last executing test programs: 7m32.353868106s ago: executing program 1 (id=199): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) ioprio_set$pid(0x2, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x421, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xc35d4f6d52288271}, 0x200048c4) 7m31.575603668s ago: executing program 1 (id=200): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000340)=0xfffffffffffffff9, 0x2) 7m30.593558346s ago: executing program 1 (id=203): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kmem_cache_free\x00', r1, 0x0, 0x8000}, 0x18) rt_sigpending(0x0, 0x0) 7m30.143910494s ago: executing program 1 (id=206): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="02130000050000000000000000000000030008"], 0x28}}, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x32, 0x0, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0xb}}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x4, "d57e190d001e6e1d16c1711bbd8adbf65bd846957b378a02340c68117aa1b390", "b0b4170e157cddfb9792c8e37bafb99e319950347e93f4d34870ee24c0ea06d56270e45c8d3e7d708161ba81dd33c54b", "01acae6f69ea1443db8d53af54944d4894a87f20c65bfb8e0c8cfb67", {"38f5e54b3dc7c070b4d66f0f9565df74", "d2653a13d554fee0e7be27c873db314d"}}}}}}}, 0x0) 7m29.757223225s ago: executing program 1 (id=208): bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0xfff, @empty, 0x4}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x659, @empty, 0xff}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x98eece0513554594) 7m29.416421409s ago: executing program 1 (id=210): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x3c1, 0x7fffffe, 0x4e0, 0x0, 0x18c, 0x203, 0x320, 0x19030000, 0x410, 0x2e0, 0x2e0, 0x410, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x320, 0x300, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0xe}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x3}, {0x2, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x8}, {}, {0x16}, {0x0, 0xff}, {}, {0x7}, {0x0, 0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0x101}, {}, {0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x9}, {0xfffc, 0x0, 0x0, 0x6}, {}, {0xfffe}, {}, {}, {}, {0xfffe, 0xfb}, {}, {0x7a04}, {}, {}, {0x20, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x800}, {}, {0xb8c, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {0x3}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0xfd}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0xb}, {0x4, 0x2}]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x2, 'syz0\x00', {0x8001}}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz0\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 6m44.206054112s ago: executing program 32 (id=210): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x3c1, 0x7fffffe, 0x4e0, 0x0, 0x18c, 0x203, 0x320, 0x19030000, 0x410, 0x2e0, 0x2e0, 0x410, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x320, 0x300, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0xe}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x3}, {0x2, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x8}, {}, {0x16}, {0x0, 0xff}, {}, {0x7}, {0x0, 0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0x101}, {}, {0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x9}, {0xfffc, 0x0, 0x0, 0x6}, {}, {0xfffe}, {}, {}, {}, {0xfffe, 0xfb}, {}, {0x7a04}, {}, {}, {0x20, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x800}, {}, {0xb8c, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {0x3}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0xfd}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0xb}, {0x4, 0x2}]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x2, 'syz0\x00', {0x8001}}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz0\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 5m29.017794833s ago: executing program 0 (id=366): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001400)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x10448) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/xfrm_stat\x00') 5m28.565265912s ago: executing program 0 (id=369): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/diskstats\x00', 0x0, 0x0) preadv(r2, &(0x7f00000006c0)=[{&(0x7f00000004c0)=""/149, 0x95}], 0x1, 0x31, 0x0) 5m28.374908037s ago: executing program 0 (id=370): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000dfff75390000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r0}, 0x10) unshare(0x22020400) r1 = syz_io_uring_setup(0x3bd4, &(0x7f0000000180)={0x0, 0xcc19, 0x130c8, 0x6, 0x30e}, &(0x7f0000000100), &(0x7f0000000200)) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r1, 0xc, 0x0, 0x0) 5m28.100079682s ago: executing program 0 (id=371): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) 5m27.958205171s ago: executing program 0 (id=372): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f0000000440)={0x28, 0x0, 0x0, @local}, 0x10) listen(r1, 0xa) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x18, 0xf, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x1000}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000840)='virtio_transport_alloc_pkt\x00', r3}, 0x18) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r5}, 0x18) close_range(r0, r4, 0x0) 5m27.346384431s ago: executing program 0 (id=374): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578"], 0x10) 4m41.618012241s ago: executing program 33 (id=374): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578"], 0x10) 13.772894714s ago: executing program 2 (id=735): syz_usb_connect$cdc_ncm(0x3, 0xa4, &(0x7f00000000c0)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x92, 0x2, 0x1, 0x6b, 0x90, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x1, 0x1, 0x9, 0x4}, {0x6, 0x24, 0x1a, 0xb}, [@mdlm={0xffffffffffffff37, 0x24, 0x12, 0xd8}, @mbim={0xc, 0x24, 0x1b, 0xc75, 0x3, 0x80, 0x9, 0xff, 0xd2}, @mdlm={0x15, 0x24, 0x12, 0xfff}]}, {{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x2, 0x7, 0x1}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200, 0x0, 0xe, 0x2}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x9, 0xb, 0x7}}}}}}}]}}, &(0x7f0000000400)={0xa, &(0x7f0000000000)={0xfffffffffffffd60, 0x6, 0x110, 0x5, 0x0, 0x1, 0xff, 0x4}, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="00e9000000"]}) 13.589761918s ago: executing program 2 (id=736): setresuid(0xee01, 0xee01, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB="700000001200030200133a439f00000000000000000000000000000000000000000000000000000000000000000004000000000000000000", @ANYRES32, @ANYBLOB="814b00000000000000000000000000002100010007"], 0x70}}, 0x4040000) 13.480420772s ago: executing program 2 (id=737): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x24}, {0x6}]}) 12.701191484s ago: executing program 2 (id=738): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) setpriority(0x0, 0x0, 0xacf0165) chown(0x0, 0x0, 0xee01) lseek(0xffffffffffffffff, 0x102, 0x0) 12.35268389s ago: executing program 2 (id=739): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @var={0x1, 0x0, 0x0, 0xe, 0x3, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x36, 0xf0, 0x1}, 0x28) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="3400000014000b032bbd7000fcdbdf250a281000", @ANYRES32=r1, @ANYBLOB="080008000604000014000100ff"], 0x34}}, 0x0) 11.714052173s ago: executing program 2 (id=740): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00'}, 0x80) r4 = epoll_create1(0x0) r5 = fcntl$dupfd(r4, 0x2, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@cgroup=r5, r3, 0x11, 0x0, r5}, 0x14) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000140)={@cgroup, r3, 0x11}, 0x11) 2.135889961s ago: executing program 3 (id=764): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) capset(&(0x7f0000000180)={0x19980330}, &(0x7f0000000400)={0x9, 0x80010, 0xb4, 0x3, 0x3, 0x9}) 1.766423649s ago: executing program 3 (id=765): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) dup(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000001200)=@raw={'raw\x00', 0x4001, 0x3, 0x3a0, 0x230, 0x700001b, 0x148, 0x0, 0x148, 0x308, 0x206, 0x240, 0x308, 0x240, 0x7fffffe, 0x0, {[{{@ip={@local, @rand_addr, 0x0, 0x0, 'tunl0\x00', 'bond_slave_1\x00', {0xff}}, 0x1ea, 0x1e8, 0x230, 0x0, {0x390, 0x8f00}, [@common=@inet=@hashlimit2={{0x150}, {'pim6reg1\x00', {0x5, 0x1ff, 0x1, 0x1, 0x1, 0x100, 0x1, 0x8, 0x20}, {0x8}}}, @common=@inet=@socket2={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x8, 0x9, 'snmp\x00', {0xc000}}}}, {{@uncond, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@set={{0x40}, {{0x0, [0x0, 0x6275dd3c01ecbf44, 0x2, 0x4, 0x4], 0x4, 0x2}}}]}, @common=@unspec=@NFQUEUE3={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x400) 987.114491ms ago: executing program 3 (id=766): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x5, [{0x0, 0x2, 0x9}]}, @union]}}, &(0x7f0000000080)=""/156, 0x3e, 0x9c, 0x1}, 0x20) 683.56054ms ago: executing program 3 (id=767): syz_emit_ethernet(0x105, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffff00ffff67eaa8fce2504305be"], 0x0) 314.892189ms ago: executing program 3 (id=768): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000400)=@newsa={0x138, 0x10, 0x1, 0x70bd27, 0x0, {{@in=@broadcast, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x64}, {@in, 0x0, 0x2b}, @in=@dev={0xac, 0x14, 0x14, 0x35}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, 0x5}, {0xfffffffffffffffd, 0x0, 0x8000000, 0x200}, {0x0, 0x0, 0xfffffeff}, 0x0, 0x3506, 0x2, 0x2, 0x2, 0x4f}, [@algo_crypt={0x48, 0x2, {{'ctr(camellia)\x00'}}}]}, 0x138}}, 0x0) 0s ago: executing program 3 (id=769): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x3) ioctl$TIOCSSOFTCAR(r0, 0x5432, 0x0) kernel console output (not intermixed with test programs): 2473): avc: denied { perfmon } for pid=5297 comm="syz.0.335" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 262.617098][ T29] audit: type=1400 audit(270.428:2474): avc: denied { prog_run } for pid=5297 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 262.923243][ T29] audit: type=1400 audit(270.848:2475): avc: denied { execmem } for pid=5297 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 266.675278][ T29] audit: type=1400 audit(274.588:2476): avc: denied { map_create } for pid=5291 comm="syz.2.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 266.675732][ T29] audit: type=1400 audit(274.588:2477): avc: denied { bpf } for pid=5291 comm="syz.2.334" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 266.675957][ T29] audit: type=1400 audit(274.588:2478): avc: denied { map_read map_write } for pid=5291 comm="syz.2.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 266.791260][ T29] audit: type=1400 audit(274.708:2479): avc: denied { map_create } for pid=5291 comm="syz.2.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 266.821579][ T29] audit: type=1400 audit(274.748:2480): avc: denied { prog_load } for pid=5291 comm="syz.2.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 267.788865][ T29] audit: type=1400 audit(275.718:2481): avc: denied { prog_load } for pid=5302 comm="syz.0.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 267.819536][ T29] audit: type=1400 audit(275.738:2482): avc: denied { bpf } for pid=5302 comm="syz.0.336" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 267.840757][ T29] audit: type=1400 audit(275.758:2483): avc: denied { perfmon } for pid=5302 comm="syz.0.336" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 267.853312][ T29] audit: type=1400 audit(275.778:2484): avc: denied { prog_run } for pid=5302 comm="syz.0.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 268.445455][ T29] audit: type=1400 audit(276.338:2485): avc: denied { prog_load } for pid=5306 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 268.465621][ T29] audit: type=1400 audit(276.358:2486): avc: denied { bpf } for pid=5306 comm="syz.0.337" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 268.467058][ T29] audit: type=1400 audit(276.358:2487): avc: denied { perfmon } for pid=5306 comm="syz.0.337" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 268.644085][ T29] audit: type=1400 audit(276.568:2488): avc: denied { prog_load } for pid=5309 comm="syz.0.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 268.684468][ T29] audit: type=1400 audit(276.608:2489): avc: denied { bpf } for pid=5309 comm="syz.0.338" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 268.698737][ T29] audit: type=1400 audit(276.608:2490): avc: denied { perfmon } for pid=5309 comm="syz.0.338" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 272.812975][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 272.813367][ T29] audit: type=1400 audit(280.738:2565): avc: denied { map_create } for pid=5349 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 272.813621][ T29] audit: type=1400 audit(280.738:2566): avc: denied { bpf } for pid=5349 comm="syz.0.353" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 272.813693][ T29] audit: type=1400 audit(280.738:2567): avc: denied { map_read map_write } for pid=5349 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 272.820641][ T29] audit: type=1400 audit(280.748:2568): avc: denied { prog_load } for pid=5349 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 272.821019][ T29] audit: type=1400 audit(280.748:2569): avc: denied { perfmon } for pid=5349 comm="syz.0.353" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 272.821274][ T29] audit: type=1400 audit(280.748:2570): avc: denied { prog_run } for pid=5349 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 272.961668][ T29] audit: type=1400 audit(280.888:2571): avc: denied { create } for pid=5349 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 272.969785][ T29] audit: type=1400 audit(280.898:2572): avc: denied { write } for pid=5349 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 273.034237][ T29] audit: type=1400 audit(280.958:2573): avc: denied { prog_load } for pid=5352 comm="syz.2.354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 273.037847][ T29] audit: type=1400 audit(280.968:2574): avc: denied { bpf } for pid=5352 comm="syz.2.354" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 273.098140][ T5353] netlink: 36 bytes leftover after parsing attributes in process `syz.2.354'. [ 273.098641][ T5353] netlink: 16 bytes leftover after parsing attributes in process `syz.2.354'. [ 273.098829][ T5353] netlink: 36 bytes leftover after parsing attributes in process `syz.2.354'. [ 273.099057][ T5353] netlink: 36 bytes leftover after parsing attributes in process `syz.2.354'. [ 274.698528][ T5389] netlink: 4 bytes leftover after parsing attributes in process `syz.0.358'. [ 277.857631][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 277.857923][ T29] audit: type=1400 audit(285.788:2701): avc: denied { read } for pid=5402 comm="syz.2.362" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 277.858142][ T29] audit: type=1400 audit(285.788:2702): avc: denied { open } for pid=5402 comm="syz.2.362" path="/dev/snd/seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 277.973239][ T29] audit: type=1400 audit(285.898:2703): avc: denied { create } for pid=5415 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 278.027276][ T29] audit: type=1400 audit(285.928:2704): avc: denied { create } for pid=5415 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 278.042695][ T29] audit: type=1400 audit(285.968:2706): avc: denied { ioctl } for pid=5415 comm="syz.0.365" path="socket:[5812]" dev="sockfs" ino=5812 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 278.046996][ T29] audit: type=1400 audit(285.958:2705): avc: denied { read } for pid=5402 comm="syz.2.362" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 278.049231][ T29] audit: type=1400 audit(285.968:2707): avc: denied { open } for pid=5402 comm="syz.2.362" path="/dev/snd/seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 278.085597][ T29] audit: type=1400 audit(285.998:2708): avc: denied { connect } for pid=5415 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 278.128723][ T29] audit: type=1400 audit(286.058:2709): avc: denied { write } for pid=5415 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 278.254848][ T5416] netlink: 4 bytes leftover after parsing attributes in process `syz.0.365'. [ 278.635747][ T29] audit: type=1400 audit(286.558:2710): avc: denied { prog_load } for pid=5422 comm="syz.2.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 283.028743][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 283.029789][ T29] audit: type=1400 audit(290.958:2789): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-xcbc(aes)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 283.271570][ T29] audit: type=1400 audit(291.198:2790): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-xcbc(aes)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 283.499904][ T29] audit: type=1400 audit(291.428:2791): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-cmac(aes)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 283.963130][ T29] audit: type=1400 audit(291.888:2792): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-cmac(aes)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 284.227752][ T29] audit: type=1400 audit(292.158:2793): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-hmac(sm3)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 285.003376][ T29] audit: type=1400 audit(292.928:2794): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-hmac(sm3)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 286.368694][ T29] audit: type=1400 audit(294.298:2795): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-ecb(cipher_null)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 286.457900][ T29] audit: type=1400 audit(294.388:2796): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-ecb(cipher_null)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 287.159534][ T29] audit: type=1400 audit(295.088:2797): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-cbc(des)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 287.412013][ T29] audit: type=1400 audit(295.338:2798): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-cbc(des)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 290.705407][ T29] audit: type=1400 audit(298.628:2799): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-cbc(des3_ede)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 290.977683][ T29] audit: type=1400 audit(298.878:2800): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-cbc(des3_ede)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 292.087424][ T29] audit: type=1400 audit(300.018:2801): avc: denied { module_request } for pid=5456 comm="syz.2.376" kmod="crypto-cbc(cast5)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 293.653005][ T29] audit: type=1400 audit(301.548:2802): avc: denied { map_create } for pid=5537 comm="syz.2.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 293.653449][ T29] audit: type=1400 audit(301.548:2803): avc: denied { perfmon } for pid=5537 comm="syz.2.377" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 293.653658][ T29] audit: type=1400 audit(301.548:2804): avc: denied { map_read map_write } for pid=5537 comm="syz.2.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 293.653908][ T29] audit: type=1400 audit(301.578:2805): avc: denied { prog_load } for pid=5537 comm="syz.2.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 293.654149][ T29] audit: type=1400 audit(301.578:2806): avc: denied { bpf } for pid=5537 comm="syz.2.377" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 293.713871][ T29] audit: type=1400 audit(301.628:2807): avc: denied { bpf } for pid=5537 comm="syz.2.377" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 293.714250][ T29] audit: type=1400 audit(301.638:2808): avc: denied { prog_run } for pid=5537 comm="syz.2.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 297.796523][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 297.798169][ T29] audit: type=1400 audit(305.718:2814): avc: denied { create } for pid=5542 comm="syz.2.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 297.801366][ T29] audit: type=1400 audit(305.718:2815): avc: denied { prog_load } for pid=5542 comm="syz.2.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 297.816117][ T29] audit: type=1400 audit(305.738:2816): avc: denied { bpf } for pid=5542 comm="syz.2.379" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 298.034373][ T29] audit: type=1400 audit(305.958:2817): avc: denied { perfmon } for pid=5542 comm="syz.2.379" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 298.157352][ T29] audit: type=1400 audit(306.088:2818): avc: denied { prog_run } for pid=5542 comm="syz.2.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 298.282276][ T29] audit: type=1400 audit(306.198:2819): avc: denied { connect } for pid=5542 comm="syz.2.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 299.025546][ T29] audit: type=1400 audit(306.948:2820): avc: denied { map_create } for pid=5547 comm="syz.2.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 299.025920][ T29] audit: type=1400 audit(306.948:2821): avc: denied { bpf } for pid=5547 comm="syz.2.381" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 299.044008][ T29] audit: type=1400 audit(306.958:2822): avc: denied { map_read map_write } for pid=5547 comm="syz.2.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 299.044864][ T29] audit: type=1400 audit(306.968:2823): avc: denied { prog_load } for pid=5547 comm="syz.2.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 302.809365][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 302.810358][ T29] audit: type=1400 audit(310.738:2898): avc: denied { prog_run } for pid=5580 comm="syz.2.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 302.929171][ T29] audit: type=1400 audit(310.858:2899): avc: denied { create } for pid=5580 comm="syz.2.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 302.938739][ T29] audit: type=1400 audit(310.868:2900): avc: denied { write } for pid=5580 comm="syz.2.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 302.941608][ T29] audit: type=1400 audit(310.868:2901): avc: denied { read } for pid=5580 comm="syz.2.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.311199][ T29] audit: type=1400 audit(311.238:2902): avc: denied { create } for pid=5582 comm="syz.2.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 303.330092][ T29] audit: type=1400 audit(311.258:2903): avc: denied { setopt } for pid=5582 comm="syz.2.393" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 308.418040][ T29] audit: type=1400 audit(316.348:2904): avc: denied { map_create } for pid=5582 comm="syz.2.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 308.421438][ T29] audit: type=1400 audit(316.348:2905): avc: denied { map_read map_write } for pid=5582 comm="syz.2.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 308.423556][ T29] audit: type=1400 audit(316.348:2906): avc: denied { prog_load } for pid=5582 comm="syz.2.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 308.428610][ T29] audit: type=1400 audit(316.348:2907): avc: denied { bpf } for pid=5582 comm="syz.2.393" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 308.430987][ T29] audit: type=1400 audit(316.348:2908): avc: denied { perfmon } for pid=5582 comm="syz.2.393" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 308.453089][ T29] audit: type=1400 audit(316.378:2909): avc: denied { prog_run } for pid=5582 comm="syz.2.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 308.486055][ T29] audit: type=1400 audit(316.408:2910): avc: denied { read append } for pid=5582 comm="syz.2.393" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 308.487451][ T29] audit: type=1400 audit(316.418:2911): avc: denied { open } for pid=5582 comm="syz.2.393" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 323.420446][ T29] audit: type=1400 audit(331.338:2912): avc: denied { create } for pid=5589 comm="syz.2.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 323.456060][ T29] audit: type=1400 audit(331.348:2913): avc: denied { map_create } for pid=5589 comm="syz.2.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 323.523372][ T29] audit: type=1400 audit(331.348:2914): avc: denied { map_read map_write } for pid=5589 comm="syz.2.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 323.637273][ T29] audit: type=1400 audit(331.368:2915): avc: denied { prog_load } for pid=5589 comm="syz.2.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 323.637730][ T29] audit: type=1400 audit(331.368:2916): avc: denied { bpf } for pid=5589 comm="syz.2.394" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 323.638014][ T29] audit: type=1400 audit(331.368:2917): avc: denied { perfmon } for pid=5589 comm="syz.2.394" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 323.638348][ T29] audit: type=1400 audit(331.368:2918): avc: denied { prog_run } for pid=5589 comm="syz.2.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 323.638646][ T29] audit: type=1400 audit(331.418:2919): avc: denied { setopt } for pid=5589 comm="syz.2.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 323.638913][ T29] audit: type=1400 audit(331.418:2920): avc: denied { name_bind } for pid=5589 comm="syz.2.394" src=65533 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 324.014782][ T29] audit: type=1400 audit(331.938:2921): avc: denied { map_create } for pid=5591 comm="syz.2.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 328.478779][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 328.479233][ T29] audit: type=1400 audit(336.408:2966): avc: denied { prog_load } for pid=5608 comm="syz.2.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 328.481049][ T29] audit: type=1400 audit(336.408:2967): avc: denied { bpf } for pid=5608 comm="syz.2.401" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 328.524559][ T29] audit: type=1400 audit(336.448:2968): avc: denied { perfmon } for pid=5608 comm="syz.2.401" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 328.525677][ T29] audit: type=1400 audit(336.448:2969): avc: denied { prog_run } for pid=5608 comm="syz.2.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 328.547612][ T5609] netlink: 96 bytes leftover after parsing attributes in process `syz.2.401'. [ 328.812517][ T29] audit: type=1400 audit(336.738:2970): avc: denied { sys_module } for pid=5596 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 328.816628][ T29] audit: type=1400 audit(336.748:2971): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="nr3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 328.876164][ T29] audit: type=1400 audit(336.798:2972): avc: denied { prog_load } for pid=5610 comm="syz.2.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 328.878604][ T29] audit: type=1400 audit(336.808:2973): avc: denied { bpf } for pid=5610 comm="syz.2.402" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 328.878944][ T29] audit: type=1400 audit(336.808:2974): avc: denied { perfmon } for pid=5610 comm="syz.2.402" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 328.885587][ T29] audit: type=1400 audit(336.808:2975): avc: denied { prog_run } for pid=5610 comm="syz.2.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 330.465025][ T5651] netlink: 224 bytes leftover after parsing attributes in process `syz.2.407'. [ 333.500006][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 333.500307][ T29] audit: type=1400 audit(341.428:3048): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 333.765851][ T29] audit: type=1400 audit(341.688:3049): avc: denied { sys_module } for pid=5596 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 333.768606][ T29] audit: type=1400 audit(341.698:3050): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 334.099664][ T29] audit: type=1400 audit(342.028:3051): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 334.225429][ T29] audit: type=1400 audit(342.148:3052): avc: denied { sys_module } for pid=5596 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 334.227404][ T29] audit: type=1400 audit(342.158:3053): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 334.659459][ T5596] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 334.689433][ T5596] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 334.830767][ T29] audit: type=1400 audit(342.758:3054): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 335.064261][ T29] audit: type=1400 audit(342.988:3055): avc: denied { sys_module } for pid=5596 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 335.072132][ T29] audit: type=1400 audit(342.998:3056): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 335.675658][ T29] audit: type=1400 audit(343.598:3057): avc: denied { map_create } for pid=5694 comm="syz.2.