last executing test programs: 11m46.782770813s ago: executing program 1 (id=2086): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r2, 0x0) unshare(0x22020600) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0100000003000000ec0b000007"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r3, &(0x7f0000000540), 0x0}, 0x20) socket$inet6(0xa, 0x1, 0x0) 11m46.437206581s ago: executing program 1 (id=2087): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xec}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000001c0)="ff", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000500)}}], 0x2, 0x40408e0) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) shutdown(r0, 0x1) 11m45.627707279s ago: executing program 1 (id=2088): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000d00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a090000000000000000000200fffd0900020073797a310000000008000440000000000900010073797a3000000000080003"], 0x98}}, 0x0) 11m44.866242692s ago: executing program 1 (id=2089): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11m42.065204115s ago: executing program 1 (id=2090): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02030003130000002cbd7000fbdbdf2503000900800000001cdc0dca1d9f68846960e56de42944af05000600000000000a004e2400000004ff010000000000000000000000000001000000000000000002000100000000000000070c0100000005000500000000000a004e2400000009000000000000000000000000000000000600000000002000020013"], 0x98}, 0x1, 0x7}, 0x0) 11m41.743422192s ago: executing program 1 (id=2091): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x1c, r5, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4008084}, 0x0) 10m55.817903544s ago: executing program 32 (id=2091): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x1c, r5, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4008084}, 0x0) 10m5.15705118s ago: executing program 0 (id=2155): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001a80)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x1, {0x0, 0x1, 0x4}}, 0x18) syz_genetlink_get_family_id$tipc2(0x0, r0) 10m4.658065475s ago: executing program 0 (id=2156): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='io_uring_file_get\x00'}, 0x10) r0 = syz_io_uring_setup(0x917, &(0x7f0000000300)={0x0, 0x400, 0x80, 0x1000000}, &(0x7f0000000280)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffc00, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_WRITEV={0x2, 0x40, 0x4000, @fd_index=0x1, 0x800009, 0x0, 0x0, 0x5, 0x1}) io_uring_enter(r0, 0x47f6, 0x0, 0x42, 0x0, 0x0) 10m3.179969957s ago: executing program 0 (id=2157): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) 9m58.219259602s ago: executing program 0 (id=2163): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000000000040ac054382408b0b00000109022400010000002009040000fd0301000009210000000122010009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000003c0)={0x24, 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="002281"], 0x0}, 0x0) r1 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCSREPORT(r1, 0x81044804, &(0x7f0000000400)={0x1, 0x2}) syz_usb_control_io$hid(r0, 0x0, 0x0) 9m55.157950737s ago: executing program 0 (id=2164): r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x42, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0xfffffdab) chmod(&(0x7f0000000540)='./file0\x00', 0x120) creat(&(0x7f0000000000)='./file0\x00', 0x104) 9m54.697387528s ago: executing program 0 (id=2167): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r0}, &(0x7f00000008c0), &(0x7f0000000880)}, 0x20) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2, 0x0, 0x1}, 0x18) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x200000000000000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x8000000, 0x288, 0x1e8, 0xffffffff, 0xffffffff, 0x1e8, 0xffffffff, 0x3d0, 0xffffffff, 0xffffffff, 0x3d0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@remote, @loopback, [0xff, 0xff, 0xff, 0xff], [0xff000000, 0xff, 0xff], 'team_slave_0\x00', 'netdevsim0\x00', {}, {0xff}, 0x29, 0x3, 0x0, 0x60}, 0x0, 0xa8, 0xf0, 0x60030000, {0x0, 0xff000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0xc9, 0x7a3, 0x6, 'snmp_trap\x00', {0x369bc443}}}}, {{@ipv6={@remote, @local, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xffffffff, 0xff000000], 'netpci0\x00', 'bridge_slave_1\x00', {}, {0xff}, 0x2b, 0x2, 0x5, 0x5}, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2e8) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xf, &(0x7f0000000300)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) tgkill(0x0, 0x0, 0x12) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000001140)=ANY=[@ANYBLOB="44000000010101020000000000000000020000012400018014000180080001000000000008000200ac1414bb0c0002800500010011000000"], 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x20004800) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="18020000fffdffff0000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 9m9.517354819s ago: executing program 33 (id=2167): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r0}, &(0x7f00000008c0), &(0x7f0000000880)}, 0x20) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2, 0x0, 0x1}, 0x18) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x200000000000000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x8000000, 0x288, 0x1e8, 0xffffffff, 0xffffffff, 0x1e8, 0xffffffff, 0x3d0, 0xffffffff, 0xffffffff, 0x3d0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@remote, @loopback, [0xff, 0xff, 0xff, 0xff], [0xff000000, 0xff, 0xff], 'team_slave_0\x00', 'netdevsim0\x00', {}, {0xff}, 0x29, 0x3, 0x0, 0x60}, 0x0, 0xa8, 0xf0, 0x60030000, {0x0, 0xff000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0xc9, 0x7a3, 0x6, 'snmp_trap\x00', {0x369bc443}}}}, {{@ipv6={@remote, @local, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xffffffff, 0xff000000], 'netpci0\x00', 'bridge_slave_1\x00', {}, {0xff}, 0x2b, 0x2, 0x5, 0x5}, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2e8) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xf, &(0x7f0000000300)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) tgkill(0x0, 0x0, 0x12) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000001140)=ANY=[@ANYBLOB="44000000010101020000000000000000020000012400018014000180080001000000000008000200ac1414bb0c0002800500010011000000"], 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x20004800) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="18020000fffdffff0000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 7m20.696695896s ago: executing program 3 (id=2382): splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10d00, 0xf) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = syz_clone(0x20000000, 0x0, 0xf, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000040000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28}) 7m20.410013322s ago: executing program 3 (id=2385): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001803000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) sendmsg$inet(r2, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0xffff, @multicast1}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0xfffe) 7m20.139645256s ago: executing program 3 (id=2387): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000400018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x18) fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) 7m19.440073958s ago: executing program 3 (id=2388): r0 = syz_open_dev$loop(0x0, 0x0, 0x40000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 7m19.059991623s ago: executing program 3 (id=2389): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x14, 0x4, 0x4, 0x22}, 0x50) r4 = socket$inet(0x2, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r3, &(0x7f00000001c0), &(0x7f00000004c0)=@udp=r4}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) gettid() bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r3}, 0x8) io_setup(0x2, &(0x7f0000000000)) prctl$PR_SET_NAME(0xf, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) splice(r1, 0x0, r2, 0x0, 0xf3a, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x10001) write(r0, 0x0, 0x0) 7m17.296147561s ago: executing program 3 (id=2391): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) close_range(r1, 0xffffffffffffffff, 0x0) 6m32.145355889s ago: executing program 34 (id=2391): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000e868495fb58d00b6ad1f50ad32d6ad25dfd73a015e0ca6a0f68a7d007dc6751dfb265a0e3ccae669e173a64bc1cfd514600650a58f145ff1205fc9ddaa275e687d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc64e57cbb7aee976f2b54421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983cd44c05bd0a48dfe3e26e7a23129d6606ed28a69989d552af6d9a9df2c3af36e0360070011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a1a83109753f54b21cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b81a7000000e7ffffff00000000d7900a820b63278f4e9a217b98ef7042ad2a928903000000cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c06054002238260000000000040587c1ed797aa21a38e1e389f640a0b8b0000000000a835ad0f61ba739cd0c31b05c00fba8a4aee676d7caa2e53b91a68ff2e60da7b01a2e5785a238afa4aba70c08b0d71b6f72d6a8d87fb08533d97ad96d3943c4cc8306dac433a5cdf78b04963d679d5a5d07e618a1ef9057fec00f9e93021f5a8d30e716de8cde9c6000000000c3b64d10f0939b42b33ab2a8717096c58bb3bb1d457d8bb96870f5a7e2ba31fd69bb80235d957eaa9a40b764e5381ffa604aaafb76a980e72b408f686b185736693089213b4e140f8f38e5589663115093889deb646122a5dc5a9e5ba4d37749a36b880110e2bf524b79bc91105f1d3f7d0de694a9417d68694f17ba5e27ea1cec518b93fadcfe0de010ae9be3273ff73c34b5695080a35bfa5c69e3b533e1b939c81b3beda037b7191cb0000000000000000000010e5d683b8938db5c305cf7e6e62a6890ba9e1f4ee64f8202b59de5036569febfaa95f4633db108b2f786333ec7bacc927f4a1785165b5d2444b4c022bb5cff472e6a0c8ee9d6d8df83b704669147b732ac508c9b9f0ca0a1ce45319d43d4643eb285835daf2065b57bebd61ad6671296c27253a5f9688d57c91ccd40ffe2dbc5dd1613a2e6f5b363cc8d205ce6ef3c3c6ded7dd3dfdb39008d8997213f68cdc971c1d6fdacb7729a5560880a77525e9cfb94ef1735dfe74e6b948697f7e3580436b532a82e315d56b17a5dba98436cc24babaae409f0aab0b40af116001bc85492455956e853ead08b5793d4ecf72378a3dfd9cc837b1c66212d9a2be8fd6341c2f837c7fe09924a51ec42912856cce3d3b2d092c80813aad03e1e63a655f4138730f302df339f30a4fbd453c9a0fba381d071ad7cb80a52bec572e29b0b9b55c235806b97e166609f8083ce776075c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) close_range(r1, 0xffffffffffffffff, 0x0) 3m32.588277749s ago: executing program 4 (id=2800): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="070000000400000008000000d9"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000001000080000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000001140)=[{&(0x7f0000000000)=""/87, 0x62}, {&(0x7f0000001200)=""/4096, 0x100a}], 0x2, &(0x7f00000011c0)=[{0xffffffffffffffff, 0x19000}], 0x1, 0x0) 3m32.231145241s ago: executing program 4 (id=2802): r0 = syz_io_uring_setup(0x497, &(0x7f0000000180)={0x0, 0x4885, 0x100, 0x3, 0x1d}, &(0x7f00000000c0), &(0x7f0000000600)) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, 0x0, 0x1) 3m31.875253913s ago: executing program 4 (id=2804): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f066bbee3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x20a02, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a1000"/196], 0x119) r2 = syz_open_dev$hidraw(&(0x7f0000000000), 0x0, 0x81) ioctl$HIDIOCSFEATURE(r2, 0xc0404806, &(0x7f0000000440)) close_range(r0, 0xffffffffffffffff, 0x0) 3m27.060692634s ago: executing program 4 (id=2812): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x67) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000005c0)='syz_tun\x00', 0x10) getsockopt$inet_mreqn(r0, 0x0, 0x32, 0x0, &(0x7f0000002140)) sendto$inet(r0, 0x0, 0x0, 0x24000840, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) 3m26.698190297s ago: executing program 4 (id=2813): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x18) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r3, &(0x7f0000000140)='./file0\x00') openat(r3, &(0x7f00000000c0)='./file0\x00', 0x515a02, 0x52abe154ad664f26) 3m25.947133154s ago: executing program 4 (id=2815): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=ANY=[@ANYBLOB="0b00000005000000070100000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) setrlimit(0x3, &(0x7f0000000180)={0x7f, 0x6}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) 2m40.740234497s ago: executing program 35 (id=2815): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=ANY=[@ANYBLOB="0b00000005000000070100000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) setrlimit(0x3, &(0x7f0000000180)={0x7f, 0x6}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) 1m28.32948061s ago: executing program 5 (id=2948): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x10) clock_getres(0x6, 0x0) 1m28.10794519s ago: executing program 5 (id=2949): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000000010000000100000900000001"], 0x50) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3, r0, 0xc00}, 0x38) 1m27.88768751s ago: executing program 5 (id=2950): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x50, r3, 0x1, 0x4, 0x1, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x48c1}, 0x0) 1m27.377344056s ago: executing program 5 (id=2952): sendmmsg$inet(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}}], 0x1, 0x9880) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a0101"], 0x57) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000008c0)={0x1, {{0x2, 0x0, @multicast2}}}, 0x88) 1m27.175769264s ago: executing program 5 (id=2955): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) ioprio_get$pid(0x2, 0x0) 1m26.949118294s ago: executing program 5 (id=2956): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) 41.819432531s ago: executing program 36 (id=2956): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) 19.607802132s ago: executing program 2 (id=3002): mremap(&(0x7f0000d84000/0x2000)=nil, 0x7fffdf4dd000, 0x1002, 0x3, &(0x7f0000b22000/0x1000)=nil) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0, r0) r1 = syz_io_uring_setup(0x5c6, &(0x7f0000000140)={0x0, 0x1001, 0x0, 0x4}, &(0x7f00000001c0)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x80}, 0x18) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x101000, 0x800, 0x3, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, 0xfffffffffffffe25) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r1, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) 16.635605849s ago: executing program 2 (id=3003): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)='%pS \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r2, &(0x7f0000000080), 0x10) close(r2) 15.996282736s ago: executing program 2 (id=3004): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000700)={0x0, 0x1e5, &(0x7f00000006c0)={&(0x7f0000000440)=@deltaction={0x28, 0x31, 0x101, 0xfd, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 15.39534459s ago: executing program 2 (id=3005): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="d800000018007b7be00212ba0d1605040a003f00000f040b067c55a1bc0009001e0006990300000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b3162700e06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5005ccca262f3d40fad95667e04adcdf63cc1f215ce3bb9ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd601edef3d93452a92307f00000e97031e9f05e9f16e0700000004000000", 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x34048814) 15.004178525s ago: executing program 2 (id=3006): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14.665213536s ago: executing program 2 (id=3007): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) syz_clone(0x40000080, 0x0, 0x0, 0x0, 0x0, 0x0) 2.507952396s ago: executing program 6 (id=3011): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) pipe2(0x0, 0x0) symlink(&(0x7f0000001640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mount$cgroup(0x0, &(0x7f00000007c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', 0x0, 0x0, 0x0) 2.202259313s ago: executing program 6 (id=3012): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) listen(r1, 0x0) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r2, 0x2, &(0x7f0000000600)=[&(0x7f0000000300)={0x1802, 0x0, 0x0, 0x5, 0xfffd, r1, 0x0}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) shutdown(r1, 0x0) 1.844866925s ago: executing program 6 (id=3013): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8040}, 0x49894) r1 = timerfd_create(0x0, 0x800) timerfd_settime(r1, 0x3, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0x5edc, 0x1000, 0x0, 0x40000333}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r1, 0x0, &(0x7f0000000880)=[{&(0x7f0000000400)=""/245, 0xf5}], 0x1}) io_uring_enter(r2, 0x847ba, 0x0, 0xe, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000340)='mmap_lock_acquire_returned\x00', r8}, 0x18) r9 = gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r10 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r10, &(0x7f0000000080), 0x10) close(r10) process_vm_writev(r9, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=@newtfilter={0x3c, 0x2c, 0x527, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x0, 0x1}, {}, {0x0, 0xfffd}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_FLAGS_MASK={0x8, 0x30, 0x3}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000810}, 0x20084084) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[], 0x32600) 1.00775998s ago: executing program 6 (id=3014): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x5}, 0x2004c000) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) 487.834296ms ago: executing program 6 (id=3015): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x18, 0x7ffc1fff}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x18) readahead(0xffffffffffffffff, 0x4ca841af, 0x3ff) 0s ago: executing program 6 (id=3016): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd2d, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x93}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {0x0, 0x0, 0x0, 0x0, 0x3000000}, {0x1, 0x0, 0x0, 0x4000000, 0x7, 0x80000}, {0x8000, 0x5, 0x0, 0xfffffffc, 0x5}, {}, {0x0, 0x0, 0x800000, 0x0, 0x6}, {0x0, 0xc3}, {0x0, 0x5}, {0x5}, {}, {0x0, 0x10}, {0x0, 0x4, 0x0, 0x8000000, 0x0, 0x200000}, {}, {0x2, 0x0, 0x0, 0x0, 0x6, 0x6}, {}, {}, {0x0, 0x0, 0x0, 0x1, 0x0, 0xfff}, {0x0, 0x0, 0x0, 0x8000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {0x20000, 0x400}, {0x1000000}, {0x0, 0x7, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x60569add}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x1, 0x9}, {0x0, 0x0, 0x0, 0x0, 0xfffff800}, {0x0, 0x0, 0x0, 0x0, 0x9}, {}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x2}, {}, {0x80, 0x0, 0xffffffff}, {0x80, 0x0, 0x0, 0x0, 0x400}, {0x0, 0x0, 0x0, 0x5, 0x5}, {}, {0x0, 0x0, 0x8, 0x0, 0x0, 0x1}, {0x0, 0x2, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x0, 0x0, 0x8510}, {0xffff}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0xfffefffd}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x2}, {}, {0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, {0x0, 0x7}, {0x7}, {0x3, 0x0, 0x0, 0xfffffffe, 0x0, 0x9}, {0x0, 0xfffffffc, 0x200}, {0xffffffff}, {0x0, 0x0, 0x0, 0x3}, {0x4}, {}, {0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x101, 0x0, 0x0, 0x0, 0xffffffff}, {}, {0x3}, {0x0, 0x0, 0x0, 0x4, 0x9}, {}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x7}, {0x0, 0xb}, {0x0, 0x0, 0x0, 0xffffffff}, {}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, {0x0, 0x0, 0x0, 0xec33, 0x0, 0x4}, {}, {0xb, 0x0, 0x0, 0x0, 0x0, 0xfe1}, {0x0, 0x0, 0x0, 0x0, 0x4}, {0xfff}, {}, {0x0, 0xfffffffd}, {0x6, 0x2, 0x7fffffff}, {0x7f}, {}, {0x0, 0x8, 0x0, 0x0, 0xfffffffe}, {0x0, 0x2, 0x0, 0x2, 0x0, 0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0xe9d, 0x58a}, {0x2}, {0x2, 0x9, 0x20000000}, {0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0xe600, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {0x0, 0x5, 0x0, 0x7, 0x1}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x80}, {0x10000000, 0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {0xfffffffb, 0x0, 0x0, 0x2, 0x8000}, {0x6, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {0x2d}, {0x0, 0x0, 0x8000}, {0x0, 0x8000, 0x0, 0x1}, {0x0, 0x0, 0x10000}, {0x0, 0x80000000, 0x0, 0x7fff800, 0x4}, {0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0xd}], [{}, {}, {0x0, 0x1}, {0x1}, {}, {0x3}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x4, 0x1}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {0x4}, {0x3}, {}, {}, {}, {}, {0x5}, {}, {}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x1}, {}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x1}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {0x2, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {0x4}, {0x3}, {}, {}, {}, {}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) kernel console output (not intermixed with test programs): .930:2065): avc: denied { nlmsg_write } for pid=13571 comm="syz.3.2256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1542.770004][ T29] audit: type=1326 audit(1542.670:2066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13583 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1542.778466][ T29] audit: type=1326 audit(1542.680:2067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13583 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1542.781046][ T29] audit: type=1326 audit(1542.680:2068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13583 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1542.783864][ T29] audit: type=1326 audit(1542.680:2069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13583 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1542.802410][ T29] audit: type=1326 audit(1542.700:2070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13583 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1542.804013][ T29] audit: type=1326 audit(1542.700:2071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13583 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1542.806084][ T29] audit: type=1326 audit(1542.700:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13583 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1542.806298][ T29] audit: type=1326 audit(1542.700:2073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13583 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1542.820484][ T29] audit: type=1326 audit(1542.700:2074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13583 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=40000028 syscall=298 compat=0 ip=0x132970 code=0x7ffc0000 [ 1544.102353][T13602] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2263'. [ 1546.749421][T13624] IPv6: NLM_F_CREATE should be specified when creating new route [ 1548.785282][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1548.785615][ T29] audit: type=1400 audit(1548.680:2077): avc: denied { bind } for pid=13636 comm="syz.2.2272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1548.791112][ T29] audit: type=1400 audit(1548.690:2078): avc: denied { setopt } for pid=13636 comm="syz.2.2272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1548.949099][T13637] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1549.216182][T13637] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1549.318396][T13637] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1549.495973][T13637] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1549.862923][T12911] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1550.007526][T10015] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1550.021730][T12911] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1550.166090][T10015] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1550.560041][ T29] audit: type=1400 audit(1550.460:2079): avc: denied { execute } for pid=13676 comm="syz.2.2273" dev="tmpfs" ino=76 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1550.635899][ T29] audit: type=1400 audit(1550.530:2080): avc: denied { execute_no_trans } for pid=13676 comm="syz.2.2273" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=76 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1551.094136][ T29] audit: type=1400 audit(1550.990:2081): avc: denied { create } for pid=13626 comm="syz.3.2270" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1551.100861][ T29] audit: type=1400 audit(1551.000:2082): avc: denied { write } for pid=13626 comm="syz.3.2270" name="file0" dev="tmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1551.119709][ T29] audit: type=1400 audit(1551.000:2083): avc: denied { open } for pid=13626 comm="syz.3.2270" path="/14/file0" dev="tmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1551.291007][T13680] netlink: 108 bytes leftover after parsing attributes in process `syz.2.2274'. [ 1552.055773][ T29] audit: type=1400 audit(1551.950:2084): avc: denied { unlink } for pid=12963 comm="syz-executor" name="file0" dev="tmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1552.309490][ T29] audit: type=1326 audit(1552.210:2085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13687 comm="syz.3.2276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1552.311353][ T29] audit: type=1326 audit(1552.210:2086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13687 comm="syz.3.2276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1552.949561][T13698] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1553.044174][T13698] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1553.127554][T13698] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1553.182318][T13709] netlink: 56 bytes leftover after parsing attributes in process `syz.3.2281'. [ 1553.188527][T13709] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2281'. [ 1553.331246][T13698] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1553.695003][T13715] netlink: 464 bytes leftover after parsing attributes in process `syz.3.2282'. [ 1553.824965][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 1553.825284][ T29] audit: type=1326 audit(1553.720:2094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13716 comm="syz.3.2283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1553.828160][ T29] audit: type=1326 audit(1553.730:2095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13716 comm="syz.3.2283" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 1553.898240][T12912] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1553.987217][T12908] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1554.135677][T12908] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1554.143872][ T29] audit: type=1326 audit(1554.040:2096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13716 comm="syz.3.2283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1554.151348][ T29] audit: type=1326 audit(1554.050:2097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13716 comm="syz.3.2283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1554.151421][ T29] audit: type=1326 audit(1554.050:2098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13716 comm="syz.3.2283" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132970 code=0x7ffc0000 [ 1554.151449][ T29] audit: type=1326 audit(1554.050:2099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13716 comm="syz.3.2283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1554.151474][ T29] audit: type=1326 audit(1554.050:2100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13716 comm="syz.3.2283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1554.156825][ T29] audit: type=1326 audit(1554.060:2101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13716 comm="syz.3.2283" exe="/syz-executor" sig=0 arch=40000028 syscall=297 compat=0 ip=0x132970 code=0x7ffc0000 [ 1554.157052][ T29] audit: type=1326 audit(1554.060:2102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13716 comm="syz.3.2283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1554.157111][ T29] audit: type=1326 audit(1554.060:2103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13716 comm="syz.3.2283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1554.171410][T12909] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1557.790423][T13769] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2297'. [ 1559.912020][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1559.916238][ T29] audit: type=1326 audit(1559.810:2107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13784 comm="syz.3.