T6557] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 491.241122][ T6568] netlink: 'syz.3.598': attribute type 10 has an invalid length. [ 491.241722][ T6568] netlink: 40 bytes leftover after parsing attributes in process `syz.3.598'. [ 491.295580][ T6566] netlink: 'syz.2.599': attribute type 12 has an invalid length. [ 491.365445][ T5431] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 491.393937][ T5446] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 491.407253][ T5446] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 491.429427][ T5450] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 497.985350][ T29] audit: type=1400 audit(497.860:962): avc: denied { create } for pid=6604 comm="syz.2.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 498.015209][ T29] audit: type=1400 audit(497.880:963): avc: denied { write } for pid=6604 comm="syz.2.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 498.895222][ T29] audit: type=1400 audit(498.760:964): avc: denied { create } for pid=6612 comm="syz.2.612" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 500.888006][ T29] audit: type=1400 audit(500.760:965): avc: denied { setopt } for pid=6632 comm="syz.3.618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 500.926748][ T29] audit: type=1400 audit(500.800:966): avc: denied { name_bind } for pid=6632 comm="syz.3.618" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 500.937493][ T29] audit: type=1400 audit(500.810:967): avc: denied { node_bind } for pid=6632 comm="syz.3.618" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 500.961148][ T6635] af_packet: tpacket_rcv: packet too big, clamped from 66 to 4294967286. macoff=82 [ 501.438109][ T6641] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 501.775478][ T29] audit: type=1400 audit(501.650:968): avc: denied { append } for pid=6645 comm="syz.3.622" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 501.793204][ T29] audit: type=1400 audit(501.660:969): avc: denied { bind } for pid=6646 comm="syz.2.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 501.814430][ T29] audit: type=1400 audit(501.690:970): avc: denied { setopt } for pid=6646 comm="syz.2.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 501.836791][ T6648] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2572 sclass=netlink_xfrm_socket pid=6648 comm=syz.2.623 [ 501.845942][ T29] audit: type=1400 audit(501.720:971): avc: denied { lock } for pid=6645 comm="syz.3.622" path="socket:[9490]" dev="sockfs" ino=9490 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 503.513451][ T6659] netlink: 28 bytes leftover after parsing attributes in process `syz.2.627'. [ 503.515292][ T6659] netlink: 32 bytes leftover after parsing attributes in process `syz.2.627'. [ 504.217962][ T6665] netlink: 4 bytes leftover after parsing attributes in process `syz.2.628'. [ 504.266258][ T6665] netlink: 32 bytes leftover after parsing attributes in process `syz.2.628'. [ 506.597262][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 506.600624][ T29] audit: type=1400 audit(506.470:977): avc: denied { setopt } for pid=6677 comm="syz.3.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 512.155971][ T29] audit: type=1400 audit(512.030:978): avc: denied { read } for pid=6703 comm="syz.2.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 519.505494][ T29] audit: type=1326 audit(519.380:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6730 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 519.514679][ T29] audit: type=1326 audit(519.390:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6730 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 519.522496][ T29] audit: type=1326 audit(519.390:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6730 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 519.527442][ T29] audit: type=1326 audit(519.400:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6730 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 519.543365][ T29] audit: type=1326 audit(519.400:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6730 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 519.550317][ T29] audit: type=1326 audit(519.420:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6730 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 519.560704][ T29] audit: type=1326 audit(519.430:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6730 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 519.570118][ T29] audit: type=1326 audit(519.440:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6730 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=245 compat=0 ip=0x132320 code=0x7ffc0000 [ 519.575340][ T29] audit: type=1326 audit(519.440:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6730 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 519.613729][ T29] audit: type=1326 audit(519.460:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6730 comm="syz.2.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 529.724947][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 529.725982][ T29] audit: type=1400 audit(529.600:993): avc: denied { watch watch_reads } for pid=6757 comm="syz.2.662" path="/177" dev="tmpfs" ino=912 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 530.614633][ T6760] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 530.755391][ T6760] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 530.995682][ T6760] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 531.167105][ T6760] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 531.363198][ T5450] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 531.419961][ T5450] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 531.468394][ T5437] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 531.499177][ T5431] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 537.454622][ T6787] vlan0: entered allmulticast mode [ 537.463871][ T6787] bridge_slave_0: entered allmulticast mode [ 561.862923][ T29] audit: type=1400 audit(561.720:994): avc: denied { execute } for pid=6847 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 561.866888][ T29] audit: type=1400 audit(561.740:995): avc: denied { execute_no_trans } for pid=6847 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 562.058712][ T29] audit: type=1400 audit(561.930:996): avc: denied { mounton } for pid=6848 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 567.874416][ T29] audit: type=1400 audit(567.740:997): avc: denied { mount } for pid=6971 comm="syz.2.690" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 568.208790][ T29] audit: type=1400 audit(568.080:998): avc: denied { read } for pid=6981 comm="syz.2.691" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 568.210417][ T29] audit: type=1400 audit(568.080:999): avc: denied { open } for pid=6981 comm="syz.2.691" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 568.227886][ T6848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 568.246143][ T29] audit: type=1400 audit(568.120:1000): avc: denied { ioctl } for pid=6981 comm="syz.2.691" path="/dev/nullb0" dev="devtmpfs" ino=654 ioctlcmd=0x127d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 568.257301][ T6848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 569.104548][ T7012] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 569.105938][ T7012] syzkaller0: linktype set to 804 [ 569.515390][ T29] audit: type=1400 audit(569.390:1001): avc: denied { map } for pid=7019 comm="syz.2.694" path="socket:[8726]" dev="sockfs" ino=8726 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 570.609595][ T29] audit: type=1400 audit(570.480:1002): avc: denied { write } for pid=7044 comm="syz.2.697" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 570.624369][ T29] audit: type=1400 audit(570.500:1003): avc: denied { map } for pid=7044 comm="syz.2.697" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 570.633402][ T29] audit: type=1400 audit(570.510:1004): avc: denied { execute } for pid=7044 comm="syz.2.697" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.075860][ T6848] hsr_slave_0: entered promiscuous mode [ 571.077557][ T6848] hsr_slave_1: entered promiscuous mode [ 571.097871][ T6848] debugfs: 'hsr0' already exists in 'hsr' [ 571.098309][ T6848] Cannot create hsr debugfs directory [ 571.244495][ T29] audit: type=1400 audit(571.100:1005): avc: denied { read } for pid=7044 comm="syz.2.697" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 571.248150][ T29] audit: type=1400 audit(571.100:1006): avc: denied { open } for pid=7044 comm="syz.2.697" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 572.191403][ T6848] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 572.207830][ T6848] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 572.227633][ T6848] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 572.261609][ T6848] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 575.383246][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 575.386717][ T29] audit: type=1400 audit(575.250:1008): avc: denied { create } for pid=7171 comm="syz.2.