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 338.259214][ T5843] ip6gre1: entered promiscuous mode [ 338.369002][ T5596] hsr_slave_0: entered promiscuous mode [ 338.370688][ T5596] hsr_slave_1: entered promiscuous mode [ 338.371875][ T5596] debugfs: 'hsr0' already exists in 'hsr' [ 338.372099][ T5596] Cannot create hsr debugfs directory [ 338.518321][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 338.519290][ T29] audit: type=1400 audit(346.448:3077): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="rtnl-link-virt_wifi" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 338.820492][ T29] audit: type=1400 audit(346.748:3078): avc: denied { prog_load } for pid=5885 comm="syz.2.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 338.822449][ T29] audit: type=1400 audit(346.748:3079): avc: denied { bpf } for pid=5885 comm="syz.2.411" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 338.824326][ T29] audit: type=1400 audit(346.748:3080): avc: denied { perfmon } for pid=5885 comm="syz.2.411" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 338.826690][ T29] audit: type=1400 audit(346.748:3081): avc: denied { prog_run } for pid=5885 comm="syz.2.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 339.351702][ T29] audit: type=1400 audit(347.278:3082): avc: denied { allowed } for pid=5929 comm="syz.2.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 339.357398][ T29] audit: type=1400 audit(347.288:3083): avc: denied { create } for pid=5929 comm="syz.2.412" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 339.362907][ T29] audit: type=1400 audit(347.288:3084): avc: denied { map } for pid=5929 comm="syz.2.412" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 339.365020][ T29] audit: type=1400 audit(347.288:3085): avc: denied { read write } for pid=5929 comm="syz.2.412" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 339.468115][ T5596] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 339.472640][ T29] audit: type=1400 audit(347.378:3086): avc: denied { create } for pid=5596 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 339.479369][ T5596] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 339.499436][ T5596] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 339.509056][ T5596] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 341.237317][ T5958] netlink: 8 bytes leftover after parsing attributes in process `syz.2.415'. [ 342.468878][ T5596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 343.546343][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 343.546637][ T29] audit: type=1326 audit(351.468:3140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 343.558241][ T29] audit: type=1326 audit(351.488:3141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 343.566131][ T29] audit: type=1326 audit(351.488:3142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.418" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 343.579353][ T29] audit: type=1326 audit(351.508:3143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 343.581094][ T29] audit: type=1326 audit(351.508:3144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 343.586111][ T29] audit: type=1326 audit(351.508:3145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.418" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132970 code=0x7ffc0000 [ 343.610339][ T29] audit: type=1326 audit(351.538:3146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 343.611898][ T29] audit: type=1326 audit(351.538:3147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.418" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132970 code=0x7ffc0000 [ 343.616077][ T29] audit: type=1326 audit(351.548:3148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 343.620639][ T29] audit: type=1326 audit(351.548:3149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.2.418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 348.722507][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 348.725772][ T29] audit: type=1400 audit(356.648:3194): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 349.312904][ T29] audit: type=1400 audit(357.228:3195): avc: denied { sys_module } for pid=5596 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 349.316330][ T29] audit: type=1400 audit(357.228:3196): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 349.655631][ T29] audit: type=1400 audit(357.578:3197): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 350.140510][ T29] audit: type=1400 audit(358.058:3198): avc: denied { sys_module } for pid=5596 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 350.140833][ T29] audit: type=1400 audit(358.068:3199): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 350.387294][ T29] audit: type=1400 audit(358.308:3200): avc: denied { module_request } for pid=5984 comm="syz.2.422" kmod="crypto-cbc(cast5)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 350.754970][ T29] audit: type=1400 audit(358.678:3201): avc: denied { module_request } for pid=5984 comm="syz.2.422" kmod="crypto-cbc(cast5)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 350.775832][ T29] audit: type=1400 audit(358.698:3202): avc: denied { module_request } for pid=5596 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 351.211103][ T29] audit: type=1400 audit(359.138:3203): avc: denied { sys_module } for pid=5596 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 352.290639][ T5596] veth0_vlan: entered promiscuous mode [ 352.339583][ T5596] veth1_vlan: entered promiscuous mode [ 352.729740][ T5596] veth0_macvtap: entered promiscuous mode [ 352.782731][ T5596] veth1_macvtap: entered promiscuous mode [ 353.135949][ T5529] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.136686][ T5529] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.136993][ T5529] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.137262][ T5529] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.768055][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 353.768796][ T29] audit: type=1400 audit(361.678:3218): avc: denied { mounton } for pid=5596 comm="syz-executor" path="/syzkaller.2DEdJd/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7213 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 353.772709][ T29] audit: type=1400 audit(361.688:3219): avc: denied { mounton } for pid=5596 comm="syz-executor" path="/syzkaller.2DEdJd/syz-tmp/newroot/syzcgroup/unified" dev="tmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 353.773743][ T29] audit: type=1400 audit(361.698:3220): avc: denied { unmount } for pid=5596 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 353.821418][ T29] audit: type=1400 audit(361.708:3221): avc: denied { mounton } for pid=5596 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 353.855290][ T29] audit: type=1400 audit(361.728:3222): avc: denied { mount } for pid=5596 comm="syz-executor" name="/" dev="gadgetfs" ino=2366 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 353.855670][ T29] audit: type=1400 audit(361.728:3223): avc: denied { mounton } for pid=5596 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 353.855739][ T29] audit: type=1400 audit(361.728:3224): avc: denied { mount } for pid=5596 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 353.855817][ T29] audit: type=1400 audit(361.728:3225): avc: denied { mounton } for pid=5596 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 353.855866][ T29] audit: type=1400 audit(361.748:3226): avc: denied { mount } for pid=5596 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 354.530369][ T29] audit: type=1400 audit(362.458:3227): avc: denied { prog_load } for pid=6034 comm="syz.3.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 358.913968][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 358.914427][ T29] audit: type=1400 audit(366.838:3276): avc: denied { map_create } for pid=6105 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 358.953603][ T29] audit: type=1400 audit(366.878:3277): avc: denied { allowed } for pid=6105 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 359.026717][ T29] audit: type=1400 audit(366.948:3278): avc: denied { create } for pid=6105 comm="syz.2.430" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 359.027115][ T29] audit: type=1400 audit(366.948:3279): avc: denied { map } for pid=6105 comm="syz.2.430" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6392 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 359.027330][ T29] audit: type=1400 audit(366.948:3280): avc: denied { read write } for pid=6105 comm="syz.2.430" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6392 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 359.114581][ T29] audit: type=1400 audit(367.038:3281): avc: denied { map } for pid=6105 comm="syz.2.430" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6392 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 359.138420][ T29] audit: type=1400 audit(367.068:3282): avc: denied { read write } for pid=6105 comm="syz.2.430" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6392 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 359.283388][ T29] audit: type=1400 audit(367.208:3283): avc: denied { prog_load } for pid=6105 comm="syz.2.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 359.286342][ T29] audit: type=1400 audit(367.208:3284): avc: denied { bpf } for pid=6105 comm="syz.2.430" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 359.405934][ T29] audit: type=1400 audit(367.328:3285): avc: denied { prog_load } for pid=6107 comm="syz.3.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 363.958899][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 363.971594][ T29] audit: type=1326 audit(371.878:3326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6131 comm="syz.3.442" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 363.972161][ T29] audit: type=1326 audit(371.888:3327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6131 comm="syz.3.442" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 363.972399][ T29] audit: type=1326 audit(371.898:3328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6131 comm="syz.3.442" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 363.972483][ T29] audit: type=1400 audit(371.898:3329): avc: denied { map_create } for pid=6131 comm="syz.3.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 363.972526][ T29] audit: type=1400 audit(371.898:3330): avc: denied { map_read map_write } for pid=6131 comm="syz.3.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 363.972564][ T29] audit: type=1326 audit(371.898:3331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6131 comm="syz.3.442" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 363.972602][ T29] audit: type=1326 audit(371.898:3332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6131 comm="syz.3.442" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 363.993317][ T29] audit: type=1326 audit(371.918:3333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6131 comm="syz.3.442" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 363.993763][ T29] audit: type=1400 audit(371.918:3334): avc: denied { prog_load } for pid=6131 comm="syz.3.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 363.993951][ T29] audit: type=1400 audit(371.918:3335): avc: denied { bpf } for pid=6131 comm="syz.3.442" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 369.196140][ T29] kauditd_printk_skb: 81 callbacks suppressed [ 369.196488][ T29] audit: type=1400 audit(377.118:3417): avc: denied { read } for pid=6180 comm="syz.3.451" dev="nsfs" ino=4026532937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 369.199946][ T29] audit: type=1400 audit(377.128:3418): avc: denied { open } for pid=6180 comm="syz.3.451" path="net:[4026532937]" dev="nsfs" ino=4026532937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 369.201906][ T29] audit: type=1400 audit(377.128:3419): avc: denied { create } for pid=6180 comm="syz.3.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 369.254544][ T29] audit: type=1400 audit(377.168:3420): avc: denied { write } for pid=6180 comm="syz.3.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 369.265530][ T29] audit: type=1400 audit(377.188:3421): avc: denied { module_request } for pid=6180 comm="syz.3.451" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 369.795696][ T29] audit: type=1400 audit(377.708:3422): avc: denied { ioctl } for pid=6180 comm="syz.3.451" path="socket:[6538]" dev="sockfs" ino=6538 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 369.809228][ T29] audit: type=1400 audit(377.738:3423): avc: denied { module_request } for pid=6180 comm="syz.3.451" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 370.115699][ T29] audit: type=1400 audit(378.038:3424): avc: denied { read } for pid=6180 comm="syz.3.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 370.295643][ T29] audit: type=1400 audit(378.218:3425): avc: denied { write } for pid=6180 comm="syz.3.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 370.387594][ T29] audit: type=1400 audit(378.318:3426): avc: denied { sys_module } for pid=6180 comm="syz.3.451" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 373.049502][ T6195] ICMPv6: RA: ndisc_router_discovery failed to add default route [ 373.050258][ T6195] ICMPv6: RA: ndisc_router_discovery failed to add default route [ 373.050750][ T6195] ICMPv6: RA: ndisc_router_discovery failed to add default route [ 373.051240][ T6195] ICMPv6: RA: ndisc_router_discovery failed to add default route [ 373.051728][ T6195] ICMPv6: RA: ndisc_router_discovery failed to add default route [ 373.052222][ T6195] ICMPv6: RA: ndisc_router_discovery failed to add default route [ 373.052805][ T6195] ICMPv6: RA: ndisc_router_discovery failed to add default route [ 373.053336][ T6195] ICMPv6: RA: ndisc_router_discovery failed to add default route [ 373.053853][ T6195] ICMPv6: RA: ndisc_router_discovery failed to add default route [ 373.054320][ T6195] ICMPv6: RA: ndisc_router_discovery failed to add default route [ 374.390248][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 374.428068][ T29] audit: type=1400 audit(382.318:3467): avc: denied { map_create } for pid=6198 comm="syz.3.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 374.438617][ T29] audit: type=1400 audit(382.318:3468): avc: denied { perfmon } for pid=6198 comm="syz.3.456" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 374.461343][ T29] audit: type=1400 audit(382.318:3469): avc: denied { map_read map_write } for pid=6198 comm="syz.3.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 374.504097][ T29] audit: type=1400 audit(382.338:3470): avc: denied { prog_load } for pid=6198 comm="syz.3.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 374.522992][ T29] audit: type=1400 audit(382.338:3471): avc: denied { bpf } for pid=6198 comm="syz.3.456" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 374.550888][ T29] audit: type=1400 audit(382.358:3472): avc: denied { prog_run } for pid=6198 comm="syz.3.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 374.587789][ T29] audit: type=1400 audit(382.388:3473): avc: denied { create } for pid=6198 comm="syz.3.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 374.616678][ T29] audit: type=1400 audit(382.408:3474): avc: denied { setopt } for pid=6198 comm="syz.3.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 374.711253][ T29] audit: type=1400 audit(382.408:3475): avc: denied { ioctl } for pid=6198 comm="syz.3.456" path="socket:[7311]" dev="sockfs" ino=7311 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 374.754526][ T29] audit: type=1400 audit(382.418:3476): avc: denied { bind } for pid=6198 comm="syz.3.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 377.434795][ T6207] 8021q: adding VLAN 0 to HW filter on device bond1 [ 377.459776][ T6207] bond0: (slave bond1): Enslaving as an active interface with an up link [ 379.691185][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 379.719518][ T29] audit: type=1400 audit(387.598:3516): avc: denied { prog_load } for pid=6249 comm="syz.3.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 379.747278][ T29] audit: type=1400 audit(387.598:3517): avc: denied { bpf } for pid=6249 comm="syz.3.462" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 379.747751][ T29] audit: type=1400 audit(387.598:3518): avc: denied { perfmon } for pid=6249 comm="syz.3.462" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 379.747976][ T29] audit: type=1400 audit(387.608:3519): avc: denied { prog_run } for pid=6249 comm="syz.3.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 379.748249][ T29] audit: type=1400 audit(387.628:3520): avc: denied { read write } for pid=6249 comm="syz.3.462" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 379.748525][ T29] audit: type=1400 audit(387.628:3521): avc: denied { open } for pid=6249 comm="syz.3.462" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 379.917720][ T29] audit: type=1400 audit(387.848:3522): avc: denied { map_create } for pid=6251 comm="syz.3.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 379.931673][ T29] audit: type=1400 audit(387.858:3523): avc: denied { perfmon } for pid=6251 comm="syz.3.463" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 379.931875][ T29] audit: type=1400 audit(387.858:3524): avc: denied { map_read map_write } for pid=6251 comm="syz.3.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 379.938221][ T29] audit: type=1400 audit(387.858:3525): avc: denied { prog_load } for pid=6251 comm="syz.3.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 384.777764][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 384.778078][ T29] audit: type=1400 audit(392.708:3594): avc: denied { prog_load } for pid=6278 comm="syz.3.476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 384.789634][ T29] audit: type=1400 audit(392.718:3595): avc: denied { bpf } for pid=6278 comm="syz.3.476" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 384.789941][ T29] audit: type=1400 audit(392.718:3596): avc: denied { perfmon } for pid=6278 comm="syz.3.476" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 384.807746][ T29] audit: type=1400 audit(392.738:3597): avc: denied { prog_run } for pid=6278 comm="syz.3.476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 385.182824][ T29] audit: type=1400 audit(393.108:3598): avc: denied { map_create } for pid=6280 comm="syz.3.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 385.183412][ T29] audit: type=1400 audit(393.108:3599): avc: denied { map_read map_write } for pid=6280 comm="syz.3.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 385.187468][ T29] audit: type=1400 audit(393.108:3600): avc: denied { prog_load } for pid=6280 comm="syz.3.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 385.187878][ T29] audit: type=1400 audit(393.108:3601): avc: denied { bpf } for pid=6280 comm="syz.3.477" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 385.214557][ T29] audit: type=1400 audit(393.138:3602): avc: denied { perfmon } for pid=6280 comm="syz.3.477" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 385.214946][ T29] audit: type=1400 audit(393.138:3603): avc: denied { prog_run } for pid=6280 comm="syz.3.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 386.086438][ T6288] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 389.829062][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 389.829381][ T29] audit: type=1400 audit(397.758:3644): avc: denied { map_create } for pid=6303 comm="syz.2.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 389.836647][ T29] audit: type=1400 audit(397.768:3645): avc: denied { bpf } for pid=6303 comm="syz.2.486" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 389.837067][ T29] audit: type=1400 audit(397.768:3646): avc: denied { map_read map_write } for pid=6303 comm="syz.2.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 389.843745][ T29] audit: type=1400 audit(397.768:3647): avc: denied { prog_load } for pid=6303 comm="syz.2.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 389.844103][ T29] audit: type=1400 audit(397.768:3648): avc: denied { perfmon } for pid=6303 comm="syz.2.486" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 389.859152][ T29] audit: type=1400 audit(397.788:3649): avc: denied { prog_run } for pid=6303 comm="syz.2.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 389.866544][ T29] audit: type=1400 audit(397.798:3650): avc: denied { create } for pid=6303 comm="syz.2.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 389.878694][ T29] audit: type=1400 audit(397.808:3651): avc: denied { write } for pid=6303 comm="syz.2.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 390.312550][ T29] audit: type=1400 audit(398.238:3652): avc: denied { map_create } for pid=6307 comm="syz.2.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 390.324995][ T29] audit: type=1400 audit(398.248:3653): avc: denied { bpf } for pid=6307 comm="syz.2.488" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 395.060015][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 395.060371][ T29] audit: type=1326 audit(402.988:3711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.3.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 395.074807][ T29] audit: type=1326 audit(402.988:3712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.3.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 395.080385][ T29] audit: type=1326 audit(403.008:3713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.3.492" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132970 code=0x7ffc0000 [ 395.082290][ T29] audit: type=1326 audit(403.008:3714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.3.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 395.084077][ T29] audit: type=1400 audit(403.008:3715): avc: denied { prog_load } for pid=6323 comm="syz.2.493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 395.087425][ T29] audit: type=1400 audit(403.008:3716): avc: denied { bpf } for pid=6323 comm="syz.2.493" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 395.089380][ T29] audit: type=1400 audit(403.008:3717): avc: denied { perfmon } for pid=6323 comm="syz.2.493" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 395.099417][ T29] audit: type=1400 audit(403.018:3718): avc: denied { prog_run } for pid=6323 comm="syz.2.493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 395.104404][ T29] audit: type=1326 audit(403.028:3719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.3.492" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x132970 code=0x7ffc0000 [ 395.109885][ T29] audit: type=1326 audit(403.028:3720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.3.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 398.292661][ T6334] syzkaller0: entered promiscuous mode [ 398.296268][ T6334] syzkaller0: entered allmulticast mode [ 400.100067][ T29] kauditd_printk_skb: 194 callbacks suppressed [ 400.100568][ T29] audit: type=1400 audit(408.018:3915): avc: denied { create } for pid=6354 comm="syz.2.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 400.127057][ T29] audit: type=1400 audit(408.048:3916): avc: denied { setopt } for pid=6354 comm="syz.2.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 400.139187][ T29] audit: type=1400 audit(408.068:3917): avc: denied { ioctl } for pid=6354 comm="syz.2.501" path="socket:[6760]" dev="sockfs" ino=6760 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 400.163543][ T29] audit: type=1400 audit(408.088:3918): avc: denied { bind } for pid=6354 comm="syz.2.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 400.203876][ T29] audit: type=1400 audit(408.128:3919): avc: denied { read write } for pid=6354 comm="syz.2.501" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 400.213444][ T29] audit: type=1400 audit(408.138:3920): avc: denied { read write open } for pid=6354 comm="syz.2.501" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 400.398627][ T29] audit: type=1400 audit(408.318:3921): avc: denied { map_read map_write } for pid=6345 comm="syz.3.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 401.021311][ T29] audit: type=1400 audit(408.948:3922): avc: denied { map_create } for pid=6357 comm="syz.3.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 401.023611][ T29] audit: type=1400 audit(408.948:3923): avc: denied { map_read map_write } for pid=6357 comm="syz.3.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 401.036618][ T29] audit: type=1400 audit(408.968:3924): avc: denied { prog_load } for pid=6357 comm="syz.3.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 405.333062][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 405.333469][ T29] audit: type=1400 audit(413.258:3978): avc: denied { prog_load } for pid=6384 comm="syz.2.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 405.333638][ T29] audit: type=1400 audit(413.258:3979): avc: denied { bpf } for pid=6384 comm="syz.2.512" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 405.333756][ T29] audit: type=1400 audit(413.258:3980): avc: denied { perfmon } for pid=6384 comm="syz.2.512" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 405.336662][ T29] audit: type=1400 audit(413.268:3981): avc: denied { prog_run } for pid=6384 comm="syz.2.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 405.351854][ T29] audit: type=1400 audit(413.278:3982): avc: denied { read } for pid=6384 comm="syz.2.512" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 405.353331][ T29] audit: type=1400 audit(413.278:3983): avc: denied { read open } for pid=6384 comm="syz.2.512" path="/dev/random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 405.355495][ T29] audit: type=1400 audit(413.278:3984): avc: denied { ioctl } for pid=6384 comm="syz.2.512" path="/dev/random" dev="devtmpfs" ino=7 ioctlcmd=0x5203 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 406.850911][ T29] audit: type=1400 audit(414.778:3985): avc: denied { create } for pid=6412 comm="syz.3.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 406.862097][ T29] audit: type=1400 audit(414.788:3986): avc: denied { ioctl } for pid=6412 comm="syz.3.514" path="socket:[6857]" dev="sockfs" ino=6857 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 406.863718][ T29] audit: type=1400 audit(414.788:3987): avc: denied { module_request } for pid=6412 comm="syz.3.514" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 409.228746][ T6432] IPv6: Can't replace route, no match found [ 410.214610][ T6441] netlink: 24 bytes leftover after parsing attributes in process `syz.3.522'. [ 410.461911][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 410.462329][ T29] audit: type=1400 audit(418.388:4048): avc: denied { prog_load } for pid=6446 comm="syz.2.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 410.462566][ T29] audit: type=1400 audit(418.388:4049): avc: denied { bpf } for pid=6446 comm="syz.2.523" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 410.462671][ T29] audit: type=1400 audit(418.388:4050): avc: denied { perfmon } for pid=6446 comm="syz.2.523" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 410.470788][ T29] audit: type=1400 audit(418.398:4051): avc: denied { prog_run } for pid=6446 comm="syz.2.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 410.498862][ T29] audit: type=1400 audit(418.428:4052): avc: denied { wake_alarm } for pid=6446 comm="syz.2.523" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 410.745730][ T29] audit: type=1400 audit(418.668:4053): avc: denied { map_create } for pid=6456 comm="syz.2.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 410.755818][ T29] audit: type=1400 audit(418.678:4054): avc: denied { bpf } for pid=6456 comm="syz.2.525" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 410.756145][ T29] audit: type=1400 audit(418.678:4055): avc: denied { map_read map_write } for pid=6456 comm="syz.2.