last executing test programs: 24m52.027615564s ago: executing program 1 (id=235): pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_mptcp(0x2, 0x1, 0x106) socketpair$unix(0x1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x10d00, 0xf) 24m51.92859529s ago: executing program 1 (id=236): r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="2c385aa3d49100dc6626c892b6bc436a", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) 24m51.858409913s ago: executing program 1 (id=237): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000200)=0x208001, 0x4) sendto$inet(r0, &(0x7f0000000000)="f461a9bbc95c3583", 0x8, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f000000e280), 0x58a, 0x42, 0x0) 24m51.607763726s ago: executing program 1 (id=238): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='contention_begin\x00', r0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), r1) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x20, r2, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x0) 24m51.437870514s ago: executing program 1 (id=239): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r1, 0x701, 0x0, 0x0, {0x16}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), r0) 24m50.976115698s ago: executing program 1 (id=240): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) socket$inet(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x4}, 0x94) mount$cgroup(0x0, &(0x7f0000000000)='.\x00', &(0x7f00000000c0), 0x10012, &(0x7f0000000040)={[{@name={'name', 0x3d, '_))%['}}]}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_clone3(&(0x7f00000008c0)={0x100010000, 0x0, &(0x7f00000005c0), &(0x7f0000000600), {0x29}, &(0x7f0000000640)=""/246, 0xf6, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000940)='svc_xprt_dequeue\x00', r5}, 0x18) 24m5.861998512s ago: executing program 32 (id=240): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) socket$inet(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x4}, 0x94) mount$cgroup(0x0, &(0x7f0000000000)='.\x00', &(0x7f00000000c0), 0x10012, &(0x7f0000000040)={[{@name={'name', 0x3d, '_))%['}}]}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_clone3(&(0x7f00000008c0)={0x100010000, 0x0, &(0x7f00000005c0), &(0x7f0000000600), {0x29}, &(0x7f0000000640)=""/246, 0xf6, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000940)='svc_xprt_dequeue\x00', r5}, 0x18) 14m22.087650952s ago: executing program 2 (id=774): r0 = socket$inet6(0xa, 0x3, 0x5) sendmmsg(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000180)=@l2tp6={0xa, 0x500, 0x80000, @remote, 0x0, 0x1}, 0x80, 0x0}, 0x5b4}, {{&(0x7f0000000540)=@qipcrtr={0x2a, 0x4, 0x4000}, 0x80, 0x0}}], 0x2, 0x4000000) 14m22.018244015s ago: executing program 2 (id=775): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x262200, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000340)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x40480) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f0000000200)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001c00)=ANY=[@ANYBLOB="28040000", @ANYRES16=r6, @ANYBLOB="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", @ANYRES32=r7], 0x428}, 0x1, 0x0, 0x0, 0x4000}, 0x4000010) 14m14.259086293s ago: executing program 2 (id=777): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000940)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x58}}, 0x0) 14m14.079525213s ago: executing program 2 (id=778): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000540)={@empty, @rand_addr=' \x01\x00', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, r1}) 14m14.079138303s ago: executing program 2 (id=779): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000c00)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) fcntl$getflags(r1, 0xb) sendmsg$netlink(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=ANY=[@ANYBLOB="340000001900150000000000000000000a"], 0x34}], 0x1}, 0x0) 14m0.560196936s ago: executing program 2 (id=789): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_lsm={0x6, 0x4, &(0x7f0000000340)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xc}]}, &(0x7f0000000100)='GPL\x00', 0x5}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="440000001300290a000000000000000007000000", @ANYRES32, @ANYBLOB="00000000000000001c001a800800028008000200080000003e120000080002001040e5"], 0x44}}, 0x0) 13m15.529015375s ago: executing program 33 (id=789): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_lsm={0x6, 0x4, &(0x7f0000000340)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xc}]}, &(0x7f0000000100)='GPL\x00', 0x5}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="440000001300290a000000000000000007000000", @ANYRES32, @ANYBLOB="00000000000000001c001a800800028008000200080000003e120000080002001040e5"], 0x44}}, 0x0) 8m11.077901786s ago: executing program 0 (id=1639): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 8m10.877951256s ago: executing program 0 (id=1640): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, 0x0, 0x1) 8m8.233919548s ago: executing program 0 (id=1642): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x8000000, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x100, 0x7, 0x6361, 0x1000005, 0xfffffffd, 0x6}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0x80000, {0x0, 0x0, 0x0, r3, {0x0, 0x11}, {0xffe6, 0xb}, {0x0, 