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 575.408944][ T29] audit: type=1400 audit(575.280:1009): avc: denied { write } for pid=7171 comm="syz.2.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 575.490616][ T6848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 581.877773][ T29] audit: type=1400 audit(581.750:1010): avc: denied { create } for pid=7206 comm="syz.2.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 586.228357][ T29] audit: type=1400 audit(586.100:1011): avc: denied { bind } for pid=7206 comm="syz.2.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 586.380064][ T6848] veth0_vlan: entered promiscuous mode [ 586.458084][ T6848] veth1_vlan: entered promiscuous mode [ 586.638619][ T6848] veth0_macvtap: entered promiscuous mode [ 586.671442][ T6848] veth1_macvtap: entered promiscuous mode [ 586.746622][ T29] audit: type=1400 audit(586.620:1012): avc: denied { accept } for pid=7206 comm="syz.2.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 587.163330][ T102] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.176822][ T102] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.178166][ T102] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.179229][ T102] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.580237][ T29] audit: type=1400 audit(587.450:1013): avc: denied { mounton } for pid=6848 comm="syz-executor" path="/syzkaller.uIDZsn/syz-tmp" dev="vda" ino=818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 587.593535][ T29] audit: type=1400 audit(587.460:1014): avc: denied { mount } for pid=6848 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 587.665243][ T29] audit: type=1400 audit(587.540:1015): avc: denied { mount } for pid=6848 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 587.772745][ T29] audit: type=1400 audit(587.640:1016): avc: denied { mounton } for pid=6848 comm="syz-executor" path="/syzkaller.uIDZsn/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 587.799844][ T29] audit: type=1400 audit(587.660:1017): avc: denied { mounton } for pid=6848 comm="syz-executor" path="/syzkaller.uIDZsn/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 587.840511][ T29] audit: type=1400 audit(587.710:1018): avc: denied { unmount } for pid=6848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 587.849530][ T29] audit: type=1400 audit(587.720:1019): avc: denied { mounton } for pid=6848 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 587.854608][ T29] audit: type=1400 audit(587.720:1020): avc: denied { mount } for pid=6848 comm="syz-executor" name="/" dev="gadgetfs" ino=3204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 587.879361][ T29] audit: type=1400 audit(587.750:1021): avc: denied { mount } for pid=6848 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 587.913174][ T29] audit: type=1400 audit(587.750:1022): avc: denied { mounton } for pid=6848 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 590.039250][ T7245] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 590.040547][ T7245] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 590.894363][ T7253] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 590.903164][ T7253] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 591.282915][ T7253] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 591.286817][ T7253] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 591.672283][ T7259] faux_driver vkms: [drm] Unknown color mode 11; guessing buffer size. [ 593.050136][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 593.052898][ T29] audit: type=1400 audit(592.920:1024): avc: denied { remount } for pid=7266 comm="syz.2.723" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 593.054106][ T7267] ======================================================= [ 593.054106][ T7267] WARNING: The mand mount option has been deprecated and [ 593.054106][ T7267] and is ignored by this kernel. Remove the mand [ 593.054106][ T7267] option from the mount to silence this warning. [ 593.054106][ T7267] ======================================================= [ 593.110995][ T29] audit: type=1400 audit(592.980:1025): avc: denied { unmount } for pid=4997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 618.874220][ T29] audit: type=1400 audit(618.730:1026): avc: denied { setopt } for pid=7293 comm="syz.2.733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 620.667212][ T29] audit: type=1400 audit(620.540:1027): avc: denied { map } for pid=7302 comm="syz.2.736" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 620.667730][ T29] audit: type=1400 audit(620.540:1028): avc: denied { execute } for pid=7302 comm="syz.2.736" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 629.444238][ T102] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 629.575912][ T102] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 629.687569][ T102] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 629.793938][ T102] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 630.711629][ T102] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 630.729570][ T102] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 630.735727][ T102] bond0 (unregistering): Released all slaves [ 630.893967][ T102] hsr_slave_0: left promiscuous mode [ 630.922961][ T102] hsr_slave_1: left promiscuous mode [ 630.954542][ T102] veth1_macvtap: left promiscuous mode [ 630.955654][ T102] veth0_macvtap: left promiscuous mode [ 630.958110][ T102] veth1_vlan: left promiscuous mode [ 630.959141][ T102] veth0_vlan: left promiscuous mode [ 632.836431][ T29] audit: type=1400 audit(632.710:1029): avc: denied { write } for pid=7328 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 632.839365][ T29] audit: type=1400 audit(632.710:1030): avc: denied { open } for pid=7328 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 633.507799][ T29] audit: type=1400 audit(633.380:1031): avc: denied { search } for pid=7329 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 633.508472][ T29] audit: type=1400 audit(633.380:1032): avc: denied { search } for pid=7329 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 633.511500][ T29] audit: type=1400 audit(633.380:1033): avc: denied { search } for pid=7329 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 633.511684][ T29] audit: type=1400 audit(633.380:1034): avc: denied { search } for pid=7329 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 633.574487][ T29] audit: type=1400 audit(633.450:1035): avc: denied { read open } for pid=7330 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 633.577877][ T29] audit: type=1400 audit(633.450:1036): avc: denied { getattr } for pid=7330 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 633.660941][ T29] audit: type=1400 audit(633.530:1037): avc: denied { add_name } for pid=7329 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 633.661474][ T29] audit: type=1400 audit(633.530:1038): avc: denied { create } for pid=7329 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 645.076601][ T7372] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.745' sets config #0 [ 645.093973][ T7372] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.745' sets config #1 [ 646.786209][ T7388] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 646.786954][ T7388] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 665.428667][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 665.451180][ T29] audit: type=1400 audit(665.300:1047): avc: denied { unmount } for pid=4997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 665.805920][ T29] audit: type=1400 audit(665.680:1048): avc: denied { mount } for pid=7449 comm="syz.2.764" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 680.233980][ T7479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14385 sclass=netlink_route_socket pid=7479 comm=syz.4.769 [ 704.685205][ T29] audit: type=1400 audit(704.550:1049): avc: denied { unmount } for pid=6848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 705.364059][ T7498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7498 comm=syz.4.775 [ 705.618800][ T29] audit: type=1400 audit(705.490:1050): avc: denied { connect } for pid=7499 comm="syz.4.776" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 706.376963][ T7507] netlink: 16 bytes leftover after parsing attributes in process `syz.4.780'. [ 708.213121][ T7522] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 708.234525][ T7522] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 708.932541][ T29] audit: type=1400 audit(708.800:1051): avc: denied { create } for pid=7527 comm="syz.4.787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 708.951526][ T29] audit: type=1400 audit(708.820:1052): avc: denied { ioctl } for pid=7527 comm="syz.4.787" path="socket:[11614]" dev="sockfs" ino=11614 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 708.960939][ T29] audit: type=1400 audit(708.830:1053): avc: denied { bind } for pid=7527 