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 410.761234][ T29] audit: type=1400 audit(418.688:4056): avc: denied { prog_load } for pid=6456 comm="syz.2.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 410.767000][ T29] audit: type=1400 audit(418.698:4057): avc: denied { create } for pid=6456 comm="syz.2.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 415.709814][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 415.710176][ T29] audit: type=1400 audit(423.638:4112): avc: denied { name_bind } for pid=6482 comm="syz.3.533" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 416.412481][ T29] audit: type=1400 audit(424.338:4113): avc: denied { prog_load } for pid=6485 comm="syz.3.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 416.412878][ T29] audit: type=1400 audit(424.338:4114): avc: denied { bpf } for pid=6485 comm="syz.3.534" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 416.413059][ T29] audit: type=1400 audit(424.338:4115): avc: denied { perfmon } for pid=6485 comm="syz.3.534" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 416.413218][ T29] audit: type=1400 audit(424.338:4116): avc: denied { prog_run } for pid=6485 comm="syz.3.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 416.666555][ T29] audit: type=1400 audit(424.588:4117): avc: denied { prog_load } for pid=6487 comm="syz.3.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 416.677108][ T29] audit: type=1400 audit(424.608:4118): avc: denied { bpf } for pid=6487 comm="syz.3.535" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 416.681406][ T29] audit: type=1400 audit(424.608:4119): avc: denied { prog_load } for pid=6487 comm="syz.3.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 416.682493][ T29] audit: type=1400 audit(424.608:4120): avc: denied { bpf } for pid=6487 comm="syz.3.535" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 416.682928][ T29] audit: type=1400 audit(424.608:4121): avc: denied { perfmon } for pid=6487 comm="syz.3.535" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 421.180456][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 421.182933][ T29] audit: type=1400 audit(429.108:4133): avc: denied { map_create } for pid=6521 comm="syz.2.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.194124][ T29] audit: type=1400 audit(429.118:4134): avc: denied { perfmon } for pid=6521 comm="syz.2.539" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 421.197787][ T29] audit: type=1400 audit(429.118:4135): avc: denied { map_read map_write } for pid=6521 comm="syz.2.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.221422][ T29] audit: type=1400 audit(429.148:4136): avc: denied { prog_load } for pid=6521 comm="syz.2.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.225896][ T29] audit: type=1400 audit(429.148:4137): avc: denied { bpf } for pid=6521 comm="syz.2.539" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 421.230830][ T29] audit: type=1400 audit(429.148:4138): avc: denied { prog_run } for pid=6521 comm="syz.2.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.274149][ T29] audit: type=1400 audit(429.178:4139): avc: denied { create } for pid=6521 comm="syz.2.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 421.274571][ T29] audit: type=1400 audit(429.178:4140): avc: denied { setopt } for pid=6521 comm="syz.2.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 421.534684][ T29] audit: type=1400 audit(429.458:4141): avc: denied { map_create } for pid=6523 comm="syz.2.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.566941][ T29] audit: type=1400 audit(429.458:4142): avc: denied { map_read map_write } for pid=6523 comm="syz.2.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.879424][ T6481] hid-generic 0009:0006:0001.0002: item fetching failed at offset 3/106 [ 421.889970][ T6481] hid-generic 0009:0006:0001.0002: probe with driver hid-generic failed with error -22 [ 423.155294][ C0] hrtimer: interrupt took 8312016 ns [ 425.086473][ T6555] netlink: 'syz.2.542': attribute type 13 has an invalid length. [ 427.556833][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 427.557189][ T29] audit: type=1400 audit(435.488:4171): avc: denied { map_create } for pid=6559 comm="syz.2.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 427.559830][ T29] audit: type=1400 audit(435.488:4172): avc: denied { perfmon } for pid=6559 comm="syz.2.544" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 427.563629][ T29] audit: type=1400 audit(435.488:4173): avc: denied { map_read map_write } for pid=6559 comm="syz.2.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 427.604569][ T29] audit: type=1400 audit(435.528:4174): avc: denied { prog_load } for pid=6559 comm="syz.2.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 427.607098][ T29] audit: type=1400 audit(435.528:4175): avc: denied { bpf } for pid=6559 comm="syz.2.544" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 427.626211][ T29] audit: type=1400 audit(435.548:4176): avc: denied { prog_run } for pid=6559 comm="syz.2.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 428.012957][ T29] audit: type=1400 audit(435.938:4177): avc: denied { map_create } for pid=6561 comm="syz.2.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 428.014879][ T29] audit: type=1400 audit(435.938:4178): avc: denied { map_read map_write } for pid=6561 comm="syz.2.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 428.310298][ T29] audit: type=1400 audit(436.238:4179): avc: denied { prog_load } for pid=6563 comm="syz.2.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 428.319679][ T29] audit: type=1400 audit(436.238:4180): avc: denied { bpf } for pid=6563 comm="syz.2.546" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 429.873250][ T6580] netlink: 4 bytes leftover after parsing attributes in process `syz.3.551'. [ 429.897334][ T6580] netlink: 4 bytes leftover after parsing attributes in process `syz.3.551'. [ 432.710042][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 432.710261][ T29] audit: type=1400 audit(440.638:4241): avc: denied { create } for pid=6602 comm="syz.2.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 432.714518][ T29] audit: type=1400 audit(440.638:4242): avc: denied { write } for pid=6602 comm="syz.2.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 432.893822][ T29] audit: type=1400 audit(440.818:4243): avc: denied { map_create } for pid=6604 comm="syz.2.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 432.897599][ T29] audit: type=1400 audit(440.828:4244): avc: denied { map_read map_write } for pid=6604 comm="syz.2.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 432.907103][ T29] audit: type=1400 audit(440.838:4245): avc: denied { prog_load } for pid=6604 comm="syz.2.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 432.914829][ T29] audit: type=1400 audit(440.838:4246): avc: denied { bpf } for pid=6604 comm="syz.2.557" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 432.919698][ T29] audit: type=1400 audit(440.848:4247): avc: denied { prog_load } for pid=6604 comm="syz.2.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 432.921018][ T29] audit: type=1400 audit(440.848:4248): avc: denied { bpf } for pid=6604 comm="syz.2.557" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 432.922353][ T29] audit: type=1400 audit(440.848:4249): avc: denied { perfmon } for pid=6604 comm="syz.2.557" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 432.924200][ T29] audit: type=1400 audit(440.848:4250): avc: denied { prog_run } for pid=6604 comm="syz.2.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 433.996471][ T6613] netlink: 12 bytes leftover after parsing attributes in process `syz.2.560'. [ 434.861613][ T6618] syz.2.561 uses obsolete (PF_INET,SOCK_PACKET) [ 436.173918][ T6637] net_ratelimit: 44 callbacks suppressed [ 436.176498][ T6637] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 437.743698][ T29] kauditd_printk_skb: 109 callbacks suppressed [ 437.744122][ T29] audit: type=1400 audit(445.668:4360): avc: denied { read } for pid=6659 comm="syz.3.575" dev="nsfs" ino=4026532937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 437.744417][ T29] audit: type=1400 audit(445.668:4361): avc: denied { open } for pid=6659 comm="syz.3.575" path="net:[4026532937]" dev="nsfs" ino=4026532937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 437.749039][ T29] audit: type=1400 audit(445.668:4362): avc: denied { create } for pid=6659 comm="syz.3.575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 437.751226][ T29] audit: type=1400 audit(445.678:4363): avc: denied { bind } for pid=6659 comm="syz.3.575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 437.760756][ T29] audit: type=1400 audit(445.678:4364): avc: denied { write } for pid=6659 comm="syz.3.575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 437.892081][ T29] audit: type=1400 audit(445.818:4365): avc: denied { map_create } for pid=6662 comm="syz.3.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.894073][ T29] audit: type=1400 audit(445.818:4366): avc: denied { map_read map_write } for pid=6662 comm="syz.3.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.896499][ T29] audit: type=1400 audit(445.818:4367): avc: denied { prog_load } for pid=6662 comm="syz.3.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 437.898232][ T29] audit: type=1400 audit(445.828:4368): avc: denied { bpf } for pid=6662 comm="syz.3.576" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 437.905702][ T29] audit: type=1400 audit(445.828:4369): avc: denied { perfmon } for pid=6662 comm="syz.3.576" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 443.083083][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 443.083514][ T29] audit: type=1400 audit(451.008:4396): avc: denied { map_create } for pid=6682 comm="syz.3.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.083781][ T29] audit: type=1400 audit(451.008:4397): avc: denied { perfmon } for pid=6682 comm="syz.3.581" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 443.083877][ T29] audit: type=1400 audit(451.008:4398): avc: denied { map_read map_write } for pid=6682 comm="syz.3.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.110377][ T29] audit: type=1400 audit(451.038:4399): avc: denied { prog_load } for pid=6682 comm="syz.3.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.216142][ T29] audit: type=1400 audit(451.038:4400): avc: denied { bpf } for pid=6682 comm="syz.3.581" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 443.248043][ T29] audit: type=1400 audit(451.038:4401): avc: denied { prog_run } for pid=6682 comm="syz.3.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.665653][ T29] audit: type=1400 audit(451.588:4402): avc: denied { read } for pid=6685 comm="syz.3.582" name="event0" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 443.671907][ T29] audit: type=1400 audit(451.598:4403): avc: denied { read open } for pid=6685 comm="syz.3.582" path="/dev/input/event0" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 443.706895][ T29] audit: type=1400 audit(451.628:4404): avc: denied { map_create } for pid=6685 comm="syz.3.582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.815718][ T29] audit: type=1400 audit(451.628:4405): avc: denied { map_read map_write } for pid=6685 comm="syz.3.582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 450.143583][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 450.143963][ T29] audit: type=1400 audit(458.068:4429): avc: denied { prog_load } for pid=6694 comm="syz.2.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 450.156291][ T29] audit: type=1400 audit(458.078:4430): avc: denied { perfmon } for pid=6694 comm="syz.2.585" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 450.162532][ T29] audit: type=1400 audit(458.088:4431): avc: denied { prog_run } for pid=6694 comm="syz.2.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 450.276267][ T29] audit: type=1400 audit(458.198:4432): avc: denied { allowed } for pid=6694 comm="syz.2.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 450.278267][ T29] audit: type=1400 audit(458.208:4433): avc: denied { create } for pid=6694 comm="syz.2.585" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 450.282671][ T29] audit: type=1400 audit(458.208:4434): avc: denied { map } for pid=6694 comm="syz.2.585" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 450.295789][ T29] audit: type=1400 audit(458.218:4435): avc: denied { read write } for pid=6694 comm="syz.2.585" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 450.530532][ T29] audit: type=1400 audit(458.458:4436): avc: denied { map_create } for pid=6700 comm="syz.3.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 450.531734][ T29] audit: type=1400 audit(458.458:4437): avc: denied { bpf } for pid=6700 comm="syz.3.587" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 450.532701][ T29] audit: type=1400 audit(458.458:4438): avc: denied { map_read map_write } for pid=6700 comm="syz.3.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 470.529171][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 470.531308][ T29] audit: type=1326 audit(478.458:4444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 470.533114][ T29] audit: type=1326 audit(478.458:4445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 470.538727][ T29] audit: type=1326 audit(478.468:4446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=146 compat=0 ip=0x132970 code=0x7ffc0000 [ 470.540824][ T29] audit: type=1326 audit(478.468:4447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 470.555907][ T29] audit: type=1326 audit(478.468:4448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 470.556294][ T29] audit: type=1326 audit(478.478:4449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x132970 code=0x7ffc0000 [ 470.556488][ T29] audit: type=1326 audit(478.478:4450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 470.556549][ T29] audit: type=1326 audit(478.478:4451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 470.558322][ T29] audit: type=1326 audit(478.488:4452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132970 code=0x7ffc0000 [ 470.558407][ T29] audit: type=1326 audit(478.488:4453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6708 comm="syz.2.588" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 474.851098][ T6738] netlink: 12 bytes leftover after parsing attributes in process `syz.3.601'. [ 475.151774][ T6738] netlink: 4 bytes leftover after parsing attributes in process `syz.3.601'. [ 475.537801][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 475.546699][ T29] audit: type=1400 audit(483.468:4553): avc: denied { setopt } for pid=6742 comm="syz.3.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 475.551266][ T29] audit: type=1400 audit(483.468:4554): avc: denied { ioctl } for pid=6742 comm="syz.3.603" path="socket:[8266]" dev="sockfs" ino=8266 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 475.572063][ T29] audit: type=1400 audit(483.498:4555): avc: denied { bind } for pid=6742 comm="syz.3.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 475.586235][ T29] audit: type=1400 audit(483.518:4556): avc: denied { read write } for pid=6742 comm="syz.3.603" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 475.588499][ T29] audit: type=1400 audit(483.518:4557): avc: denied { open } for pid=6742 comm="syz.3.603" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 476.147387][ T29] audit: type=1400 audit(484.078:4558): avc: denied { ioctl } for pid=6742 comm="syz.3.603" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x540a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 476.660614][ T29] audit: type=1400 audit(484.578:4559): avc: denied { write } for pid=6742 comm="syz.3.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 477.926000][ T29] audit: type=1400 audit(485.848:4560): avc: denied { map_create } for pid=6746 comm="syz.2.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 477.926225][ T29] audit: type=1400 audit(485.848:4561): avc: denied { perfmon } for pid=6746 comm="syz.2.604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 477.938589][ T29] audit: type=1400 audit(485.868:4562): avc: denied { map_read map_write } for pid=6746 comm="syz.2.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 479.108262][ T6755] netlink: 20 bytes leftover after parsing attributes in process `syz.2.606'. [ 479.709059][ T6763] netlink: 8 bytes leftover after parsing attributes in process `syz.3.611'. [ 479.718107][ T6763] netlink: 4 bytes leftover after parsing attributes in process `syz.3.611'. [ 480.570970][ T6771] netlink: 'syz.3.614': attribute type 4 has an invalid length. [ 480.572342][ T6771] netlink: 17 bytes leftover after parsing attributes in process `syz.3.614'. [ 480.727496][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 480.727859][ T29] audit: type=1400 audit(488.648:4625): avc: denied { map_create } for pid=6772 comm="syz.3.615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 480.750352][ T29] audit: type=1400 audit(488.678:4626): avc: denied { map_read map_write } for pid=6772 comm="syz.3.615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 480.754472][ T29] audit: type=1400 audit(488.678:4627): avc: denied { prog_load } for pid=6772 comm="syz.3.615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 480.756907][ T29] audit: type=1400 audit(488.678:4628): avc: denied { bpf } for pid=6772 comm="syz.3.615" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 480.758577][ T29] audit: type=1400 audit(488.678:4629): avc: denied { perfmon } for pid=6772 comm="syz.3.615" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 480.760439][ T29] audit: type=1400 audit(488.688:4630): avc: denied { prog_run } for pid=6772 comm="syz.3.615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 481.158184][ T29] audit: type=1400 audit(489.078:4631): avc: denied { prog_load } for pid=6774 comm="syz.3.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 481.167905][ T29] audit: type=1400 audit(489.098:4632): avc: denied { bpf } for pid=6774 comm="syz.3.616" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 481.823281][ T29] audit: type=1400 audit(489.748:4633): avc: denied { perfmon } for pid=6774 comm="syz.3.616" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 481.890412][ T29] audit: type=1400 audit(489.808:4634): avc: denied { perfmon } for pid=6774 comm="syz.3.616" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 486.147561][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 486.147890][ T29] audit: type=1400 audit(494.078:4677): avc: denied { ioctl } for pid=6807 comm="syz.2.621" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x540a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 486.663323][ T29] audit: type=1400 audit(494.588:4678): avc: denied { write } for pid=6807 comm="syz.2.621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 488.383006][ T29] audit: type=1400 audit(496.308:4679): avc: denied { map_create } for pid=6812 comm="syz.2.622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 488.383491][ T29] audit: type=1400 audit(496.308:4680): avc: denied { bpf } for pid=6812 comm="syz.2.622" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 488.383693][ T29] audit: type=1400 audit(496.308:4681): avc: denied { map_read map_write } for pid=6812 comm="syz.2.622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 488.406056][ T29] audit: type=1400 audit(496.328:4682): avc: denied { prog_load } for pid=6812 comm="syz.2.622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 488.406432][ T29] audit: type=1400 audit(496.328:4683): avc: denied { perfmon } for pid=6812 comm="syz.2.622" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 488.406630][ T29] audit: type=1400 audit(496.328:4684): avc: denied { prog_run } for pid=6812 comm="syz.2.622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 488.427914][ T6813] mmap: syz.2.622 (6813) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 488.708006][ T29] audit: type=1400 audit(496.638:4685): avc: denied { map_create } for pid=6814 comm="syz.2.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 488.708410][ T29] audit: type=1400 audit(496.638:4686): avc: denied { bpf } for pid=6814 comm="syz.2.623" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 491.267934][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 491.270094][ T29] audit: type=1400 audit(499.198:4721): avc: denied { prog_load } for pid=6829 comm="syz.2.630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 491.285501][ T29] audit: type=1400 audit(499.208:4722): avc: denied { bpf } for pid=6829 comm="syz.2.630" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 493.001903][ T29] audit: type=1400 audit(500.928:4723): avc: denied { map_create } for pid=6837 comm="syz.3.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 493.007664][ T29] audit: type=1400 audit(500.938:4724): avc: denied { map_read map_write } for pid=6837 comm="syz.3.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 493.668754][ T29] audit: type=1400 audit(501.598:4725): avc: denied { map_create } for pid=6842 comm="syz.3.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 493.670948][ T29] audit: type=1400 audit(501.598:4726): avc: denied { perfmon } for pid=6842 comm="syz.3.635" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 493.672623][ T29] audit: type=1400 audit(501.598:4727): avc: denied { map_read map_write } for pid=6842 comm="syz.3.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 493.701174][ T29] audit: type=1400 audit(501.598:4728): avc: denied { prog_load } for pid=6842 comm="syz.3.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 493.701639][ T29] audit: type=1400 audit(501.628:4729): avc: denied { bpf } for pid=6842 comm="syz.3.635" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 493.701892][ T29] audit: type=1400 audit(501.628:4730): avc: denied { prog_run } for pid=6842 comm="syz.3.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 496.296147][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 496.296468][ T29] audit: type=1400 audit(504.218:4761): avc: denied { execmem } for pid=6864 comm="syz.2.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 496.464836][ T6868] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 496.466997][ T29] audit: type=1400 audit(504.388:4762): avc: denied { read write } for pid=6867 comm="syz.3.644" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 496.467315][ T29] audit: type=1400 audit(504.388:4763): avc: denied { open } for pid=6867 comm="syz.3.644" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 496.467534][ T29] audit: type=1400 audit(504.388:4764): avc: denied { ioctl } for pid=6867 comm="syz.3.644" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 496.497451][ T6868] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 498.235216][ T29] audit: type=1400 audit(506.116:4765): avc: denied { create } for pid=6880 comm="syz.3.648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 498.236610][ T29] audit: type=1400 audit(506.116:4766): avc: denied { bpf } for pid=6880 comm="syz.3.648" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 498.325565][ T29] audit: type=1400 audit(506.200:4767): avc: denied { setopt } for pid=6880 comm="syz.3.648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 500.211826][ T29] audit: type=1400 audit(507.944:4768): avc: denied { module_request } for pid=6885 comm="syz.3.650" kmod="rtnl-link-bridge_slave" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 501.668749][ T29] audit: type=1400 audit(509.282:4769): avc: denied { create } for pid=6895 comm="syz.3.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 501.741091][ T29] audit: type=1400 audit(509.338:4770): avc: denied { prog_load } for pid=6895 comm="syz.3.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 501.741526][ T29] audit: type=1400 audit(509.338:4771): avc: denied { bpf } for pid=6895 comm="syz.3.654" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 501.741730][ T29] audit: type=1400 audit(509.338:4772): avc: denied { perfmon } for pid=6895 comm="syz.3.654" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 501.753371][ T29] audit: type=1400 audit(509.365:4773): avc: denied { bpf } for pid=6895 comm="syz.3.654" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 501.753781][ T29] audit: type=1400 audit(509.365:4774): avc: denied { prog_run } for pid=6895 comm="syz.3.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 501.776299][ T29] audit: type=1400 audit(509.384:4775): avc: denied { write } for pid=6895 comm="syz.3.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 501.777756][ T6896] netlink: 24 bytes leftover after parsing attributes in process `syz.3.654'. [ 501.778380][ T6896] netlink: 8 bytes leftover after parsing attributes in process `syz.3.654'. [ 502.109133][ T29] audit: type=1400 audit(509.698:4776): avc: denied { associate } for pid=6897 comm="syz.3.655" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 502.120026][ T29] audit: type=1400 audit(509.707:4777): avc: denied { write } for pid=6897 comm="syz.3.655" name="pfkey" dev="proc" ino=4026533177 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 502.140016][ T29] audit: type=1400 audit(509.725:4778): avc: denied { write } for pid=6897 comm="syz.3.655" name="pfkey" dev="proc" ino=4026533177 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 510.464364][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 510.464654][ T29] audit: type=1400 audit(517.405:4783): avc: denied { prog_load } for pid=6908 comm="syz.3.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 510.464862][ T29] audit: type=1400 audit(517.405:4784): avc: denied { bpf } for pid=6908 comm="syz.3.660" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 510.465044][ T29] audit: type=1400 audit(517.405:4785): avc: denied { perfmon } for pid=6908 comm="syz.3.660" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 510.465237][ T29] audit: type=1400 audit(517.405:4786): avc: denied { prog_run } for pid=6908 comm="syz.3.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 520.393585][ T29] audit: type=1400 audit(526.561:4787): avc: denied { execmem } for pid=6913 comm="syz.2.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 525.720911][ T29] audit: type=1400 audit(531.481:4788): avc: denied { prog_load } for pid=6913 comm="syz.2.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 525.748342][ T29] audit: type=1400 audit(531.517:4789): avc: denied { bpf } for pid=6913 comm="syz.2.661" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 525.748706][ T29] audit: type=1400 audit(531.517:4790): avc: denied { perfmon } for pid=6913 comm="syz.2.661" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 525.759473][ T29] audit: type=1400 audit(531.527:4791): avc: denied { prog_run } for pid=6913 comm="syz.2.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 525.835467][ T29] audit: type=1400 audit(531.591:4792): avc: denied { mount } for pid=6913 comm="syz.2.661" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 525.953124][ T29] audit: type=1400 audit(531.684:4793): avc: denied { prog_load } for pid=6913 comm="syz.2.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 525.972434][ T29] audit: type=1400 audit(531.702:4794): avc: denied { bpf } for pid=6913 comm="syz.2.661" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 525.975256][ T29] audit: type=1400 audit(531.721:4795): avc: denied { perfmon } for pid=6913 comm="syz.2.661" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 530.649124][ T29] audit: type=1400 audit(536.031:4796): avc: denied { map_create } for pid=6920 comm="syz.3.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 530.651185][ T29] audit: type=1400 audit(536.031:4797): avc: denied { perfmon } for pid=6920 comm="syz.3.663" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 530.662553][ T29] audit: type=1400 audit(536.031:4798): avc: denied { map_read map_write } for pid=6920 comm="syz.3.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 530.667278][ T29] audit: type=1400 audit(536.059:4799): avc: denied { prog_load } for pid=6920 comm="syz.3.