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1559.932122][ T29] audit: type=1326 audit(1559.830:2108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13784 comm="syz.3.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132970 code=0x7ffc0000 [ 1559.959004][ T29] audit: type=1326 audit(1559.860:2109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13784 comm="syz.3.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1559.962961][ T29] audit: type=1326 audit(1559.860:2110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13784 comm="syz.3.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1559.970206][ T29] audit: type=1326 audit(1559.870:2111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13784 comm="syz.3.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1559.972443][ T29] audit: type=1326 audit(1559.870:2112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13784 comm="syz.3.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1559.975026][ T29] audit: type=1326 audit(1559.870:2113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13784 comm="syz.3.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1559.979321][ T29] audit: type=1326 audit(1559.870:2114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13784 comm="syz.3.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1559.983067][ T29] audit: type=1326 audit(1559.880:2115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13784 comm="syz.3.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1559.997170][ T29] audit: type=1326 audit(1559.900:2116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13784 comm="syz.3.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1565.775282][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 1565.788727][ T29] audit: type=1326 audit(1565.670:2155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13824 comm="syz.2.2313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1565.795498][ T29] audit: type=1326 audit(1565.680:2156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13824 comm="syz.2.2313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1565.805971][ T29] audit: type=1326 audit(1565.690:2157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13824 comm="syz.2.2313" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1565.842605][ T29] audit: type=1326 audit(1565.690:2158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13824 comm="syz.2.2313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1565.854870][ T29] audit: type=1326 audit(1565.690:2159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13824 comm="syz.2.2313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1565.857388][ T29] audit: type=1326 audit(1565.690:2160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13824 comm="syz.2.2313" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1565.864806][ T29] audit: type=1326 audit(1565.690:2161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13824 comm="syz.2.2313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1565.874905][ T29] audit: type=1326 audit(1565.700:2162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13824 comm="syz.2.2313" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1565.888542][ T29] audit: type=1326 audit(1565.700:2163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13824 comm="syz.2.2313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1565.890953][ T29] audit: type=1326 audit(1565.710:2164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13824 comm="syz.2.2313" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132970 code=0x7ffc0000 [ 1566.372548][T13839] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2315'. [ 1567.359438][T13877] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.2317' sets config #1 [ 1568.799521][T13888] ip6_tunnel: non-ECT from fc00:0000:0000:0000:0000:0000:0000:0000 with DS=0x5 [ 1569.845042][T13898] netlink: 96 bytes leftover after parsing attributes in process `syz.2.2324'. [ 1570.799454][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 1570.799913][ T29] audit: type=1400 audit(1570.690:2198): avc: denied { setopt } for pid=13900 comm="syz.2.2325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1572.080669][ T29] audit: type=1400 audit(1571.980:2199): avc: denied { create } for pid=13810 comm="syz.3.2309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1572.972485][T13913] random: crng reseeded on system resumption [ 1579.041644][T13938] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2339'. [ 1597.197784][T12747] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 1597.199127][T12747] syz.0.2167: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 1597.226121][T12747] CPU: 1 UID: 0 PID: 12747 Comm: syz.0.2167 Not tainted syzkaller #0 PREEMPT [ 1597.226230][T12747] Hardware name: ARM-Versatile Express [ 1597.226257][T12747] Call trace: [ 1597.226291][T12747] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1597.226424][T12747] r7:00000dc0 r6:8226e1ac r5:60000113 r4:82252424 [ 1597.226444][T12747] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 1597.226533][T12747] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 1597.226592][T12747] r5:859d0c00 r4:00000000 [ 1597.226607][T12747] [<8021f8bc>] (dump_stack) from [<804ff660>] (warn_alloc+0xd8/0x178) [ 1597.226669][T12747] [<804ff588>] (warn_alloc) from [<804edfa8>] (__vmalloc_node_range_noprof+0xc0/0x544) [ 1597.226730][T12747] r3:20000000 r2:8226e1ac [ 1597.226757][T12747] r6:df800000 r5:ff800000 r4:20000000 [ 1597.226774][T12747] [<804edee8>] (__vmalloc_node_range_noprof) from [<80510bfc>] (__kvmalloc_node_noprof+0x2b0/0x708) [ 1597.226851][T12747] r10:dfa99d58 r9:000029c0 r8:859d0c00 r7:00000000 r6:00000dc0 r5:00000000 [ 1597.226870][T12747] r4:20000000 [ 1597.226885][T12747] [<8051094c>] (__kvmalloc_node_noprof) from [<81727b90>] (xt_alloc_entry_offsets+0x28/0x34) [ 1597.226973][T12747] r10:dfa99d58 r9:84f99800 r8:00000000 r7:00000000 r6:00000288 r5:84f99840 [ 1597.226995][T12747] r4:08000000 [ 1597.227010][T12747] [<81727b68>] (xt_alloc_entry_offsets) from [<818b50d8>] (translate_table+0x70/0x78c) [ 1597.227073][T12747] [<818b5068>] (translate_table) from [<818b62b4>] (do_replace+0xe8/0x5d0) [ 1597.227146][T12747] r10:b5403587 r9:84f99840 r8:00000000 r7:20000060 r6:00000288 r5:84f99800 [ 1597.227166][T12747] r4:8558ad00 [ 1597.227182][T12747] [<818b61cc>] (do_replace) from [<818b68d0>] (do_ip6t_set_ctl+0x134/0x2a0) [ 1597.227256][T12747] r10:00000126 r9:859d0c00 r8:000002e8 r7:837de000 r6:dfa99e00 r5:84deb180 [ 1597.227275][T12747] r4:00000040 [ 1597.227292][T12747] [<818b679c>] (do_ip6t_set_ctl) from [<816b1b74>] (nf_setsockopt+0x60/0x7c) [ 1597.227374][T12747] r10:00000126 r9:859d0c00 r8:000002e8 r7:837de000 r6:84deb180 r5:818b679c [ 1597.227394][T12747] r4:829f2678 [ 1597.227409][T12747] [<816b1b18>] (nf_setsockopt) from [<8186c970>] (ipv6_setsockopt+0x9c/0xbc) [ 1597.227483][T12747] r6:000002e8 r5:84deb180 r4:00000040 [ 1597.227499][T12747] [<8186c8d8>] (ipv6_setsockopt) from [<8175eaa0>] (tcp_setsockopt+0x3c/0x58) [ 1597.227571][T12747] r6:00000040 r5:00000029 r4:8186c8d4 [ 1597.227588][T12747] [<8175ea68>] (tcp_setsockopt) from [<8155a084>] (sock_common_setsockopt+0x38/0x40) [ 1597.227649][T12747] r4:8175ea64 [ 1597.227664][T12747] [<8155a050>] (sock_common_setsockopt) from [<81555810>] (do_sock_setsockopt+0x70/0xc8) [ 1597.227722][T12747] r4:8155a04c [ 1597.227738][T12747] [<815557a0>] (do_sock_setsockopt) from [<81558d18>] (__sys_setsockopt+0x7c/0xc4) [ 1597.227806][T12747] r8:00000000 r7:847883c0 r6:847883c1 r5:00000040 r4:00000029 [ 1597.227823][T12747] [<81558c9c>] (__sys_setsockopt) from [<81558d7c>] (sys_setsockopt+0x1c/0x24) [ 1597.227891][T12747] r8:8020029c r7:00000126 r6:00316310 r5:00000000 r4:000002e8 [ 1597.227909][T12747] [<81558d60>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1597.227961][T12747] Exception stack(0xdfa99fa8 to 0xdfa99ff0) [ 1597.228056][T12747] 9fa0: 000002e8 00000000 00000007 00000029 00000040 20000000 [ 1597.228098][T12747] 9fc0: 000002e8 00000000 00316310 00000126 00300000 00000000 00006364 76f3a0bc [ 1597.228127][T12747] 9fe0: 76f39ec0 76f39eb0 0001928c 00132970 [ 1597.252689][T12747] Mem-Info: [ 1597.253172][T12747] active_anon:4576 inactive_anon:0 isolated_anon:0 [ 1597.253172][T12747] active_file:2048 inactive_file:39393 isolated_file:0 [ 1597.253172][T12747] unevictable:768 dirty:19 writeback:0 [ 1597.253172][T12747] slab_reclaimable:1095 slab_unreclaimable:7067 [ 1597.253172][T12747] mapped:5344 shmem:3648 pagetables:440 [ 1597.253172][T12747] sec_pagetables:0 bounce:0 [ 1597.253172][T12747] kernel_misc_reclaimable:0 [ 1597.253172][T12747] free:429755 free_pcp:1000 free_cma:4032 [ 1597.253415][T12747] Node 0 active_anon:18304kB inactive_anon:0kB active_file:8192kB inactive_file:157572kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:21376kB dirty:76kB writeback:0kB shmem:14592kB kernel_stack:2992kB pagetables:1760kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 1597.253617][T12747] Normal free:1372984kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:2876kB unevictable:0kB writepending:0kB zspages:0kB present:1556480kB managed:1426908kB mlocked:0kB bounce:0kB free_pcp:4000kB local_pcp:1568kB free_cma:0kB [ 1597.253858][T12747] lowmem_reserve[]: 0 4224 4224 [ 1597.255113][T12747] Normal: 2*4kB (UE) 4*8kB (UM) 3*16kB (UME) 1*32kB (E) 7*64kB (UME) 2*128kB (ME) 2*256kB (UM) 7*512kB (UME) 4*1024kB (M) 6*2048kB (UME) 330*4096kB (UM) = 1372984kB [ 1597.255975][T12747] 45095 total pagecache pages [ 1597.256121][T12747] 0 pages in swap cache [ 1597.256151][T12747] Free swap = 124996kB [ 1597.256173][T12747] Total swap = 124996kB [ 1597.256191][T12747] 524288 pages RAM [ 1597.256207][T12747] 135168 pages HighMem/MovableOnly [ 1597.256222][T12747] 32393 pages reserved [ 1597.256281][T12747] 4096 pages cma reserved [ 1608.938459][T13991] random: crng reseeded on system resumption [ 1608.969632][ T29] audit: type=1326 audit(1608.870:2200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13990 comm="syz.2.2355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1609.059298][ T29] audit: type=1326 audit(1608.940:2201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13990 comm="syz.2.2355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1609.163045][ T29] audit: type=1326 audit(1609.060:2202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13990 comm="syz.2.2355" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 1609.169720][ T29] audit: type=1326 audit(1609.060:2203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13990 comm="syz.2.2355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1609.182431][ T29] audit: type=1326 audit(1609.060:2204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13990 comm="syz.2.2355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1609.193976][ T29] audit: type=1326 audit(1609.090:2205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13990 comm="syz.2.2355" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x132970 code=0x7ffc0000 [ 1609.207117][ T29] audit: type=1326 audit(1609.090:2206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13990 comm="syz.2.2355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1609.308520][ T29] audit: type=1326 audit(1609.210:2207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13990 comm="syz.2.2355" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1609.316155][ T29] audit: type=1326 audit(1609.220:2208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13990 comm="syz.2.2355" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x132970 code=0x7ffc0000 [ 1609.341851][ T29] audit: type=1326 audit(1609.240:2209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13990 comm="syz.2.2355" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 1610.088465][T13819] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 1610.099403][T13819] hid-generic 0000:0000:0000.0018: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1613.426847][T14031] ip6gretap0: entered promiscuous mode [ 1613.452175][T14031] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2370'. [ 1614.418597][ T29] kauditd_printk_skb: 225 callbacks suppressed [ 1614.437191][ T29] audit: type=1326 audit(1614.280:2435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14030 comm="syz.2.2370" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1614.966022][T14042] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2374'. [ 1614.975917][T14042] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2374'. [ 1615.371789][ T29] audit: type=1400 audit(1615.270:2436): avc: denied { mount } for pid=14043 comm="syz.2.2375" name="/" dev="ramfs" ino=25560 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1618.317182][ T29] audit: type=1326 audit(1618.220:2437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14063 comm="syz.2.2384" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1618.318806][ T29] audit: type=1326 audit(1618.220:2438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14063 comm="syz.2.2384" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1618.323133][ T29] audit: type=1326 audit(1618.220:2439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14063 comm="syz.2.2384" exe="/syz-executor" sig=0 arch=40000028 syscall=103 compat=0 ip=0x132970 code=0x7ffc0000 [ 1618.333728][ T29] audit: type=1326 audit(1618.230:2440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14063 comm="syz.2.2384" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1622.445219][ T29] audit: type=1326 audit(1622.340:2441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14087 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1622.471147][ T29] audit: type=1326 audit(1622.350:2442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14087 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1622.492719][ T29] audit: type=1326 audit(1622.380:2443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14087 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=40000028 syscall=373 compat=0 ip=0x132970 code=0x7ffc0000 [ 1622.496261][ T29] audit: type=1326 audit(1622.390:2444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14087 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1623.160021][T14090] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2395'. [ 1630.884758][ T29] audit: type=1326 audit(1630.780:2445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14107 comm="syz.2.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1630.893620][ T29] audit: type=1326 audit(1630.790:2446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14107 comm="syz.2.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=347 compat=0 ip=0x132970 code=0x7ffc0000 [ 1630.901007][ T29] audit: type=1326 audit(1630.800:2447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14107 comm="syz.2.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1630.918753][ T29] audit: type=1326 audit(1630.820:2448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14107 comm="syz.2.2402" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1633.348171][ T29] audit: type=1326 audit(1633.250:2449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14118 comm="syz.2.2406" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1633.360340][ T29] audit: type=1326 audit(1633.260:2450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14118 comm="syz.2.2406" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1633.371548][ T29] audit: type=1326 audit(1633.270:2451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14118 comm="syz.2.2406" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x132970 code=0x7ffc0000 [ 1633.387931][ T29] audit: type=1326 audit(1633.280:2452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14118 comm="syz.2.2406" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1633.398554][ T29] audit: type=1326 audit(1633.290:2453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14118 comm="syz.2.2406" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x132970 code=0x7ffc0000 [ 1633.425741][ T29] audit: type=1326 audit(1633.310:2454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14118 comm="syz.2.2406" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1634.293886][T14122] netlink: '+}[@': attribute type 10 has an invalid length. [ 1635.193311][T14129] ALSA: seq fatal error: cannot create timer (-19) [ 1642.642313][T14143] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2414'. [ 1642.996428][T14147] SELinux: failed to load policy [ 1643.411389][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 1643.411765][ T29] audit: type=1326 audit(1643.310:2462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14152 comm="syz.2.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1643.417162][ T29] audit: type=1326 audit(1643.320:2463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14152 comm="syz.2.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=217 compat=0 ip=0x132970 code=0x7ffc0000 [ 1643.426772][ T29] audit: type=1326 audit(1643.320:2464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14152 comm="syz.2.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1643.433810][ T29] audit: type=1326 audit(1643.330:2465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14152 comm="syz.2.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1643.571315][T14155] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2419'. [ 1643.575666][T14155] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2419'. [ 1651.165900][ T29] audit: type=1326 audit(1651.050:2466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14178 comm="syz.2.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1651.170072][ T29] audit: type=1326 audit(1651.070:2467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14178 comm="syz.2.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1651.177238][ T29] audit: type=1326 audit(1651.070:2468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14178 comm="syz.2.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1651.228267][ T29] audit: type=1326 audit(1651.070:2469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14178 comm="syz.2.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1651.238891][ T29] audit: type=1326 audit(1651.070:2470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14178 comm="syz.2.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1651.246543][ T29] audit: type=1326 audit(1651.070:2471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14178 comm="syz.2.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1651.259199][ T29] audit: type=1326 audit(1651.080:2472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14178 comm="syz.2.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1651.396487][ T29] audit: type=1326 audit(1651.080:2473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14178 comm="syz.2.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1651.396916][ T29] audit: type=1326 audit(1651.090:2474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14178 comm="syz.2.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1651.397616][ T29] audit: type=1326 audit(1651.100:2475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14178 comm="syz.2.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1660.696215][T14205] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1660.793750][T14205] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1660.880126][T14205] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1660.968120][T14205] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1661.371968][T12909] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1661.439164][T12912] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1661.481613][T12912] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1661.532247][T12912] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1663.962032][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 1663.968837][ T29] audit: type=1326 audit(1663.860:2489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14232 comm="syz.2.2443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1663.977779][ T29] audit: type=1326 audit(1663.880:2490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14232 comm="syz.2.2443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1663.985410][ T29] audit: type=1326 audit(1663.880:2491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14232 comm="syz.2.2443" exe="/syz-executor" sig=0 arch=40000028 syscall=132 compat=0 ip=0x132970 code=0x7ffc0000 [ 1663.993483][ T29] audit: type=1326 audit(1663.890:2492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14232 comm="syz.2.2443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1664.010592][ T29] audit: type=1326 audit(1663.910:2493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14232 comm="syz.2.2443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1664.692351][T14241] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2447'. [ 1665.313197][ T29] audit: type=1326 audit(1665.210:2494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14250 comm="syz.2.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1665.338050][ T29] audit: type=1326 audit(1665.210:2495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14250 comm="syz.2.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1665.365807][ T29] audit: type=1326 audit(1665.230:2496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14250 comm="syz.2.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1665.367720][ T29] audit: type=1326 audit(1665.270:2497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14250 comm="syz.2.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1665.384005][ T29] audit: type=1326 audit(1665.270:2498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14250 comm="syz.2.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=144 compat=0 ip=0x132970 code=0x7ffc0000 [ 1666.466356][T14255] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2454'. [ 1670.709795][T13127] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 1670.713586][T13127] hid-generic 0000:0000:0000.0019: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1673.999655][T14260] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1674.020494][T14260] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1676.311406][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 1676.311850][ T29] audit: type=1326 audit(1676.200:2503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14509 comm="syz.2.2472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1676.328310][ T29] audit: type=1326 audit(1676.230:2504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14509 comm="syz.2.2472" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1676.328915][ T29] audit: type=1326 audit(1676.230:2505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14509 comm="syz.2.2472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1676.343733][ T29] audit: type=1326 audit(1676.230:2506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14509 comm="syz.2.2472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1676.355595][ T29] audit: type=1326 audit(1676.250:2507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14509 comm="syz.2.2472" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1676.360397][ T29] audit: type=1326 audit(1676.260:2508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14509 comm="syz.2.2472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1676.368561][ T29] audit: type=1326 audit(1676.270:2509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14509 comm="syz.2.2472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1676.391749][ T29] audit: type=1326 audit(1676.280:2510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14509 comm="syz.2.2472" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1676.398863][ T29] audit: type=1326 audit(1676.300:2511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14509 comm="syz.2.2472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1676.400802][ T29] audit: type=1326 audit(1676.300:2512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14509 comm="syz.2.2472" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1676.668582][T14260] hsr_slave_0: entered promiscuous mode [ 1676.670427][T14260] hsr_slave_1: entered promiscuous mode [ 1676.695665][T14260] debugfs: 'hsr0' already exists in 'hsr' [ 1676.696314][T14260] Cannot create hsr debugfs directory [ 1678.368715][T14260] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1678.389401][T14260] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1678.413241][T14260] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1678.448468][T14260] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1680.603119][T14260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1681.545077][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 1681.545453][ T29] audit: type=1326 audit(1681.440:2599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14625 comm="syz.2.2474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1681.549921][ T29] audit: type=1326 audit(1681.450:2600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14625 comm="syz.2.2474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1681.555166][ T29] audit: type=1326 audit(1681.450:2601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14625 comm="syz.2.2474" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1681.569674][ T29] audit: type=1326 audit(1681.470:2602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14625 comm="syz.2.2474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1681.575311][ T29] audit: type=1326 audit(1681.470:2603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14625 comm="syz.2.2474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1681.581194][ T29] audit: type=1326 audit(1681.480:2604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14625 comm="syz.2.2474" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132970 code=0x7ffc0000 [ 1681.586086][ T29] audit: type=1326 audit(1681.480:2605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14625 comm="syz.2.2474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1681.590527][ T29] audit: type=1326 audit(1681.480:2606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14625 comm="syz.2.2474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1681.608429][ T29] audit: type=1326 audit(1681.510:2607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14625 comm="syz.2.2474" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1681.611385][ T29] audit: type=1326 audit(1681.510:2608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14625 comm="syz.2.2474" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1690.772840][T14260] veth0_vlan: entered promiscuous mode [ 1690.909961][T14260] veth1_vlan: entered promiscuous mode [ 1691.101750][T14260] veth0_macvtap: entered promiscuous mode [ 1691.200674][T14260] veth1_macvtap: entered promiscuous mode [ 1691.389605][T12907] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1691.390076][T12907] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1691.390538][T12907] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1691.390782][T12907] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1693.476273][T14689] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2484'. [ 1694.086468][ T29] kauditd_printk_skb: 414 callbacks suppressed [ 1694.086913][ T29] audit: type=1326 audit(1693.990:3023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.4.2487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1694.091581][ T29] audit: type=1326 audit(1693.990:3024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.4.2487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1694.124142][ T29] audit: type=1326 audit(1694.020:3025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.4.2487" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1694.154829][ T29] audit: type=1326 audit(1694.020:3026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.4.2487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1694.161741][ T29] audit: type=1326 audit(1694.020:3027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.4.2487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1694.261001][ T29] audit: type=1326 audit(1694.020:3028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.4.2487" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1694.267501][ T29] audit: type=1326 audit(1694.040:3029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.4.2487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1694.271750][ T29] audit: type=1326 audit(1694.100:3030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.4.2487" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1694.276521][ T29] audit: type=1326 audit(1694.130:3031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.4.2487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1694.281038][ T29] audit: type=1326 audit(1694.130:3032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.4.2487" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1695.149766][T14704] netlink: 'syz.2.2488': attribute type 10 has an invalid length. [ 1695.154946][T14704] macvtap0: entered allmulticast mode [ 1695.155718][T14704] veth0_macvtap: entered allmulticast mode [ 1696.622902][T14721] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2499'. [ 1700.260407][T10181] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 1700.276488][T10181] hid-generic 0000:0000:0000.001A: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1706.328476][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 1706.330274][ T29] audit: type=1326 audit(1706.230:3058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.2.2521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1706.356200][ T29] audit: type=1326 audit(1706.260:3059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.2.2521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1706.368157][ T29] audit: type=1326 audit(1706.270:3060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.2.2521" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1706.371005][ T29] audit: type=1326 audit(1706.270:3061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.2.2521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1706.373140][ T29] audit: type=1326 audit(1706.270:3062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.2.2521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1706.379850][ T29] audit: type=1326 audit(1706.280:3063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.2.2521" exe="/syz-executor" sig=0 arch=40000028 syscall=183 compat=0 ip=0x132970 code=0x7ffc0000 [ 1706.382867][ T29] audit: type=1326 audit(1706.280:3064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.2.2521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1706.392229][ T29] audit: type=1326 audit(1706.290:3065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.2.2521" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1706.403857][ T29] audit: type=1326 audit(1706.300:3066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.2.2521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1706.411505][ T29] audit: type=1326 audit(1706.300:3067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.2.2521" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1706.673432][T10186] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 1706.712567][T10186] hid-generic 0000:0000:0000.001B: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1711.770608][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 1711.772320][ T29] audit: type=1326 audit(1711.670:3076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14822 comm="syz.4.2532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1711.778743][ T29] audit: type=1326 audit(1711.680:3077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14822 comm="syz.4.2532" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x132970 code=0x7ffc0000 [ 1711.781105][ T29] audit: type=1326 audit(1711.680:3078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14822 comm="syz.4.2532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1712.373100][T14828] SELinux: Context system_u:object_r:crypt_device_t:s0 is not valid (left unmapped). [ 1712.383155][ T29] audit: type=1400 audit(1712.280:3079): avc: denied { relabelto } for pid=14826 comm="syz.4.2534" name="file0" dev="tmpfs" ino=183 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:crypt_device_t:s0" [ 1712.388151][ T29] audit: type=1400 audit(1712.280:3080): avc: denied { associate } for pid=14826 comm="syz.4.2534" name="file0" dev="tmpfs" ino=183 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:crypt_device_t:s0" [ 1717.441985][T14838] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 1717.447045][T14838] hid-generic 0000:0000:0000.001C: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1720.723173][ T29] audit: type=1400 audit(1720.620:3081): avc: denied { name_bind } for pid=14874 comm="syz.2.2549" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1722.638888][T14886] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1723.653473][T10044] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 1723.697007][T10044] hid-generic 0000:0000:0000.001D: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1726.196679][T14899] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2555'. [ 1727.397910][ T29] audit: type=1326 audit(1727.300:3082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14884 comm="syz.2.2553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1727.400610][ T29] audit: type=1326 audit(1727.300:3083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14884 comm="syz.2.2553" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1730.253510][ T29] audit: type=1326 audit(1730.140:3084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14916 comm="syz.2.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1730.274679][ T29] audit: type=1326 audit(1730.150:3085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14916 comm="syz.2.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1730.286553][ T29] audit: type=1326 audit(1730.190:3086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14916 comm="syz.2.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1730.300752][ T29] audit: type=1326 audit(1730.200:3087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14916 comm="syz.2.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1730.307895][ T29] audit: type=1326 audit(1730.200:3088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14916 comm="syz.2.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1730.311117][ T29] audit: type=1326 audit(1730.210:3089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14916 comm="syz.2.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1730.322392][ T29] audit: type=1326 audit(1730.220:3090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14916 comm="syz.2.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1730.332315][ T29] audit: type=1326 audit(1730.230:3091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14916 comm="syz.2.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x132970 code=0x7ffc0000 [ 1731.733001][T13825] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 1731.747958][T13825] hid-generic 0000:0000:0000.001E: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1734.147079][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 1734.148339][ T29] audit: type=1326 audit(1734.040:3093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.4.2572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.151569][ T29] audit: type=1326 audit(1734.050:3094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.4.2572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.167270][ T29] audit: type=1326 audit(1734.070:3095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.4.2572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.168977][ T29] audit: type=1326 audit(1734.070:3096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.4.2572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.186034][ T29] audit: type=1326 audit(1734.080:3097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.4.2572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.188467][ T29] audit: type=1326 audit(1734.090:3098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.4.2572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.190776][ T29] audit: type=1326 audit(1734.090:3099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.4.2572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.234853][ T29] audit: type=1326 audit(1734.110:3100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.4.2572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.235180][ T29] audit: type=1326 audit(1734.130:3101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.4.2572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.240162][ T29] audit: type=1326 audit(1734.130:3102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.4.2572" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.567898][T14956] vlan0: entered promiscuous mode [ 1738.694140][T14982] netlink: 'syz.2.2581': attribute type 3 has an invalid length. [ 1738.700369][T14982] netlink: 'syz.2.2581': attribute type 3 has an invalid length. [ 1739.300580][T14992] netlink: 'syz.2.2586': attribute type 4 has an invalid length. [ 1739.337138][T14992] netlink: 'syz.2.2586': attribute type 4 has an invalid length. [ 1740.606317][T15005] netlink: 'syz.4.2590': attribute type 12 has an invalid length. [ 1743.310253][T15033] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2598'. [ 1747.409340][T15060] syzkaller0: entered promiscuous mode [ 1747.409573][T15060] syzkaller0: entered allmulticast mode [ 1748.689392][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 1748.689890][ T29] audit: type=1326 audit(1748.590:3141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15077 comm="syz.2.2612" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1748.695950][ T29] audit: type=1326 audit(1748.600:3142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15077 comm="syz.2.2612" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1748.711782][ T29] audit: type=1326 audit(1748.610:3143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15077 comm="syz.2.2612" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1748.713978][ T29] audit: type=1326 audit(1748.610:3144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15077 comm="syz.2.2612" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1748.782123][ T29] audit: type=1326 audit(1748.670:3145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15077 comm="syz.2.2612" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1748.887542][ T29] audit: type=1326 audit(1748.790:3146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15077 comm="syz.2.2612" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1748.888919][ T29] audit: type=1326 audit(1748.790:3147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15077 comm="syz.2.2612" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1748.889892][ T29] audit: type=1326 audit(1748.790:3148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15077 comm="syz.2.2612" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1748.995718][ T29] audit: type=1326 audit(1748.850:3149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15077 comm="syz.2.2612" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1748.999585][ T29] audit: type=1326 audit(1748.900:3150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15077 comm="syz.2.2612" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1750.426428][T15101] IPv6: NLM_F_CREATE should be specified when creating new route [ 1756.501474][T15164] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2641'. [ 1757.384034][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 1757.388620][ T29] audit: type=1326 audit(1757.280:3187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15167 comm="syz.2.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1757.392221][ T29] audit: type=1326 audit(1757.290:3188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15167 comm="syz.2.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1757.407686][ T29] audit: type=1326 audit(1757.310:3189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15167 comm="syz.2.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 1757.413383][ T29] audit: type=1326 audit(1757.310:3190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15167 comm="syz.2.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1757.417473][ T29] audit: type=1326 audit(1757.310:3191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15167 comm="syz.2.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1757.423037][ T29] audit: type=1326 audit(1757.320:3192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15167 comm="syz.2.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x132970 code=0x7ffc0000 [ 1757.426692][ T29] audit: type=1326 audit(1757.320:3193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15167 comm="syz.2.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1757.440447][ T29] audit: type=1326 audit(1757.330:3194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15167 comm="syz.2.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x132970 code=0x7ffc0000 [ 1757.576263][ T29] audit: type=1326 audit(1757.400:3195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15167 comm="syz.2.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1757.647159][ T29] audit: type=1326 audit(1757.550:3196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15167 comm="syz.2.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1285fc code=0x7ffc0000 [ 1760.809613][T15208] netlink: 830 bytes leftover after parsing attributes in process `syz.4.2647'. [ 1764.119168][ T29] kauditd_printk_skb: 381 callbacks suppressed [ 1764.119588][ T29] audit: type=1400 audit(1764.020:3578): avc: denied { getopt } for pid=15228 comm="syz.4.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1764.479124][ T29] audit: type=1400 audit(1764.360:3579): avc: denied { getopt } for pid=15230 comm="syz.4.2655" lport=13 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1765.877627][T15242] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1765.878970][T15242] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1766.961620][T15257] pimreg: entered allmulticast mode [ 1766.982171][T15257] pimreg: left allmulticast mode [ 1767.058780][ T29] audit: type=1400 audit(1766.960:3580): avc: denied { create } for pid=15258 comm="syz.2.2665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1767.307210][ T29] audit: type=1326 audit(1767.200:3581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15266 comm="syz.2.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1767.311053][ T29] audit: type=1326 audit(1767.210:3582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15266 comm="syz.2.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1767.314101][ T29] audit: type=1326 audit(1767.210:3583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15266 comm="syz.2.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1767.321742][ T29] audit: type=1326 audit(1767.220:3584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15266 comm="syz.2.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1767.329146][ T29] audit: type=1326 audit(1767.230:3585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15266 comm="syz.2.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1767.338366][ T29] audit: type=1326 audit(1767.240:3586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15266 comm="syz.2.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1767.339653][ T29] audit: type=1326 audit(1767.240:3587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15266 comm="syz.2.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1768.234157][T15279] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2666'. [ 1769.163221][T15287] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1770.030041][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 1770.030358][ T29] audit: type=1326 audit(1769.930:3612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15300 comm="syz.2.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1770.030575][ T29] audit: type=1326 audit(1769.930:3613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15300 comm="syz.2.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1770.048670][ T29] audit: type=1326 audit(1769.950:3614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15300 comm="syz.2.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=435 compat=0 ip=0x132970 code=0x7ffc0000 [ 1770.069398][ T29] audit: type=1326 audit(1769.970:3615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15300 comm="syz.2.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1770.075148][ T29] audit: type=1326 audit(1769.970:3616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15300 comm="syz.2.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1770.075811][ T29] audit: type=1326 audit(1769.970:3617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15300 comm="syz.2.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=268 compat=0 ip=0x132970 code=0x7ffc0000 [ 1770.082144][ T29] audit: type=1326 audit(1769.980:3618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15300 comm="syz.2.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1776.675531][ T29] audit: type=1400 audit(1776.550:3619): avc: denied { write } for pid=15330 comm="syz.2.2682" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1776.904437][T15359] veth0: entered promiscuous mode [ 1776.921862][T15359] veth0: left promiscuous mode [ 1777.896580][ T29] audit: type=1400 audit(1777.790:3620): avc: denied { create } for pid=15373 comm="syz.4.2688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1777.979291][ T29] audit: type=1400 audit(1777.880:3621): avc: denied { read } for pid=15373 comm="syz.4.2688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1778.657190][ T29] audit: type=1400 audit(1778.560:3622): avc: denied { create } for pid=15381 comm="syz.2.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1780.213600][ T29] audit: type=1326 audit(1780.110:3623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15398 comm="syz.2.2695" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1780.278745][ T29] audit: type=1326 audit(1780.180:3624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15398 comm="syz.2.2695" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1780.298536][ T29] audit: type=1326 audit(1780.200:3625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15398 comm="syz.2.2695" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1780.309297][ T29] audit: type=1326 audit(1780.210:3626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15398 comm="syz.2.2695" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1780.326921][ T29] audit: type=1326 audit(1780.220:3627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15398 comm="syz.2.2695" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1780.339249][ T29] audit: type=1326 audit(1780.240:3628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15398 comm="syz.2.2695" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1781.547485][T15420] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2698'. [ 1783.898040][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 1783.915233][ T29] audit: type=1326 audit(1783.790:3633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15434 comm="syz.4.2705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1783.955240][ T29] audit: type=1326 audit(1783.800:3634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15434 comm="syz.4.2705" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1783.959659][ T29] audit: type=1326 audit(1783.800:3635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15434 comm="syz.4.2705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1783.963182][ T29] audit: type=1326 audit(1783.800:3636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15434 comm="syz.4.2705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1783.978432][ T29] audit: type=1326 audit(1783.810:3637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15434 comm="syz.4.2705" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1783.984048][ T29] audit: type=1326 audit(1783.810:3638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15434 comm="syz.4.2705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1783.994990][ T29] audit: type=1326 audit(1783.820:3639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15434 comm="syz.4.2705" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1783.997885][ T29] audit: type=1326 audit(1783.820:3640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15434 comm="syz.4.2705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1784.004957][ T29] audit: type=1326 audit(1783.820:3641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15434 comm="syz.4.2705" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1784.028317][ T29] audit: type=1326 audit(1783.830:3642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15434 comm="syz.4.2705" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x130904 code=0x7ffc0000 [ 1788.941039][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 1788.946135][ T29] audit: type=1400 audit(1788.830:3656): avc: denied { unmount } for pid=15520 comm="syz.4.2728" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1789.753801][ T29] audit: type=1326 audit(1789.650:3657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15532 comm="syz.4.2730" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1789.764589][ T29] audit: type=1326 audit(1789.650:3658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15532 comm="syz.4.2730" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1789.808895][ T29] audit: type=1326 audit(1789.670:3659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15532 comm="syz.4.2730" exe="/syz-executor" sig=0 arch=40000028 syscall=122 compat=0 ip=0x132970 code=0x7ffc0000 [ 1789.824224][ T29] audit: type=1326 audit(1789.720:3660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15532 comm="syz.4.2730" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1789.844168][ T29] audit: type=1326 audit(1789.740:3661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15532 comm="syz.4.2730" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1790.429583][T15541] veth2: entered promiscuous mode [ 1790.436083][T15541] veth2: entered allmulticast mode [ 1790.707751][ T29] audit: type=1326 audit(1790.610:3662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15538 comm="syz.4.2732" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1790.709064][ T29] audit: type=1326 audit(1790.610:3663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15538 comm="syz.4.2732" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1790.712824][ T29] audit: type=1326 audit(1790.610:3664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15538 comm="syz.4.2732" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1305f8 code=0x7ffc0000 [ 1790.716610][ T29] audit: type=1326 audit(1790.620:3665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15538 comm="syz.4.2732" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1797.133006][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 1797.142973][ T29] audit: type=1326 audit(1797.030:3696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.4.2742" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1797.206775][ T29] audit: type=1326 audit(1797.040:3697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.4.2742" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1797.207138][ T29] audit: type=1326 audit(1797.050:3698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.4.2742" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1797.207342][ T29] audit: type=1326 audit(1797.070:3699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.4.2742" exe="/syz-executor" sig=0 arch=40000028 syscall=151 compat=0 ip=0x132970 code=0x7ffc0000 [ 1797.207547][ T29] audit: type=1326 audit(1797.070:3700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.4.2742" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1798.022473][T15618] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1798.375752][T15622] SELinux: policydb version 8 does not match my version range 15-35 [ 1798.377454][T15622] SELinux: failed to load policy [ 1799.639052][T15633] syz_tun: entered allmulticast mode [ 1799.669343][T15633] dvmrp6: entered allmulticast mode [ 1799.670693][T15631] syz_tun: left allmulticast mode [ 1800.333678][T15641] syz_tun: entered allmulticast mode [ 1800.360264][T15639] syz_tun: left allmulticast mode [ 1800.888906][ T29] audit: type=1326 audit(1800.790:3701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15644 comm="syz.2.2756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1800.898350][ T29] audit: type=1326 audit(1800.800:3702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15644 comm="syz.2.2756" exe="/syz-executor" sig=0 arch=40000028 syscall=236 compat=0 ip=0x132970 code=0x7ffc0000 [ 1800.903251][ T29] audit: type=1326 audit(1800.800:3703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15644 comm="syz.2.2756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1800.940271][ T29] audit: type=1326 audit(1800.820:3704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15644 comm="syz.2.2756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1801.691565][T15651] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 1802.173624][ T29] audit: type=1326 audit(1802.070:3705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15653 comm="syz.2.2759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1802.185958][ T29] audit: type=1326 audit(1802.090:3706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15653 comm="syz.2.2759" exe="/syz-executor" sig=0 arch=40000028 syscall=314 compat=0 ip=0x132970 code=0x7ffc0000 [ 1802.192722][ T29] audit: type=1326 audit(1802.090:3707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15653 comm="syz.2.2759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1802.209127][ T29] audit: type=1326 audit(1802.110:3708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15653 comm="syz.2.2759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1816.549089][T15723] tap0: tun_chr_ioctl cmd 1074025677 [ 1816.550609][T15723] tap0: linktype set to 817 [ 1817.126064][ T29] audit: type=1326 audit(1817.020:3709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15728 comm="syz.2.2775" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1817.138830][ T29] audit: type=1326 audit(1817.040:3710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15728 comm="syz.2.2775" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1817.149354][ T29] audit: type=1326 audit(1817.040:3711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15728 comm="syz.2.2775" exe="/syz-executor" sig=0 arch=40000028 syscall=61 compat=0 ip=0x132970 code=0x7ffc0000 [ 1817.151710][ T29] audit: type=1326 audit(1817.050:3712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15728 comm="syz.2.2775" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1817.204982][ T29] audit: type=1326 audit(1817.060:3713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15728 comm="syz.2.2775" exe="/syz-executor" sig=0 arch=40000028 syscall=36 compat=0 ip=0x132970 code=0x7ffc0000 [ 1817.360605][ T29] audit: type=1326 audit(1817.260:3714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15728 comm="syz.2.2775" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1817.361300][ T29] audit: type=1326 audit(1817.260:3715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15728 comm="syz.2.2775" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1817.378088][ T29] audit: type=1326 audit(1817.280:3716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15728 comm="syz.2.2775" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x132970 code=0x7ffc0000 [ 1817.378726][ T29] audit: type=1326 audit(1817.280:3717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15728 comm="syz.2.2775" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1817.381958][ T29] audit: type=1326 audit(1817.280:3718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15728 comm="syz.2.2775" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132970 code=0x7ffc0000 [ 1822.484892][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 1822.485249][ T29] audit: type=1400 audit(1822.370:3734): avc: denied { create } for pid=15743 comm="syz.4.2780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1823.105923][T15744] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1823.889529][T15744] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1824.208660][T15744] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1824.388036][T15744] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1824.691107][T12907] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1824.691648][T12907] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1824.806394][T12907] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1824.806840][T12907] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1825.719788][T15764] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2782'. [ 1825.721253][T15764] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2782'. [ 1838.133456][ T29] audit: type=1326 audit(1838.030:3735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15790 comm="syz.4.2789" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x50000 [ 1838.148238][ T29] audit: type=1326 audit(1838.050:3736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15790 comm="syz.4.2789" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132970 code=0x50000 [ 1838.150374][ T29] audit: type=1326 audit(1838.050:3737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15790 comm="syz.4.2789" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x160424 code=0x50000 [ 1838.152084][ T29] audit: type=1326 audit(1838.050:3738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15790 comm="syz.4.2789" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132970 code=0x50000 [ 1838.684960][ T29] audit: type=1326 audit(1838.580:3739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15790 comm="syz.4.2789" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132970 code=0x50000 [ 1841.173033][ T29] audit: type=1326 audit(1841.070:3740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15801 comm="syz.4.2795" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1841.185160][ T29] audit: type=1326 audit(1841.080:3741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15801 comm="syz.4.2795" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1841.185425][ T29] audit: type=1326 audit(1841.080:3742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15801 comm="syz.4.2795" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1841.194565][ T29] audit: type=1326 audit(1841.080:3743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15801 comm="syz.4.2795" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1841.196857][ T29] audit: type=1326 audit(1841.090:3744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15801 comm="syz.4.2795" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1841.386059][T15804] netlink: 'syz.2.2794': attribute type 1 has an invalid length. [ 1845.512315][T15846] netlink: 332 bytes leftover after parsing attributes in process `syz.2.2798'. [ 1846.696493][T15859] netem: change failed [ 1847.150986][T15868] netlink: 'syz.2.2805': attribute type 9 has an invalid length. [ 1849.242723][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 1849.255351][ T29] audit: type=1400 audit(1849.140:3754): avc: denied { create } for pid=15877 comm="syz.2.2807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1850.916093][T15884] IPv6: Can't replace route, no match found [ 1862.628775][T15932] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2822'. [ 1862.698759][T15932] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2822'. [ 1868.445731][T15937] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2824'. [ 1873.229287][ T29] audit: type=1400 audit(1873.130:3755): avc: denied { wake_alarm } for pid=15950 comm="syz.2.2829" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1880.185354][T15971] netlink: 'syz.2.2835': attribute type 13 has an invalid length. [ 1881.440721][T15971] veth0_macvtap: left allmulticast mode [ 1881.521424][T12398] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1881.537796][T12398] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1881.538208][T12398] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1881.538550][T12398] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1882.402780][ T29] audit: type=1326 audit(1882.300:3756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.2.2837" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1882.403384][ T29] audit: type=1326 audit(1882.300:3757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.2.2837" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1882.406634][ T29] audit: type=1326 audit(1882.310:3758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.2.2837" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x132970 code=0x7ffc0000 [ 1882.422064][ T29] audit: type=1326 audit(1882.320:3759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.2.2837" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1882.422709][ T29] audit: type=1326 audit(1882.320:3760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.2.2837" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=0 ip=0x132970 code=0x7ffc0000 [ 1882.423073][ T29] audit: type=1326 audit(1882.320:3761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.2.2837" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1882.426004][ T29] audit: type=1326 audit(1882.330:3762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.2.2837" exe="/syz-executor" sig=0 arch=40000028 syscall=275 compat=0 ip=0x132970 code=0x7ffc0000 [ 1882.432614][ T29] audit: type=1326 audit(1882.330:3763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.2.2837" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1882.445374][ T29] audit: type=1326 audit(1882.330:3764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.2.2837" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132970 code=0x7ffc0000 [ 1882.447395][ T29] audit: type=1326 audit(1882.350:3765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15976 comm="syz.2.2837" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1902.343969][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 1902.345372][ T29] audit: type=1400 audit(1902.240:3787): avc: denied { associate } for pid=16020 comm="syz.2.2849" name="1070" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1905.187273][T16129] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2856'. [ 1905.243977][T16129] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2856'. [ 1905.249628][T16129] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2856'. [ 1906.827061][T16002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1906.869836][T16002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1908.080917][T16244] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1908.082084][T16244] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1909.532686][T16002] hsr_slave_0: entered promiscuous mode [ 1909.556326][T16002] hsr_slave_1: entered promiscuous mode [ 1909.565669][T16002] debugfs: 'hsr0' already exists in 'hsr' [ 1909.566933][T16002] Cannot create hsr debugfs directory [ 1910.155646][T16298] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1910.200069][T16298] hsr_slave_1 (unregistering): left promiscuous mode [ 1910.798226][T16002] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1910.808297][T16002] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1910.821142][T16002] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1910.918548][T16002] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1913.721811][T16002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1925.999424][T16002] veth0_vlan: entered promiscuous mode [ 1926.069516][T16002] veth1_vlan: entered promiscuous mode [ 1926.341734][T16002] veth0_macvtap: entered promiscuous mode [ 1926.390841][T16002] veth1_macvtap: entered promiscuous mode [ 1926.514034][ T29] audit: type=1400 audit(1926.410:3788): avc: denied { mounton } for pid=16467 comm="syz.2.2870" path="/504/bus" dev="tmpfs" ino=2584 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1926.573637][ T29] audit: type=1400 audit(1926.470:3789): avc: denied { unmount } for pid=12220 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1926.697886][T12909] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1926.698414][T12909] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1926.698754][T12909] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1926.699028][T12909] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1927.125173][ T29] audit: type=1326 audit(1927.010:3790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16469 comm="syz.2.2871" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1927.129132][ T29] audit: type=1326 audit(1927.030:3791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16469 comm="syz.2.2871" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1927.158383][ T29] audit: type=1326 audit(1927.050:3792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16469 comm="syz.2.2871" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1927.159150][ T29] audit: type=1326 audit(1927.060:3793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16469 comm="syz.2.2871" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1927.159397][ T29] audit: type=1326 audit(1927.060:3794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16469 comm="syz.2.2871" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1927.159752][ T29] audit: type=1326 audit(1927.060:3795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16469 comm="syz.2.2871" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1927.160036][ T29] audit: type=1326 audit(1927.060:3796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16469 comm="syz.2.2871" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1927.160407][ T29] audit: type=1326 audit(1927.060:3797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16469 comm="syz.2.2871" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1931.311926][T16515] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 1931.318011][T16515] SELinux: failed to load policy [ 1932.653209][T16527] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2888'. [ 1934.987962][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 1934.988566][ T29] audit: type=1400 audit(1934.890:3876): avc: denied { bind } for pid=16576 comm="syz.5.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1935.003127][ T29] audit: type=1400 audit(1934.900:3877): avc: denied { listen } for pid=16576 comm="syz.5.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1935.027469][ T29] audit: type=1400 audit(1934.930:3878): avc: denied { setopt } for pid=16576 comm="syz.5.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1935.044154][ T29] audit: type=1400 audit(1934.930:3879): avc: denied { write } for pid=16576 comm="syz.5.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1937.808925][ T29] audit: type=1326 audit(1937.710:3880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16593 comm="syz.2.2904" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1937.824210][ T29] audit: type=1326 audit(1937.720:3881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16593 comm="syz.2.2904" exe="/syz-executor" sig=0 arch=40000028 syscall=185 compat=0 ip=0x132970 code=0x7ffc0000 [ 1937.825224][ T29] audit: type=1326 audit(1937.720:3882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16593 comm="syz.2.2904" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1940.543770][T16607] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2907'. [ 1940.544958][T16607] netlink: 312 bytes leftover after parsing attributes in process `syz.2.2907'. [ 1940.545326][T16607] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2907'. [ 1940.899466][ T29] audit: type=1326 audit(1940.800:3883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16609 comm="syz.2.2908" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1940.900024][ T29] audit: type=1326 audit(1940.800:3884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16609 comm="syz.2.2908" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1940.916938][ T29] audit: type=1326 audit(1940.810:3885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16609 comm="syz.2.2908" exe="/syz-executor" sig=0 arch=40000028 syscall=424 compat=0 ip=0x132970 code=0x7ffc0000 [ 1940.917417][ T29] audit: type=1326 audit(1940.810:3886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16609 comm="syz.2.2908" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1940.917503][ T29] audit: type=1326 audit(1940.820:3887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16609 comm="syz.2.2908" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1941.166795][ T29] audit: type=1326 audit(1941.070:3888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16613 comm="syz.2.2909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1941.167088][ T29] audit: type=1326 audit(1941.070:3889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16613 comm="syz.2.2909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1941.179013][ T29] audit: type=1326 audit(1941.080:3890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16613 comm="syz.2.2909" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 1941.179299][ T29] audit: type=1326 audit(1941.080:3891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16613 comm="syz.2.2909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1941.179418][ T29] audit: type=1326 audit(1941.080:3892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16613 comm="syz.2.2909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1952.752820][ T29] kauditd_printk_skb: 546 callbacks suppressed [ 1952.753358][ T29] audit: type=1326 audit(1952.650:4439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16636 comm="syz.2.2914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1952.753627][ T29] audit: type=1326 audit(1952.650:4440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16636 comm="syz.2.2914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1952.761941][ T29] audit: type=1326 audit(1952.660:4441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16636 comm="syz.2.2914" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1952.857195][ T29] audit: type=1326 audit(1952.720:4442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16636 comm="syz.2.2914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1952.857594][ T29] audit: type=1326 audit(1952.760:4443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16636 comm="syz.2.2914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1952.967169][ T29] audit: type=1326 audit(1952.860:4444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16636 comm="syz.2.2914" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1953.037040][ T29] audit: type=1326 audit(1952.930:4445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16636 comm="syz.2.2914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1953.039179][ T29] audit: type=1326 audit(1952.930:4446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16636 comm="syz.2.2914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1953.046459][ T29] audit: type=1326 audit(1952.950:4447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16636 comm="syz.2.2914" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1953.048002][ T29] audit: type=1326 audit(1952.950:4448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16636 comm="syz.2.2914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1957.995490][T16671] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2926'. [ 1965.127649][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 1965.128129][ T29] audit: type=1400 audit(1965.030:4476): avc: denied { write } for pid=16681 comm="syz.2.2930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1966.086640][ T29] audit: type=1326 audit(1965.990:4477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16686 comm="syz.2.2932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1966.090081][ T29] audit: type=1326 audit(1965.990:4478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16686 comm="syz.2.2932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1966.115406][ T29] audit: type=1326 audit(1966.010:4479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16686 comm="syz.2.2932" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1966.118205][ T29] audit: type=1326 audit(1966.020:4480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16686 comm="syz.2.2932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1966.135864][ T29] audit: type=1326 audit(1966.030:4481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16686 comm="syz.2.2932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1966.141516][ T29] audit: type=1326 audit(1966.040:4482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16686 comm="syz.2.2932" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1966.143427][ T29] audit: type=1326 audit(1966.040:4483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16686 comm="syz.2.2932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1966.143634][ T29] audit: type=1326 audit(1966.040:4484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16686 comm="syz.2.2932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1966.185966][ T29] audit: type=1326 audit(1966.070:4485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16686 comm="syz.2.2932" exe="/syz-executor" sig=0 arch=40000028 syscall=260 compat=0 ip=0x132970 code=0x7ffc0000 [ 1966.995377][T16699] netlink: 176 bytes leftover after parsing attributes in process `syz.5.2937'. [ 1967.628923][T16701] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2938'. [ 1967.634082][T16701] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2938'. [ 1969.706091][T16723] syzkaller1: entered promiscuous mode [ 1969.715312][T16723] syzkaller1: entered allmulticast mode [ 1970.445635][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1970.445999][ T29] audit: type=1326 audit(1970.340:4488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16734 comm="syz.5.2948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1970.452232][ T29] audit: type=1326 audit(1970.350:4489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16734 comm="syz.5.2948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1970.452717][ T29] audit: type=1326 audit(1970.350:4490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16734 comm="syz.5.2948" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1970.465703][ T29] audit: type=1326 audit(1970.370:4491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16734 comm="syz.5.2948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1970.476762][ T29] audit: type=1326 audit(1970.370:4492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16734 comm="syz.5.2948" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1970.477177][ T29] audit: type=1326 audit(1970.380:4493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16734 comm="syz.5.2948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1970.479604][ T29] audit: type=1326 audit(1970.380:4494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16734 comm="syz.5.2948" exe="/syz-executor" sig=0 arch=40000028 syscall=264 compat=0 ip=0x132970 code=0x7ffc0000 [ 1970.481157][ T29] audit: type=1326 audit(1970.380:4495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16734 comm="syz.5.2948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1970.488198][ T29] audit: type=1326 audit(1970.390:4496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16734 comm="syz.5.2948" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1971.065475][T16745] veth0_to_bridge: entered promiscuous mode [ 1971.258215][T16745] veth0_to_team: entered promiscuous mode [ 1971.266956][T16744] veth0_to_bridge: left promiscuous mode [ 1971.415330][T16750] netlink: 'syz.5.2952': attribute type 4 has an invalid length. [ 1971.441344][T16750] netlink: 'syz.5.2952': attribute type 4 has an invalid length. [ 1971.661121][ T29] audit: type=1326 audit(1971.560:4497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16756 comm="syz.5.2955" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1975.857927][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 1975.859121][ T29] audit: type=1326 audit(1975.760:4506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16767 comm="syz.2.2958" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x0 [ 1976.948549][T16769] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2958'. [ 1979.877493][ T29] audit: type=1326 audit(1979.780:4507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16785 comm="syz.2.2964" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1979.880010][ T29] audit: type=1326 audit(1979.780:4508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16785 comm="syz.2.2964" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 1979.883230][ T29] audit: type=1326 audit(1979.780:4509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16785 comm="syz.2.2964" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1979.885994][ T29] audit: type=1326 audit(1979.790:4510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16785 comm="syz.2.2964" exe="/syz-executor" sig=0 arch=40000028 syscall=316 compat=0 ip=0x132970 code=0x7ffc0000 [ 1979.888657][ T29] audit: type=1326 audit(1979.790:4511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16785 comm="syz.2.2964" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1979.889878][ T29] audit: type=1326 audit(1979.790:4512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16785 comm="syz.2.2964" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1987.967382][T16812] pim6reg: entered allmulticast mode [ 1988.009675][ T29] audit: type=1326 audit(1987.910:4513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16811 comm="syz.2.2972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1988.025431][ T29] audit: type=1326 audit(1987.910:4514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16811 comm="syz.2.2972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1988.025853][ T29] audit: type=1326 audit(1987.920:4515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16811 comm="syz.2.2972" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1988.026077][ T29] audit: type=1326 audit(1987.920:4516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16811 comm="syz.2.2972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1988.026154][ T29] audit: type=1326 audit(1987.920:4517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16811 comm="syz.2.2972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1988.026204][ T29] audit: type=1326 audit(1987.920:4518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16811 comm="syz.2.2972" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 1988.026252][ T29] audit: type=1326 audit(1987.920:4519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16811 comm="syz.2.2972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1988.029489][ T29] audit: type=1326 audit(1987.930:4520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16811 comm="syz.2.2972" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=0 ip=0x132970 code=0x7ffc0000 [ 1988.031236][ T29] audit: type=1326 audit(1987.930:4521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16811 comm="syz.2.2972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1988.039558][ T29] audit: type=1326 audit(1987.940:4522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16811 comm="syz.2.2972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1988.530669][T16819] netlink: 4776 bytes leftover after parsing attributes in process `syz.2.2974'. [ 1989.877393][T16824] GUP no longer grows the stack in syz.2.2976 (16824): 20004000-2000a000 (20002000) [ 1989.878063][T16824] CPU: 1 UID: 0 PID: 16824 Comm: syz.2.2976 Not tainted syzkaller #0 PREEMPT [ 1989.878178][T16824] Hardware name: ARM-Versatile Express [ 1989.878215][T16824] Call trace: [ 1989.878265][T16824] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1989.878399][T16824] r7:eaab1db0 r6:84a46784 r5:60000013 r4:82252424 [ 1989.878421][T16824] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 1989.878516][T16824] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 1989.878708][T16824] r5:00000000 r4:20002000 [ 1989.878754][T16824] [<8021f8bc>] (dump_stack) from [<804c00f4>] (gup_vma_lookup+0xb4/0xb8) [ 1989.878881][T16824] [<804c0040>] (gup_vma_lookup) from [<804c1d5c>] (__get_user_pages+0xfc/0x6e4) [ 1989.878965][T16824] r4:00050082 [ 1989.879069][T16824] [<804c1c60>] (__get_user_pages) from [<804c2464>] (get_user_pages_remote+0x120/0x58c) [ 1989.879205][T16824] r10:00050082 r9:eaab1e20 r8:20002000 r7:84a46700 r6:84a46784 r5:eaab1db0 [ 1989.879236][T16824] r4:ded2cdbc [ 1989.879284][T16824] [<804c2344>] (get_user_pages_remote) from [<804ca670>] (__access_remote_vm+0x158/0x428) [ 1989.879454][T16824] r10:00000d00 r9:82a78528 r8:ded2cdbc r7:00000000 r6:20002000 r5:00000300 [ 1989.879486][T16824] r4:ded2cdbc [ 1989.879540][T16824] [<804ca518>] (__access_remote_vm) from [<804d4774>] (access_remote_vm+0x1c/0x24) [ 1989.879729][T16824] r10:00000000 r9:20002480 r8:0000100a r7:86ff0000 r6:20001300 r5:eaab1f88 [ 1989.879761][T16824] r4:84a46700 [ 1989.879862][T16824] [<804d4758>] (access_remote_vm) from [<80617444>] (proc_pid_cmdline_read+0x268/0x478) [ 1989.879939][T16824] [<806171dc>] (proc_pid_cmdline_read) from [<8055d900>] (vfs_readv+0x224/0x290) [ 1989.880078][T16824] r10:00000169 r9:00000001 r8:00000001 r7:eaab1f88 r6:859d8480 r5:806171dc [ 1989.880130][T16824] r4:00000000 [ 1989.880151][T16824] [<8055d6dc>] (vfs_readv) from [<8055db44>] (do_preadv+0x90/0xf0) [ 1989.880238][T16824] r9:8713b000 r8:8020029c r7:20000040 r6:00000001 r5:859d8480 r4:859d8481 [ 1989.880285][T16824] [<8055dab4>] (do_preadv) from [<805602b0>] (sys_preadv+0x20/0x28) [ 1989.880421][T16824] r7:00000169 r6:00316310 r5:00000000 r4:00000000 [ 1989.880492][T16824] [<80560290>] (sys_preadv) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1989.880572][T16824] Exception stack(0xeaab1fa8 to 0xeaab1ff0) [ 1989.880624][T16824] 1fa0: 00000000 00000000 00000004 20000040 00000001 00000300 [ 1989.880703][T16824] 1fc0: 00000000 00000000 00316310 00000169 00300000 00000000 00006364 76f940bc [ 1989.880749][T16824] 1fe0: 76f93ec0 76f93eb0 0001928c 00132970 [ 1992.198798][T16835] netlink: 76 bytes leftover after parsing attributes in process `syz.2.2979'. [ 2001.459268][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 2001.459685][ T29] audit: type=1326 audit(2001.360:4541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16874 comm="syz.2.2991" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2001.477491][ T29] audit: type=1326 audit(2001.370:4542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16874 comm="syz.2.2991" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2001.479136][ T29] audit: type=1326 audit(2001.380:4543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16874 comm="syz.2.2991" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2001.480662][ T29] audit: type=1326 audit(2001.380:4544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16874 comm="syz.2.2991" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2001.482981][ T29] audit: type=1326 audit(2001.380:4545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16874 comm="syz.2.2991" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2001.485970][ T29] audit: type=1326 audit(2001.390:4546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16874 comm="syz.2.2991" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2001.488425][ T29] audit: type=1326 audit(2001.390:4547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16874 comm="syz.2.2991" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2001.492847][ T29] audit: type=1326 audit(2001.390:4548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16874 comm="syz.2.2991" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2001.504899][ T29] audit: type=1326 audit(2001.400:4549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16874 comm="syz.2.2991" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2001.505334][ T29] audit: type=1326 audit(2001.400:4550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16874 comm="syz.2.2991" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2002.184988][T16881] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2993'. [ 2002.579218][T16881] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2993'. [ 2002.967005][T16885] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2993'. [ 2003.328801][T16881] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2993'. [ 2003.435271][T16885] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2993'. [ 2004.192104][T16885] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2993'. [ 2004.711197][T16892] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2994'. [ 2007.719998][T12912] dvmrp6 (unregistering): left allmulticast mode [ 2007.803249][T12912] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2007.811504][T12912] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2007.816120][T12912] bond0 (unregistering): Released all slaves [ 2007.837772][T12912] bond1 (unregistering): Released all slaves [ 2007.860974][T12912] bond2 (unregistering): Released all slaves [ 2008.115772][T12912] hsr_slave_0: left promiscuous mode [ 2008.125597][T12912] pim6reg (unregistering): left allmulticast mode [ 2014.718581][T16916] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2014.728577][T16916] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2018.947231][T16916] hsr_slave_0: entered promiscuous mode [ 2018.948775][T16916] hsr_slave_1: entered promiscuous mode [ 2018.949724][T16916] debugfs: 'hsr0' already exists in 'hsr' [ 2018.949908][T16916] Cannot create hsr debugfs directory [ 2020.865065][T16916] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2020.885794][T16916] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2020.898055][T16916] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2020.927304][T16916] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2023.850085][T16916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2024.492206][T17133] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2024.600094][T17133] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2028.657105][T17133] hsr_slave_0: entered promiscuous mode [ 2028.659265][T17133] hsr_slave_1: entered promiscuous mode [ 2028.659993][T17133] debugfs: 'hsr0' already exists in 'hsr' [ 2028.660103][T17133] Cannot create hsr debugfs directory [ 2030.242815][T17133] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 2030.319191][T17133] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 2030.465377][T17133] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 2030.559819][T17133] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 2034.036619][T17133] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2036.650385][T16916] veth0_vlan: entered promiscuous mode [ 2036.942133][T16916] veth1_vlan: entered promiscuous mode [ 2037.367705][T16916] veth0_macvtap: entered promiscuous mode [ 2037.438779][T16916] veth1_macvtap: entered promiscuous mode [ 2037.752023][T12909] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2037.756197][T12902] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2037.785194][T12902] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2037.864755][T16933] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2038.987816][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 2038.988175][ T29] audit: type=1326 audit(2038.870:4554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17676 comm="syz.2.3000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2038.988437][ T29] audit: type=1326 audit(2038.880:4555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17676 comm="syz.2.3000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2038.988516][ T29] audit: type=1326 audit(2038.880:4556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17676 comm="syz.2.3000" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2038.988574][ T29] audit: type=1326 audit(2038.890:4557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17676 comm="syz.2.3000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2038.997787][ T29] audit: type=1326 audit(2038.890:4558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17676 comm="syz.2.3000" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2039.025482][ T29] audit: type=1326 audit(2038.900:4559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17676 comm="syz.2.3000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2039.026003][ T29] audit: type=1326 audit(2038.920:4560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17676 comm="syz.2.3000" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2039.026768][ T29] audit: type=1326 audit(2038.920:4561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17676 comm="syz.2.3000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2039.026861][ T29] audit: type=1326 audit(2038.920:4562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17676 comm="syz.2.3000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2039.026925][ T29] audit: type=1326 audit(2038.920:4563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17676 comm="syz.2.3000" exe="/syz-executor" sig=0 arch=40000028 syscall=250 compat=0 ip=0x132970 code=0x7ffc0000 [ 2042.457134][T12398] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2042.619089][T12398] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2042.798613][T12398] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2042.957623][T12398] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2043.629341][T17719] IPv6: Can't replace route, no match found [ 2043.836028][T12398] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2043.856538][T12398] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2043.862529][T12398] bond0 (unregistering): Released all slaves [ 2044.176254][T12398] hsr_slave_0: left promiscuous mode [ 2044.195455][T12398] hsr_slave_1: left promiscuous mode [ 2044.222230][T12398] veth1_macvtap: left promiscuous mode [ 2044.223569][T12398] veth0_macvtap: left promiscuous mode [ 2044.225458][T12398] veth1_vlan: left promiscuous mode [ 2044.226955][T12398] veth0_vlan: left promiscuous mode [ 2049.442417][T17133] veth0_vlan: entered promiscuous mode [ 2049.476147][T17133] veth1_vlan: entered promiscuous mode [ 2049.842868][T17133] veth0_macvtap: entered promiscuous mode [ 2049.899714][T17133] veth1_macvtap: entered promiscuous mode [ 2050.458056][T16933] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2050.458754][T16933] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2050.459102][T16933] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2050.459410][T16933] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2050.772817][T16933] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2050.889661][T16933] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2051.036822][T16933] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2051.197367][T16933] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2052.310106][T16933] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2052.327437][T16933] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2052.335549][T16933] bond0 (unregistering): Released all slaves [ 2052.490786][T16933] hsr_slave_0: left promiscuous mode [ 2052.515520][T16933] hsr_slave_1: left promiscuous mode [ 2052.535695][T16933] veth1_macvtap: left promiscuous mode [ 2052.537391][T16933] veth0_macvtap: left promiscuous mode [ 2052.538609][T16933] veth1_vlan: left promiscuous mode [ 2052.545922][T16933] veth0_vlan: left promiscuous mode [ 2052.613449][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 2052.626445][ T29] audit: type=1400 audit(2052.510:4571): avc: denied { bind } for pid=17787 comm="syz.6.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2058.363616][ T29] audit: type=1326 audit(2058.240:4572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17814 comm="syz.6.3015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2058.364085][ T29] audit: type=1326 audit(2058.250:4573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17814 comm="syz.6.3015" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2058.391148][ T29] audit: type=1326 audit(2058.290:4574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17814 comm="syz.6.3015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2058.392425][ T29] audit: type=1326 audit(2058.290:4575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17814 comm="syz.6.3015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2058.401608][ T29] audit: type=1326 audit(2058.300:4576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17814 comm="syz.6.3015" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2058.404202][ T29] audit: type=1326 audit(2058.300:4577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17814 comm="syz.6.3015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2058.406105][ T29] audit: type=1326 audit(2058.310:4578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17814 comm="syz.6.3015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2058.409842][ T29] audit: type=1326 audit(2058.310:4579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17814 comm="syz.6.3015" exe="/syz-executor" sig=0 arch=40000028 syscall=225 compat=0 ip=0x132970 code=0x7ffc0000 [ 2058.413331][ T29] audit: type=1326 audit(2058.310:4580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17814 comm="syz.6.3015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2058.413911][ T29] audit: type=1326 audit(2058.310:4581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17814 comm="syz.6.3015" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2072.915723][ T30] INFO: task kworker/1:33:13564 blocked for more than 430 seconds. [ 2072.920571][ T30] Not tainted syzkaller #0 [ 2072.921454][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2072.922675][ T30] task:kworker/1:33 state:D stack:0 pid:13564 tgid:13564 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2072.949079][ T30] Workqueue: events bpf_prog_free_deferred [ 2072.975717][ T29] audit: type=1400 audit(2072.860:4582): avc: denied { write } for pid=3093 comm="syz-executor" path="pipe:[481]" dev="pipefs" ino=481 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2072.985828][ T30] Call trace: [ 2072.986598][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2072.986939][ T30] r10:ea3b1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea3b1d8c r5:8490d400 [ 2072.987159][ T30] r4:8490d400 [ 2072.987337][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2072.987633][ T30] r5:8490d400 r4:8291719c [ 2072.987802][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2072.988078][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2072.988412][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea3b1e08 [ 2072.988607][ T30] r4:00000000 [ 2072.988793][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2072.989047][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2072.989294][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2072.989596][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c302c0 [ 2072.989899][ T30] r4:00000000 [ 2072.990093][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2072.990478][ T30] r9:83018605 r8:8490d400 r7:00000000 r6:83018600 r5:00001000 r4:7f266000 [ 2072.990801][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2072.991171][ T30] r5:00001000 r4:dfff5000 [ 2072.991521][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2072.991778][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2072.992110][ T30] r5:8675a38c r4:85437000 [ 2072.992311][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2072.992606][ T30] r7:ddde3d80 r6:83018600 r5:8675a38c r4:85437000 [ 2072.992853][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2072.993253][ T30] r10:61c88647 r9:8490d400 r8:8543702c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2072.993506][ T30] r4:85437000 [ 2072.993852][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.010301][ T30] r10:00000000 r9:85437000 r8:80278fec r7:ea345e60 r6:84f6ca00 r5:8490d400 [ 2073.010388][ T30] r4:00000001 [ 2073.010412][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.010550][ T30] Exception stack(0xea3b1fb0 to 0xea3b1ff8) [ 2073.010599][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.010642][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.010679][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.010723][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.010757][ T30] r4:867b7100 [ 2073.011785][ T30] INFO: task kworker/1:33:13564 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.012006][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.012216][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.012291][ T30] Call trace: [ 2073.012319][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.012407][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.012449][ T30] r4:00000000 [ 2073.012468][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.012585][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.012696][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.012755][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.012784][ T30] 1d60: 80010113 ffffffff [ 2073.012848][ T30] r5:80010113 r4:80239c10 [ 2073.012928][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.013010][ T30] r4:82acb1e4 [ 2073.013031][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.013111][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.013134][ T30] r4:ea881dc0 [ 2073.013180][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.013308][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.013333][ T30] r4:00000000 [ 2073.013354][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.013428][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.013447][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.013510][ T30] r5:00001000 r4:ea70e000 [ 2073.013526][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.013612][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.013726][ T30] r5:8410378c r4:8601a700 [ 2073.013757][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.013834][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.013855][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.013940][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.013963][ T30] r4:8601a700 [ 2073.014010][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.014097][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.014120][ T30] r4:00000001 [ 2073.014174][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.035633][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.035783][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.035836][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.035873][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.035928][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.035955][ T30] r4:85d145c0 [ 2073.036645][ T30] INFO: task kworker/1:37:13569 blocked for more than 430 seconds. [ 2073.036720][ T30] Not tainted syzkaller #0 [ 2073.036783][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.036806][ T30] task:kworker/1:37 state:D stack:0 pid:13569 tgid:13569 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.036903][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.037002][ T30] Call trace: [ 2073.037041][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.037134][ T30] r10:ea3f5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea3f5d8c r5:83b58000 [ 2073.037179][ T30] r4:83b58000 [ 2073.037202][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.037269][ T30] r5:83b58000 r4:8291719c [ 2073.037289][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.037386][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.037476][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea3f5e08 [ 2073.037521][ T30] r4:00000000 [ 2073.037545][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.037616][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.037683][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.037766][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86216680 [ 2073.037810][ T30] r4:00000000 [ 2073.037832][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.037914][ T30] r9:83018605 r8:83b58000 r7:00000000 r6:83018600 r5:00001000 r4:7f25e000 [ 2073.037935][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.038000][ T30] r5:00001000 r4:dff3c000 [ 2073.038020][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.038081][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.038149][ T30] r5:8675838c r4:85437300 [ 2073.038168][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.038254][ T30] r7:ddde3d80 r6:83018600 r5:8675838c r4:85437300 [ 2073.038369][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.038460][ T30] r10:61c88647 r9:83b58000 r8:8543732c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.038548][ T30] r4:85437300 [ 2073.038587][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.038675][ T30] r10:00000000 r9:85437300 r8:80278fec r7:ea3b1e60 r6:84f6cb80 r5:83b58000 [ 2073.038699][ T30] r4:00000001 [ 2073.038716][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.038785][ T30] Exception stack(0xea3f5fb0 to 0xea3f5ff8) [ 2073.038845][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 2073.038939][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.038981][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.039029][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.039121][ T30] r4:867b7a80 [ 2073.039718][ T30] INFO: task kworker/1:37:13569 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.039848][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.040080][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.040148][ T30] Call trace: [ 2073.040179][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.040285][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.040315][ T30] r4:00000000 [ 2073.040335][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.040401][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.040446][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.040486][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.040534][ T30] 1d60: 80010113 ffffffff [ 2073.040569][ T30] r5:80010113 r4:80239c10 [ 2073.040658][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.040738][ T30] r4:82acb1e4 [ 2073.040784][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.040867][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.040934][ T30] r4:ea881dc0 [ 2073.040957][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.041031][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.041051][ T30] r4:00000000 [ 2073.041090][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.041174][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.041194][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.041258][ T30] r5:00001000 r4:ea70e000 [ 2073.041276][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.041330][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.041399][ T30] r5:8410378c r4:8601a700 [ 2073.041418][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.041524][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.041543][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.041648][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.041682][ T30] r4:8601a700 [ 2073.041697][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.041802][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.041835][ T30] r4:00000001 [ 2073.041852][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.041900][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.041936][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.041979][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.042027][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.042073][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.042097][ T30] r4:85d145c0 [ 2073.042183][ T30] INFO: task kworker/1:39:13589 blocked for more than 430 seconds. [ 2073.042233][ T30] Not tainted syzkaller #0 [ 2073.042259][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.042278][ T30] task:kworker/1:39 state:D stack:0 pid:13589 tgid:13589 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.042367][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.042511][ T30] Call trace: [ 2073.042548][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.042633][ T30] r10:ea581d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea581d8c r5:8490e000 [ 2073.042657][ T30] r4:8490e000 [ 2073.042674][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.042741][ T30] r5:8490e000 r4:8291719c [ 2073.042770][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.042832][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.042917][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea581e08 [ 2073.042940][ T30] r4:00000000 [ 2073.042984][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.043125][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.043189][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.043262][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86216380 [ 2073.043352][ T30] r4:00000000 [ 2073.043403][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.043485][ T30] r9:83018605 r8:8490e000 r7:00000000 r6:83018600 r5:00001000 r4:7f25a000 [ 2073.043507][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.043598][ T30] r5:00001000 r4:dfc11000 [ 2073.043639][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.043704][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.043776][ T30] r5:8675978c r4:85437f00 [ 2073.043795][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.043867][ T30] r7:ddde3d80 r6:83018600 r5:8675978c r4:85437f00 [ 2073.043884][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.044002][ T30] r10:61c88647 r9:8490e000 r8:85437f2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.044030][ T30] r4:85437f00 [ 2073.044048][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.044125][ T30] r10:00000000 r9:85437f00 r8:80278fec r7:ea3f5e60 r6:84f6ce00 r5:8490e000 [ 2073.044146][ T30] r4:00000001 [ 2073.044160][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.070165][ T30] Exception stack(0xea581fb0 to 0xea581ff8) [ 2073.070296][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.070338][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.070378][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.070430][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.070454][ T30] r4:85955c40 [ 2073.071042][ T30] INFO: task kworker/1:39:13589 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.071099][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.071280][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.071445][ T30] Call trace: [ 2073.071517][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.071619][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.071645][ T30] r4:00000000 [ 2073.071665][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.071729][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.071783][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.071826][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.072116][ T30] 1d60: 80010113 ffffffff [ 2073.072163][ T30] r5:80010113 r4:80239c10 [ 2073.072184][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.072256][ T30] r4:82acb1e4 [ 2073.072275][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.072341][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.072364][ T30] r4:ea881dc0 [ 2073.072483][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.072608][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.072634][ T30] r4:00000000 [ 2073.072649][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.072720][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.072819][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.072904][ T30] r5:00001000 r4:ea70e000 [ 2073.072923][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.072980][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.073109][ T30] r5:8410378c r4:8601a700 [ 2073.073136][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.073288][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.073313][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.073393][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.073417][ T30] r4:8601a700 [ 2073.073434][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.073509][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.073596][ T30] r4:00000001 [ 2073.073616][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.073674][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.073709][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.073962][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.074142][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.074232][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.095435][ T30] r4:85d145c0 [ 2073.095536][ T30] INFO: task kworker/1:40:13590 blocked for more than 430 seconds. [ 2073.095597][ T30] Not tainted syzkaller #0 [ 2073.095625][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.095645][ T30] task:kworker/1:40 