0xc}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x2, 0x4, 0x10001, 0x0, 0x3ff, 0x10fb}}, {0x4}}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x2402c8e1}, 0x4000000) 8m7.912037335s ago: executing program 0 (id=1643): eventfd(0x7) r0 = syz_io_uring_setup(0xc97, &(0x7f0000000700)={0x0, 0x6015, 0x800, 0xff7fffff, 0x11c}, &(0x7f00000003c0)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x4000, @fd_index=0x3, 0x5, 0x0, 0x0, 0x4}) io_uring_enter(r0, 0x47ba, 0x0, 0x0, 0x0, 0x0) 8m7.211678119s ago: executing program 0 (id=1644): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000073d000/0x3000)=nil) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x1c) 8m6.698555495s ago: executing program 0 (id=1645): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x100000005, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, 0x0) add_key(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 7m21.309549505s ago: executing program 34 (id=1645): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x100000005, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, 0x0) add_key(0x0, &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 6m58.333529765s ago: executing program 3 (id=1782): linkat(0xffffffffffffff9c, &(0x7f00000006c0)='./file2\x00', 0xffffffffffffff9c, 0x0, 0x8cff) 6m58.097442897s ago: executing program 3 (id=1783): r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x5, &(0x7f0000000180), 0x43) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000880)={0x2, 0x4e24, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ac1414bb008000000000000038000000000000000000000007000000070e43aa5889c23ef593ae6bcd1844187c8073b5c9e00000000600000003000000080000000900001400000000000000000000000100000005000000000000001400000000000000000000000700000001000000000000001400000000000000000000000100000003000000000000001c000000000000000000000008"], 0xc0}, 0x54) 6m57.917556575s ago: executing program 3 (id=1784): socket$inet_tcp(0x2, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, &(0x7f0000000340)=ANY=[@ANYBLOB="000202"], 0x18) 6m57.727938425s ago: executing program 3 (id=1785): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x9, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0xfdef, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xfde1, 0x300, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x4d, 0x0, @wg=@data}}}}}, 0x0) 6m57.399601812s ago: executing program 3 (id=1786): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) close(r2) 6m57.244588669s ago: executing program 3 (id=1787): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0xf, 0x200cc, 0x6, 0x5}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x4af, r1}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000680), 0x2, r1}, 0x38) 6m12.106899947s ago: executing program 35 (id=1787): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0xf, 0x200cc, 0x6, 0x5}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x4af, r1}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000680), 0x2, r1}, 0x38) 4m53.347305386s ago: executing program 4 (id=2134): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r1, 0x0, 0x5}, 0x18) syz_open_procfs(0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2fffffffd}, 0xc) close(r2) 4m53.009114354s ago: executing program 4 (id=2135): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000580)='./file0\x00', 0x3) 4m52.226761422s ago: executing program 4 (id=2136): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='kfree\x00', r1, 0x0, 0x2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_io_uring_setup(0x499, &(0x7f0000000400)={0x0, 0xd146, 0x0, 0xc, 0x288}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x40, 0x0, r2, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='0'], 0x30}}) io_uring_enter(r3, 0x3516, 0x0, 0x4, 0x0, 0x0) 4m50.608271824s ago: executing program 4 (id=2137): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) fstatfs(0xffffffffffffffff, 0x0) 4m50.327758768s ago: executing program 4 (id=2138): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) renameat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) 4m50.017552083s ago: executing program 4 (id=2139): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 4m4.801014545s ago: executing program 36 (id=2139): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 10.046858927s ago: executing program 5 (id=2630): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) mremap(&(0x7f0000254000/0x4000)=nil, 0x4000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) 7.298128355s ago: executing program 6 (id=2635): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x300}]}]}]}, 0x38}}, 0x0) 7.167834342s ago: executing program 6 (id=2636): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=ANY=[@ANYBLOB="0f00000004000000040000000200020000000000", @ANYRES32=0x1, @ANYBLOB="fdffffff0000000000000000fbffffff00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000004"], 0x48) 6.968934851s ago: executing program 6 (id=2637): bpf$PROG_LOAD(0x5, 0x0, 0x9045e73b4c0fcea4) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r3 = dup3(r0, r2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r3, 0x1b, &(0x7f0000000200)}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x23}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424d", "bcfd56f1375461caaa2f19935e6996c7096ffeeb0300000000000064", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000}, 