comm="syz.4.787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 708.997973][ T29] audit: type=1400 audit(708.860:1054): avc: denied { write } for pid=7527 comm="syz.4.787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 715.180405][ T29] audit: type=1400 audit(715.050:1055): avc: denied { write } for pid=7546 comm="syz.4.794" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 715.589244][ T7551] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 715.591849][ T7551] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 716.883413][ T7555] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 716.888148][ T7555] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 725.716618][ T30] INFO: task kworker/1:4:2886 blocked for more than 430 seconds. [ 725.737020][ T30] Not tainted syzkaller #0 [ 725.738430][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 725.743030][ T30] task:kworker/1:4 state:D [ 725.744112][ T29] audit: type=1400 audit(725.610:1056): avc: denied { write } for pid=3094 comm="syz-executor" path="pipe:[750]" dev="pipefs" ino=750 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 725.747958][ T30] stack:0 pid:2886 tgid:2886 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 725.748508][ T30] Workqueue: events bpf_prog_free_deferred [ 725.749057][ T30] Call trace: [ 725.749306][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 725.749652][ T30] r10:eafc9d84 r9:829174e8 r8:60000013 r7:829174e8 r6:eafc9d8c r5:83910000 [ 725.749748][ T30] r4:83910000 [ 725.749880][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 725.750044][ T30] r5:83910000 r4:829174e4 [ 725.750097][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 725.750163][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 725.750313][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08 [ 725.750466][ T30] r4:00000000 [ 725.750504][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 725.750555][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 725.750615][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 725.750688][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86009140 [ 725.750708][ T30] r4:00000000 [ 725.750726][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 725.750859][ T30] r9:83018605 r8:83910000 r7:00000000 r6:83018600 r5:00001000 r4:7f031000 [ 725.750889][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 725.750966][ T30] r5:00001000 r4:dfa27000 [ 725.751017][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 725.751130][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 725.751207][ T30] r5:86240b94 r4:84ab0a80 [ 725.751334][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 725.751420][ T30] r7:ddde3b40 r6:83018600 r5:86240b94 r4:84ab0a80 [ 725.751475][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 725.751587][ T30] r10:61c88647 r9:83910000 r8:84ab0aac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 725.751624][ T30] r4:84ab0a80 [ 725.751647][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 725.751878][ T30] r10:00000000 r9:84ab0a80 r8:802762fc r7:eafb5e60 r6:84ac7700 r5:83910000 [ 725.889478][ T30] r4:00000001 [ 725.890829][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 725.913697][ T30] Exception stack(0xeafc9fb0 to 0xeafc9ff8) [ 725.915088][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 725.916127][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 725.917127][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 725.929396][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 725.930899][ T30] r4:84b56180 [ 725.940289][ T30] INFO: task kworker/1:4:2886 is blocked on a mutex likely owned by task kworker/1:8:3735. [ 725.953818][ T30] task:kworker/1:8 state:R running task stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 725.974606][ T30] Workqueue: events bpf_prog_free_deferred [ 726.006170][ T30] Call trace: [ 726.007397][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 726.008764][ T30] r10:8280ca38 r9:85918c00 r8:80200c04 r7:e0299d54 r6:ffffffff r5:85918c00 [ 726.009918][ T30] r4:00000000 [ 726.010634][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 726.012943][ T30] Exception stack(0xe0299d20 to 0xe0299d68) [ 726.015013][ T30] 9d20: bfbe5000 ea79b000 00000001 80239018 7f033000 00000001 82ace204 82acd5e0 [ 726.016036][ T30] 9d40: 7f033000 ea79b000 8280ca38 e0299d9c e0299da0 e0299d70 8022fe10 80239030 [ 726.016970][ T30] 9d60: 80000113 ffffffff [ 726.017733][ T30] r5:80000113 r4:80239030 [ 726.018413][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 726.019981][ T30] r4:82ace224 [ 726.020766][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 726.023980][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0299dc0 r5:e0299e08 [ 726.036290][ T30] r4:e0299dc0 [ 726.037810][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.039063][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86009dc0 [ 726.044528][ T30] r4:00000000 [ 726.044863][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.045146][ T30] r9:83018605 r8:85918c00 r7:00000000 r6:83018600 r5:00001000 r4:7f00b000 [ 726.045189][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.045282][ T30] r5:00001000 r4:dfcdb000 [ 726.045303][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.045370][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.045434][ T30] r5:86240794 r4:85f5c100 [ 726.045451][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.045568][ T30] r7:ddde3b40 r6:83018600 r5:86240794 r4:85f5c100 [ 726.045608][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.045687][ T30] r10:61c88647 r9:85918c00 r8:85f5c12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.045710][ T30] r4:85f5c100 [ 726.045727][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.045833][ T30] r10:00000000 r9:85f5c100 r8:802762fc r7:e01cde60 r6:85f5c280 r5:85918c00 [ 726.045860][ T30] r4:00000001 [ 726.045967][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.046336][ T30] Exception stack(0xe0299fb0 to 0xe0299ff8) [ 726.046422][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.046456][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.046487][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.046534][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.046595][ T30] r4:84d17900 [ 726.176069][ T30] INFO: task kworker/1:120:4798 blocked for more than 430 seconds. [ 726.179651][ T30] Not tainted syzkaller #0 [ 726.185891][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 726.187298][ T30] task:kworker/1:120 state:D stack:0 pid:4798 tgid:4798 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.188943][ T30] Workqueue: events bpf_prog_free_deferred [ 726.219211][ T30] Call trace: [ 726.220471][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 726.223952][ T30] r10:e4311d84 r9:829174e8 r8:60000113 r7:829174e8 r6:e4311d8c r5:8538b000 [ 726.225031][ T30] r4:8538b000 [ 726.225708][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 726.226815][ T30] r5:8538b000 r4:829174e4 [ 726.227509][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 726.243348][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 726.245991][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4311e08 [ 726.254218][ T30] r4:00000000 [ 726.256034][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 726.256520][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 726.256721][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.256954][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861d7c40 [ 726.257115][ T30] r4:00000000 [ 726.257264][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.257509][ T30] r9:83018605 r8:8538b000 r7:00000000 r6:83018600 r5:00001000 r4:7f033000 [ 726.257657][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.257907][ T30] r5:00001000 r4:e0177000 [ 726.258050][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.277795][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.279148][ T30] r5:8623af94 r4:861b4980 [ 726.293405][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.296452][ T30] r7:ddde3b40 r6:83018600 r5:8623af94 r4:861b4980 [ 726.298444][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.301167][ T30] r10:61c88647 r9:8538b000 r8:861b49ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.303867][ T30] r4:861b4980 [ 726.304513][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.305701][ T30] r10:00000000 r9:861b4980 r8:802762fc r7:e431de60 r6:861b4f80 r5:8538b000 [ 726.307842][ T30] r4:00000001 [ 726.308987][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.309991][ T30] Exception stack(0xe4311fb0 to 0xe4311ff8) [ 726.310810][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 726.311768][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.314108][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.315001][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.315947][ T30] r4:851fa600 [ 726.316984][ T30] INFO: task kworker/1:120:4798 is blocked on a mutex likely owned by task kworker/1:8:3735. [ 726.318143][ T30] task:kworker/1:8 state:R running task stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.320285][ T30] Workqueue: events bpf_prog_free_deferred [ 726.324821][ T30] Call trace: [ 726.325982][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 726.327046][ T30] r10:8280ca38 r9:85918c00 r8:80200c04 r7:e0299d54 r6:ffffffff r5:85918c00 [ 726.328057][ T30] r4:00000000 [ 726.328761][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 726.332537][ T30] Exception stack(0xe0299d20 to 0xe0299d68) [ 726.333536][ T30] 9d20: c08ff000 ea79b000 00000001 80239018 7f033000 00000001 82ace204 82acd5e0 [ 726.334674][ T30] 9d40: 7f033000 ea79b000 8280ca38 e0299d9c e0299da0 e0299d70 8022fe10 80239030 [ 726.335754][ T30] 9d60: 80000113 ffffffff [ 726.336664][ T30] r5:80000113 r4:80239030 [ 726.337472][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 726.338609][ T30] r4:82ace224 [ 726.339230][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 726.340341][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0299dc0 r5:e0299e08 [ 726.341249][ T30] r4:e0299dc0 [ 726.352943][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.354386][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86009dc0 [ 726.355322][ T30] r4:00000000 [ 726.355978][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.356986][ T30] r9:83018605 r8:85918c00 r7:00000000 r6:83018600 r5:00001000 r4:7f00b000 [ 726.357894][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.360523][ T30] r5:00001000 r4:dfcdb000 [ 726.361289][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.363768][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.364861][ T30] r5:86240794 r4:85f5c100 [ 726.365503][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.366468][ T30] r7:ddde3b40 r6:83018600 r5:86240794 r4:85f5c100 [ 726.367261][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.368311][ T30] r10:61c88647 r9:85918c00 r8:85f5c12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.369198][ T30] r4:85f5c100 [ 726.369837][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.370855][ T30] r10:00000000 r9:85f5c100 r8:802762fc r7:e01cde60 r6:85f5c280 r5:85918c00 [ 726.371765][ T30] r4:00000001 [ 726.373172][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.374108][ T30] Exception stack(0xe0299fb0 to 0xe0299ff8) [ 726.374961][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.377138][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.383424][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.386312][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.387922][ T30] r4:84d17900 [ 726.390419][ T30] INFO: task kworker/1:122:4811 blocked for more than 430 seconds. [ 726.391576][ T30] Not tainted syzkaller #0 [ 726.394261][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 726.395336][ T30] task:kworker/1:122 state:D stack:0 pid:4811 tgid:4811 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.404848][ T30] Workqueue: events bpf_prog_free_deferred [ 726.406130][ T30] Call trace: [ 726.407181][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 726.408204][ T30] r10:eaaedd84 r9:829174e8 r8:60000013 r7:829174e8 r6:eaaedd8c r5:85923000 [ 726.409118][ T30] r4:85923000 [ 726.409815][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 726.411038][ T30] r5:85923000 r4:829174e4 [ 726.411785][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 726.462853][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 726.465287][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08 [ 726.465364][ T30] r4:00000000 [ 726.465426][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 726.465522][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 726.465585][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.465665][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861ceb40 [ 726.465688][ T30] r4:00000000 [ 726.465789][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.465952][ T30] r9:83018605 r8:85923000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [ 726.466025][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.466106][ T30] r5:00001000 r4:df94e000 [ 726.466125][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.466182][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.466248][ T30] r5:8623b394 r4:84d1bf80 [ 726.466398][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.466483][ T30] r7:ddde3b40 r6:83018600 r5:8623b394 r4:84d1bf80 [ 726.466537][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.466631][ T30] r10:61c88647 r9:85923000 r8:84d1bfac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.466684][ T30] r4:84d1bf80 [ 726.466789][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.466893][ T30] r10:00000000 r9:84d1bf80 r8:802762fc r7:e4311e60 r6:84d1be80 r5:85923000 [ 726.466915][ T30] r4:00000001 [ 726.466973][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.467105][ T30] Exception stack(0xeaaedfb0 to 0xeaaedff8) [ 726.467223][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 726.467345][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.467384][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.467424][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.467446][ T30] r4:85fd43c0 [ 726.467826][ T30] INFO: task kworker/1:122:4811 is blocked on a mutex likely owned by task kworker/1:8:3735. [ 726.467904][ T30] task:kworker/1:8 state:R running task stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.468106][ T30] Workqueue: events bpf_prog_free_deferred [ 726.468392][ T30] Call trace: [ 726.468477][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 726.468570][ T30] r10:8280ca38 r9:85918c00 r8:80200c04 r7:e0299d54 r6:ffffffff r5:85918c00 [ 726.468602][ T30] r4:00000000 [ 726.468698][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 726.468771][ T30] Exception stack(0xe0299d20 to 0xe0299d68) [ 726.468815][ T30] 9d20: c1899000 ea79b000 00000001 80239018 7f033000 00000001 82ace204 82acd5e0 [ 726.468855][ T30] 9d40: 7f033000 ea79b000 8280ca38 e0299d9c e0299da0 e0299d70 8022fe10 80239030 [ 726.468885][ T30] 9d60: 80000113 ffffffff [ 726.468914][ T30] r5:80000113 r4:80239030 [ 726.468933][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 726.469024][ T30] r4:82ace224 [ 726.469047][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 726.469148][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0299dc0 r5:e0299e08 [ 726.469180][ T30] r4:e0299dc0 [ 726.469196][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.469394][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86009dc0 [ 726.469478][ T30] r4:00000000 [ 726.469505][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.469603][ T30] r9:83018605 r8:85918c00 r7:00000000 r6:83018600 r5:00001000 r4:7f00b000 [ 726.469627][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.469702][ T30] r5:00001000 r4:dfcdb000 [ 726.469717][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.469796][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.469922][ T30] r5:86240794 r4:85f5c100 [ 726.470030][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.470121][ T30] r7:ddde3b40 r6:83018600 r5:86240794 r4:85f5c100 [ 726.470142][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.470220][ T30] r10:61c88647 r9:85918c00 r8:85f5c12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.470246][ T30] r4:85f5c100 [ 726.470262][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.470366][ T30] r10:00000000 r9:85f5c100 r8:802762fc r7:e01cde60 r6:85f5c280 r5:85918c00 [ 726.470472][ T30] r4:00000001 [ 726.470665][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.470736][ T30] Exception stack(0xe0299fb0 to 0xe0299ff8) [ 726.470794][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.470836][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.471230][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.471324][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.471406][ T30] r4:84d17900 [ 726.471532][ T30] INFO: task kworker/1:123:4827 blocked for more than 430 seconds. [ 726.471669][ T30] Not tainted syzkaller #0 [ 726.471704][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 726.471743][ T30] task:kworker/1:123 state:D stack:0 pid:4827 tgid:4827 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.471837][ T30] Workqueue: events bpf_prog_free_deferred [ 726.471910][ T30] Call trace: [ 726.472265][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 726.506607][ T30] r10:e02d9d84 r9:829174e8 r8:60000013 r7:829174e8 r6:e02d9d8c r5:861a1800 [ 726.506719][ T30] r4:861a1800 [ 726.506742][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 726.506877][ T30] r5:861a1800 r4:829174e4 [ 726.506895][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 726.506997][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 726.508232][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e02d9e08 [ 726.508591][ T30] r4:00000000 [ 726.508640][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 726.508784][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 726.508849][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.508917][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860095c0 [ 726.509005][ T30] r4:00000000 [ 726.509027][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.509200][ T30] r9:83018605 r8:861a1800 r7:00000000 r6:83018600 r5:00001000 r4:7f02f000 [ 726.509225][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.509299][ T30] r5:00001000 r4:dfa14000 [ 726.509319][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.509380][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.509430][ T30] r5:86242794 r4:84d1b800 [ 726.509488][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.509611][ T30] r7:ddde3b40 r6:83018600 r5:86242794 r4:84d1b800 [ 726.509680][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.509779][ T30] r10:61c88647 r9:861a1800 r8:84d1b82c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.509848][ T30] r4:84d1b800 [ 726.509872][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.509942][ T30] r10:00000000 r9:84d1b800 r8:802762fc r7:eaaede60 r6:861e1c00 r5:861a1800 [ 726.510206][ T30] r4:00000001 [ 726.510515][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.510665][ T30] Exception stack(0xe02d9fb0 to 0xe02d9ff8) [ 726.511001][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.511074][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.511148][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.511205][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.511230][ T30] r4:85fdc580 [ 726.511698][ T30] INFO: task kworker/1:123:4827 is blocked on a mutex likely owned by task kworker/1:8:3735. [ 726.511761][ T30] task:kworker/1:8 state:R running task stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000002 [ 726.549736][ T30] Workqueue: events bpf_prog_free_deferred [ 726.549885][ T30] Call trace: [ 726.549922][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 726.550073][ T30] r10:8280ca38 r9:85918c00 r8:80200c04 r7:e0299d54 r6:ffffffff r5:85918c00 [ 726.550107][ T30] r4:00000000 [ 726.550254][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 726.550345][ T30] Exception stack(0xe0299d20 to 0xe0299d68) [ 726.550392][ T30] 9d20: c1a93000 ea79b000 00000001 80239018 7f033000 00000001 82ace204 82acd5e0 [ 726.550433][ T30] 9d40: 7f033000 ea79b000 8280ca38 e0299d9c e0299da0 e0299d70 8022fe10 80239030 [ 726.550461][ T30] 9d60: 80000113 ffffffff [ 726.550492][ T30] r5:80000113 r4:80239030 [ 726.550512][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 726.550601][ T30] r4:82ace224 [ 726.550620][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 726.550700][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0299dc0 r5:e0299e08 [ 726.550727][ T30] r4:e0299dc0 [ 726.550746][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.550826][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86009dc0 [ 726.550877][ T30] r4:00000000 [ 726.550910][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.550999][ T30] r9:83018605 r8:85918c00 r7:00000000 r6:83018600 r5:00001000 r4:7f00b000 [ 726.551025][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.551093][ T30] r5:00001000 r4:dfcdb000 [ 726.551111][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.551170][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.551224][ T30] r5:86240794 r4:85f5c100 [ 726.551242][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.551328][ T30] r7:ddde3b40 r6:83018600 r5:86240794 r4:85f5c100 [ 726.551354][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.551493][ T30] r10:61c88647 r9:85918c00 r8:85f5c12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.551543][ T30] r4:85f5c100 [ 726.551564][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.551640][ T30] r10:00000000 r9:85f5c100 r8:802762fc r7:e01cde60 r6:85f5c280 r5:85918c00 [ 726.551664][ T30] r4:00000001 [ 726.551725][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.551800][ T30] Exception stack(0xe0299fb0 to 0xe0299ff8) [ 726.552016][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.563631][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.563791][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.563848][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.563874][ T30] r4:84d17900 [ 726.567903][ T30] INFO: task kworker/1:124:4899 blocked for more than 430 seconds. [ 726.568050][ T30] Not tainted syzkaller #0 [ 726.568080][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 726.568135][ T30] task:kworker/1:124 state:D stack:0 pid:4899 tgid:4899 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.568278][ T30] Workqueue: events bpf_prog_free_deferred [ 726.568485][ T30] Call trace: [ 726.568536][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 726.568643][ T30] r10:e4375d84 r9:829174e8 r8:60000113 r7:829174e8 r6:e4375d8c r5:85926000 [ 726.568680][ T30] r4:85926000 [ 726.568702][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 726.568782][ T30] r5:85926000 r4:829174e4 [ 726.568801][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 726.569060][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 726.569136][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4375e08 [ 726.569203][ T30] r4:00000000 [ 726.569224][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 726.569282][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 726.569351][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.569427][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861d7a80 [ 726.569451][ T30] r4:00000000 [ 726.569471][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.569579][ T30] r9:83018605 r8:85926000 r7:00000000 r6:83018600 r5:00001000 r4:7f02b000 [ 726.569603][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.569680][ T30] r5:00001000 r4:e00e9000 [ 726.569700][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.569761][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.569833][ T30] r5:8623ab94 r4:85d12200 [ 726.569854][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.569923][ T30] r7:ddde3b40 r6:83018600 r5:8623ab94 r4:85d12200 [ 726.569942][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.570111][ T30] r10:61c88647 r9:85926000 r8:85d1222c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.570143][ T30] r4:85d12200 [ 726.570160][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.570233][ T30] r10:00000000 r9:85d12200 r8:802762fc r7:eafc9e60 r6:85d12480 r5:85926000 [ 726.570252][ T30] r4:00000001 [ 726.570270][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.570322][ T30] Exception stack(0xe4375fb0 to 0xe4375ff8) [ 726.570354][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 726.570388][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.570480][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.570545][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.570602][ T30] r4:86012080 [ 726.571025][ T30] INFO: task kworker/1:124:4899 is blocked on a mutex likely owned by task kworker/1:8:3735. [ 726.571072][ T30] task:kworker/1:8 state:R running task stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.571176][ T30] Workqueue: events bpf_prog_free_deferred [ 726.571230][ T30] Call trace: [ 726.571265][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 726.571354][ T30] r10:8280ca38 r9:85918c00 r8:80200c04 r7:e0299d54 r6:ffffffff r5:85918c00 [ 726.571380][ T30] r4:00000000 [ 726.571399][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 726.571458][ T30] Exception stack(0xe0299d20 to 0xe0299d68) [ 726.571493][ T30] 9d20: c1a93000 ea79b000 00000001 80239018 7f033000 00000001 82ace204 82acd5e0 [ 726.571550][ T30] 9d40: 7f033000 ea79b000 8280ca38 e0299d9c e0299da0 e0299d70 8022fe10 80239030 [ 726.571580][ T30] 9d60: 80000113 ffffffff [ 726.571610][ T30] r5:80000113 r4:80239030 [ 726.571633][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 726.571713][ T30] r4:82ace224 [ 726.571757][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 726.615006][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0299dc0 r5:e0299e08 [ 726.615201][ T30] r4:e0299dc0 [ 726.615241][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.615391][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86009dc0 [ 726.615417][ T30] r4:00000000 [ 726.615435][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.615522][ T30] r9:83018605 r8:85918c00 r7:00000000 r6:83018600 r5:00001000 r4:7f00b000 [ 726.615590][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.615731][ T30] r5:00001000 r4:dfcdb000 [ 726.615760][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.615856][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.615978][ T30] r5:86240794 r4:85f5c100 [ 726.616230][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.616362][ T30] r7:ddde3b40 r6:83018600 r5:86240794 r4:85f5c100 [ 726.616592][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.616677][ T30] r10:61c88647 r9:85918c00 r8:85f5c12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.616699][ T30] r4:85f5c100 [ 726.616839][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.616961][ T30] r10:00000000 r9:85f5c100 r8:802762fc r7:e01cde60 r6:85f5c280 r5:85918c00 [ 726.617591][ T30] r4:00000001 [ 726.617624][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.618093][ T30] Exception stack(0xe0299fb0 to 0xe0299ff8) [ 726.618150][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.618192][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.618638][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.618813][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.618855][ T30] r4:84d17900 [ 726.618907][ T30] INFO: task kworker/0:120:4919 blocked for more than 430 seconds. [ 726.618960][ T30] Not tainted syzkaller #0 [ 726.618989][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 726.619010][ T30] task:kworker/0:120 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.619112][ T30] Workqueue: events bpf_prog_free_deferred [ 726.619171][ T30] Call trace: [ 726.619276][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 726.619411][ T30] r10:e432dd84 r9:829174e8 r8:60000113 r7:829174e8 r6:e432dd8c r5:85360c00 [ 726.619439][ T30] r4:85360c00 [ 726.619516][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 726.619777][ T30] r5:85360c00 r4:829174e4 [ 726.620160][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 726.620268][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 726.620343][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e432de08 [ 726.620610][ T30] r4:00000000 [ 726.620646][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 726.620916][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 726.621069][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.621161][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861d7240 [ 726.621185][ T30] r4:00000000 [ 726.621202][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.621280][ T30] r9:83018405 r8:85360c00 r7:00000000 r6:83018400 r5:00001000 r4:7f00d000 [ 726.621340][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.621436][ T30] r5:00001000 r4:e00d4000 [ 726.621457][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.621519][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.621591][ T30] r5:8623a794 r4:85851380 [ 726.621658][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.621782][ T30] r7:dddcfb40 r6:83018400 r5:8623a794 r4:85851380 [ 726.621828][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.661146][ T30] r10:61c88647 r9:85360c00 r8:858513ac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 726.661285][ T30] r4:85851380 [ 726.661313][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.661439][ T30] r10:00000000 r9:85851380 r8:802762fc r7:ea685e60 r6:85851400 r5:85360c00 [ 726.661464][ T30] r4:00000001 [ 726.661481][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.661538][ T30] Exception stack(0xe432dfb0 to 0xe432dff8) [ 726.661582][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 726.661623][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.661659][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.661700][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.661763][ T30] r4:86012080 [ 726.719630][ T30] INFO: task kworker/0:120:4919 is blocked on a mutex likely owned by task kworker/1:8:3735. [ 726.757435][ T30] task:kworker/1:8 state:R running task stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000002 [ 726.880281][ T30] Workqueue: events bpf_prog_free_deferred [ 726.880897][ T30] Call trace: [ 726.881040][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 726.881216][ T30] r10:8280ca38 r9:85918c00 r8:80200c04 r7:e0299d54 r6:ffffffff r5:85918c00 [ 726.881278][ T30] r4:00000000 [ 726.881302][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 726.881367][ T30] Exception stack(0xe0299d20 to 0xe0299d68) [ 726.881412][ T30] 9d20: c5c50000 ea79b000 00000001 80239018 7f033000 00000001 82ace204 82acd5e0 [ 726.881482][ T30] 9d40: 7f033000 ea79b000 8280ca38 e0299d9c e0299da0 e0299d70 8022fe10 80239030 [ 726.881524][ T30] 9d60: 80000113 ffffffff [ 726.881554][ T30] r5:80000113 r4:80239030 [ 726.881573][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 726.881656][ T30] r4:82ace224 [ 726.881673][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 726.881795][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0299dc0 r5:e0299e08 [ 726.882547][ T30] r4:e0299dc0 [ 726.882601][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.882700][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86009dc0 [ 726.882722][ T30] r4:00000000 [ 726.882771][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.882858][ T30] r9:83018605 r8:85918c00 r7:00000000 r6:83018600 r5:00001000 r4:7f00b000 [ 726.882894][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.882976][ T30] r5:00001000 r4:dfcdb000 [ 726.883006][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.883067][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.883151][ T30] r5:86240794 r4:85f5c100 [ 726.883175][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.883253][ T30] r7:ddde3b40 r6:83018600 r5:86240794 r4:85f5c100 [ 726.883274][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.883346][ T30] r10:61c88647 r9:85918c00 r8:85f5c12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.883368][ T30] r4:85f5c100 [ 726.883429][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.883521][ T30] r10:00000000 r9:85f5c100 r8:802762fc r7:e01cde60 r6:85f5c280 r5:85918c00 [ 726.883543][ T30] r4:00000001 [ 726.883559][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.883638][ T30] Exception stack(0xe0299fb0 to 0xe0299ff8) [ 726.883678][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.883710][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.883763][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.883807][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.883827][ T30] r4:84d17900 [ 726.887491][ T5446] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 726.890924][ T30] INFO: task kworker/1:125:4936 blocked for more than 431 seconds. [ 726.891004][ T30] Not tainted syzkaller #0 [ 726.891033][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 726.891051][ T30] task:kworker/1:125 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.891138][ T30] Workqueue: events bpf_prog_free_deferred [ 726.891223][ T30] Call trace: [ 726.891255][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 726.891359][ T30] r10:dfbc1d84 r9:829174e8 r8:60000013 r7:829174e8 r6:dfbc1d8c r5:85362400 [ 726.891382][ T30] r4:85362400 [ 726.891399][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 726.891464][ T30] r5:85362400 r4:829174e4 [ 726.891480][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 726.891552][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 726.891619][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 [ 726.891638][ T30] r4:00000000 [ 726.891654][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 726.891706][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 726.891772][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.900059][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861d73c0 [ 726.900153][ T30] r4:00000000 [ 726.900272][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.900438][ T30] r9:83018605 r8:85362400 r7:00000000 r6:83018600 r5:00001000 r4:7f003000 [ 726.900464][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.900539][ T30] r5:00001000 r4:df937000 [ 726.900565][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.900603][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.900638][ T30] r5:8623bb94 r4:85d12080 [ 726.900647][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.900687][ T30] r7:ddde3b40 r6:83018600 r5:8623bb94 r4:85d12080 [ 726.900696][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.900756][ T30] r10:61c88647 r9:85362400 r8:85d120ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.900769][ T30] r4:85d12080 [ 726.900778][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.900848][ T30] r10:00000000 r9:85d12080 r8:802762fc r7:eaaede60 r6:85851200 r5:85362400 [ 726.900861][ T30] r4:00000001 [ 726.900870][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.900897][ T30] Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) [ 726.900919][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 726.900938][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.900955][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.900977][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.901002][ T30] r4:861d72c0 [ 726.901213][ T30] INFO: task kworker/1:125:4936 is blocked on a mutex likely owned by task kworker/1:8:3735. [ 726.901237][ T30] task:kworker/1:8 state:R running task stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.901314][ T30] Workqueue: events bpf_prog_free_deferred [ 726.901347][ T30] Call trace: [ 726.901365][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 726.901434][ T30] r10:8280ca38 r9:85918c00 r8:80200c04 r7:e0299d54 r6:ffffffff r5:85918c00 [ 726.901447][ T30] r4:00000000 [ 726.901457][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 726.901508][ T30] Exception stack(0xe0299d20 to 0xe0299d68) [ 726.901533][ T30] 9d20: c5c50000 