state:D stack:0 pid:13590 tgid:13590 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.095739][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.095844][ T30] Call trace: [ 2073.095927][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.096030][ T30] r10:ea559d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea559d8c r5:8490bc00 [ 2073.096055][ T30] r4:8490bc00 [ 2073.096074][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.096144][ T30] r5:8490bc00 r4:8291719c [ 2073.096164][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.096226][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.096307][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea559e08 [ 2073.096396][ T30] r4:00000000 [ 2073.096423][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.096492][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.096559][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.096635][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:867b7fc0 [ 2073.096660][ T30] r4:00000000 [ 2073.096715][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.096814][ T30] r9:83018605 r8:8490bc00 r7:00000000 r6:83018600 r5:00001000 r4:7f236000 [ 2073.096837][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.096943][ T30] r5:00001000 r4:dfa1b000 [ 2073.096967][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.097037][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.097132][ T30] r5:8548d38c r4:85437e00 [ 2073.097158][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.097257][ T30] r7:ddde3d80 r6:83018600 r5:8548d38c r4:85437e00 [ 2073.097299][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.097390][ T30] r10:61c88647 r9:8490bc00 r8:85437e2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.097414][ T30] r4:85437e00 [ 2073.097466][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.097553][ T30] r10:00000000 r9:85437e00 r8:80278fec r7:ea581e60 r6:84f6ce80 r5:8490bc00 [ 2073.097577][ T30] r4:00000001 [ 2073.097665][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.097759][ T30] Exception stack(0xea559fb0 to 0xea559ff8) [ 2073.097803][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 2073.097845][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.097896][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.097941][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.097963][ T30] r4:85955c40 [ 2073.098477][ T30] INFO: task kworker/1:40:13590 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.098560][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.098650][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.098737][ T30] Call trace: [ 2073.098878][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.098968][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.098991][ T30] r4:00000000 [ 2073.099010][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.099127][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.099177][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.099218][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.099246][ T30] 1d60: 80010113 ffffffff [ 2073.099274][ T30] r5:80010113 r4:80239c10 [ 2073.099292][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.099360][ T30] r4:82acb1e4 [ 2073.099379][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.099454][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.099509][ T30] r4:ea881dc0 [ 2073.099548][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.099689][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.099720][ T30] r4:00000000 [ 2073.099740][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.099865][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.099893][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.099985][ T30] r5:00001000 r4:ea70e000 [ 2073.100014][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.100130][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.100213][ T30] r5:8410378c r4:8601a700 [ 2073.100234][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.100317][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.100334][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.100416][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.100439][ T30] r4:8601a700 [ 2073.100456][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.100540][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.100584][ T30] r4:00000001 [ 2073.100605][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.100667][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.100704][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.100796][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.100865][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.100912][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.100936][ T30] r4:85d145c0 [ 2073.100969][ T30] INFO: task kworker/1:43:13593 blocked for more than 430 seconds. [ 2073.101013][ T30] Not tainted syzkaller #0 [ 2073.101039][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.101083][ T30] task:kworker/1:43 state:D stack:0 pid:13593 tgid:13593 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.101192][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.101250][ T30] Call trace: [ 2073.101535][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.101625][ T30] r10:ea549d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea549d8c r5:83b1c800 [ 2073.101649][ T30] r4:83b1c800 [ 2073.101684][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.101766][ T30] r5:83b1c800 r4:8291719c [ 2073.101861][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.101929][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.102011][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea549e08 [ 2073.102034][ T30] r4:00000000 [ 2073.102051][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.102135][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.102210][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.102290][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ee400 [ 2073.102440][ T30] r4:00000000 [ 2073.102475][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.102961][ T30] r9:83018605 r8:83b1c800 r7:00000000 r6:83018600 r5:00001000 r4:7f254000 [ 2073.103084][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.103164][ T30] r5:00001000 r4:dfbe3000 [ 2073.103183][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.103243][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.103517][ T30] r5:8675bf8c r4:85437f80 [ 2073.103729][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.103822][ T30] r7:ddde3d80 r6:83018600 r5:8675bf8c r4:85437f80 [ 2073.103950][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.104045][ T30] r10:61c88647 r9:83b1c800 r8:85437fac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.104071][ T30] r4:85437f80 [ 2073.104088][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.104164][ T30] r10:00000000 r9:85437f80 r8:80278fec r7:ea559e60 r6:84f6cf80 r5:83b1c800 [ 2073.104222][ T30] r4:00000001 [ 2073.166974][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.167160][ T30] Exception stack(0xea549fb0 to 0xea549ff8) [ 2073.167210][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 2073.167257][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.167295][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.167344][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.167371][ T30] r4:85a06680 [ 2073.167948][ T30] INFO: task kworker/1:43:13593 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.168433][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.168611][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.168686][ T30] Call trace: [ 2073.168727][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.168830][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.169349][ T30] r4:00000000 [ 2073.169375][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.169437][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.169483][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.169528][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.169556][ T30] 1d60: 80010113 ffffffff [ 2073.169676][ T30] r5:80010113 r4:80239c10 [ 2073.169701][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.170152][ T30] r4:82acb1e4 [ 2073.170188][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.170267][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.170288][ T30] r4:ea881dc0 [ 2073.170475][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.170580][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.170642][ T30] r4:00000000 [ 2073.170969][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.171059][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.171081][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.171318][ T30] r5:00001000 r4:ea70e000 [ 2073.171498][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.171569][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.171812][ T30] r5:8410378c r4:8601a700 [ 2073.171934][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.172026][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.172245][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.172333][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.172457][ T30] r4:8601a700 [ 2073.172574][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.172696][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.172753][ T30] r4:00000001 [ 2073.172943][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.173074][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.173117][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.173210][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.173257][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.173302][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.173408][ T30] r4:85d145c0 [ 2073.210445][ T30] INFO: task kworker/0:42:13594 blocked for more than 430 seconds. [ 2073.210627][ T30] Not tainted syzkaller #0 [ 2073.210658][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.210678][ T30] task:kworker/0:42 state:D stack:0 pid:13594 tgid:13594 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.210817][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.210915][ T30] Call trace: [ 2073.210951][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.211075][ T30] r10:ea5a9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea5a9d8c r5:861c6c00 [ 2073.211182][ T30] r4:861c6c00 [ 2073.211343][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.211450][ T30] r5:861c6c00 r4:8291719c [ 2073.211477][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.211544][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.211628][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea5a9e08 [ 2073.211756][ T30] r4:00000000 [ 2073.211862][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.211934][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.212002][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.212104][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8613ff40 [ 2073.212142][ T30] r4:00000000 [ 2073.212220][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.212474][ T30] r9:83018405 r8:861c6c00 r7:00000000 r6:83018400 r5:00001000 r4:7f230000 [ 2073.212529][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.212603][ T30] r5:00001000 r4:dfb3b000 [ 2073.212879][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.213083][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.213216][ T30] r5:8548ff8c r4:84f6cf00 [ 2073.213458][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.213591][ T30] r7:dddcfd80 r6:83018400 r5:8548ff8c r4:84f6cf00 [ 2073.213611][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.213739][ T30] r10:61c88647 r9:861c6c00 r8:84f6cf2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.213818][ T30] r4:84f6cf00 [ 2073.213987][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.214155][ T30] r10:00000000 r9:84f6cf00 r8:80278fec r7:e826de60 r6:85437780 r5:861c6c00 [ 2073.214181][ T30] r4:00000001 [ 2073.214274][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.245850][ T30] Exception stack(0xea5a9fb0 to 0xea5a9ff8) [ 2073.246242][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 2073.246308][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.246355][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.246409][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.246435][ T30] r4:85452c80 [ 2073.247035][ T30] INFO: task kworker/0:42:13594 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.247091][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.247243][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.247409][ T30] Call trace: [ 2073.247470][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.247572][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.247597][ T30] r4:00000000 [ 2073.247652][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.247723][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.247816][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.247958][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.247993][ T30] 1d60: 80010113 ffffffff [ 2073.248026][ T30] r5:80010113 r4:80239c10 [ 2073.248069][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.248149][ T30] r4:82acb1e4 [ 2073.248169][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.248283][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.248312][ T30] r4:ea881dc0 [ 2073.248333][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.248411][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.248433][ T30] r4:00000000 [ 2073.248450][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.248529][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.248549][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.248627][ T30] r5:00001000 r4:ea70e000 [ 2073.248648][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.248714][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.248796][ T30] r5:8410378c r4:8601a700 [ 2073.248815][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.248898][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.248919][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.249044][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.249165][ T30] r4:8601a700 [ 2073.249201][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.249289][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.249313][ T30] r4:00000001 [ 2073.249330][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.249384][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.249422][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.249464][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.249501][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.249571][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.249602][ T30] r4:85d145c0 [ 2073.249680][ T30] INFO: task kworker/1:52:13600 blocked for more than 430 seconds. [ 2073.249735][ T30] Not tainted syzkaller #0 [ 2073.249772][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.249832][ T30] task:kworker/1:52 state:D stack:0 pid:13600 tgid:13600 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.249907][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.249959][ T30] Call trace: [ 2073.249990][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.250110][ T30] r10:ea63dd84 r9:00000002 r8:60000013 r7:829171a0 r6:ea63dd8c r5:861c5400 [ 2073.250138][ T30] r4:861c5400 [ 2073.250159][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.250269][ T30] r5:861c5400 r4:8291719c [ 2073.250353][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.250427][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.250535][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea63de08 [ 2073.250560][ T30] r4:00000000 [ 2073.250578][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.250641][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.250700][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.250786][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8613f780 [ 2073.250810][ T30] r4:00000000 [ 2073.250826][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.250977][ T30] r9:83018605 r8:861c5400 r7:00000000 r6:83018600 r5:00001000 r4:7f252000 [ 2073.251046][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.251122][ T30] r5:00001000 r4:dfb9d000 [ 2073.251142][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.251205][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.251312][ T30] r5:86758b8c r4:85437b00 [ 2073.251337][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.251421][ T30] r7:ddde3d80 r6:83018600 r5:86758b8c r4:85437b00 [ 2073.251440][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.251521][ T30] r10:61c88647 r9:861c5400 r8:85437b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.251586][ T30] r4:85437b00 [ 2073.251611][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.251697][ T30] r10:00000000 r9:85437b00 r8:80278fec r7:ea549e60 r6:85437b80 r5:861c5400 [ 2073.251721][ T30] r4:00000001 [ 2073.251763][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.251860][ T30] Exception stack(0xea63dfb0 to 0xea63dff8) [ 2073.251955][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 2073.252002][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.252041][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.252128][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.252155][ T30] r4:85986680 [ 2073.252538][ T30] INFO: task kworker/1:52:13600 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.252577][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.252799][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.252960][ T30] Call trace: [ 2073.253109][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.253207][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.253272][ T30] r4:00000000 [ 2073.253295][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.253372][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.253417][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.253457][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.253483][ T30] 1d60: 80010113 ffffffff [ 2073.253511][ T30] r5:80010113 r4:80239c10 [ 2073.253529][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.253657][ T30] r4:82acb1e4 [ 2073.253717][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.253809][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.253833][ T30] r4:ea881dc0 [ 2073.253850][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.253948][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.253975][ T30] r4:00000000 [ 2073.254016][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.254094][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.254114][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.254273][ T30] r5:00001000 r4:ea70e000 [ 2073.286043][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.286388][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.286591][ T30] r5:8410378c r4:8601a700 [ 2073.286658][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.286838][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.286868][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.287025][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.287096][ T30] r4:8601a700 [ 2073.287171][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.287349][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.287383][ T30] r4:00000001 [ 2073.287402][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.287491][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.287540][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.287576][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.287612][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.287652][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.287674][ T30] r4:85d145c0 [ 2073.287731][ T30] INFO: task kworker/1:56:13634 blocked for more than 430 seconds. [ 2073.287792][ T30] Not tainted syzkaller #0 [ 2073.287967][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.288010][ T30] task:kworker/1:56 state:D stack:0 pid:13634 tgid:13634 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.288914][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.290508][ T30] Call trace: [ 2073.291090][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.291209][ T30] r10:dfa05d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfa05d8c r5:861c2400 [ 2073.291234][ T30] r4:861c2400 [ 2073.291255][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.291328][ T30] r5:861c2400 r4:8291719c [ 2073.291376][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.291459][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.291549][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 [ 2073.291574][ T30] r4:00000000 [ 2073.291614][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.291683][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.291799][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.291887][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:867b7380 [ 2073.291912][ T30] r4:00000000 [ 2073.291931][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.292013][ T30] r9:83018605 r8:861c2400 r7:00000000 r6:83018600 r5:00001000 r4:7f23a000 [ 2073.292034][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.292103][ T30] r5:00001000 r4:dfa5b000 [ 2073.292148][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.292395][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.292480][ T30] r5:8675b78c r4:85437880 [ 2073.292567][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.292741][ T30] r7:ddde3d80 r6:83018600 r5:8675b78c r4:85437880 [ 2073.292861][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.293098][ T30] r10:61c88647 r9:861c2400 r8:854378ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.293133][ T30] r4:85437880 [ 2073.293151][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.293236][ T30] r10:00000000 r9:85437880 r8:80278fec r7:ea559e60 r6:8593c800 r5:861c2400 [ 2073.293259][ T30] r4:00000001 [ 2073.293273][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.293329][ T30] Exception stack(0xdfa05fb0 to 0xdfa05ff8) [ 2073.293448][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 2073.293499][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.293576][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.293620][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.293640][ T30] r4:86216200 [ 2073.326022][ T30] INFO: task kworker/1:56:13634 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.326165][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.326287][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.326429][ T30] Call trace: [ 2073.326467][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.326597][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.326623][ T30] r4:00000000 [ 2073.326643][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.326703][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.326757][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.326801][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.326830][ T30] 1d60: 80010113 ffffffff [ 2073.326860][ T30] r5:80010113 r4:80239c10 [ 2073.326879][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.326982][ T30] r4:82acb1e4 [ 2073.327007][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.327085][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.327106][ T30] r4:ea881dc0 [ 2073.327123][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.327197][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.327239][ T30] r4:00000000 [ 2073.327261][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.327340][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.327360][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.327426][ T30] r5:00001000 r4:ea70e000 [ 2073.327446][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.327507][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.327577][ T30] r5:8410378c r4:8601a700 [ 2073.327597][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.327676][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.327695][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.327820][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.327959][ T30] r4:8601a700 [ 2073.328006][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.328096][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.328120][ T30] r4:00000001 [ 2073.328140][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.328193][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.328229][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.328269][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.328328][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.328374][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.328396][ T30] r4:85d145c0 [ 2073.337085][ T30] INFO: task kworker/1:57:13635 blocked for more than 430 seconds. [ 2073.337229][ T30] Not tainted syzkaller #0 [ 2073.337262][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.337319][ T30] task:kworker/1:57 state:D stack:0 pid:13635 tgid:13635 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.337430][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.337529][ T30] Call trace: [ 2073.337636][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.337756][ T30] r10:dfab9d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfab9d8c r5:849d6000 [ 2073.337782][ T30] r4:849d6000 [ 2073.337800][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.337868][ T30] r5:849d6000 r4:8291719c [ 2073.337885][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.337974][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.338065][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 [ 2073.338088][ T30] r4:00000000 [ 2073.338221][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.338298][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.338365][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.338440][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ea0440 [ 2073.338465][ T30] r4:00000000 [ 2073.338483][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.338613][ T30] r9:83018605 r8:849d6000 r7:00000000 r6:83018600 r5:00001000 r4:7f23e000 [ 2073.338638][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.338708][ T30] r5:00001000 r4:dfb97000 [ 2073.338726][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.338839][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.338920][ T30] r5:8675878c r4:85437900 [ 2073.338939][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.339020][ T30] r7:ddde3d80 r6:83018600 r5:8675878c r4:85437900 [ 2073.339041][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.339123][ T30] r10:61c88647 r9:849d6000 r8:8543792c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.339148][ T30] r4:85437900 [ 2073.339167][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.339249][ T30] r10:00000000 r9:85437900 r8:80278fec r7:ea661e60 r6:84f6c980 r5:849d6000 [ 2073.339272][ T30] r4:00000001 [ 2073.339290][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.339348][ T30] Exception stack(0xdfab9fb0 to 0xdfab9ff8) [ 2073.339384][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 2073.339427][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.339462][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.339504][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.339526][ T30] r4:86216e40 [ 2073.340126][ T30] INFO: task kworker/1:57:13635 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.340210][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.340304][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.340365][ T30] Call trace: [ 2073.340396][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.340507][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.340538][ T30] r4:00000000 [ 2073.340554][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.340616][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.340659][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.340739][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.340790][ T30] 1d60: 80010113 ffffffff [ 2073.340818][ T30] r5:80010113 r4:80239c10 [ 2073.340838][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.340905][ T30] r4:82acb1e4 [ 2073.340923][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.341034][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.341063][ T30] r4:ea881dc0 [ 2073.341079][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.341157][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.341181][ T30] r4:00000000 [ 2073.341199][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.341274][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.341295][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.341361][ T30] r5:00001000 r4:ea70e000 [ 2073.341378][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.341537][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.341613][ T30] r5:8410378c r4:8601a700 [ 2073.341633][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.341855][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.341879][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.341987][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.342022][ T30] r4:8601a700 [ 2073.342039][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.342120][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.342143][ T30] r4:00000001 [ 2073.342194][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.342287][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.342353][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.342400][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.342628][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.342678][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.342703][ T30] r4:85d145c0 [ 2073.342741][ T30] INFO: task kworker/1:58:13684 blocked for more than 430 seconds. [ 2073.342793][ T30] Not tainted syzkaller #0 [ 2073.342818][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.342860][ T30] task:kworker/1:58 state:D stack:0 pid:13684 tgid:13684 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.342929][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.343116][ T30] Call trace: [ 2073.343254][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.343464][ T30] r10:e8229d84 r9:00000002 r8:60000013 r7:829171a0 r6:e8229d8c r5:859cbc00 [ 2073.343498][ T30] r4:859cbc00 [ 2073.343517][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.343621][ T30] r5:859cbc00 r4:8291719c [ 2073.343682][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.343753][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.343827][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8229e08 [ 2073.343847][ T30] r4:00000000 [ 2073.343903][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.343965][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.344019][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.344083][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:867b7b40 [ 2073.344133][ T30] r4:00000000 [ 2073.344245][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.369779][ T30] r9:83018605 r8:859cbc00 r7:00000000 r6:83018600 r5:00001000 r4:7f00f000 [ 2073.369860][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.370011][ T30] r5:00001000 r4:df98f000 [ 2073.370036][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.370137][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.370237][ T30] r5:8576538c r4:86890400 [ 2073.370263][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.370346][ T30] r7:ddde3d80 r6:83018600 r5:8576538c r4:86890400 [ 2073.370366][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.370450][ T30] r10:61c88647 r9:859cbc00 r8:8689042c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.370474][ T30] r4:86890400 [ 2073.370518][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.370600][ T30] r10:00000000 r9:86890400 r8:80278fec r7:ea661e60 r6:86890380 r5:859cbc00 [ 2073.370628][ T30] r4:00000001 [ 2073.370645][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.370705][ T30] Exception stack(0xe8229fb0 to 0xe8229ff8) [ 2073.370756][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 2073.370836][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.370880][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.371039][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.371072][ T30] r4:85d1d5c0 [ 2073.371633][ T30] INFO: task kworker/1:58:13684 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.371685][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.371850][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.371920][ T30] Call trace: [ 2073.372009][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.372144][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.372175][ T30] r4:00000000 [ 2073.372267][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.372350][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.372397][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.372451][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.372530][ T30] 1d60: 80010113 ffffffff [ 2073.372567][ T30] r5:80010113 r4:80239c10 [ 2073.372588][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.372700][ T30] r4:82acb1e4 [ 2073.372725][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.372879][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.372910][ T30] r4:ea881dc0 [ 2073.372970][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.373059][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.373081][ T30] r4:00000000 [ 2073.373100][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.373176][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.373259][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.373332][ T30] r5:00001000 r4:ea70e000 [ 2073.373350][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.373411][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.373482][ T30] r5:8410378c r4:8601a700 [ 2073.373541][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.373620][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.373638][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.373709][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.373762][ T30] r4:8601a700 [ 2073.373787][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.373892][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.373918][ T30] r4:00000001 [ 2073.373934][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.373989][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.374070][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.374252][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.385882][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.385998][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.386027][ T30] r4:85d145c0 [ 2073.386107][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2073.386238][ T30] INFO: task kworker/0:47:13685 blocked for more than 430 seconds. [ 2073.386321][ T30] Not tainted syzkaller #0 [ 2073.386369][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.386391][ T30] task:kworker/0:47 state:D stack:0 pid:13685 tgid:13685 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.386513][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.386647][ T30] Call trace: [ 2073.386681][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.386786][ T30] r10:e4191d84 r9:00000002 r8:60000013 r7:829171a0 r6:e4191d8c r5:84203000 [ 2073.386810][ T30] r4:84203000 [ 2073.386828][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.386893][ T30] r5:84203000 r4:8291719c [ 2073.386932][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.387005][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.387086][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4191e08 [ 2073.387109][ T30] r4:00000000 [ 2073.387127][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.387181][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.387258][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.387377][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ecb00 [ 2073.387411][ T30] r4:00000000 [ 2073.387431][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.387576][ T30] r9:83018405 r8:84203000 r7:00000000 r6:83018400 r5:00001000 r4:7f292000 [ 2073.387606][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.387680][ T30] r5:00001000 r4:ea7a7000 [ 2073.387701][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.387782][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.387855][ T30] r5:8694ab8c r4:8601a080 [ 2073.387873][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.387956][ T30] r7:dddcfd80 r6:83018400 r5:8694ab8c r4:8601a080 [ 2073.388003][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.388109][ T30] r10:61c88647 r9:84203000 r8:8601a0ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.388132][ T30] r4:8601a080 [ 2073.388148][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.388232][ T30] r10:00000000 r9:8601a080 r8:80278fec r7:ea6e9e60 r6:86890300 r5:84203000 [ 2073.388257][ T30] r4:00000001 [ 2073.388274][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.388334][ T30] Exception stack(0xe4191fb0 to 0xe4191ff8) [ 2073.388372][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.388414][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.388453][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.388497][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.388547][ T30] r4:867922c0 [ 2073.389108][ T30] INFO: task kworker/0:47:13685 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.389157][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.389268][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.389334][ T30] Call trace: [ 2073.389394][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.389495][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.389523][ T30] r4:00000000 [ 2073.389541][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.389606][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.389653][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.389696][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.389757][ T30] 1d60: 80010113 ffffffff [ 2073.389794][ T30] r5:80010113 r4:80239c10 [ 2073.389814][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.389884][ T30] r4:82acb1e4 [ 2073.389905][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.390010][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.390040][ T30] r4:ea881dc0 [ 2073.390059][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.390155][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.390181][ T30] r4:00000000 [ 2073.390199][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.390271][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.390293][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.390357][ T30] r5:00001000 r4:ea70e000 [ 2073.390375][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.390432][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.390536][ T30] r5:8410378c r4:8601a700 [ 2073.390627][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.390710][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.390729][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.390817][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.390840][ T30] r4:8601a700 [ 2073.390881][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.390963][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.390983][ T30] r4:00000001 [ 2073.390999][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.391050][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.391086][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.391125][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.391158][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.391214][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.391243][ T30] r4:85d145c0 [ 2073.391283][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2073.391347][ T30] INFO: task kworker/1:59:13690 blocked for more than 430 seconds. [ 2073.391399][ T30] Not tainted syzkaller #0 [ 2073.391425][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.391441][ T30] task:kworker/1:59 state:D stack:0 pid:13690 tgid:13690 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.391541][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.391599][ T30] Call trace: [ 2073.391632][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.391709][ T30] r10:e8205d84 r9:00000002 r8:60000113 r7:829171a0 r6:e8205d8c r5:8330c800 [ 2073.391733][ T30] r4:8330c800 [ 2073.391759][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.391823][ T30] r5:8330c800 r4:8291719c [ 2073.391841][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.391899][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.391975][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8205e08 [ 2073.391999][ T30] r4:00000000 [ 2073.392016][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.392140][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.392222][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.392324][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657980 [ 2073.392408][ T30] r4:00000000 [ 2073.392430][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.392538][ T30] r9:83018605 r8:8330c800 r7:00000000 r6:83018600 r5:00001000 r4:7f22c000 [ 2073.392559][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.392626][ T30] r5:00001000 r4:dfaed000 [ 2073.392670][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.392741][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.392820][ T30] r5:84e13f8c r4:86890480 [ 2073.392942][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.393028][ T30] r7:ddde3d80 r6:83018600 r5:84e13f8c r4:86890480 [ 2073.393047][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.393125][ T30] r10:61c88647 r9:8330c800 r8:868904ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.393144][ T30] r4:86890480 [ 2073.393186][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.393269][ T30] r10:00000000 r9:86890480 r8:80278fec r7:e8229e60 r6:86890500 r5:8330c800 [ 2073.393352][ T30] r4:00000001 [ 2073.393375][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.393429][ T30] Exception stack(0xe8205fb0 to 0xe8205ff8) [ 2073.393466][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 2073.393534][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.393591][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.393671][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.393719][ T30] r4:86164580 [ 2073.394078][ T30] INFO: task kworker/1:59:13690 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.394123][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.437943][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.438079][ T30] Call trace: [ 2073.438114][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.438218][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.438243][ T30] r4:00000000 [ 2073.438263][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.438322][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.438363][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.438405][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.438431][ T30] 1d60: 80010113 ffffffff [ 2073.438458][ T30] r5:80010113 r4:80239c10 [ 2073.438475][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.438568][ T30] r4:82acb1e4 [ 2073.438586][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.438662][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.438803][ T30] r4:ea881dc0 [ 2073.438836][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.438967][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.438991][ T30] r4:00000000 [ 2073.439010][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.439090][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.439112][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.439172][ T30] r5:00001000 r4:ea70e000 [ 2073.439192][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.439252][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.439320][ T30] r5:8410378c r4:8601a700 [ 2073.439337][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.439501][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.439565][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.439654][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.439676][ T30] r4:8601a700 [ 2073.439694][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.440652][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.440702][ T30] r4:00000001 [ 2073.440722][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.440807][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.440847][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.440888][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.440922][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.440962][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.441007][ T30] r4:85d145c0 [ 2073.441073][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2073.441118][ T30] INFO: task kworker/1:61:13697 blocked for more than 430 seconds. [ 2073.441168][ T30] Not tainted syzkaller #0 [ 2073.441194][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.441213][ T30] task:kworker/1:61 state:D stack:0 pid:13697 tgid:13697 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.441366][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.441478][ T30] Call trace: [ 2073.441543][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.441636][ T30] r10:ea855d84 r9:00000002 r8:60010013 r7:829171a0 r6:ea855d8c r5:855fd400 [ 2073.441658][ T30] r4:855fd400 [ 2073.441701][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.441814][ T30] r5:855fd400 r4:8291719c [ 2073.441874][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.441978][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.442063][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea855e08 [ 2073.442087][ T30] r4:00000000 [ 2073.442104][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.442169][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.442234][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.442313][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85657e80 [ 2073.442349][ T30] r4:00000000 [ 2073.442371][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.442453][ T30] r9:83018605 r8:855fd400 r7:00000000 r6:83018600 r5:00001000 r4:7f22a000 [ 2073.442475][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.442577][ T30] r5:00001000 r4:dfaa9000 [ 2073.442600][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.442693][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.442779][ T30] r5:85685b8c r4:86890700 [ 2073.442799][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.442883][ T30] r7:ddde3d80 r6:83018600 r5:85685b8c r4:86890700 [ 2073.442904][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.442987][ T30] r10:61c88647 r9:855fd400 r8:8689072c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.443014][ T30] r4:86890700 [ 2073.443073][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.443159][ T30] r10:00000000 r9:86890700 r8:80278fec r7:e8205e60 r6:86890780 r5:855fd400 [ 2073.443183][ T30] r4:00000001 [ 2073.443236][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.443296][ T30] Exception stack(0xea855fb0 to 0xea855ff8) [ 2073.443366][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 2073.443411][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.443509][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.443555][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.443595][ T30] r4:86202d80 [ 2073.444128][ T30] INFO: task kworker/1:61:13697 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.475464][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.475669][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.475776][ T30] Call trace: [ 2073.475814][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.475912][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.475936][ T30] r4:00000000 [ 2073.475954][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.476046][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.476098][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.476139][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.476190][ T30] 1d60: 80010113 ffffffff [ 2073.476227][ T30] r5:80010113 r4:80239c10 [ 2073.476245][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.476380][ T30] r4:82acb1e4 [ 2073.476405][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.476481][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.476504][ T30] r4:ea881dc0 [ 2073.476520][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.476625][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.476653][ T30] r4:00000000 [ 2073.476671][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.476760][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.476783][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.476890][ T30] r5:00001000 r4:ea70e000 [ 2073.476919][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.476990][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.477062][ T30] r5:8410378c r4:8601a700 [ 2073.477081][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.477158][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.477179][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.477296][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.477348][ T30] r4:8601a700 [ 2073.477372][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.477492][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.477742][ T30] r4:00000001 [ 2073.477795][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.477862][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.477895][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.477969][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.478012][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.478055][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.478077][ T30] r4:85d145c0 [ 2073.478103][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2073.487826][ T30] INFO: task kworker/1:62:13702 blocked for more than 430 seconds. [ 2073.487989][ T30] Not tainted syzkaller #0 [ 2073.488027][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.488048][ T30] task:kworker/1:62 state:D stack:0 pid:13702 tgid:13702 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.488223][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.488322][ T30] Call trace: [ 2073.488468][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.488574][ T30] r10:ea891d84 r9:00000002 r8:60010113 r7:829171a0 r6:ea891d8c r5:83b41800 [ 2073.488600][ T30] r4:83b41800 [ 2073.488618][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.488685][ T30] r5:83b41800 r4:8291719c [ 2073.488702][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.488844][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.488937][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea891e08 [ 2073.488962][ T30] r4:00000000 [ 2073.488981][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.489048][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.489146][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.489231][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85941080 [ 2073.489290][ T30] r4:00000000 [ 2073.489323][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.489404][ T30] r9:83018605 r8:83b41800 r7:00000000 r6:83018600 r5:00001000 r4:7f232000 [ 2073.489425][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.489491][ T30] r5:00001000 r4:dfb5b000 [ 2073.489510][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.489573][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.489654][ T30] r5:8569978c r4:86890900 [ 2073.489750][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.489842][ T30] r7:ddde3d80 r6:83018600 r5:8569978c r4:86890900 [ 2073.489862][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.489948][ T30] r10:61c88647 r9:83b41800 r8:8689092c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.489972][ T30] r4:86890900 [ 2073.489989][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.490072][ T30] r10:00000000 r9:86890900 r8:80278fec r7:e8205e60 r6:86890980 r5:83b41800 [ 2073.490116][ T30] r4:00000001 [ 2073.490162][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.490256][ T30] Exception stack(0xea891fb0 to 0xea891ff8) [ 2073.490311][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.490386][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.490506][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.490668][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.490708][ T30] r4:862165c0 [ 2073.491254][ T30] INFO: task kworker/1:62:13702 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.491298][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.491417][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.491479][ T30] Call trace: [ 2073.491577][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.491686][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.491713][ T30] r4:00000000 [ 2073.491730][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.491798][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.491846][ T30] 1d20: c3ca0000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.491890][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.491918][ T30] 1d60: 80010113 ffffffff [ 2073.491946][ T30] r5:80010113 r4:80239c10 [ 2073.491964][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.492036][ T30] r4:82acb1e4 [ 2073.492054][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.492129][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.492151][ T30] r4:ea881dc0 [ 2073.492167][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.492247][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.492393][ T30] r4:00000000 [ 2073.492422][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.492524][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.492547][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.492651][ T30] r5:00001000 r4:ea70e000 [ 2073.492676][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.492785][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.492899][ T30] r5:8410378c r4:8601a700 [ 2073.492923][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.493004][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.493051][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.493136][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.493162][ T30] r4:8601a700 [ 2073.493280][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.493401][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.493428][ T30] r4:00000001 [ 2073.493448][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.493501][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.493570][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.493611][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.493640][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.493675][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.493694][ T30] r4:85d145c0 [ 2073.493710][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2073.493751][ T30] INFO: task kworker/1:63:13706 blocked for more than 430 seconds. [ 2073.493822][ T30] Not tainted syzkaller #0 [ 2073.493884][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.493904][ T30] task:kworker/1:63 state:D stack:0 pid:13706 tgid:13706 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.493970][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.494048][ T30] Call trace: [ 2073.494233][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.660226][ T30] r10:ea8add84 r9:00000002 r8:60000013 r7:829171a0 r6:ea8add8c r5:84204800 [ 2073.660312][ T30] r4:84204800 [ 2073.660334][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.660451][ T30] r5:84204800 r4:8291719c [ 2073.660501][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.660599][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.660685][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ade08 [ 2073.660707][ T30] r4:00000000 [ 2073.660725][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.660789][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.660856][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.660976][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763680 [ 2073.661076][ T30] r4:00000000 [ 2073.661197][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.661288][ T30] r9:83018605 r8:84204800 r7:00000000 r6:83018600 r5:00001000 r4:7f28e000 [ 2073.661310][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.661508][ T30] r5:00001000 r4:ea73b000 [ 2073.661628][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.661956][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.662044][ T30] r5:84102f8c r4:86890680 [ 2073.662200][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.662382][ T30] r7:ddde3d80 r6:83018600 r5:84102f8c r4:86890680 [ 2073.662408][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.662518][ T30] r10:61c88647 r9:84204800 r8:868906ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 2073.662544][ T30] r4:86890680 [ 2073.662561][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.662902][ T30] r10:00000000 r9:86890680 r8:80278fec r7:e8205e60 r6:86890a00 r5:84204800 [ 2073.663017][ T30] r4:00000001 [ 2073.663048][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.663110][ T30] Exception stack(0xea8adfb0 to 0xea8adff8) [ 2073.663154][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 2073.663263][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.663313][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.663381][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.663413][ T30] r4:8599b980 [ 2073.663972][ T30] INFO: task kworker/1:63:13706 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.664035][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.664290][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.695578][ T30] Call trace: [ 2073.695649][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.695817][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.695845][ T30] r4:00000000 [ 2073.695864][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.695926][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.695980][ T30] 1d20: c679e000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.696027][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.696058][ T30] 1d60: 80010113 ffffffff [ 2073.696088][ T30] r5:80010113 r4:80239c10 [ 2073.696106][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.696171][ T30] r4:82acb1e4 [ 2073.696187][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.696261][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.696281][ T30] r4:ea881dc0 [ 2073.696298][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.696368][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.696391][ T30] r4:00000000 [ 2073.696406][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.696479][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.696497][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.696566][ T30] r5:00001000 r4:ea70e000 [ 2073.696583][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.696639][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.696703][ T30] r5:8410378c r4:8601a700 [ 2073.696722][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.696859][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.696885][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.696968][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.696990][ T30] r4:8601a700 [ 2073.697007][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.697084][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.697148][ T30] r4:00000001 [ 2073.697172][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.697227][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.697258][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.697333][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.697417][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.697465][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.697489][ T30] r4:85d145c0 [ 2073.697553][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2073.698646][ T30] INFO: task kworker/0:49:13744 blocked for more than 430 seconds. [ 2073.698707][ T30] Not tainted syzkaller #0 [ 2073.698742][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.698759][ T30] task:kworker/0:49 state:D stack:0 pid:13744 tgid:13744 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.699031][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.699089][ T30] Call trace: [ 2073.699205][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.699293][ T30] r10:eac51d84 r9:00000002 r8:60000113 r7:829171a0 r6:eac51d8c r5:841f6c00 [ 2073.699316][ T30] r4:841f6c00 [ 2073.699333][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.699394][ T30] r5:841f6c00 r4:8291719c [ 2073.699412][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.699473][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.699581][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08 [ 2073.699677][ T30] r4:00000000 [ 2073.699704][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.699778][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.699840][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.699912][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f5280 [ 2073.699935][ T30] r4:00000000 [ 2073.699951][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.700026][ T30] r9:83018405 r8:841f6c00 r7:00000000 r6:83018400 r5:00001000 r4:7f290000 [ 2073.700044][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.700171][ T30] r5:00001000 r4:ea77f000 [ 2073.700240][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.700308][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.700378][ T30] r5:8694978c r4:8601a900 [ 2073.700397][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.700472][ T30] r7:dddcfd80 r6:83018400 r5:8694978c r4:8601a900 [ 2073.700533][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.700619][ T30] r10:61c88647 r9:841f6c00 r8:8601a92c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.700641][ T30] r4:8601a900 [ 2073.700658][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.700749][ T30] r10:00000000 r9:8601a900 r8:80278fec r7:ea6e9e60 r6:862e6a80 r5:841f6c00 [ 2073.700845][ T30] r4:00000001 [ 2073.700869][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.700927][ T30] Exception stack(0xeac51fb0 to 0xeac51ff8) [ 2073.700963][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.701005][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.701039][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.701080][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.701184][ T30] r4:8607a8c0 [ 2073.701707][ T30] INFO: task kworker/0:49:13744 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.701763][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.701931][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.701999][ T30] Call trace: [ 2073.702028][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.702111][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.702196][ T30] r4:00000000 [ 2073.702217][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.702316][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.702363][ T30] 1d20: c679e000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.702449][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.702479][ T30] 1d60: 80010113 ffffffff [ 2073.702546][ T30] r5:80010113 r4:80239c10 [ 2073.702564][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.702632][ T30] r4:82acb1e4 [ 2073.702648][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.702726][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.702768][ T30] r4:ea881dc0 [ 2073.702819][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.702904][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.702929][ T30] r4:00000000 [ 2073.702948][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.703054][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.703081][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.703226][ T30] r5:00001000 r4:ea70e000 [ 2073.703256][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.703326][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.703397][ T30] r5:8410378c r4:8601a700 [ 2073.703418][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.703562][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.703592][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.703709][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.703743][ T30] r4:8601a700 [ 2073.703758][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.703844][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.703872][ T30] r4:00000001 [ 2073.703888][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.703965][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.704010][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.704098][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.704184][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.735296][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.735392][ T30] r4:85d145c0 [ 2073.735421][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2073.735455][ T30] INFO: task kworker/0:50:13749 blocked for more than 430 seconds. [ 2073.735510][ T30] Not tainted syzkaller #0 [ 2073.735536][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.735554][ T30] task:kworker/0:50 state:D stack:0 pid:13749 tgid:13749 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.735643][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.735731][ T30] Call trace: [ 2073.735770][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.735861][ T30] r10:eac95d84 r9:00000002 r8:60000013 r7:829171a0 r6:eac95d8c r5:859cc800 [ 2073.735881][ T30] r4:859cc800 [ 2073.735897][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.735958][ T30] r5:859cc800 r4:8291719c [ 2073.735975][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.736035][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.736112][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 [ 2073.736135][ T30] r4:00000000 [ 2073.736151][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.736208][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.736266][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.736336][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84815cc0 [ 2073.736357][ T30] r4:00000000 [ 2073.736374][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.736446][ T30] r9:83018405 r8:859cc800 r7:00000000 r6:83018400 r5:00001000 r4:7f288000 [ 2073.736466][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.736529][ T30] r5:00001000 r4:ea6dd000 [ 2073.736546][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.736606][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.736675][ T30] r5:8545c78c r4:8601a880 [ 2073.736695][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.736795][ T30] r7:dddcfd80 r6:83018400 r5:8545c78c r4:8601a880 [ 2073.736815][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.736894][ T30] r10:61c88647 r9:859cc800 r8:8601a8ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.736919][ T30] r4:8601a880 [ 2073.736936][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.737016][ T30] r10:00000000 r9:8601a880 r8:80278fec r7:ea6e9e60 r6:8601a800 r5:859cc800 [ 2073.737038][ T30] r4:00000001 [ 2073.737054][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.737107][ T30] Exception stack(0xeac95fb0 to 0xeac95ff8) [ 2073.737143][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 2073.737185][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.737221][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.737264][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.737285][ T30] r4:85986b40 [ 2073.738560][ T30] INFO: task kworker/0:50:13749 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.738638][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.738720][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.738795][ T30] Call trace: [ 2073.738823][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.738901][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.738965][ T30] r4:00000000 [ 2073.739069][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.739131][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.739170][ T30] 1d20: c6a21000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.739226][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.739254][ T30] 1d60: 80010113 ffffffff [ 2073.739279][ T30] r5:80010113 r4:80239c10 [ 2073.739312][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.739375][ T30] r4:82acb1e4 [ 2073.739390][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.739454][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.739473][ T30] r4:ea881dc0 [ 2073.739488][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.739552][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.739571][ T30] r4:00000000 [ 2073.739613][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.739686][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.739704][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.739811][ T30] r5:00001000 r4:ea70e000 [ 2073.739873][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.739939][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.740044][ T30] r5:8410378c r4:8601a700 [ 2073.740071][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.740154][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.740173][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.740250][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.740298][ T30] r4:8601a700 [ 2073.740352][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.740450][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.740516][ T30] r4:00000001 [ 2073.740540][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.740634][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.740672][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.740713][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.740763][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.740807][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.740860][ T30] r4:85d145c0 [ 2073.740911][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2073.741020][ T30] INFO: task kworker/0:65:13821 blocked for more than 430 seconds. [ 2073.741066][ T30] Not tainted syzkaller #0 [ 2073.741153][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2073.741174][ T30] task:kworker/0:65 state:D stack:0 pid:13821 tgid:13821 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.741278][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.741361][ T30] Call trace: [ 2073.741480][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 2073.741569][ T30] r10:ea36dd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea36dd8c r5:84ec0c00 [ 2073.741590][ T30] r4:84ec0c00 [ 2073.741606][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 2073.741708][ T30] r5:84ec0c00 r4:8291719c [ 2073.741728][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 2073.741842][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 2073.741929][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea36de08 [ 2073.741977][ T30] r4:00000000 [ 2073.742042][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 2073.742106][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 2073.742200][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.742286][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8613fdc0 [ 2073.742315][ T30] r4:00000000 [ 2073.742332][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.742412][ T30] r9:83018405 r8:84ec0c00 r7:00000000 r6:83018400 r5:00001000 r4:7f22e000 [ 2073.742458][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.742609][ T30] r5:00001000 r4:dfb2d000 [ 2073.742643][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.742708][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.742827][ T30] r5:8548c38c r4:859dd400 [ 2073.742875][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.742957][ T30] r7:dddcfd80 r6:83018400 r5:8548c38c r4:859dd400 [ 2073.742984][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.743076][ T30] r10:61c88647 r9:84ec0c00 r8:859dd42c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.743103][ T30] r4:859dd400 [ 2073.743161][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.743266][ T30] r10:00000000 r9:859dd400 r8:80278fec r7:dff69e60 r6:859dda80 r5:84ec0c00 [ 2073.743289][ T30] r4:00000001 [ 2073.743305][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.743359][ T30] Exception stack(0xea36dfb0 to 0xea36dff8) [ 2073.743400][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 2073.743471][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.743509][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.743554][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.743604][ T30] r4:86822700 [ 2073.744107][ T30] INFO: task kworker/0:65:13821 is blocked on a mutex likely owned by task kworker/0:51:13750. [ 2073.744159][ T30] task:kworker/0:51 state:R running task stack:0 pid:13750 tgid:13750 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2073.744361][ T30] Workqueue: events bpf_prog_free_deferred [ 2073.776148][ T30] Call trace: [ 2073.776201][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 2073.776883][ T30] r10:8280c9b4 r9:859cd400 r8:80200c04 r7:ea881d54 r6:ffffffff r5:859cd400 [ 2073.776923][ T30] r4:00000000 [ 2073.776939][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 2073.777027][ T30] Exception stack(0xea881d20 to 0xea881d68) [ 2073.777073][ T30] 1d20: c6d28000 ebb4d000 00000001 80239bf8 7f23a000 00000001 82acb1c4 82aca5a0 [ 2073.777110][ T30] 1d40: 7f23a000 ebb4d000 8280c9b4 ea881d9c ea881da0 ea881d70 80230af0 80239c10 [ 2073.777132][ T30] 1d60: 80010113 ffffffff [ 2073.777157][ T30] r5:80010113 r4:80239c10 [ 2073.777170][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 2073.777227][ T30] r4:82acb1e4 [ 2073.777242][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 2073.777307][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea881dc0 r5:ea881e08 [ 2073.777325][ T30] r4:ea881dc0 [ 2073.777338][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 2073.777403][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599acc0 [ 2073.777421][ T30] r4:00000000 [ 2073.777434][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 2073.777500][ T30] r9:83018405 r8:859cd400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 2073.777515][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 2073.777577][ T30] r5:00001000 r4:ea70e000 [ 2073.777590][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 2073.777646][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 2073.777707][ T30] r5:8410378c r4:8601a700 [ 2073.777721][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 2073.777791][ T30] r7:dddcfd80 r6:83018400 r5:8410378c r4:8601a700 [ 2073.777806][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 2073.777876][ T30] r10:61c88647 r9:859cd400 r8:8601a72c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 2073.777894][ T30] r4:8601a700 [ 2073.777907][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.777976][ T30] r10:00000000 r9:8601a700 r8:80278fec r7:ea6e9e60 r6:8601a780 r5:859cd400 [ 2073.777994][ T30] r4:00000001 [ 2073.778011][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.778055][ T30] Exception stack(0xea881fb0 to 0xea881ff8) [ 2073.778084][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 2073.778119][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.778149][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.778186][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.778204][ T30] r4:85d145c0 [ 2073.778226][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2073.780481][ T30] NMI backtrace for cpu 1 [ 2073.780592][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 2073.780641][ T30] Hardware name: ARM-Versatile Express [ 2073.780661][ T30] Call trace: [ 2073.780696][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2073.780777][ T30] r7:00000000 r6:00000013 r5:60000093 r4:82252424 [ 2073.780791][ T30] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 2073.780841][ T30] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2073.780896][ T30] r5:00000001 r4:00000001 [ 2073.780939][ T30] [<8021f8bc>] (dump_stack) from [<81a4d02c>] (nmi_cpu_backtrace+0x160/0x17c) [ 2073.781001][ T30] [<81a4cecc>] (nmi_cpu_backtrace) from [<81a4d178>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 2073.781099][ T30] r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [ 2073.781237][ T30] [<81a4d048>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 2073.781351][ T30] r9:8281ba28 r8:8280c810 r7:0002b4d0 r6:00007d55 r5:82abf7d4 r4:86e9290c [ 2073.781385][ T30] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fb08>] (watchdog+0x5d0/0x850) [ 2073.781483][ T30] [<8037f538>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.781596][ T30] r10:00000000 r9:00000000 r8:8037f538 r7:830cfd80 r6:830cfd80 r5:8321c800 [ 2073.781650][ T30] r4:00000001 [ 2073.781681][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.781724][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 2073.781788][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 2073.781822][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.781875][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.781927][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.781945][ T30] r4:833cb7c0 [ 2073.782295][ T30] Sending NMI from CPU 1 to CPUs 0: [ 2073.783858][ C0] NMI backtrace for cpu 0 [ 2073.784066][ C0] CPU: 0 UID: 0 PID: 2821 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 2073.784126][ C0] Hardware name: ARM-Versatile Express [ 2073.784183][ C0] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 2073.784288][ C0] LR is at pl011_console_device_unlock+0x20/0x24 [ 2073.784351][ C0] pc : [<81a6d27c>] lr : [<80a8ee08>] psr: 60010113 [ 2073.784391][ C0] sp : eb01deb0 ip : eb01dec0 fp : eb01debc [ 2073.784433][ C0] r10: 82959554 r9 : 00000000 r8 : 00000000 [ 2073.784477][ C0] r7 : 00000117 r6 : 829594b8 r5 : 00000000 r4 : 00000001 [ 2073.784521][ C0] r3 : 0000223e r2 : 00000000 r1 : 60010113 r0 : 840ed440 [ 2073.784655][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 2073.784727][ C0] Control: 30c5387d Table: 84dce040 DAC: fffffffd [ 2073.784805][ C0] Call trace: [ 2073.784855][ C0] [<81a6d254>] (_raw_spin_unlock_irqrestore) from [<80a8ee08>] (pl011_console_device_unlock+0x20/0x24) [ 2073.784923][ C0] [<80a8ede8>] (pl011_console_device_unlock) from [<802e3768>] (nbcon_emit_one+0x88/0x100) [ 2073.784983][ C0] [<802e36e0>] (nbcon_emit_one) from [<802e3988>] (nbcon_kthread_func+0x1a8/0x2a4) [ 2073.785052][ C0] r6:8280c690 r5:83b33c00 r4:829594b8 [ 2073.785069][ C0] [<802e37e0>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.785147][ C0] r10:00000000 r9:829594b8 r8:802e37e0 r7:84b9a780 r6:84b9a780 r5:83b33c00 [ 2073.785172][ C0] r4:00000001 [ 2073.785189][ C0] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2073.785241][ C0] Exception stack(0xeb01dfb0 to 0xeb01dff8) [ 2073.785279][ C0] dfa0: 00000000 00000000 00000000 00000000 [ 2073.785315][ C0] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2073.785346][ C0] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2073.785385][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2073.785407][ C0] r4:84178d00 [ 2073.796541][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 2073.995319][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 2073.995757][ T30] Hardware name: ARM-Versatile Express [ 2073.996030][ T30] Call trace: [ 2073.996311][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2073.996748][ T30] r7:82253148 r6:8321c800 r5:00000000 r4:82252424 [ 2073.997033][ T30] [<80201b08>] (show_stack) from [<8021f894>] (dump_stack_lvl+0x54/0x7c) [ 2073.997419][ T30] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 2073.997802][ T30] r5:00000000 r4:82a78d18 [ 2073.998016][ T30] [<8021f8bc>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 2073.998370][ T30] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 2073.998744][ T30] r7:0002b4d0 [ 2073.998903][ T30] [<80202800>] (panic) from [<8037f948>] (watchdog+0x410/0x850) [ 2073.999273][ T30] r3:00000001 r2:00000000 r1:00000000 r0:82253148 [ 2073.999544][ T30] [<8037f538>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 2073.999931][ T30] r10:00000000 r9:00000000 r8:8037f538 r7:830cfd80 r6:830cfd80 r5:8321c800 [ 2074.000278][ T30] r4:00000001 [ 2074.000487][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2074.000867][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 2074.001156][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 2074.001530][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2074.001893][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2074.002217][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 2074.002576][ T30] r4:833cb7c0 [ 2074.005094][ T30] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:15:06 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82252424 R02=00000001 R03=81a610f0 R04=00000006 R05=828f7e48 R06=00000000 R07=828f7e40 R08=8321c800 R09=00000028 R10=828f7e48 R11=df801f24 R12=df801f28 R13=df801f18 R14=8033dd04 R15=81a61100 PSR=20010193 --C- A S svc32 s00=63616669 s01=003d7365 d00=003d736563616669 s02=01a70e60 s03=76c27b00 d01=76c27b0001a70e60 s04=00f80000 s05=00f80000 d02=00f8000000f80000 s06=00000000 s07=00000000 d03=0000000000000000 s08=c0300800 s09=00000000 d04=00000000c0300800 s10=00000000 s11=00000000 d05=0000000000000000 s12=08040201 s13=80402010 d06=8040201008040201 s14=08040201 s15=80402010 d07=8040201008040201 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=76847008 R01=00000000 R02=00016d88 R03=76850800 R04=00020500 R05=00000100 R06=76847008 R07=01e1ce78 R08=01e1c1d8 R09=0054201c R10=00000c1e R11=7efed2bc R12=00000000 R13=7efed108 R14=76a3294c R15=769c94ec PSR=20010010 --C- A S usr32 s00=03000800 s01=080004b8 d00=080004b803000800 s02=04c00320 s03=ffffff04 d01=ffffff0404c00320 s04=00002008 s05=06880300 d02=0688030000002008 s06=00040406 s07=8c030100 d03=8c03010000040406 s08=012a0806 s09=c3572703 d04=c3572703012a0806 s10=4156088d s11=000026a7 d05=000026a74156088d s12=01000c00 s13=01000880 d06=0100088001000c00 s14=00168803 s15=98034008 d07=9803400800168803 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=03200800 s33=08000a98 d16=08000a9803200800 s34=03408082 s35=08000aa0 d17=08000aa003408082 s36=0201d000 s37=0a080006 d18=0a0800060201d000 s38=00088002 s39=0302a808 d19=0302a80800088002 s40=80040880 s41=0d80030d d20=0d80030d80040880 s42=fffff308 s43=ffffffff d21=fffffffffffff308 s44=6b01ffff s45=65657266 d22=656572666b01ffff s46=08900300 s47=00020806 d23=0002080608900300 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=e048dcb0 s53=7e277e10 d26=7e277e10e048dcb0 s54=6123661a s55=38f3fe2a d27=38f3fe2a6123661a s56=41b24c19 s57=202a5bf7 d28=202a5bf741b24c19 s58=93bf0f22 s59=571eb05a d29=571eb05a93bf0f22 s60=8f1d7d93 s61=65484aad d30=65484aad8f1d7d93 s62=c5a6b4e9 s63=db368c0d d31=db368c0dc5a6b4e9 FPSCR: 00000000