0x94) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r4, &(0x7f0000003d00)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000300)=""/148, 0x94}], 0x1}, 0x4}], 0x1, 0x10000, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x200) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) acct(0x0) ioctl$int_out(r6, 0x0, &(0x7f00000003c0)) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r9, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) 5.458107647s ago: executing program 5 (id=2638): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x56899130b459a9f4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='kfree\x00', r1, 0x0, 0xe}, 0x18) syz_io_uring_setup(0x10b, &(0x7f0000000580)={0x0, 0xd736, 0x8, 0x3, 0xbffffffa}, &(0x7f00000003c0), &(0x7f0000000340)) socket$kcm(0x21, 0x2, 0xa) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000001400000008000f00fc00000018000180140002006e657464657673696d300000000000000800060000fcffff08000900fc000000080011000700000008000e00800000000800", @ANYRES64=r4], 0x5c}, 0x1, 0x0, 0x0, 0x4000800}, 0x88010) 4.118792704s ago: executing program 5 (id=2639): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x1, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff000000009408000000001700638af0ff00000000bfa100000000000007"], 0x0, 0xc}, 0x94) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa1780c206050086dd6018"], 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0xffffffffffffff62, &(0x7f0000000000)="ff", 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x48) 3.946933762s ago: executing program 6 (id=2640): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) statx(0xffffffffffffffff, &(0x7f0000002340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1000, 0x10, 0x0) 3.420158379s ago: executing program 6 (id=2641): fsync(0xffffffffffffffff) bpf$TOKEN_CREATE(0x24, &(0x7f0000000400), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYRES16=0x0], &(0x7f0000000180)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, r3, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x4000054) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d000000181100", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r6}, 0x18) ptrace(0x10, r4) ptrace$getregset(0x4204, r4, 0x1, &(0x7f0000000480)={0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x20, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYRESOCT=r7, @ANYRESOCT=r7, @ANYRES32=0x0], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1d, 0x8, &(0x7f0000000040)=ANY=[@ANYRES32=r8, @ANYRESHEX=r0, @ANYRES64=r5], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r9}, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x8910, &(0x7f0000000000)={'veth0_macvtap\x00', @ifru_ivalue=0x7}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x8943, &(0x7f0000000000)) 1.236907278s ago: executing program 5 (id=2642): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) creat(&(0x7f0000000100)='./bus\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000200)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22, 0x0) 1.045298848s ago: executing program 6 (id=2643): connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x85}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x6) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000880)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0902000000000000000001"], 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x0) 317.479064ms ago: executing program 5 (id=2644): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@ipv6_newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {0x2}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWTUNNEL_IP6_TC={0x5}}, @NHA_OIF={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 0s ago: executing program 5 (id=2645): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000003740)={{r0}, &(0x7f0000000400), &(0x7f0000003700)='%pK \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x3, 0x0, 0x3, 0x11, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_key={0x3, 0x9, 0x80, 0x0, "1cdc0dca1d9f68846960e56de42944af"}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x9}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x7}}]}, 0x88}, 0x1, 0x7}, 0x0) kernel console output (not intermixed with test programs): pid=11486 comm="syz.3.1776" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1448.511099][ T31] audit: type=1400 audit(1448.420:1154): avc: denied { map } for pid=11486 comm="syz.3.1776" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18895 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1448.511444][ T31] audit: type=1400 audit(1448.420:1155): avc: denied { read write } for pid=11486 comm="syz.3.1776" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18895 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1448.577924][ T31] audit: type=1400 audit(1448.490:1156): avc: denied { mounton } for pid=11488 comm="syz.4.1724" path="/proc/2/task" dev="proc" ino=18401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1448.955643][ T31] audit: type=1400 audit(1448.870:1157): avc: denied { watch watch_reads } for pid=11494 comm="syz.4.1778" path="/1" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1449.143331][ T31] audit: type=1400 audit(1449.060:1158): avc: denied { kexec_image_load } for pid=11496 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 1449.546025][ T31] audit: type=1400 audit(1449.460:1159): avc: denied { name_bind } for pid=11501 comm="syz.3.1781" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1449.569134][ T31] audit: type=1400 audit(1449.460:1160): avc: denied { node_bind } for pid=11501 comm="syz.3.1781" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1450.181601][ T31] audit: type=1400 audit(1450.100:1161): avc: denied { create } for pid=11509 comm="syz.3.1784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1450.192594][ T31] audit: type=1400 audit(1450.110:1162): avc: denied { setopt } for pid=11509 comm="syz.3.1784" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1452.886435][T11526] netlink: 5 bytes leftover after parsing attributes in process `syz.4.1790'. [ 1452.888100][T11526] 0ªî{X¹¦: renamed from gretap0 (while UP) [ 1452.905466][T11526] 0ªî{X¹¦: entered allmulticast mode [ 1452.912091][T11526] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 1454.654017][T11545] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1798'. [ 1454.917049][ T31] audit: type=1400 audit(1454.830:1163): avc: denied { lock } for pid=11549 comm="syz.4.1799" path="socket:[18956]" dev="sockfs" ino=18956 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1455.108371][T11554] netlink: 'syz.4.1800': attribute type 10 has an invalid length. [ 1455.789547][ T31] audit: type=1400 audit(1455.700:1164): avc: denied { create } for pid=11559 comm="syz.4.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1457.295000][ T31] audit: type=1400 audit(1457.210:1165): avc: denied { ioctl } for pid=11576 comm="syz.4.1808" path="socket:[19551]" dev="sockfs" ino=19551 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1460.223090][ T31] audit: type=1326 audit(1460.140:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11608 comm="syz.4.1818" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1460.223759][ T31] audit: type=1326 audit(1460.140:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11608 comm="syz.4.1818" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1460.225947][ T31] audit: type=1326 audit(1460.140:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11608 comm="syz.4.1818" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1460.226770][ T31] audit: type=1326 audit(1460.140:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11608 comm="syz.4.1818" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1460.227151][ T31] audit: type=1326 audit(1460.140:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11608 comm="syz.4.1818" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1460.231950][ T31] audit: type=1326 audit(1460.150:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11608 comm="syz.4.1818" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1460.234173][ T31] audit: type=1326 audit(1460.150:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11608 comm="syz.4.1818" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1460.235456][ T31] audit: type=1326 audit(1460.150:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11608 comm="syz.4.1818" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1460.236895][ T31] audit: type=1326 audit(1460.150:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11608 comm="syz.4.1818" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1460.238993][ T31] audit: type=1326 audit(1460.150:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11608 comm="syz.4.1818" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1461.430977][T11622] IPv6: Can't replace route, no match found [ 1466.742638][T11666] SELinux: Context Ü is not valid (left unmapped). [ 1466.892797][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 1466.893722][ T31] audit: type=1400 audit(1466.790:1182): avc: denied { create } for pid=11668 comm="syz.4.1834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1467.441536][ T31] audit: type=1400 audit(1467.360:1183): avc: denied { create } for pid=11672 comm="syz.4.1835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1469.231098][ T31] audit: type=1400 audit(1469.150:1184): avc: denied { create } for pid=11690 comm="syz.4.1841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1469.406896][ T31] audit: type=1400 audit(1469.320:1185): avc: denied { read } for pid=11690 comm="syz.4.1841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1473.599419][ T31] audit: type=1326 audit(1473.510:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11702 comm="syz.4.1846" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1473.613548][ T31] audit: type=1326 audit(1473.530:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11702 comm="syz.4.1846" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1473.617312][ T31] audit: type=1326 audit(1473.530:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11702 comm="syz.4.1846" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1473.632451][ T31] audit: type=1326 audit(1473.550:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11702 comm="syz.4.1846" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1473.634957][ T31] audit: type=1326 audit(1473.550:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11702 comm="syz.4.1846" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1473.731247][T11705] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1473.743343][T11705] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1473.755834][T11705] netlink: 36 bytes leftover after parsing attributes in process `syz.4.1847'. [ 1480.144007][ T31] audit: type=1400 audit(1480.060:1191): avc: denied { bind } for pid=11749 comm="syz.4.