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 530.668805][ T29] audit: type=1400 audit(536.059:4800): avc: denied { bpf } for pid=6920 comm="syz.3.663" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 530.684815][ T29] audit: type=1400 audit(536.068:4801): avc: denied { prog_run } for pid=6920 comm="syz.3.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 531.453718][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 531.455309][ T29] audit: type=1400 audit(536.751:4808): avc: denied { ioctl } for pid=6920 comm="syz.3.663" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x540a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 532.154609][ T29] audit: type=1400 audit(537.295:4809): avc: denied { write } for pid=6920 comm="syz.3.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 533.778257][ T29] audit: type=1400 audit(538.929:4810): avc: denied { read write } for pid=6926 comm="syz.3.664" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 533.779560][ T29] audit: type=1400 audit(538.929:4811): avc: denied { open } for pid=6926 comm="syz.3.664" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 533.781396][ T29] audit: type=1400 audit(538.929:4812): avc: denied { ioctl } for pid=6926 comm="syz.3.664" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 533.801453][ T6927] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 533.802490][ T6927] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 534.180054][ T29] audit: type=1400 audit(539.298:4813): avc: denied { read } for pid=6930 comm="syz.3.665" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 534.180498][ T29] audit: type=1400 audit(539.298:4814): avc: denied { open } for pid=6930 comm="syz.3.665" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 534.184373][ T29] audit: type=1400 audit(539.298:4815): avc: denied { ioctl } for pid=6930 comm="syz.3.665" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x5428 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 535.214567][ T29] audit: type=1400 audit(540.249:4816): avc: denied { map_create } for pid=6936 comm="syz.3.668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 535.248735][ T29] audit: type=1400 audit(540.277:4817): avc: denied { perfmon } for pid=6936 comm="syz.3.668" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 538.710244][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 538.710548][ T29] audit: type=1400 audit(543.480:4830): avc: denied { read } for pid=6945 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 538.823541][ T29] audit: type=1400 audit(543.572:4831): avc: denied { create } for pid=6945 comm="syz.3.671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 538.829240][ T29] audit: type=1400 audit(543.581:4832): avc: denied { connect } for pid=6945 comm="syz.3.671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 538.866646][ T29] audit: type=1400 audit(543.618:4833): avc: denied { write } for pid=6945 comm="syz.3.671" name="icmp6" dev="proc" ino=4026533172 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 539.101058][ T29] audit: type=1400 audit(543.839:4834): avc: denied { read } for pid=6947 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 539.196802][ T29] audit: type=1400 audit(543.923:4835): avc: denied { audit_write } for pid=6947 comm="syz.3.672" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 539.197168][ T29] audit: type=1107 audit(543.923:4836): pid=6947 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='º%jY:-R}"_Ò{S&cçEé*Ü&›JÍU+9o<ÆŽppHi[AM…±Úëlã/ý^@U|€±BÉ!í:5Ã÷îÞø°mñ±%ۦƣ—“—/Õ1²s™^fuB† ÃVöP>šÈØ®¥µäTÐT‘?…µ¤H"GAü-!´tó~ –;‘´Üy WèSÃ×Ö3fÙï°ã' [ 539.392118][ T29] audit: type=1400 audit(544.107:4837): avc: denied { read } for pid=6949 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 539.473458][ T29] audit: type=1400 audit(544.172:4838): avc: denied { read write } for pid=6949 comm="syz.3.673" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 539.473961][ T29] audit: type=1400 audit(544.172:4839): avc: denied { open } for pid=6949 comm="syz.3.673" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 544.256492][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 544.256850][ T29] audit: type=1400 audit(548.593:4862): avc: denied { read } for pid=6968 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 544.308783][ T6970] netlink: 4 bytes leftover after parsing attributes in process `syz.3.680'. [ 544.487068][ T29] audit: type=1400 audit(548.805:4863): avc: denied { read } for pid=6971 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 544.600794][ T29] audit: type=1400 audit(548.916:4864): avc: denied { read } for pid=6973 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 544.735726][ T29] audit: type=1400 audit(549.036:4865): avc: denied { read } for pid=6975 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 544.881324][ T29] audit: type=1400 audit(549.156:4866): avc: denied { write } for pid=6975 comm="syz.3.683" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 544.978541][ T29] audit: type=1400 audit(549.258:4867): avc: denied { read } for pid=6977 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 545.298612][ T29] audit: type=1400 audit(549.544:4868): avc: denied { read write } for pid=6977 comm="syz.3.684" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 545.388718][ T29] audit: type=1400 audit(549.544:4869): avc: denied { read write open } for pid=6977 comm="syz.3.684" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 545.393583][ T29] audit: type=1400 audit(549.544:4870): avc: denied { ioctl } for pid=6977 comm="syz.3.684" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 545.456617][ T29] audit: type=1400 audit(549.701:4871): avc: denied { read } for pid=6979 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 547.285275][ T6995] netlink: 8 bytes leftover after parsing attributes in process `syz.3.692'. [ 547.488132][ T6998] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=6998 comm=syz.3.694 [ 549.932199][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 549.932550][ T29] audit: type=1400 audit(553.836:4908): avc: denied { read } for pid=7018 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 550.035254][ T29] audit: type=1400 audit(553.928:4909): avc: denied { prog_load } for pid=7018 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 550.095530][ T29] audit: type=1400 audit(553.983:4910): avc: denied { bpf } for pid=7018 comm="syz.3.703" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 550.167179][ T29] audit: type=1400 audit(554.002:4911): avc: denied { perfmon } for pid=7018 comm="syz.3.703" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 550.316822][ T29] audit: type=1400 audit(554.186:4912): avc: denied { bpf } for pid=7018 comm="syz.3.703" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 550.364740][ T29] audit: type=1400 audit(554.223:4913): avc: denied { prog_run } for pid=7018 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 550.437693][ T29] audit: type=1400 audit(554.297:4914): avc: denied { execmem } for pid=7018 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 550.944918][ T29] audit: type=1400 audit(554.768:4915): avc: denied { read } for pid=7020 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 551.468773][ T29] audit: type=1400 audit(555.257:4916): avc: denied { read } for pid=7022 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 552.117506][ T29] audit: type=1400 audit(555.848:4917): avc: denied { read } for pid=7024 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 552.175810][ T7025] netlink: 'syz.2.706': attribute type 29 has an invalid length. [ 555.468418][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 555.471318][ T29] audit: type=1400 audit(558.931:4925): avc: denied { create } for pid=7018 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 555.488044][ T29] audit: type=1400 audit(558.949:4926): avc: denied { bind } for pid=7018 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 555.502600][ T29] audit: type=1400 audit(558.958:4927): avc: denied { setopt } for pid=7018 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 555.519905][ T29] audit: type=1400 audit(558.958:4928): avc: denied { accept } for pid=7018 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 555.528308][ T29] audit: type=1400 audit(558.977:4929): avc: denied { write } for pid=7018 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 555.557811][ T29] audit: type=1400 audit(558.986:4930): avc: denied { read } for pid=7018 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 575.586781][ T29] audit: type=1400 audit(577.511:4931): avc: denied { read } for pid=7032 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 575.614081][ T29] audit: type=1400 audit(577.538:4932): avc: denied { create } for pid=7032 comm="syz.3.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 575.653161][ T7033] netlink: 8 bytes leftover after parsing attributes in process `syz.3.708'. [ 575.654520][ T29] audit: type=1400 audit(577.575:4933): avc: denied { write } for pid=7032 comm="syz.3.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 575.655066][ T29] audit: type=1400 audit(577.575:4934): avc: denied { nlmsg_read } for pid=7032 comm="syz.3.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 575.891091][ T29] audit: type=1400 audit(577.797:4935): avc: denied { read } for pid=7034 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 575.952191][ T29] audit: type=1400 audit(577.843:4936): avc: denied { create } for pid=7034 comm="syz.3.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 575.952572][ T29] audit: type=1400 audit(577.843:4937): avc: denied { ioctl } for pid=7034 comm="syz.3.709" path="socket:[8096]" dev="sockfs" ino=8096 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 575.952646][ T29] audit: type=1400 audit(577.843:4938): avc: denied { module_request } for pid=7034 comm="syz.3.709" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 576.505807][ T29] audit: type=1400 audit(578.369:4939): avc: denied { write } for pid=7034 comm="syz.3.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 576.517257][ T29] audit: type=1400 audit(578.378:4940): avc: denied { module_request } for pid=7034 comm="syz.3.709" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 577.919523][ T7049] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 577.920663][ T7049] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 578.770617][ T7056] tmpfs: Bad value for 'nr_inodes' [ 582.871930][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 582.872369][ T29] audit: type=1400 audit(584.239:4974): avc: denied { read } for pid=7064 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 583.192211][ T29] audit: type=1400 audit(584.525:4975): avc: denied { read } for pid=7066 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 583.969938][ T29] audit: type=1400 audit(585.245:4976): avc: denied { read } for pid=7068 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 584.457504][ T29] audit: type=1400 audit(585.688:4977): avc: denied { read } for pid=7070 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 584.565375][ T29] audit: type=1400 audit(585.781:4978): avc: denied { prog_load } for pid=7070 comm="syz.2.723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 584.565780][ T29] audit: type=1400 audit(585.781:4979): avc: denied { bpf } for pid=7070 comm="syz.2.723" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 584.565965][ T29] audit: type=1400 audit(585.781:4980): avc: denied { perfmon } for pid=7070 comm="syz.2.723" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 584.566139][ T29] audit: type=1400 audit(585.781:4981): avc: denied { prog_run } for pid=7070 comm="syz.2.723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 584.960483][ T29] audit: type=1400 audit(586.168:4982): avc: denied { read } for pid=7072 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 585.023436][ T29] audit: type=1400 audit(586.224:4983): avc: denied { prog_load } for pid=7072 comm="syz.2.724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 588.317891][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 588.319295][ T29] audit: type=1400 audit(589.270:4989): avc: denied { execmem } for pid=7077 comm="syz.2.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 588.512520][ T29] audit: type=1400 audit(589.445:4990): avc: denied { read } for pid=7079 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 588.749675][ T29] audit: type=1400 audit(589.666:4991): avc: denied { bpf } for pid=7079 comm="syz.2.727" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 588.791256][ T29] audit: type=1400 audit(589.694:4992): avc: denied { prog_load } for pid=7079 comm="syz.2.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 588.793577][ T29] audit: type=1400 audit(589.694:4993): avc: denied { bpf } for pid=7079 comm="syz.2.727" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 588.795181][ T29] audit: type=1400 audit(589.694:4994): avc: denied { perfmon } for pid=7079 comm="syz.2.727" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 589.506799][ T29] audit: type=1400 audit(590.359:4995): avc: denied { read } for pid=7081 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 589.543463][ T29] audit: type=1400 audit(590.396:4996): avc: denied { create } for pid=7081 comm="syz.2.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 589.559867][ T29] audit: type=1400 audit(590.405:4997): avc: denied { bind } for pid=7081 comm="syz.2.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 589.562531][ T29] audit: type=1400 audit(590.414:4998): avc: denied { connect } for pid=7081 comm="syz.2.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 590.327492][ T7086] SELinux: ebitmap: truncated map [ 590.397926][ T7086] SELinux: failed to load policy [ 593.796001][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 593.800151][ T29] audit: type=1400 audit(594.318:5011): avc: denied { read write } for pid=7096 comm="syz.2.735" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 593.801896][ T29] audit: type=1400 audit(594.318:5012): avc: denied { read write open } for pid=7096 comm="syz.2.735" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 593.813537][ T29] audit: type=1400 audit(594.337:5013): avc: denied { ioctl } for pid=7096 comm="syz.2.735" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 593.816398][ T7097] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 593.818266][ T7097] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 593.925991][ T29] audit: type=1400 audit(594.438:5014): avc: denied { read } for pid=7100 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 594.065421][ T29] audit: type=1400 audit(594.568:5015): avc: denied { read } for pid=7102 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 594.106059][ T29] audit: type=1326 audit(594.604:5016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7102 comm="syz.2.737" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x0 [ 594.938430][ T29] audit: type=1400 audit(595.371:5017): avc: denied { read } for pid=7104 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 595.013705][ T29] audit: type=1400 audit(595.444:5018): avc: denied { prog_load } for pid=7104 comm="syz.2.738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 595.016591][ T29] audit: type=1400 audit(595.444:5019): avc: denied { bpf } for pid=7104 comm="syz.2.738" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 595.018513][ T29] audit: type=1400 audit(595.444:5020): avc: denied { perfmon } for pid=7104 comm="syz.2.738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 596.007099][ T7113] netlink: 8 bytes leftover after parsing attributes in process `syz.3.741'. [ 599.323122][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 599.332462][ T29] audit: type=1400 audit(599.413:5039): avc: denied { read } for pid=7126 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 599.350052][ T29] audit: type=1400 audit(599.441:5040): avc: denied { module_request } for pid=7126 comm="syz.3.748" kmod="fs-overlay" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 599.957518][ T29] audit: type=1400 audit(600.004:5041): avc: denied { read } for pid=7130 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 600.155007][ T29] audit: type=1400 audit(600.189:5042): avc: denied { read } for pid=7132 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 600.204318][ T29] audit: type=1400 audit(600.235:5043): avc: denied { create } for pid=7132 comm="syz.3.750" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_socket permissive=1 [ 600.314548][ T29] audit: type=1400 audit(600.336:5044): avc: denied { read } for pid=7134 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 600.346475][ T29] audit: type=1400 audit(600.364:5045): avc: denied { read write } for pid=7134 comm="syz.3.751" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 600.362942][ T29] audit: type=1400 audit(600.382:5046): avc: denied { open } for pid=7134 comm="syz.3.751" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 600.365251][ T29] audit: type=1400 audit(600.382:5047): avc: denied { ioctl } for pid=7134 comm="syz.3.751" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 600.368441][ T7135] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 600.370052][ T7135] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 600.474196][ T29] audit: type=1400 audit(600.484:5048): avc: denied { read } for pid=7138 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 604.500662][ T7158] syz_tun: entered allmulticast mode [ 604.541215][ T7157] syz_tun: left allmulticast mode [ 604.904072][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 604.904353][ T29] audit: type=1400 audit(604.573:5078): avc: denied { read } for pid=7161 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 605.197377][ T29] audit: type=1400 audit(604.841:5079): avc: denied { read } for pid=7163 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 605.391568][ T29] audit: type=1400 audit(605.025:5080): avc: denied { read } for pid=7165 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 605.606319][ T7166] capability: warning: `syz.3.764' uses 32-bit capabilities (legacy support in use) [ 606.100297][ T29] audit: type=1400 audit(605.671:5081): avc: denied { read } for pid=7167 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 606.169490][ T29] audit: type=1400 audit(605.736:5082): avc: denied { map_create } for pid=7167 comm="syz.3.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 606.172065][ T29] audit: type=1400 audit(605.736:5083): avc: denied { perfmon } for pid=7167 comm="syz.3.765" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 606.177060][ T29] audit: type=1400 audit(605.745:5084): avc: denied { map_read map_write } for pid=7167 comm="syz.3.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 606.187946][ T29] audit: type=1400 audit(605.754:5085): avc: denied { prog_load } for pid=7167 comm="syz.3.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 606.196080][ T29] audit: type=1400 audit(605.764:5086): avc: denied { bpf } for pid=7167 comm="syz.3.765" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 606.209467][ T29] audit: type=1400 audit(605.773:5087): avc: denied { prog_run } for pid=7167 comm="syz.3.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 608.087510][ T30] INFO: task kworker/1:76:4432 blocked for more than 430 seconds. [ 608.087887][ T30] Not tainted syzkaller #0 [ 608.088057][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.088362][ T30] task:kworker/1:76 state:D stack:0 pid:4432 tgid:4432 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.088854][ T30] Workqueue: events bpf_prog_free_deferred [ 608.089020][ T30] Call trace: [ 608.089232][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.089330][ T30] r10:dfb3dd84 r9:00000002 r8:60010013 r7:829171a0 r6:dfb3dd8c r5:85901800 [ 608.089352][ T30] r4:85901800 [ 608.089369][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.089430][ T30] r5:85901800 r4:8291719c [ 608.089447][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.089504][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.089572][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 [ 608.089593][ T30] r4:00000000 [ 608.089609][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.089681][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.089878][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.091383][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dcf0c0 [ 608.091430][ T30] r4:00000000 [ 608.091449][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.091538][ T30] r9:83018605 r8:85901800 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 608.091559][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.091703][ T30] r5:00001000 r4:dffbb000 [ 608.091726][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.091785][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.091846][ T30] r5:85ab2f8c r4:85aa6300 [ 608.091862][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.091931][ T30] r7:ddde3d80 r6:83018600 r5:85ab2f8c r4:85aa6300 [ 608.091999][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.092075][ T30] r10:61c88647 r9:85901800 r8:85aa632c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.092095][ T30] r4:85aa6300 [ 608.092111][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.092187][ T30] r10:00000000 r9:85aa6300 r8:80278fec r7:dfb39e60 r6:84e56900 r5:85901800 [ 608.092467][ T30] r4:00000001 [ 608.092491][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.092576][ T30] Exception stack(0xdfb3dfb0 to 0xdfb3dff8) [ 608.092616][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 608.092651][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.092699][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.092738][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.092777][ T30] r4:85a2d180 [ 608.093660][ T30] INFO: task kworker/1:76:4432 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.093765][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.093923][ T30] Workqueue: events bpf_prog_free_deferred [ 608.093981][ T30] Call trace: [ 608.094035][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.094116][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.094140][ T30] r4:00000000 [ 608.094182][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.094366][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.094674][ T30] 1d20: c8f9a000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.094726][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.094753][ T30] 1d60: 80000113 ffffffff [ 608.094780][ T30] r5:80000113 r4:80239c10 [ 608.094800][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.094874][ T30] r4:82acb1e4 [ 608.094891][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.094959][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.121269][ T30] r4:ea751dc0 [ 608.121504][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.121629][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.121654][ T30] r4:00000000 [ 608.121764][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.121842][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.121876][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.121944][ T30] r5:00001000 r4:dfba3000 [ 608.121995][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.122112][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.122225][ T30] r5:85800b8c r4:85a36480 [ 608.122245][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.122321][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.122338][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.122501][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.122527][ T30] r4:85a36480 [ 608.122612][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.122721][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.122748][ T30] r4:00000001 [ 608.122929][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.122997][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.123066][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.123156][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.123261][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.123317][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.123337][ T30] r4:84dd15c0 [ 608.123471][ T30] INFO: task kworker/1:77:4433 blocked for more than 430 seconds. [ 608.123583][ T30] Not tainted syzkaller #0 [ 608.123622][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.123639][ T30] task:kworker/1:77 state:D stack:0 pid:4433 tgid:4433 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.123708][ T30] Workqueue: events bpf_prog_free_deferred [ 608.123762][ T30] Call trace: [ 608.123825][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.123905][ T30] r10:dfb41d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfb41d8c r5:85ad0c00 [ 608.123980][ T30] r4:85ad0c00 [ 608.124024][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.124086][ T30] r5:85ad0c00 r4:8291719c [ 608.124103][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.124333][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.124414][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 [ 608.124456][ T30] r4:00000000 [ 608.124476][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.124534][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.124585][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.124678][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dcf940 [ 608.124704][ T30] r4:00000000 [ 608.124718][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.124862][ T30] r9:83018605 r8:85ad0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f254000 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 608.124883][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.124943][ T30] r5:00001000 r4:e0075000 [ 608.125044][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.125107][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.125168][ T30] r5:85a44f8c r4:85aa6f80 [ 608.125223][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.125296][ T30] r7:ddde3d80 r6:83018600 r5:85a44f8c r4:85aa6f80 [ 608.125367][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.125444][ T30] r10:61c88647 r9:85ad0c00 r8:85aa6fac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.125497][ T30] r4:85aa6f80 [ 608.125516][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.125588][ T30] r10:00000000 r9:85aa6f80 r8:80278fec r7:dfb3de60 r6:84e56500 r5:85ad0c00 [ 608.125608][ T30] r4:00000001 [ 608.125622][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.125843][ T30] Exception stack(0xdfb41fb0 to 0xdfb41ff8) [ 608.125881][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.125951][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.125987][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.126029][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.126193][ T30] r4:85a2d140 [ 608.126762][ T30] INFO: task kworker/1:77:4433 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.126801][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.126868][ T30] Workqueue: events bpf_prog_free_deferred [ 608.126919][ T30] Call trace: [ 608.126940][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.127009][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.127071][ T30] r4:00000000 [ 608.127130][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.127199][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.127327][ T30] 1d20: c93d8000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.127380][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.127405][ T30] 1d60: 80000113 ffffffff [ 608.127454][ T30] r5:80000113 r4:80239c10 [ 608.127560][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.127639][ T30] r4:82acb1e4 [ 608.127661][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.127725][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.127745][ T30] r4:ea751dc0 [ 608.127759][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.127824][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.127862][ T30] r4:00000000 [ 608.127998][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.128075][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.128093][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.128152][ T30] r5:00001000 r4:dfba3000 [ 608.128190][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.128252][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.128314][ T30] r5:85800b8c r4:85a36480 [ 608.128400][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.128537][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.128560][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.128878][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.128949][ T30] r4:85a36480 [ 608.128970][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.129062][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.129083][ T30] r4:00000001 [ 608.129098][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.129145][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.210300][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.211629][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.212592][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.213542][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.214732][ T30] r4:84dd15c0 [ 608.217074][ T30] INFO: task kworker/0:84:4440 blocked for more than 430 seconds. [ 608.218081][ T30] Not tainted syzkaller #0 [ 608.218852][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.219823][ T30] task:kworker/0:84 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.221527][ T30] Workqueue: events bpf_prog_free_deferred [ 608.222794][ T30] Call trace: [ 608.223730][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.224712][ T30] r10:dfbc5d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbc5d8c r5:85ad4800 [ 608.225814][ T30] r4:85ad4800 [ 608.226614][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.228588][ T30] r5:85ad4800 r4:8291719c [ 608.229693][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.231349][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.232616][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 [ 608.234268][ T30] r4:00000000 [ 608.234863][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.235905][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.237140][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.238795][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b8c40 [ 608.239725][ T30] r4:00000000 [ 608.240342][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.252138][ T30] r9:83018405 r8:85ad4800 r7:00000000 r6:83018400 r5:00001000 r4:7f258000 [ 608.253218][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.254251][ T30] r5:00001000 r4:e41ab000 [ 608.254966][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.256125][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.257314][ T30] r5:85ab3f8c r4:85a36600 [ 608.258054][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.259807][ T30] r7:dddcfd80 r6:83018400 r5:85ab3f8c r4:85a36600 [ 608.260751][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.261823][ T30] r10:61c88647 r9:85ad4800 r8:85a3662c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.262772][ T30] r4:85a36600 [ 608.263425][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.264405][ T30] r10:00000000 r9:85a36600 r8:80278fec r7:ea751e60 r6:85a36680 r5:85ad4800 [ 608.265505][ T30] r4:00000001 [ 608.266129][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.267120][ T30] Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) [ 608.267875][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 608.268881][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.270823][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.271717][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.272700][ T30] r4:84dd15c0 [ 608.281854][ T30] INFO: task kworker/0:84:4440 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.283100][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.285584][ T30] Workqueue: events bpf_prog_free_deferred [ 608.287136][ T30] Call trace: [ 608.288239][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.289345][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.290385][ T30] r4:00000000 [ 608.291377][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.293043][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.293850][ T30] 1d20: c9984000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.294938][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.295870][ T30] 1d60: 80000113 ffffffff [ 608.296674][ T30] r5:80000113 r4:80239c10 [ 608.297546][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.299221][ T30] r4:82acb1e4 [ 608.299883][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.301338][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.303712][ T30] r4:ea751dc0 [ 608.304367][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.305071][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.305576][ T30] r4:00000000 [ 608.305893][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.306388][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.306951][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.307565][ T30] r5:00001000 r4:dfba3000 [ 608.308046][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.310235][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.311392][ T30] r5:85800b8c r4:85a36480 [ 608.311777][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.312312][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.313195][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.314241][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.317011][ T30] r4:85a36480 [ 608.320923][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.324774][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.325284][ T30] r4:00000001 [ 608.325602][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.326057][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.326442][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.326910][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.327385][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.327798][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.328234][ T30] r4:84dd15c0 [ 608.328536][ T30] INFO: task kworker/0:85:4441 blocked for more than 430 seconds. [ 608.328949][ T30] Not tainted syzkaller #0 [ 608.329351][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.330101][ T30] task:kworker/0:85 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.330824][ T30] Workqueue: events bpf_prog_free_deferred [ 608.331383][ T30] Call trace: [ 608.331816][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.332253][ T30] r10:dfbd5d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbd5d8c r5:85ad3c00 [ 608.332697][ T30] r4:85ad3c00 [ 608.333098][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.334022][ T30] r5:85ad3c00 r4:8291719c [ 608.334624][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.335808][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.336393][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 [ 608.336883][ T30] r4:00000000 [ 608.337224][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.337741][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.338267][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.339607][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a4640 [ 608.340350][ T30] r4:00000000 [ 608.340931][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.341830][ T30] r9:83018405 r8:85ad3c00 r7:00000000 r6:83018400 r5:00001000 r4:7f24c000 [ 608.342693][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.343650][ T30] r5:00001000 r4:dfbed000 [ 608.344220][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.346270][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.346848][ T30] r5:859fbf8c r4:85a36780 [ 608.347400][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.348006][ T30] r7:dddcfd80 r6:83018400 r5:859fbf8c r4:85a36780 [ 608.348456][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.349104][ T30] r10:61c88647 r9:85ad3c00 r8:85a367ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.349698][ T30] r4:85a36780 [ 608.350060][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.350626][ T30] r10:00000000 r9:85a36780 r8:80278fec r7:dfbc5e60 r6:85a36800 r5:85ad3c00 [ 608.351162][ T30] r4:00000001 [ 608.351513][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.352116][ T30] Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) [ 608.352630][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 608.353190][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.353755][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.354312][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.354966][ T30] r4:84dd1400 [ 608.356347][ T30] INFO: task kworker/0:85:4441 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.360664][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.368689][ T30] Workqueue: events bpf_prog_free_deferred [ 608.369560][ T30] Call trace: [ 608.370155][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.370885][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.371613][ T30] r4:00000000 [ 608.372038][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.372750][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.373315][ T30] 1d20: c9f31000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.374021][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.374726][ T30] 1d60: 80000113 ffffffff [ 608.375195][ T30] r5:80000113 r4:80239c10 [ 608.375702][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.376503][ T30] r4:82acb1e4 [ 608.376937][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.377975][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.389926][ T30] r4:ea751dc0 [ 608.390336][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.390480][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.390504][ T30] r4:00000000 [ 608.390518][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.390587][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.390606][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.390672][ T30] r5:00001000 r4:dfba3000 [ 608.390687][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.390743][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.390803][ T30] r5:85800b8c r4:85a36480 [ 608.390820][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.390890][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.390995][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.391117][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.391138][ T30] r4:85a36480 [ 608.391155][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.391236][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.391256][ T30] r4:00000001 [ 608.391272][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.391320][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.391357][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.391392][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.391424][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.391486][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.391511][ T30] r4:84dd15c0 [ 608.391760][ T30] INFO: task kworker/0:86:4445 blocked for more than 430 seconds. [ 608.391812][ T30] Not tainted syzkaller #0 [ 608.391835][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.391850][ T30] task:kworker/0:86 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.391924][ T30] Workqueue: events bpf_prog_free_deferred [ 608.391980][ T30] Call trace: [ 608.392005][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.392082][ T30] r10:dfbf1d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbf1d8c r5:85ad6000 [ 608.393309][ T30] r4:85ad6000 [ 608.393345][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.393431][ T30] r5:85ad6000 r4:8291719c [ 608.393454][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.393531][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.393610][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 [ 608.393632][ T30] r4:00000000 [ 608.393649][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.393714][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.393774][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.393842][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2d9c0 [ 608.393865][ T30] r4:00000000 [ 608.393881][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.393968][ T30] r9:83018405 r8:85ad6000 r7:00000000 r6:83018400 r5:00001000 r4:7f24e000 [ 608.393999][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.394061][ T30] r5:00001000 r4:dfc39000 [ 608.394081][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.394155][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.394247][ T30] r5:859f8b8c r4:85a36180 [ 608.394266][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.394336][ T30] r7:dddcfd80 r6:83018400 r5:859f8b8c r4:85a36180 [ 608.394352][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.394425][ T30] r10:61c88647 r9:85ad6000 r8:85a361ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.394449][ T30] r4:85a36180 [ 608.394463][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.394533][ T30] r10:00000000 r9:85a36180 r8:80278fec r7:dfbc5e60 r6:85a36980 r5:85ad6000 [ 608.394586][ T30] r4:00000001 [ 608.394614][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.394664][ T30] Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) [ 608.394700][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.394733][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.394769][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.394805][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.394824][ T30] r4:85a2de00 [ 608.395362][ T30] INFO: task kworker/0:86:4445 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.395409][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.395494][ T30] Workqueue: events bpf_prog_free_deferred [ 608.395551][ T30] Call trace: [ 608.395597][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.395680][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.395703][ T30] r4:00000000 [ 608.395718][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.395788][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.395829][ T30] 1d20: c9f31000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.395865][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.395918][ T30] 1d60: 80000113 ffffffff [ 608.395945][ T30] r5:80000113 r4:80239c10 [ 608.395991][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.396066][ T30] r4:82acb1e4 [ 608.396083][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.396147][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.396166][ T30] r4:ea751dc0 [ 608.396187][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.396253][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.396274][ T30] r4:00000000 [ 608.396289][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.396355][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.396373][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.396432][ T30] r5:00001000 r4:dfba3000 [ 608.396448][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.396538][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.396606][ T30] r5:85800b8c r4:85a36480 [ 608.396622][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.396719][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.396747][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.396821][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.396867][ T30] r4:85a36480 [ 608.396893][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.396964][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.396985][ T30] r4:00000001 [ 608.397001][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.397046][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.397079][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.397113][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.397145][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.397189][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.397212][ T30] r4:84dd15c0 [ 608.397240][ T30] INFO: task kworker/0:87:4448 blocked for more than 430 seconds. [ 608.397305][ T30] Not tainted syzkaller #0 [ 608.397341][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.397356][ T30] task:kworker/0:87 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.397410][ T30] Workqueue: events bpf_prog_free_deferred [ 608.397457][ T30] Call trace: [ 608.397500][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.397589][ T30] r10:dfad1d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfad1d8c r5:85ad0000 [ 608.397615][ T30] r4:85ad0000 [ 608.397634][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.397694][ T30] r5:85ad0000 r4:8291719c [ 608.397710][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.397769][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.397844][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 [ 608.397863][ T30] r4:00000000 [ 608.397880][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.397931][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.397983][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.398051][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ea0740 [ 608.398073][ T30] r4:00000000 [ 608.398104][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.398188][ T30] r9:83018405 r8:85ad0000 r7:00000000 r6:83018400 r5:00001000 r4:7f27a000 [ 608.398212][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.398305][ T30] r5:00001000 r4:e41c1000 [ 608.398333][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.398393][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.398466][ T30] r5:859fb38c r4:85a36b80 [ 608.398482][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.398615][ T30] r7:dddcfd80 r6:83018400 r5:859fb38c r4:85a36b80 [ 608.398637][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.398710][ T30] r10:61c88647 r9:85ad0000 r8:85a36bac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.398732][ T30] r4:85a36b80 [ 608.398748][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.398815][ T30] r10:00000000 r9:85a36b80 r8:80278fec r7:dfbc5e60 r6:85a36c00 r5:85ad0000 [ 608.398866][ T30] r4:00000001 [ 608.398885][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.398933][ T30] Exception stack(0xdfad1fb0 to 0xdfad1ff8) [ 608.398962][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.399000][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.399098][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.399140][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.399160][ T30] r4:85aa3280 [ 608.399987][ T30] INFO: task kworker/0:87:4448 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.442557][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.443382][ T30] Workqueue: events bpf_prog_free_deferred [ 608.444230][ T30] Call trace: [ 608.444470][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.444697][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.444827][ T30] r4:00000000 [ 608.444947][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.445127][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.445300][ T30] 1d20: ca155000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.445456][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.445602][ T30] 1d60: 80000113 ffffffff [ 608.445747][ T30] r5:80000113 r4:80239c10 [ 608.445868][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.446068][ T30] r4:82acb1e4 [ 608.446203][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.446491][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.446637][ T30] r4:ea751dc0 [ 608.446759][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.446963][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.447135][ T30] r4:00000000 [ 608.447269][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.447479][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.447604][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.447802][ T30] r5:00001000 r4:dfba3000 [ 608.447927][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.483271][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.483618][ T30] r5:85800b8c r4:85a36480 [ 608.483752][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.484013][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.484141][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.484361][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.484492][ T30] r4:85a36480 [ 608.484614][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.484829][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.484969][ T30] r4:00000001 [ 608.485096][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.485305][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.485475][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.485638][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.485791][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.485995][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.486316][ T30] r4:84dd15c0 [ 608.486455][ T30] INFO: task kworker/1:78:4455 blocked for more than 430 seconds. [ 608.486604][ T30] Not tainted syzkaller #0 [ 608.498235][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.498454][ T30] task:kworker/1:78 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.498766][ T30] Workqueue: events bpf_prog_free_deferred [ 608.499093][ T30] Call trace: [ 608.499345][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.499555][ T30] r10:dffb9d84 r9:00000002 r8:60000113 r7:829171a0 r6:dffb9d8c r5:84af0c00 [ 608.499685][ T30] r4:84af0c00 [ 608.499808][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.500005][ T30] r5:84af0c00 r4:8291719c [ 608.500125][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.500316][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.500528][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb9e08 [ 608.500657][ T30] r4:00000000 [ 608.500784][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.500980][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.501163][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.501377][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d0a80 [ 608.501503][ T30] r4:00000000 [ 608.501625][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.501837][ T30] r9:83018605 r8:84af0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f256000 [ 608.501967][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.502171][ T30] r5:00001000 r4:e00e1000 [ 608.502306][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.502490][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.502690][ T30] r5:847ec38c r4:85997c00 [ 608.502814][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.503058][ T30] r7:ddde3d80 r6:83018600 r5:847ec38c r4:85997c00 [ 608.503195][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.503404][ T30] r10:61c88647 r9:84af0c00 r8:85997c2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.503538][ T30] r4:85997c00 [ 608.503659][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.503868][ T30] r10:00000000 r9:85997c00 r8:80278fec r7:dfb41e60 r6:849c0f00 r5:84af0c00 [ 608.504024][ T30] r4:00000001 [ 608.504146][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.504333][ T30] Exception stack(0xdffb9fb0 to 0xdffb9ff8) [ 608.504497][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 608.504653][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.504802][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.504952][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.505083][ T30] r4:84dcf040 [ 608.505813][ T30] INFO: task kworker/1:78:4455 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.505970][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.541702][ T30] Workqueue: events bpf_prog_free_deferred [ 608.542062][ T30] Call trace: [ 608.542325][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.542549][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.542681][ T30] r4:00000000 [ 608.542809][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.543002][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.543216][ T30] 1d20: ca977000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.543366][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.543502][ T30] 1d60: 80000113 ffffffff [ 608.543640][ T30] r5:80000113 r4:80239c10 [ 608.543754][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.543945][ T30] r4:82acb1e4 [ 608.544088][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.544303][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.544435][ T30] r4:ea751dc0 [ 608.544559][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.544760][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.544891][ T30] r4:00000000 [ 608.545008][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.545217][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.545344][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.545548][ T30] r5:00001000 r4:dfba3000 [ 608.545672][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.545853][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.546045][ T30] r5:85800b8c r4:85a36480 [ 608.546165][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.546378][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.546501][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.546709][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.546838][ T30] r4:85a36480 [ 608.546957][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.547206][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.547340][ T30] r4:00000001 [ 608.547459][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.547627][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.547776][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.547924][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.548069][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.548228][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.548356][ T30] r4:84dd15c0 [ 608.548771][ T30] INFO: task kworker/1:79:4462 blocked for more than 430 seconds. [ 608.548921][ T30] Not tainted syzkaller #0 [ 608.549050][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.549186][ T30] task:kworker/1:79 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.549493][ T30] Workqueue: events bpf_prog_free_deferred [ 608.549770][ T30] Call trace: [ 608.550006][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.550232][ T30] r10:dff7dd84 r9:00000002 r8:60000013 r7:829171a0 r6:dff7dd8c r5:84af0000 [ 608.550456][ T30] r4:84af0000 [ 608.550639][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.550834][ T30] r5:84af0000 r4:8291719c [ 608.551151][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.551359][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.551568][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff7de08 [ 608.587718][ T30] r4:00000000 [ 608.594539][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.638705][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.639828][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.641680][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594b2c0 [ 608.642771][ T30] r4:00000000 [ 608.644054][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.645818][ T30] r9:83018605 r8:84af0000 r7:00000000 r6:83018600 r5:00001000 r4:7f27e000 [ 608.646790][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.648632][ T30] r5:00001000 r4:ea9ed000 [ 608.693117][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.693859][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.695869][ T30] r5:859fab8c r4:85a30b00 [ 608.696917][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.698691][ T30] r7:ddde3d80 r6:83018600 r5:859fab8c r4:85a30b00 [ 608.699607][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.701166][ T30] r10:61c88647 r9:84af0000 r8:85a30b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.702138][ T30] r4:85a30b00 [ 608.702827][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.736771][ T30] r10:00000000 r9:85a30b00 r8:80278fec r7:dfb41e60 r6:85a30c00 r5:84af0000 [ 608.737011][ T30] r4:00000001 [ 608.737147][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.737353][ T30] Exception stack(0xdff7dfb0 to 0xdff7dff8) [ 608.737418][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 608.737462][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.737561][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.737607][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.737658][ T30] r4:858d0a00 [ 608.738169][ T30] INFO: task kworker/1:79:4462 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.738214][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.738344][ T30] Workqueue: events bpf_prog_free_deferred [ 608.738417][ T30] Call trace: [ 608.738565][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.738656][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.738768][ T30] r4:00000000 [ 608.738788][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.738842][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.738991][ T30] 1d20: ce872000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.739051][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.739118][ T30] 1d60: 80000113 ffffffff [ 608.739150][ T30] r5:80000113 r4:80239c10 [ 608.739167][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.739237][ T30] r4:82acb1e4 [ 608.739253][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.739319][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.739384][ T30] r4:ea751dc0 [ 608.739577][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.739649][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.739776][ T30] r4:00000000 [ 608.739796][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.740000][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.740022][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.740085][ T30] r5:00001000 r4:dfba3000 [ 608.740102][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.740182][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.740248][ T30] r5:85800b8c r4:85a36480 [ 608.740443][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.740522][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.740645][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.740721][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.740755][ T30] r4:85a36480 [ 608.740774][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.740846][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.740868][ T30] r4:00000001 [ 608.740927][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.740978][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.741045][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.741083][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.741116][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.741151][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.741171][ T30] r4:84dd15c0 [ 608.741447][ T30] INFO: task kworker/0:88:4463 blocked for more than 430 seconds. [ 608.741492][ T30] Not tainted syzkaller #0 [ 608.741519][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.741534][ T30] task:kworker/0:88 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.741590][ T30] Workqueue: events bpf_prog_free_deferred [ 608.741642][ T30] Call trace: [ 608.741669][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.741744][ T30] r10:ea8a1d84 r9:00000002 r8:60010013 r7:829171a0 r6:ea8a1d8c r5:83a38000 [ 608.741765][ T30] r4:83a38000 [ 608.741780][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.741842][ T30] r5:83a38000 r4:8291719c [ 608.741857][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.741923][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.742004][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a1e08 [ 608.742067][ T30] r4:00000000 [ 608.742090][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.742146][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.742206][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.742345][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567bec0 [ 608.742475][ T30] r4:00000000 [ 608.742495][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.742569][ T30] r9:83018405 r8:83a38000 r7:00000000 r6:83018400 r5:00001000 r4:7f284000 [ 608.742693][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.742770][ T30] r5:00001000 r4:eaa03000 [ 608.742823][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.742885][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.742949][ T30] r5:85ab038c r4:85a36f00 [ 608.742966][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.743072][ T30] r7:dddcfd80 r6:83018400 r5:85ab038c r4:85a36f00 [ 608.743139][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.743213][ T30] r10:61c88647 r9:83a38000 r8:85a36f2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.743254][ T30] r4:85a36f00 [ 608.743272][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.743344][ T30] r10:00000000 r9:85a36f00 r8:80278fec r7:dfbc5e60 r6:85a36f80 r5:83a38000 [ 608.743365][ T30] r4:00000001 [ 608.743478][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.743590][ T30] Exception stack(0xea8a1fb0 to 0xea8a1ff8) [ 608.743626][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.743662][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.743695][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.743733][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.743754][ T30] r4:84ea0800 [ 608.744161][ T30] INFO: task kworker/0:88:4463 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.744199][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.744283][ T30] Workqueue: events bpf_prog_free_deferred [ 608.744411][ T30] Call trace: [ 608.744453][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.744531][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.744617][ T30] r4:00000000 [ 608.744635][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.744692][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.744731][ T30] 1d20: ce872000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.744768][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.744792][ T30] 1d60: 80000113 ffffffff [ 608.744816][ T30] r5:80000113 r4:80239c10 [ 608.745134][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.745191][ T30] r4:82acb1e4 [ 608.745200][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.745343][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.745434][ T30] r4:ea751dc0 [ 608.745455][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.745524][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.745653][ T30] r4:00000000 [ 608.745775][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.745846][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.745905][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.746513][ T30] r5:00001000 r4:dfba3000 [ 608.746550][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.746596][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.746628][ T30] r5:85800b8c r4:85a36480 [ 608.746635][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.746670][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.746678][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.746714][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.746809][ T30] r4:85a36480 [ 608.762247][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.762639][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.762655][ T30] r4:00000001 [ 608.762664][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.763184][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.763212][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.763231][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.763248][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.763269][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.763650][ T30] r4:84dd15c0 [ 608.763676][ T30] INFO: task kworker/0:89:4465 blocked for more than 430 seconds. [ 608.763699][ T30] Not tainted syzkaller #0 [ 608.763827][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.763850][ T30] task:kworker/0:89 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.763897][ T30] Workqueue: events bpf_prog_free_deferred [ 608.763928][ T30] Call trace: [ 608.764248][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.764295][ T30] r10:e012dd84 r9:00000002 r8:60000113 r7:829171a0 r6:e012dd8c r5:84af4800 [ 608.764305][ T30] r4:84af4800 [ 608.764313][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.764344][ T30] r5:84af4800 r4:8291719c [ 608.764354][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.764385][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.764424][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e012de08 [ 608.764441][ T30] r4:00000000 [ 608.764466][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.764568][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.764601][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.764637][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb4040 [ 608.764648][ T30] r4:00000000 [ 608.764655][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.764692][ T30] r9:83018405 r8:84af4800 r7:00000000 r6:83018400 r5:00001000 r4:7f252000 [ 608.765218][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.765334][ T30] r5:00001000 r4:e0033000 [ 608.765344][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.765375][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.765409][ T30] r5:859e238c r4:85a36e80 [ 608.765417][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.765463][ T30] r7:dddcfd80 r6:83018400 r5:859e238c r4:85a36e80 [ 608.765734][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.765777][ T30] r10:61c88647 r9:84af4800 r8:85a36eac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.766551][ T30] r4:85a36e80 [ 608.766561][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.766785][ T30] r10:00000000 r9:85a36e80 r8:80278fec r7:ea8a1e60 r6:849d0e80 r5:84af4800 [ 608.766900][ T30] r4:00000001 [ 608.766910][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.766938][ T30] Exception stack(0xe012dfb0 to 0xe012dff8) [ 608.766957][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 608.766978][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.766997][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.767038][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.767050][ T30] r4:849461c0 [ 608.767384][ T30] INFO: task kworker/0:89:4465 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.767506][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.767622][ T30] Workqueue: events bpf_prog_free_deferred [ 608.767653][ T30] Call trace: [ 608.767671][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.767823][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.785798][ T30] r4:00000000 [ 608.785898][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.785992][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.786194][ T30] 1d20: cf29f000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.786498][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.786512][ T30] 1d60: 80000113 ffffffff [ 608.786526][ T30] r5:80000113 r4:80239c10 [ 608.786534][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.786567][ T30] r4:82acb1e4 [ 608.786574][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.786608][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.786663][ T30] r4:ea751dc0 [ 608.786673][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.786706][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.787194][ T30] r4:00000000 [ 608.787205][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.787241][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.787249][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.787281][ T30] r5:00001000 r4:dfba3000 [ 608.787289][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.787315][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.787345][ T30] r5:85800b8c r4:85a36480 [ 608.787353][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.787469][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.787480][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.787516][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.787750][ T30] r4:85a36480 [ 608.787759][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.788186][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.788198][ T30] r4:00000001 [ 608.788397][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.788910][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.788929][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.789114][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.789133][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.789152][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.789162][ T30] r4:84dd15c0 [ 608.789214][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.789281][ T30] INFO: task kworker/0:90:4469 blocked for more than 430 seconds. [ 608.789436][ T30] Not tainted syzkaller #0 [ 608.789610][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.789636][ T30] task:kworker/0:90 state:D stack:0 pid:4469 tgid:4469 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.789686][ T30] Workqueue: events bpf_prog_free_deferred [ 608.789726][ T30] Call trace: [ 608.789739][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.789782][ T30] r10:dfbf9d84 r9:00000002 r8:60070113 r7:829171a0 r6:dfbf9d8c r5:83abe000 [ 608.789794][ T30] r4:83abe000 [ 608.789802][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.789831][ T30] r5:83abe000 r4:8291719c [ 608.789839][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.789867][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.789903][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 [ 608.789912][ T30] r4:00000000 [ 608.789919][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.796290][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.796385][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.796422][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bc0c0 [ 608.796440][ T30] r4:00000000 [ 608.796448][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.796547][ T30] r9:83018405 r8:83abe000 r7:00000000 r6:83018400 r5:00001000 r4:7f27c000 [ 608.796565][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.796788][ T30] r5:00001000 r4:ea985000 [ 608.796798][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.796827][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.796857][ T30] r5:85ab338c r4:85a36200 [ 608.796864][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.796899][ T30] r7:dddcfd80 r6:83018400 r5:85ab338c r4:85a36200 [ 608.796907][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.796946][ T30] r10:61c88647 r9:83abe000 r8:85a3622c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.796957][ T30] r4:85a36200 [ 608.797023][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.797137][ T30] r10:00000000 r9:85a36200 r8:80278fec r7:ea8a1e60 r6:85a30b80 r5:83abe000 [ 608.797149][ T30] r4:00000001 [ 608.797384][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.797411][ T30] Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) [ 608.797993][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 608.798014][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.798029][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.798048][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.798058][ T30] r4:85a2dcc0 [ 608.798381][ T30] INFO: task kworker/0:90:4469 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.798717][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.798790][ T30] Workqueue: events bpf_prog_free_deferred [ 608.798823][ T30] Call trace: [ 608.798837][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.798875][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.799051][ T30] r4:00000000 [ 608.799237][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.799273][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.799786][ T30] 1d20: cf29f000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.799951][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.799964][ T30] 1d60: 80000113 ffffffff [ 608.799978][ T30] r5:80000113 r4:80239c10 [ 608.799986][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.800189][ T30] r4:82acb1e4 [ 608.812551][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.812739][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.812767][ T30] r4:ea751dc0 [ 608.812785][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.812880][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.812904][ T30] r4:00000000 [ 608.812920][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.812992][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.813010][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.813075][ T30] r5:00001000 r4:dfba3000 [ 608.813090][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.813144][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.813207][ T30] r5:85800b8c r4:85a36480 [ 608.813223][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.813304][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.813384][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.813478][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.813503][ T30] r4:85a36480 [ 608.813611][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.813722][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.813854][ T30] r4:00000001 [ 608.813877][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.813932][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.813971][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.814009][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.814041][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.814077][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.814099][ T30] r4:84dd15c0 [ 608.814146][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.814182][ T30] INFO: task kworker/1:80:4470 blocked for more than 430 seconds. [ 608.814225][ T30] Not tainted syzkaller #0 [ 608.814273][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.814294][ T30] task:kworker/1:80 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.814397][ T30] Workqueue: events bpf_prog_free_deferred [ 608.814565][ T30] Call trace: [ 608.814597][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.814675][ T30] r10:dff51d84 r9:00000002 r8:60000113 r7:829171a0 r6:dff51d8c r5:85832400 [ 608.814696][ T30] r4:85832400 [ 608.814713][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.814813][ T30] r5:85832400 r4:8291719c [ 608.814833][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.814928][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.815002][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff51e08 [ 608.815048][ T30] r4:00000000 [ 608.815265][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.815328][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.815383][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.815457][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc4540 [ 608.815480][ T30] r4:00000000 [ 608.815496][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.815562][ T30] r9:83018605 r8:85832400 r7:00000000 r6:83018600 r5:00001000 r4:7f28c000 [ 608.815579][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.815751][ T30] r5:00001000 r4:eab0b000 [ 608.816063][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.816121][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.816225][ T30] r5:859e7b8c r4:84efb380 [ 608.816243][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.816311][ T30] r7:ddde3d80 r6:83018600 r5:859e7b8c r4:84efb380 [ 608.816327][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.816398][ T30] r10:61c88647 r9:85832400 r8:84efb3ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.816546][ T30] r4:84efb380 [ 608.816566][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.816742][ T30] r10:00000000 r9:84efb380 r8:80278fec r7:dff7de60 r6:84e0e980 r5:85832400 [ 608.816771][ T30] r4:00000001 [ 608.816788][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.816987][ T30] Exception stack(0xdff51fb0 to 0xdff51ff8) [ 608.817023][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.817058][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.817162][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.817287][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.817406][ T30] r4:84dcf280 [ 608.818066][ T30] INFO: task kworker/1:80:4470 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.818178][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.818257][ T30] Workqueue: events bpf_prog_free_deferred [ 608.818343][ T30] Call trace: [ 608.818440][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.818519][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.818542][ T30] r4:00000000 [ 608.818645][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.818707][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.818748][ T30] 1d20: cf854000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.818786][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.818811][ T30] 1d60: 80000113 ffffffff [ 608.818836][ T30] r5:80000113 r4:80239c10 [ 608.819061][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.819180][ T30] r4:82acb1e4 [ 608.819202][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.819269][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.819290][ T30] r4:ea751dc0 [ 608.819307][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.819376][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.819399][ T30] r4:00000000 [ 608.819415][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.819489][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.819507][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.819787][ T30] r5:00001000 r4:dfba3000 [ 608.819900][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.819962][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.820024][ T30] r5:85800b8c r4:85a36480 [ 608.820040][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.820113][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.820143][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.820217][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.820239][ T30] r4:85a36480 [ 608.820254][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.820322][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.820366][ T30] r4:00000001 [ 608.820382][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.820478][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.820512][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.820549][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.820580][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.820616][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.820638][ T30] r4:84dd15c0 [ 608.820657][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.820679][ T30] INFO: task kworker/0:91:4478 blocked for more than 430 seconds. [ 608.820820][ T30] Not tainted syzkaller #0 [ 608.820846][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.820860][ T30] task:kworker/0:91 state:D stack:0 pid:4478 tgid:4478 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.821142][ T30] Workqueue: events bpf_prog_free_deferred [ 608.821382][ T30] Call trace: [ 608.821411][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.821490][ T30] r10:ea8b9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8b9d8c r5:85ad6c00 [ 608.821665][ T30] r4:85ad6c00 [ 608.821685][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.821747][ T30] r5:85ad6c00 r4:8291719c [ 608.821763][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.834485][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.834674][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b9e08 [ 608.834697][ T30] r4:00000000 [ 608.834714][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.834773][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.834831][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.834896][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b76ac0 [ 608.834915][ T30] r4:00000000 [ 608.834930][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.834997][ T30] r9:83018405 r8:85ad6c00 r7:00000000 r6:83018400 r5:00001000 r4:7f02f000 [ 608.835045][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.835115][ T30] r5:00001000 r4:ea449000 [ 608.835132][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.835189][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.835251][ T30] r5:859e1b8c r4:85a36100 [ 608.835268][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.835337][ T30] r7:dddcfd80 r6:83018400 r5:859e1b8c r4:85a36100 [ 608.835355][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.835425][ T30] r10:61c88647 r9:85ad6c00 r8:85a3612c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.835457][ T30] r4:85a36100 [ 608.835473][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.835547][ T30] r10:00000000 r9:85a36100 r8:80278fec r7:ea8a1e60 r6:85a36d80 r5:85ad6c00 [ 608.835566][ T30] r4:00000001 [ 608.835582][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.835632][ T30] Exception stack(0xea8b9fb0 to 0xea8b9ff8) [ 608.835670][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 608.835704][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.835734][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.835771][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.835792][ T30] r4:8599ee00 [ 608.836293][ T30] INFO: task kworker/0:91:4478 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.836333][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.836425][ T30] Workqueue: events bpf_prog_free_deferred [ 608.836489][ T30] Call trace: [ 608.836515][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.836593][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.836614][ T30] r4:00000000 [ 608.836628][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.836682][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.836720][ T30] 1d20: cfb8a000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.836756][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.836778][ T30] 1d60: 80000113 ffffffff [ 608.836801][ T30] r5:80000113 r4:80239c10 [ 608.836816][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.837040][ T30] r4:82acb1e4 [ 608.837077][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.837217][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.837241][ T30] r4:ea751dc0 [ 608.837257][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.837365][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.837400][ T30] r4:00000000 [ 608.837417][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.837496][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.837553][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.837619][ T30] r5:00001000 r4:dfba3000 [ 608.837636][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.837694][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.837759][ T30] r5:85800b8c r4:85a36480 [ 608.837777][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.837848][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.837866][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.837938][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.838051][ T30] r4:85a36480 [ 608.838185][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.838259][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.838369][ T30] r4:00000001 [ 608.838387][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.838446][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.838485][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.838520][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.838600][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.838641][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.838663][ T30] r4:84dd15c0 [ 608.838683][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.838714][ T30] INFO: task kworker/0:92:4482 blocked for more than 430 seconds. [ 608.838752][ T30] Not tainted syzkaller #0 [ 608.838778][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.838902][ T30] task:kworker/0:92 state:D stack:0 pid:4482 tgid:4482 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.839188][ T30] Workqueue: events bpf_prog_free_deferred [ 608.839242][ T30] Call trace: [ 608.839354][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.839441][ T30] r10:ea8a9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8a9d8c r5:85ad1800 [ 608.839542][ T30] r4:85ad1800 [ 608.839563][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.839625][ T30] r5:85ad1800 r4:8291719c [ 608.839642][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.839756][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.839878][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a9e08 [ 608.839900][ T30] r4:00000000 [ 608.839917][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.839971][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.840024][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.840090][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85843840 [ 608.840137][ T30] r4:00000000 [ 608.840153][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.840221][ T30] r9:83018405 r8:85ad1800 r7:00000000 r6:83018400 r5:00001000 r4:7f282000 [ 608.840239][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.840296][ T30] r5:00001000 r4:ea9ff000 [ 608.840311][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.840365][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.840459][ T30] r5:85ab378c r4:85a36400 [ 608.840477][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.840548][ T30] r7:dddcfd80 r6:83018400 r5:85ab378c r4:85a36400 [ 608.840668][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.840741][ T30] r10:61c88647 r9:85ad1800 r8:85a3642c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.840785][ T30] r4:85a36400 [ 608.840804][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.840872][ T30] r10:00000000 r9:85a36400 r8:80278fec r7:ea8a1e60 r6:85a36b00 r5:85ad1800 [ 608.840892][ T30] r4:00000001 [ 608.840907][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.840954][ T30] Exception stack(0xea8a9fb0 to 0xea8a9ff8) [ 608.840985][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 608.841020][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.841051][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.841086][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.841108][ T30] r4:8599e780 [ 608.841666][ T30] INFO: task kworker/0:92:4482 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.841700][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.841768][ T30] Workqueue: events bpf_prog_free_deferred [ 608.841906][ T30] Call trace: [ 608.842185][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.842263][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.842284][ T30] r4:00000000 [ 608.842339][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.842397][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.842567][ T30] 1d20: cfb8a000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.842608][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.842634][ T30] 1d60: 80000113 ffffffff [ 608.842665][ T30] r5:80000113 r4:80239c10 [ 608.842717][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.842882][ T30] r4:82acb1e4 [ 608.842902][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.842969][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.842989][ T30] r4:ea751dc0 [ 608.843086][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.843158][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.843198][ T30] r4:00000000 [ 608.843216][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.843285][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.843309][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.843397][ T30] r5:00001000 r4:dfba3000 [ 608.843415][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.843804][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.843915][ T30] r5:85800b8c r4:85a36480 [ 608.843934][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.844074][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.844095][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.844175][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.844198][ T30] r4:85a36480 [ 608.860897][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.861084][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.861110][ T30] r4:00000001 [ 608.861126][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.861190][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.861227][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.861260][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.861289][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.861325][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.861344][ T30] r4:84dd15c0 [ 608.861366][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.861749][ T30] INFO: task kworker/1:81:4487 blocked for more than 430 seconds. [ 608.861798][ T30] Not tainted syzkaller #0 [ 608.861821][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.861838][ T30] task:kworker/1:81 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.861915][ T30] Workqueue: events bpf_prog_free_deferred [ 608.861974][ T30] Call trace: [ 608.862000][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.867922][ T30] r10:ea8b1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8b1d8c r5:84ba2400 [ 608.867988][ T30] r4:84ba2400 [ 608.868005][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.868094][ T30] r5:84ba2400 r4:8291719c [ 608.868108][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.868163][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.868246][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b1e08 [ 608.868265][ T30] r4:00000000 [ 608.868280][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.868351][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.868414][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.868477][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858714c0 [ 608.868498][ T30] r4:00000000 [ 608.868560][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.868636][ T30] r9:83018605 r8:84ba2400 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [ 608.868654][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.868964][ T30] r5:00001000 r4:ea9f5000 [ 608.868990][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.869190][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.869270][ T30] r5:859fa78c r4:84e0ef80 [ 608.869287][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.869358][ T30] r7:ddde3d80 r6:83018600 r5:859fa78c r4:84e0ef80 [ 608.869375][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.869537][ T30] r10:61c88647 r9:84ba2400 r8:84e0efac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.870181][ T30] r4:84e0ef80 [ 608.870254][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.870473][ T30] r10:00000000 r9:84e0ef80 r8:80278fec r7:dff51e60 r6:849d0f00 r5:84ba2400 [ 608.870501][ T30] r4:00000001 [ 608.870690][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.870800][ T30] Exception stack(0xea8b1fb0 to 0xea8b1ff8) [ 608.870846][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.870883][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.870914][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.870972][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.871001][ T30] r4:84ea0800 [ 608.871584][ T30] INFO: task kworker/1:81:4487 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.871625][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.871738][ T30] Workqueue: events bpf_prog_free_deferred [ 608.871809][ T30] Call trace: [ 608.871854][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.871933][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.872061][ T30] r4:00000000 [ 608.872085][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.872141][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.872193][ T30] 1d20: cfcbf000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.872275][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.872304][ T30] 1d60: 80000113 ffffffff [ 608.872329][ T30] r5:80000113 r4:80239c10 [ 608.872345][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.872407][ T30] r4:82acb1e4 [ 608.872485][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.872569][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.872618][ T30] r4:ea751dc0 [ 608.872641][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.872715][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.872883][ T30] r4:00000000 [ 608.872904][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.872971][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.873022][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.873082][ T30] r5:00001000 r4:dfba3000 [ 608.873140][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.873210][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.873272][ T30] r5:85800b8c r4:85a36480 [ 608.873290][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.873359][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.873395][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.873503][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.873535][ T30] r4:85a36480 [ 608.873609][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.873685][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.873706][ T30] r4:00000001 [ 608.873719][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.873807][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.873844][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.873919][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.873990][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.874031][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.874053][ T30] r4:84dd15c0 [ 608.874071][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.874226][ T30] INFO: task kworker/1:82:4488 blocked for more than 430 seconds. [ 608.874273][ T30] Not tainted syzkaller #0 [ 608.874296][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.874310][ T30] task:kworker/1:82 state:D stack:0 pid:4488 tgid:4488 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.874361][ T30] Workqueue: events bpf_prog_free_deferred [ 608.874408][ T30] Call trace: [ 608.874443][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.874513][ T30] r10:ea9f1d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea9f1d8c r5:84ba3000 [ 608.874576][ T30] r4:84ba3000 [ 608.874597][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.874659][ T30] r5:84ba3000 r4:8291719c [ 608.874696][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.874797][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.874882][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08 [ 608.874931][ T30] r4:00000000 [ 608.874951][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.875044][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.875101][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.875164][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa2540 [ 608.875196][ T30] r4:00000000 [ 608.875242][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.875319][ T30] r9:83018605 r8:84ba3000 r7:00000000 r6:83018600 r5:00001000 r4:7f286000 [ 608.875339][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.875402][ T30] r5:00001000 r4:eaa31000 [ 608.875418][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.875475][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.875533][ T30] r5:859f938c r4:83ca1200 [ 608.875610][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.875681][ T30] r7:ddde3d80 r6:83018600 r5:859f938c r4:83ca1200 [ 608.875752][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.875865][ T30] r10:61c88647 r9:84ba3000 r8:83ca122c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.875892][ T30] r4:83ca1200 [ 608.875909][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.875976][ T30] r10:00000000 r9:83ca1200 r8:80278fec r7:dff51e60 r6:84e0eb00 r5:84ba3000 [ 608.876092][ T30] r4:00000001 [ 608.876493][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.876591][ T30] Exception stack(0xea9f1fb0 to 0xea9f1ff8) [ 608.876627][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.876661][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.876691][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.876754][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.910021][ T30] r4:838a4a80 [ 608.910647][ T30] INFO: task kworker/1:82:4488 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.910697][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.910790][ T30] Workqueue: events bpf_prog_free_deferred [ 608.910871][ T30] Call trace: [ 608.910918][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.911075][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.911103][ T30] r4:00000000 [ 608.911118][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.911181][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.911223][ T30] 1d20: d01c2000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.911282][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.911309][ T30] 1d60: 80000113 ffffffff [ 608.911350][ T30] r5:80000113 r4:80239c10 [ 608.911369][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.911454][ T30] r4:82acb1e4 [ 608.911475][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.911538][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.911568][ T30] r4:ea751dc0 [ 608.911582][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.911639][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.911670][ T30] r4:00000000 [ 608.911686][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.912189][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.912305][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.912380][ T30] r5:00001000 r4:dfba3000 [ 608.912397][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.912469][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.912621][ T30] r5:85800b8c r4:85a36480 [ 608.912662][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.912736][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.912752][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.912826][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.912868][ T30] r4:85a36480 [ 608.912892][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.912961][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.912980][ T30] r4:00000001 [ 608.912996][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.913040][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.913069][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.913102][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.913132][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.913433][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.913575][ T30] r4:84dd15c0 [ 608.913705][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.913748][ T30] INFO: task kworker/1:83:4491 blocked for more than 430 seconds. [ 608.913789][ T30] Not tainted syzkaller #0 [ 608.913812][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.913827][ T30] task:kworker/1:83 state:D stack:0 pid:4491 tgid:4491 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.913884][ T30] Workqueue: events bpf_prog_free_deferred [ 608.913930][ T30] Call trace: [ 608.914000][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.914076][ T30] r10:eaa29d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaa29d8c r5:84ba0c00 [ 608.914096][ T30] r4:84ba0c00 [ 608.914111][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.914214][ T30] r5:84ba0c00 r4:8291719c [ 608.914233][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.914294][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.914390][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 [ 608.914420][ T30] r4:00000000 [ 608.914438][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.914491][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.914554][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.914619][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c3900 [ 608.914662][ T30] r4:00000000 [ 608.914681][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.914744][ T30] r9:83018605 r8:84ba0c00 r7:00000000 r6:83018600 r5:00001000 r4:7f288000 [ 608.914774][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.914845][ T30] r5:00001000 r4:eaa39000 [ 608.914863][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.914953][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.915049][ T30] r5:859e278c r4:85b7a280 [ 608.915124][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.915208][ T30] r7:ddde3d80 r6:83018600 r5:859e278c r4:85b7a280 [ 608.915225][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.915307][ T30] r10:61c88647 r9:84ba0c00 r8:85b7a2ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.915337][ T30] r4:85b7a280 [ 608.915353][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.915418][ T30] r10:00000000 r9:85b7a280 r8:80278fec r7:dff51e60 r6:85b7a300 r5:84ba0c00 [ 608.915440][ T30] r4:00000001 [ 608.915499][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.915553][ T30] Exception stack(0xeaa29fb0 to 0xeaa29ff8) [ 608.915583][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 608.915725][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.915763][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.915812][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.915832][ T30] r4:85a1eb40 [ 608.916122][ T30] INFO: task kworker/1:83:4491 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.916158][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.916321][ T30] Workqueue: events bpf_prog_free_deferred [ 608.916392][ T30] Call trace: [ 608.916420][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.916492][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.916524][ T30] r4:00000000 [ 608.916537][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.916588][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.916634][ T30] 1d20: d01c2000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.916669][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.916758][ T30] 1d60: 80000113 ffffffff [ 608.916787][ T30] r5:80000113 r4:80239c10 [ 608.916804][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.916858][ T30] r4:82acb1e4 [ 608.916879][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.916942][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.916962][ T30] r4:ea751dc0 [ 608.917121][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.917203][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.917226][ T30] r4:00000000 [ 608.917240][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.917401][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.917433][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.917521][ T30] r5:00001000 r4:dfba3000 [ 608.917539][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.917594][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.917655][ T30] r5:85800b8c r4:85a36480 [ 608.917673][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.917737][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.917752][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.917820][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.917840][ T30] r4:85a36480 [ 608.917854][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.917918][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.917938][ T30] r4:00000001 [ 608.917951][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.917995][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.918025][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.918060][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.918089][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.918125][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.918143][ T30] r4:84dd15c0 [ 608.918159][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.918195][ T30] INFO: task kworker/0:93:4493 blocked for more than 430 seconds. [ 608.918281][ T30] Not tainted syzkaller #0 [ 608.918306][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.918320][ T30] task:kworker/0:93 state:D stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.918372][ T30] Workqueue: events bpf_prog_free_deferred [ 608.918413][ T30] Call trace: [ 608.918441][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.918510][ T30] r10:eaa2dd84 r9:00000002 r8:60000013 r7:829171a0 r6:eaa2dd8c r5:84ba4800 [ 608.918634][ T30] r4:84ba4800 [ 608.918737][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.918801][ T30] r5:84ba4800 r4:8291719c [ 608.918857][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.919033][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.919182][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08 [ 608.919207][ T30] r4:00000000 [ 608.919222][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.919276][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.919319][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.919668][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dcdb00 [ 608.919723][ T30] r4:00000000 [ 608.919800][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.919893][ T30] r9:83018405 r8:84ba4800 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 608.919921][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.919984][ T30] r5:00001000 r4:eaad1000 [ 608.920001][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.920116][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.942474][ T30] r5:859e538c r4:85a76400 [ 608.942559][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.942704][ T30] r7:dddcfd80 r6:83018400 r5:859e538c r4:85a76400 [ 608.942730][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.942801][ T30] r10:61c88647 r9:84ba4800 r8:85a7642c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.942820][ T30] r4:85a76400 [ 608.942834][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.942901][ T30] r10:00000000 r9:85a76400 r8:80278fec r7:ea8b9e60 r6:85b7a100 r5:84ba4800 [ 608.942922][ T30] r4:00000001 [ 608.942937][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.942984][ T30] Exception stack(0xeaa2dfb0 to 0xeaa2dff8) [ 608.943138][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 608.943187][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.943220][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.943253][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.943289][ T30] r4:84dc4440 [ 608.943620][ T30] INFO: task kworker/0:93:4493 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.943640][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.943688][ T30] Workqueue: events bpf_prog_free_deferred [ 608.943716][ T30] Call trace: [ 608.943729][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.943797][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.943821][ T30] r4:00000000 [ 608.943851][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.943879][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.943897][ T30] 1d20: d0554000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.943915][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.943926][ T30] 1d60: 80000113 ffffffff [ 608.943937][ T30] r5:80000113 r4:80239c10 [ 608.943945][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.943974][ T30] r4:82acb1e4 [ 608.944018][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.944054][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.944063][ T30] r4:ea751dc0 [ 608.944070][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.944101][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.944110][ T30] r4:00000000 [ 608.944117][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.944148][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.944157][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.944191][ T30] r5:00001000 r4:dfba3000 [ 608.944211][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.944241][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.944270][ T30] r5:85800b8c r4:85a36480 [ 608.944277][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.944340][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.944349][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.944382][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.944392][ T30] r4:85a36480 [ 608.944398][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.944429][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.944439][ T30] r4:00000001 [ 608.944445][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.944468][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.944482][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.944534][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.944571][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.944589][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.944599][ T30] r4:84dd15c0 [ 608.944607][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.944624][ T30] INFO: task kworker/1:84:4496 blocked for more than 430 seconds. [ 608.944691][ T30] Not tainted syzkaller #0 [ 608.944742][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.944804][ T30] task:kworker/1:84 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.944838][ T30] Workqueue: events bpf_prog_free_deferred [ 608.944861][ T30] Call trace: [ 608.944923][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.945005][ T30] r10:eaa91d84 r9:00000002 r8:60000113 r7:829171a0 r6:eaa91d8c r5:84ba5400 [ 608.945018][ T30] r4:84ba5400 [ 608.945026][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.945074][ T30] r5:84ba5400 r4:8291719c [ 608.945082][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.945110][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.945144][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 [ 608.945153][ T30] r4:00000000 [ 608.945159][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.945223][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.945280][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.945315][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795d80 [ 608.945324][ T30] r4:00000000 [ 608.945345][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.945410][ T30] r9:83018605 r8:84ba5400 r7:00000000 r6:83018600 r5:00001000 r4:7f029000 [ 608.945419][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.945476][ T30] r5:00001000 r4:ea3bf000 [ 608.945484][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.945512][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.945541][ T30] r5:85bccb8c r4:85b7a400 [ 608.945548][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.945580][ T30] r7:ddde3d80 r6:83018600 r5:85bccb8c r4:85b7a400 [ 608.945588][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.945622][ T30] r10:61c88647 r9:84ba5400 r8:85b7a42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.945632][ T30] r4:85b7a400 [ 608.945638][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.945670][ T30] r10:00000000 r9:85b7a400 r8:80278fec r7:dff51e60 r6:85b7a480 r5:84ba5400 [ 608.945679][ T30] r4:00000001 [ 608.945685][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.945708][ T30] Exception stack(0xeaa91fb0 to 0xeaa91ff8) [ 608.945722][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.945738][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.945753][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.945771][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.945802][ T30] r4:84de2740 [ 608.945965][ T30] INFO: task kworker/1:84:4496 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.945982][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.946036][ T30] Workqueue: events bpf_prog_free_deferred [ 608.946059][ T30] Call trace: [ 608.946070][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.946105][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.946114][ T30] r4:00000000 [ 608.946121][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.946145][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.946163][ T30] 1d20: d0554000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.946184][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.946196][ T30] 1d60: 80000113 ffffffff [ 608.946207][ T30] r5:80000113 r4:80239c10 [ 608.946237][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.946276][ T30] r4:82acb1e4 [ 608.946285][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.946317][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.946326][ T30] r4:ea751dc0 [ 608.946333][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.946364][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.946373][ T30] r4:00000000 [ 608.946379][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.946411][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.946440][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.946503][ T30] r5:00001000 r4:dfba3000 [ 608.946511][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.946560][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.946592][ T30] r5:85800b8c