ea79b000 00000001 80239018 7f033000 00000001 82ace204 82acd5e0 [ 726.901576][ T30] 9d40: 7f033000 ea79b000 8280ca38 e0299d9c e0299da0 e0299d70 8022fe10 80239030 [ 726.901590][ T30] 9d60: 80000113 ffffffff [ 726.901642][ T30] r5:80000113 r4:80239030 [ 726.901653][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 726.901698][ T30] r4:82ace224 [ 726.901849][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 726.914711][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0299dc0 r5:e0299e08 [ 726.914791][ T30] r4:e0299dc0 [ 726.914809][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.915106][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86009dc0 [ 726.915231][ T30] r4:00000000 [ 726.915276][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.915361][ T30] r9:83018605 r8:85918c00 r7:00000000 r6:83018600 r5:00001000 r4:7f00b000 [ 726.915394][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.915492][ T30] r5:00001000 r4:dfcdb000 [ 726.915512][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.915567][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.915675][ T30] r5:86240794 r4:85f5c100 [ 726.915728][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.915805][ T30] r7:ddde3b40 r6:83018600 r5:86240794 r4:85f5c100 [ 726.915822][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.915904][ T30] r10:61c88647 r9:85918c00 r8:85f5c12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.915926][ T30] r4:85f5c100 [ 726.915957][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.916338][ T30] r10:00000000 r9:85f5c100 r8:802762fc r7:e01cde60 r6:85f5c280 r5:85918c00 [ 726.916393][ T30] r4:00000001 [ 726.916415][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.916508][ T30] Exception stack(0xe0299fb0 to 0xe0299ff8) [ 726.916587][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.916630][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.916661][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.916698][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.916719][ T30] r4:84d17900 [ 726.916814][ T30] INFO: task kworker/1:126:4944 blocked for more than 431 seconds. [ 726.916900][ T30] Not tainted syzkaller #0 [ 726.916928][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 726.916948][ T30] task:kworker/1:126 state:D stack:0 pid:4944 tgid:4944 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.917117][ T30] Workqueue: events bpf_prog_free_deferred [ 726.917209][ T30] Call trace: [ 726.917389][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 726.917517][ T30] r10:e4321d84 r9:829174e8 r8:60000013 r7:829174e8 r6:e4321d8c r5:85360000 [ 726.917545][ T30] r4:85360000 [ 726.917565][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 726.917653][ T30] r5:85360000 r4:829174e4 [ 726.917671][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 726.917729][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 726.917958][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4321e08 [ 726.918000][ T30] r4:00000000 [ 726.918020][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 726.918071][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 726.918126][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.918336][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861d7540 [ 726.918361][ T30] r4:00000000 [ 726.918450][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.918553][ T30] r9:83018605 r8:85360000 r7:00000000 r6:83018600 r5:00001000 r4:7f035000 [ 726.918574][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.918653][ T30] r5:00001000 r4:e83e5000 [ 726.918671][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.918790][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.918958][ T30] r5:8623bf94 r4:85d12580 [ 726.918996][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.919066][ T30] r7:ddde3b40 r6:83018600 r5:8623bf94 r4:85d12580 [ 726.919084][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.919183][ T30] r10:61c88647 r9:85360000 r8:85d125ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.919208][ T30] r4:85d12580 [ 726.919224][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.919292][ T30] r10:00000000 r9:85d12580 r8:802762fc r7:e02d9e60 r6:85851b00 r5:85360000 [ 726.919312][ T30] r4:00000001 [ 726.919515][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.919599][ T30] Exception stack(0xe4321fb0 to 0xe4321ff8) [ 726.919632][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 726.919698][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.919770][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.919812][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.919832][ T30] r4:861ce900 [ 726.920265][ T30] INFO: task kworker/1:126:4944 is blocked on a mutex likely owned by task kworker/1:8:3735. [ 726.920312][ T30] task:kworker/1:8 state:R running task stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.920494][ T30] Workqueue: events bpf_prog_free_deferred [ 726.920549][ T30] Call trace: [ 726.920576][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 726.920656][ T30] r10:8280ca38 r9:85918c00 r8:80200c04 r7:e0299d54 r6:ffffffff r5:85918c00 [ 726.920678][ T30] r4:00000000 [ 726.920696][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 726.920749][ T30] Exception stack(0xe0299d20 to 0xe0299d68) [ 726.920793][ T30] 9d20: c5c50000 ea79b000 00000001 80239018 7f033000 00000001 82ace204 82acd5e0 [ 726.920829][ T30] 9d40: 7f033000 ea79b000 8280ca38 e0299d9c e0299da0 e0299d70 8022fe10 80239030 [ 726.920917][ T30] 9d60: 80000113 ffffffff [ 726.920950][ T30] r5:80000113 r4:80239030 [ 726.920969][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 726.921039][ T30] r4:82ace224 [ 726.921056][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 726.921136][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0299dc0 r5:e0299e08 [ 726.921159][ T30] r4:e0299dc0 [ 726.921243][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.921320][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86009dc0 [ 726.921342][ T30] r4:00000000 [ 726.921358][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.921435][ T30] r9:83018605 r8:85918c00 r7:00000000 r6:83018600 r5:00001000 r4:7f00b000 [ 726.921454][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.921543][ T30] r5:00001000 r4:dfcdb000 [ 726.921566][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.921641][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.921704][ T30] r5:86240794 r4:85f5c100 [ 726.921822][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.921985][ T30] r7:ddde3b40 r6:83018600 r5:86240794 r4:85f5c100 [ 726.942851][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.943059][ T30] r10:61c88647 r9:85918c00 r8:85f5c12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.943100][ T30] r4:85f5c100 [ 726.943173][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.943254][ T30] r10:00000000 r9:85f5c100 r8:802762fc r7:e01cde60 r6:85f5c280 r5:85918c00 [ 726.943276][ T30] r4:00000001 [ 726.943295][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.943370][ T30] Exception stack(0xe0299fb0 to 0xe0299ff8) [ 726.943414][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.943451][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.943483][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.943566][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.943592][ T30] r4:84d17900 [ 726.943635][ T30] INFO: task kworker/1:128:4947 blocked for more than 431 seconds. [ 726.943679][ T30] Not tainted syzkaller #0 [ 726.943703][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 726.943754][ T30] task:kworker/1:128 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.943898][ T30] Workqueue: events bpf_prog_free_deferred [ 726.944047][ T30] Call trace: [ 726.944116][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 726.944505][ T30] r10:e4335d84 r9:829174e8 r8:60010113 r7:829174e8 r6:e4335d8c r5:85920000 [ 726.944540][ T30] r4:85920000 [ 726.944559][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 726.944716][ T30] r5:85920000 r4:829174e4 [ 726.944736][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 726.944798][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 726.944902][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4335e08 [ 726.944928][ T30] r4:00000000 [ 726.944946][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 726.945006][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 726.945069][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.945172][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861cec80 [ 726.945242][ T30] r4:00000000 [ 726.945288][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.945393][ T30] r9:83018605 r8:85920000 r7:00000000 r6:83018600 r5:00001000 r4:7f037000 [ 726.945415][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.945521][ T30] r5:00001000 r4:dfab3000 [ 726.945576][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.945637][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.945690][ T30] r5:86238794 r4:85d12000 [ 