r4:85a36480 [ 608.946600][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.946633][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.946641][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.946674][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.946683][ T30] r4:85a36480 [ 608.946689][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.946722][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.946769][ T30] r4:00000001 [ 608.946798][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.946822][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.946867][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.946885][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.946922][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.946940][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.946950][ T30] r4:84dd15c0 [ 608.946986][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.946999][ T30] INFO: task kworker/1:85:4501 blocked for more than 430 seconds. [ 608.947044][ T30] Not tainted syzkaller #0 [ 608.947067][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.947074][ T30] task:kworker/1:85 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.947100][ T30] Workqueue: events bpf_prog_free_deferred [ 608.947121][ T30] Call trace: [ 608.947157][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.947220][ T30] r10:eaad9d84 r9:00000002 r8:60000013 r7:829171a0 r6:eaad9d8c r5:84ba6c00 [ 608.947232][ T30] r4:84ba6c00 [ 608.947240][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.947282][ T30] r5:84ba6c00 r4:8291719c [ 608.947290][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.947328][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.947383][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08 [ 608.947404][ T30] r4:00000000 [ 608.947456][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.947490][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.947523][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.947557][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795700 [ 608.947567][ T30] r4:00000000 [ 608.947574][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.947605][ T30] r9:83018605 r8:84ba6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f02b000 [ 608.947612][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.947639][ T30] r5:00001000 r4:ea423000 [ 608.947646][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.947672][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.947702][ T30] r5:85bccf8c r4:85b7a600 [ 608.947709][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.947742][ T30] r7:ddde3d80 r6:83018600 r5:85bccf8c r4:85b7a600 [ 608.947750][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.947784][ T30] r10:61c88647 r9:84ba6c00 r8:85b7a62c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.947793][ T30] r4:85b7a600 [ 608.947800][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.947832][ T30] r10:00000000 r9:85b7a600 r8:80278fec r7:eaa91e60 r6:85b7a680 r5:84ba6c00 [ 608.947842][ T30] r4:00000001 [ 608.947868][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.947893][ T30] Exception stack(0xeaad9fb0 to 0xeaad9ff8) [ 608.947908][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 608.947925][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.947940][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.947978][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.947989][ T30] r4:8560a800 [ 608.948108][ T30] INFO: task kworker/1:85:4501 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.948123][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.948178][ T30] Workqueue: events bpf_prog_free_deferred [ 608.948211][ T30] Call trace: [ 608.948221][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.948257][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.948267][ T30] r4:00000000 [ 608.948273][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.948297][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.948315][ T30] 1d20: d0554000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.948346][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.948359][ T30] 1d60: 80000113 ffffffff [ 608.948371][ T30] r5:80000113 r4:80239c10 [ 608.948399][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.948481][ T30] r4:82acb1e4 [ 608.948491][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.948523][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.948552][ T30] r4:ea751dc0 [ 608.948561][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.948594][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.948603][ T30] r4:00000000 [ 608.948609][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.948645][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.948662][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.948746][ T30] r5:00001000 r4:dfba3000 [ 608.948758][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.948798][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.948830][ T30] r5:85800b8c r4:85a36480 [ 608.948859][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.948906][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.948915][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.948949][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.948979][ T30] r4:85a36480 [ 608.948988][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.949034][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.949053][ T30] r4:00000001 [ 608.949060][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.949082][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.949096][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.949113][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.949127][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.949145][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.949154][ T30] r4:84dd15c0 [ 608.949162][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.949174][ T30] INFO: task syz.1.210:4504 blocked for more than 430 seconds. [ 608.949213][ T30] Not tainted syzkaller #0 [ 608.949225][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.949232][ T30] task:syz.1.210 state:D stack:0 pid:4504 tgid:4503 ppid:3100 task_flags:0x400140 flags:0x00000001 [ 608.949289][ T30] Call trace: [ 608.949328][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.949369][ T30] r10:ea979a2c r9:00000002 r8:60000013 r7:829171a0 r6:ea979a34 r5:854bb000 [ 608.949391][ T30] r4:854bb000 [ 608.949399][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.949436][ T30] r5:854bb000 r4:8291719c [ 608.949443][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.949468][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.949525][ T30] r10:8280c960 r9:826c0b50 r8:00000001 r7:8280c9b4 r6:fffffffe r5:ea979aa0 [ 608.949553][ T30] r4:20001000 [ 608.949562][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.949589][ T30] [<81a68ad4>] (mutex_lock) from [<804ea588>] (reclaim_and_purge_vmap_areas+0x3c/0x19c) [ 608.949614][ T30] [<804ea54c>] (reclaim_and_purge_vmap_areas) from [<804eafbc>] (alloc_vmap_area+0x8d4/0xd7c) [ 608.949646][ T30] r10:00000000 r9:df800000 r8:00000001 r7:8280c9b4 r6:fffffffe r5:83c526b8 [ 608.949666][ T30] r4:20001000 [ 608.949725][ T30] [<804ea6e8>] (alloc_vmap_area) from [<804edacc>] (__get_vm_area_node+0xcc/0x120) [ 608.949767][ T30] r10:84dd1bc0 r9:00000dc0 r8:ffffffff r7:1ffffff8 r6:00000422 r5:00000001 [ 608.949776][ T30] r4:20001000 [ 608.949809][ T30] [<804eda00>] (__get_vm_area_node) from [<804ee27c>] (__vmalloc_node_range_noprof+0x8c/0x544) [ 608.949866][ T30] r10:00000000 r9:ffffffff r8:8226e4b8 r7:00000dc0 r6:df800000 r5:ff800000 [ 608.949875][ T30] r4:1ffffff8 [ 608.949883][ T30] [<804ee1f0>] (__vmalloc_node_range_noprof) from [<80510e6c>] (__kvmalloc_node_noprof+0x2b0/0x708) [ 608.949920][ T30] r10:ea979d50 r9:000029c0 r8:854bb000 r7:00000000 r6:00000dc0 r5:00000000 [ 608.949929][ T30] r4:1ffffff8 [ 608.949937][ T30] [<80510bbc>] (__kvmalloc_node_noprof) from [<817286b0>] (xt_alloc_entry_offsets+0x28/0x34) [ 608.949986][ T30] r10:ea979d50 r9:84bc2800 r8:00000000 r7:00000000 r6:000004e0 r5:84bc2840 [ 608.949997][ T30] r4:07fffffe [ 608.950005][ T30] [<81728688>] (xt_alloc_entry_offsets) from [<818b5d78>] (translate_table+0x70/0x78c) [ 608.950036][ T30] [<818b5d08>] (translate_table) from [<818b6f54>] (do_replace+0xe8/0x5d0) [ 608.950094][ T30] r10:b5403587 r9:84bc2840 r8:00000000 r7:20000620 r6:000004e0 r5:84bc2800 [ 608.950105][ T30] r4:85518000 [ 608.950113][ T30] [<818b6e6c>] (do_replace) from [<818b7570>] (do_ip6t_set_ctl+0x134/0x2a0) [ 608.950162][ T30] r10:00000126 r9:854bb000 r8:00000540 r7:837a8000 r6:ea979df8 r5:842a0000 [ 608.950174][ T30] r4:00000040 [ 608.950194][ T30] [<818b743c>] (do_ip6t_set_ctl) from [<816b2690>] (nf_setsockopt+0x60/0x7c) [ 608.950236][ T30] r10:00000126 r9:854bb000 r8:00000540 r7:837a8000 r6:842a0000 r5:818b743c [ 608.950245][ T30] r4:829f26b8 [ 608.950252][ T30] [<816b2634>] (nf_setsockopt) from [<8186d5c8>] (ipv6_setsockopt+0x9c/0xbc) [ 608.950288][ T30] r6:00000540 r5:842a0000 r4:00000040 [ 608.950295][ T30] [<8186d530>] (ipv6_setsockopt) from [<818733cc>] (udpv6_setsockopt+0x38/0x64) [ 608.950325][ T30] r6:00000040 r5:00000029 r4:81873394 [ 608.950362][ T30] [<81873398>] (udpv6_setsockopt) from [<8155aa9c>] (sock_common_setsockopt+0x38/0x40) [ 608.950395][ T30] r4:81873394 [ 608.950402][ T30] [<8155aa68>] (sock_common_setsockopt) from [<81556228>] (do_sock_setsockopt+0x70/0xc8) [ 608.950448][ T30] r4:8155aa64 [ 608.950457][ T30] [<815561b8>] (do_sock_setsockopt) from [<81559730>] (__sys_setsockopt+0x7c/0xc4) [ 608.950498][ T30] r8:00000000 r7:84e3ecc0 r6:84e3ecc1 r5:00000040 r4:00000029 [ 608.950508][ T30] [<815596b4>] (__sys_setsockopt) from [<81559794>] (sys_setsockopt+0x1c/0x24) [ 608.950542][ T30] r8:8020029c r7:00000126 r6:00316310 r5:00000000 r4:00000540 [ 608.950550][ T30] [<81559778>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 608.950574][ T30] Exception stack(0xea979fa8 to 0xea979ff0) [ 608.950592][ T30] 9fa0: 00000540 00000000 00000006 00000029 00000040 200005c0 [ 608.950609][ T30] 9fc0: 00000540 00000000 00316310 00000126 00300000 00000000 00006364 76fa80bc [ 608.950622][ T30] 9fe0: 76fa7ec0 76fa7eb0 00019294 00132970 [ 608.950745][ T30] INFO: task syz.1.210:4504 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.950763][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.950795][ T30] Workqueue: events bpf_prog_free_deferred [ 608.950817][ T30] Call trace: [ 608.950842][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.950902][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.950914][ T30] r4:00000000 [ 608.950922][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.950947][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.950986][ T30] 1d20: d0554000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.951006][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.951059][ T30] 1d60: 80000113 ffffffff [ 608.951074][ T30] r5:80000113 r4:80239c10 [ 608.951082][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.951112][ T30] r4:82acb1e4 [ 608.951119][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.951151][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.951161][ T30] r4:ea751dc0 [ 608.951179][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.951213][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.951223][ T30] r4:00000000 [ 608.951230][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.951262][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.951279][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.951309][ T30] r5:00001000 r4:dfba3000 [ 608.951316][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.951343][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.951384][ T30] r5:85800b8c r4:85a36480 [ 608.951401][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.951445][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.951453][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.951487][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.951517][ T30] r4:85a36480 [ 608.951526][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.951559][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.951568][ T30] r4:00000001 [ 608.951583][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.951607][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.951621][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.951638][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.951652][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.951669][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.951678][ T30] r4:84dd15c0 [ 608.951708][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.951744][ T30] INFO: task kworker/0:95:4508 blocked for more than 430 seconds. [ 608.951760][ T30] Not tainted syzkaller #0 [ 608.951847][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.952186][ T30] task:kworker/0:95 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.952255][ T30] Workqueue: events bpf_prog_free_deferred [ 608.952351][ T30] Call trace: [ 608.952406][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.952474][ T30] r10:e41c9d84 r9:00000002 r8:60000113 r7:829171a0 r6:e41c9d8c r5:84ba1800 [ 608.952486][ T30] r4:84ba1800 [ 608.952494][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.952523][ T30] r5:84ba1800 r4:8291719c [ 608.952533][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.952560][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.952624][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e41c9e08 [ 608.975391][ T30] r4:00000000 [ 608.975431][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.975486][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.975540][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.975601][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858da340 [ 608.975612][ T30] r4:00000000 [ 608.975619][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.975674][ T30] r9:83018405 r8:84ba1800 r7:00000000 r6:83018400 r5:00001000 r4:7f00d000 [ 608.975685][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.975718][ T30] r5:00001000 r4:e41ed000 [ 608.975725][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.975774][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.975808][ T30] r5:85ab178c r4:84701700 [ 608.975816][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.975853][ T30] r7:dddcfd80 r6:83018400 r5:85ab178c r4:84701700 [ 608.975861][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.975898][ T30] r10:61c88647 r9:84ba1800 r8:8470172c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.975908][ T30] r4:84701700 [ 608.975915][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.975950][ T30] r10:00000000 r9:84701700 r8:80278fec r7:ea8b9e60 r6:85b7a800 r5:84ba1800 [ 608.975982][ T30] r4:00000001 [ 608.975991][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.976016][ T30] Exception stack(0xe41c9fb0 to 0xe41c9ff8) [ 608.976044][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 608.976064][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.976102][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.976122][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.976132][ T30] r4:849c5e00 [ 608.976455][ T30] INFO: task kworker/0:95:4508 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.976480][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.976527][ T30] Workqueue: events bpf_prog_free_deferred [ 608.976555][ T30] Call trace: [ 608.976579][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.976619][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.976630][ T30] r4:00000000 [ 608.976637][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.976663][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.976723][ T30] 1d20: d0b70000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.976765][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.976778][ T30] 1d60: 80000113 ffffffff [ 608.976790][ T30] r5:80000113 r4:80239c10 [ 608.976799][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.976837][ T30] r4:82acb1e4 [ 608.976846][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.976882][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.976891][ T30] r4:ea751dc0 [ 608.976898][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.976970][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.976982][ T30] r4:00000000 [ 608.976989][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.977023][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.977031][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.977061][ T30] r5:00001000 r4:dfba3000 [ 608.977091][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.977130][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.977163][ T30] r5:85800b8c r4:85a36480 [ 608.977171][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.977207][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.977228][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.977287][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.977407][ T30] r4:85a36480 [ 608.977420][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.977471][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.977481][ T30] r4:00000001 [ 608.977487][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.977510][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.977525][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.977545][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.977560][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.977579][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.977588][ T30] r4:84dd15c0 [ 608.977597][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.978013][ T30] INFO: task kworker/1:86:4554 blocked for more than 430 seconds. [ 608.978044][ T30] Not tainted syzkaller #0 [ 608.978057][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 608.978064][ T30] task:kworker/1:86 state:D stack:0 pid:4554 tgid:4554 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.978095][ T30] Workqueue: events bpf_prog_free_deferred [ 608.978121][ T30] Call trace: [ 608.978133][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 608.978171][ T30] r10:ea361d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea361d8c r5:84ba0000 [ 608.978188][ T30] r4:84ba0000 [ 608.978195][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 608.978224][ T30] r5:84ba0000 r4:8291719c [ 608.978230][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 608.978257][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 608.978293][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea361e08 [ 608.978359][ T30] r4:00000000 [ 608.978369][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 608.978397][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 608.978439][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.978473][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795180 [ 608.978483][ T30] r4:00000000 [ 608.978489][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.978569][ T30] r9:83018605 r8:84ba0000 r7:00000000 r6:83018600 r5:00001000 r4:7f02d000 [ 608.978579][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.978609][ T30] r5:00001000 r4:ea429000 [ 608.978616][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.978642][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.978672][ T30] r5:85bceb8c r4:859b3800 [ 608.978679][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.978712][ T30] r7:ddde3d80 r6:83018600 r5:85bceb8c r4:859b3800 [ 608.978719][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.978757][ T30] r10:61c88647 r9:84ba0000 r8:859b382c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 608.978766][ T30] r4:859b3800 [ 608.978773][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.978808][ T30] r10:00000000 r9:859b3800 r8:80278fec r7:eaad9e60 r6:859b3780 r5:84ba0000 [ 608.978817][ T30] r4:00000001 [ 608.978845][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.978892][ T30] Exception stack(0xea361fb0 to 0xea361ff8) [ 608.978909][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.978927][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.978989][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.979047][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.979071][ T30] r4:847953c0 [ 608.979240][ T30] INFO: task kworker/1:86:4554 is blocked on a mutex likely owned by task kworker/0:83:4439. [ 608.979268][ T30] task:kworker/0:83 state:R running task stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 608.979378][ T30] Workqueue: events bpf_prog_free_deferred [ 608.979442][ T30] Call trace: [ 608.979490][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 608.979751][ T30] r10:8280c9b4 r9:85ad5400 r8:80200c04 r7:ea751d54 r6:ffffffff r5:85ad5400 [ 608.979770][ T30] r4:00000000 [ 608.979777][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 608.979816][ T30] Exception stack(0xea751d20 to 0xea751d68) [ 608.979838][ T30] 1d20: d0b70000 ecbdc000 00000001 80239bf8 7f00b000 00000001 82acb1c4 82aca5a0 [ 608.979856][ T30] 1d40: 7f00b000 ecbdc000 8280c9b4 ea751d9c ea751da0 ea751d70 80230af0 80239c10 [ 608.979869][ T30] 1d60: 80000113 ffffffff [ 608.979881][ T30] r5:80000113 r4:80239c10 [ 608.979889][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 608.979932][ T30] r4:82acb1e4 [ 608.979942][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 608.979977][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea751dc0 r5:ea751e08 [ 608.979986][ T30] r4:ea751dc0 [ 608.980015][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 608.980051][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1480 [ 608.980061][ T30] r4:00000000 [ 608.980068][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 608.980101][ T30] r9:83018405 r8:85ad5400 r7:00000000 r6:83018400 r5:00001000 r4:7f041000 [ 608.980130][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 608.980162][ T30] r5:00001000 r4:dfba3000 [ 608.980204][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 608.980235][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 608.980267][ T30] r5:85800b8c r4:85a36480 [ 608.980274][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 608.980309][ T30] r7:dddcfd80 r6:83018400 r5:85800b8c r4:85a36480 [ 608.980317][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 608.980374][ T30] r10:61c88647 r9:85ad5400 r8:85a364ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 608.980453][ T30] r4:85a36480 [ 608.980462][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 608.980519][ T30] r10:00000000 r9:85a36480 r8:80278fec r7:df9e1e60 r6:85a36500 r5:85ad5400 [ 608.980530][ T30] r4:00000001 [ 608.980556][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.980590][ T30] Exception stack(0xea751fb0 to 0xea751ff8) [ 608.980628][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 608.980646][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.980662][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.980701][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.980711][ T30] r4:84dd15c0 [ 608.980732][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 608.981328][ T30] NMI backtrace for cpu 0 [ 608.981382][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 608.981408][ T30] Hardware name: ARM-Versatile Express [ 608.981418][ T30] Call trace: [ 608.981461][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 608.981595][ T30] r7:00000000 r6:00000113 r5:60000193 r4:82252738 [ 608.981605][ T30] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 608.981633][ T30] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 608.981661][ T30] r5:00000000 r4:00000001 [ 608.981810][ T30] [<8021f904>] (dump_stack) from [<81a4e014>] (nmi_cpu_backtrace+0x160/0x17c) [ 608.981880][ T30] [<81a4deb4>] (nmi_cpu_backtrace) from [<81a4e160>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 608.981956][ T30] r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [ 608.981972][ T30] [<81a4e030>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 608.982039][ T30] r9:8281ba28 r8:8280c810 r7:00007552 r6:00007dc3 r5:82abf7d4 r4:88bbb50c [ 608.982055][ T30] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (watchdog+0x5d0/0x850) [ 608.982111][ T30] [<8037f520>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 608.982196][ T30] r10:00000000 r9:00000000 r8:8037f520 r7:832a1d00 r6:832a1d00 r5:832e9800 [ 608.982218][ T30] r4:00000001 [ 608.982231][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.982279][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 608.982307][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 608.982338][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.982363][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.982396][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.982415][ T30] r4:83337fc0 [ 608.982580][ T30] Sending NMI from CPU 0 to CPUs 1: [ 608.983265][ C1] NMI backtrace for cpu 1 [ 608.983439][ C1] CPU: 1 UID: 0 PID: 2821 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 608.983497][ C1] Hardware name: ARM-Versatile Express [ 608.983547][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 608.983627][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 608.983682][ C1] pc : [<81a6e264>] lr : [<80a8f568>] psr: 60000113 [ 608.983722][ C1] sp : ead9deb0 ip : ead9dec0 fp : ead9debc [ 608.983756][ C1] r10: 82959594 r9 : 00000001 r8 : 00000000 [ 608.983783][ C1] r7 : 00000117 r6 : 829594f8 r5 : 00000000 r4 : 00000001 [ 608.983807][ C1] r3 : 00001119 r2 : 00000000 r1 : 60000113 r0 : 8427e440 [ 608.983895][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 608.983967][ C1] Control: 30c5387d Table: 888e5740 DAC: 00000000 [ 608.984035][ C1] Call trace: [ 608.984055][ C1] [<81a6e23c>] (_raw_spin_unlock_irqrestore) from [<80a8f568>] (pl011_console_device_unlock+0x20/0x24) [ 608.984091][ C1] [<80a8f548>] (pl011_console_device_unlock) from [<802e3750>] (nbcon_emit_one+0x88/0x100) [ 608.984121][ C1] [<802e36c8>] (nbcon_emit_one) from [<802e3970>] (nbcon_kthread_func+0x1a8/0x2a4) [ 608.984154][ C1] r6:8280c690 r5:8384e000 r4:829594f8 [ 608.984162][ C1] [<802e37c8>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280) [ 608.984200][ C1] r10:00000000 r9:829594f8 r8:802e37c8 r7:84a8ff00 r6:84a8ff00 r5:8384e000 [ 608.984209][ C1] r4:00000001 [ 608.984217][ C1] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 608.984241][ C1] Exception stack(0xead9dfb0 to 0xead9dff8) [ 608.984259][ C1] dfa0: 00000000 00000000 00000000 00000000 [ 608.984277][ C1] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 608.984293][ C1] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 608.984311][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 608.984367][ C1] r4:838aa8c0 [ 609.012868][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 609.216797][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 609.217193][ T30] Hardware name: ARM-Versatile Express [ 609.217433][ T30] Call trace: [ 609.217686][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 609.218066][ T30] r7:8225345c r6:832e9800 r5:00000000 r4:82252738 [ 609.218308][ T30] [<80201b08>] (show_stack) from [<8021f8dc>] (dump_stack_lvl+0x54/0x7c) [ 609.218642][ T30] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 609.218983][ T30] r5:00000000 r4:82a78d18 [ 609.219221][ T30] [<8021f904>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 609.219537][ T30] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 609.219860][ T30] r7:00007552 [ 609.220008][ T30] [<80202800>] (panic) from [<8037f930>] (watchdog+0x410/0x850) [ 609.220340][ T30] r3:00000001 r2:00000000 r1:00000000 r0:8225345c [ 609.220573][ T30] [<8037f520>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 609.220900][ T30] r10:00000000 r9:00000000 r8:8037f520 r7:832a1d00 r6:832a1d00 r5:832e9800 [ 609.221202][ T30] r4:00000001 [ 609.221381][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 609.221780][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 609.222022][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 609.222360][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 609.222675][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 609.223147][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 609.223457][ T30] r4:83337fc0 [ 609.229658][ T30] Rebooting in 86400 seconds..