726.945705][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.945762][ T30] r7:ddde3b40 r6:83018600 r5:86238794 r4:85d12000 [ 726.945777][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.945838][ T30] r10:61c88647 r9:85920000 r8:85d1202c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.945857][ T30] r4:85d12000 [ 726.945871][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.945935][ T30] r10:00000000 r9:85d12000 r8:802762fc r7:ea411e60 r6:85d12280 r5:85920000 [ 726.945955][ T30] r4:00000001 [ 726.945970][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.946014][ T30] Exception stack(0xe4335fb0 to 0xe4335ff8) [ 726.946046][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 726.946092][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.946129][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.946169][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.946190][ T30] r4:861cef40 [ 726.946707][ T30] INFO: task kworker/1:128:4947 is blocked on a mutex likely owned by task kworker/1:8:3735. [ 726.946861][ T30] task:kworker/1:8 state:R running task stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 726.947167][ T30] Workqueue: events bpf_prog_free_deferred [ 726.947408][ T30] Call trace: [ 726.947459][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 726.947578][ T30] r10:8280ca38 r9:85918c00 r8:80200c04 r7:e0299d54 r6:ffffffff r5:85918c00 [ 726.947599][ T30] r4:00000000 [ 726.947615][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 726.947683][ T30] Exception stack(0xe0299d20 to 0xe0299d68) [ 726.947996][ T30] 9d20: c5c50000 ea79b000 00000001 80239018 7f033000 00000001 82ace204 82acd5e0 [ 726.948176][ T30] 9d40: 7f033000 ea79b000 8280ca38 e0299d9c e0299da0 e0299d70 8022fe10 80239030 [ 726.948230][ T30] 9d60: 80000113 ffffffff [ 726.948265][ T30] r5:80000113 r4:80239030 [ 726.948288][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 726.948482][ T30] r4:82ace224 [ 726.948502][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 726.948575][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0299dc0 r5:e0299e08 [ 726.948593][ T30] r4:e0299dc0 [ 726.948606][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 726.948678][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86009dc0 [ 726.948717][ T30] r4:00000000 [ 726.948739][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 726.948839][ T30] r9:83018605 r8:85918c00 r7:00000000 r6:83018600 r5:00001000 r4:7f00b000 [ 726.948866][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 726.948966][ T30] r5:00001000 r4:dfcdb000 [ 726.948985][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 726.949048][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 726.949265][ T30] r5:86240794 r4:85f5c100 [ 726.949372][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 726.949451][ T30] r7:ddde3b40 r6:83018600 r5:86240794 r4:85f5c100 [ 726.949472][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 726.949566][ T30] r10:61c88647 r9:85918c00 r8:85f5c12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 726.949684][ T30] r4:85f5c100 [ 726.949703][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.950218][ T30] r10:00000000 r9:85f5c100 r8:802762fc r7:e01cde60 r6:85f5c280 r5:85918c00 [ 726.950371][ T30] r4:00000001 [ 726.950390][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.950480][ T30] Exception stack(0xe0299fb0 to 0xe0299ff8) [ 726.950519][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.950555][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.950587][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.950643][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.950682][ T30] r4:84d17900 [ 726.994829][ T30] NMI backtrace for cpu 0 [ 726.995406][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 726.995962][ T30] Hardware name: ARM-Versatile Express [ 726.996247][ T30] Call trace: [ 726.996322][ T30] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 726.996488][ T30] r7:00000000 r6:000f0113 r5:600f0193 r4:8229586c [ 726.996517][ T30] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 726.996578][ T30] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 726.996625][ T30] r5:00000000 r4:00000001 [ 726.996639][ T30] [<8021ee40>] (dump_stack) from [<81a9b8e0>] (nmi_cpu_backtrace+0x160/0x17c) [ 726.996700][ T30] [<81a9b780>] (nmi_cpu_backtrace) from [<81a9ba2c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 726.996757][ T30] r7:00000000 r6:8280c710 r5:8281af5c r4:ffffffff [ 726.996826][ T30] [<81a9b8fc>] (nmi_trigger_cpumask_backtrace) from [<8022f818>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 726.996925][ T30] r9:00007d54 r8:8280c890 r7:0000a6b5 r6:00007d54 r5:82ac27e4 r4:00000048 [ 726.996971][ T30] [<8022f800>] (arch_trigger_cpumask_backtrace) from [<81aa353c>] (sys_info+0x68/0xa8) [ 726.997146][ T30] [<81aa34d4>] (sys_info) from [<80383780>] (watchdog+0x464/0x8a0) [ 726.997431][ T30] r5:82ac27e4 r4:864d7c0c [ 726.997466][ T30] [<8038331c>] (watchdog) from [<8027f6fc>] (kthread+0x12c/0x280) [ 726.997573][ T30] r10:00000000 r9:00000000 r8:8038331c r7:830d6380 r6:830d6380 r5:8321c800 [ 726.997645][ T30] r4:00000001 [ 726.997790][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 726.997925][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 726.998003][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 726.998058][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 726.998108][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 726.998164][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 726.998188][ T30] r4:832dbf40 [ 726.999491][ T30] Sending NMI from CPU 0 to CPUs 1: [ 727.000642][ C1] NMI backtrace for cpu 1 [ 727.000856][ C1] CPU: 1 UID: 0 PID: 2819 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 727.000912][ C1] Hardware name: ARM-Versatile Express [ 727.001055][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 727.001142][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 727.001205][ C1] pc : [<81abca50>] lr : [<80aa3968>] psr: 60000113 [ 727.001240][ C1] sp : eaf81eb0 ip : eaf81ec0 fp : eaf81ebc [ 727.001271][ C1] r10: 82959c04 r9 : 00000001 r8 : 00000000 [ 727.001310][ C1] r7 : 00000117 r6 : 82959b68 r5 : 00000000 r4 : 00000001 [ 727.001347][ C1] r3 : 00000da9 r2 : 00000000 r1 : 60000113 r0 : 8400fc40 [ 727.001495][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 727.001564][ C1] Control: 30c5387d Table: 85171b00 DAC: 00000000 [ 727.001624][ C1] Call trace: [ 727.001663][ C1] [<81abca28>] (_raw_spin_unlock_irqrestore) from [<80aa3968>] (pl011_console_device_unlock+0x20/0x24) [ 727.001724][ C1] [<80aa3948>] (pl011_console_device_unlock) from [<802e5720>] (nbcon_emit_one+0x88/0x100) [ 727.001857][ C1] [<802e5698>] (nbcon_emit_one) from [<802e59a0>] (nbcon_kthread_func+0x208/0x2e4) [ 727.001916][ C1] r6:82abf0fc r5:82959b68 r4:83915400 [ 727.001931][ C1] [<802e5798>] (nbcon_kthread_func) from [<8027f6fc>] (kthread+0x12c/0x280) [ 727.001992][ C1] r10:00000000 r9:82959b68 r8:802e5798 r7:84ac1200 r6:84ac1200 r5:83915400 [ 727.002011][ C1] r4:00000001 [ 727.002025][ C1] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 727.002065][ C1] Exception stack(0xeaf81fb0 to 0xeaf81ff8) [ 727.002095][ C1] 1fa0: 00000000 00000000 00000000 00000000 [ 727.002122][ C1] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 727.002148][ C1] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 727.002177][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 727.002194][ C1] r4:84e4e340 [ 727.018462][ T5446] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 727.299686][ T5446] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 727.378297][ T5446] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 728.119205][ T5446] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 728.187004][ T5446] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 728.218112][ T5446] bond0 (unregistering): Released all slaves [ 728.329465][ T5446] hsr_slave_0: left promiscuous mode [ 728.355342][ T5446] hsr_slave_1: left promiscuous mode [ 728.425246][ T5446] batadv_slave_0: left promiscuous mode [ 728.426792][ T5446] veth1_macvtap: left promiscuous mode [ 728.426910][ T5446] veth0_macvtap: left promiscuous mode [ 742.779597][ T5446] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 743.299214][ T5446] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 743.386094][ T5446] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 743.975963][ T5446] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 744.681027][ T5446] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 744.693921][ T5446] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 744.724093][ T5446] bond0 (unregistering): Released all slaves [ 744.870391][ T5446] hsr_slave_0: left promiscuous mode [ 744.893624][ T5446] hsr_slave_1: left promiscuous mode [ 744.986277][ T5446] veth1_macvtap: left promiscuous mode [ 744.989933][ T5446] veth0_macvtap: left promiscuous mode [ 745.023478][ T5446] veth1_vlan: left promiscuous mode [ 745.025159][ T5446] veth0_vlan: left promiscuous mode