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1480.861713][T11757] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1480.862709][T11757] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1481.263128][ T31] audit: type=1326 audit(1481.180:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.4.1862" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1481.265646][ T31] audit: type=1326 audit(1481.180:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.4.1862" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1481.267779][ T31] audit: type=1326 audit(1481.180:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.4.1862" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1481.281430][ T31] audit: type=1326 audit(1481.200:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.4.1862" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1481.287220][ T31] audit: type=1326 audit(1481.200:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.4.1862" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1481.292647][ T31] audit: type=1326 audit(1481.200:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.4.1862" exe="/syz-executor" sig=0 arch=40000028 syscall=21 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1481.294471][ T31] audit: type=1400 audit(1481.200:1198): avc: denied { mount } for pid=11765 comm="syz.4.1862" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1481.298152][ T31] audit: type=1326 audit(1481.200:1199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.4.1862" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1481.299752][ T31] audit: type=1326 audit(1481.200:1200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.4.1862" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1484.494670][T11794] netlink: 'syz.4.1870': attribute type 1 has an invalid length. [ 1484.754361][T11796] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1871'. [ 1485.151109][T11800] IPv6: Can't replace route, no match found [ 1488.788391][T11836] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1877'. [ 1490.339242][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 1490.339541][ T31] audit: type=1400 audit(1490.250:1209): avc: denied { name_bind } for pid=11847 comm="syz.4.1882" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1492.249647][ T31] audit: type=1400 audit(1492.160:1210): avc: denied { ioctl } for pid=11860 comm="syz.4.1887" path="socket:[19350]" dev="sockfs" ino=19350 ioctlcmd=0x9413 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1492.523984][T11863] af_packet: tpacket_rcv: packet too big, clamped from 64993 to 4294967272. macoff=96 [ 1492.864288][T11865] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1492.866768][T11865] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1493.372269][ T31] audit: type=1326 audit(1493.290:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.4.1892" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1493.387854][ T31] audit: type=1326 audit(1493.300:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.4.1892" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1493.388330][ T31] audit: type=1326 audit(1493.300:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.4.1892" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1493.388524][ T31] audit: type=1326 audit(1493.300:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.4.1892" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1493.388595][ T31] audit: type=1326 audit(1493.300:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.4.1892" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1493.392988][ T31] audit: type=1326 audit(1493.300:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.4.1892" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1493.394960][ T31] audit: type=1326 audit(1493.310:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.4.1892" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1493.396977][ T31] audit: type=1326 audit(1493.310:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.4.1892" exe="/syz-executor" sig=0 arch=40000028 syscall=40 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1499.780796][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 1499.781099][ T31] audit: type=1400 audit(1499.680:1240): avc: denied { create } for pid=11985 comm="syz.4.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1499.781335][ T31] audit: type=1400 audit(1499.690:1241): avc: denied { ioctl } for pid=11985 comm="syz.4.1905" path="socket:[19866]" dev="sockfs" ino=19866 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1500.589748][ T31] audit: type=1326 audit(1500.500:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12052 comm="syz.4.1909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1500.669122][ T31] audit: type=1326 audit(1500.580:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12052 comm="syz.4.1909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1500.669550][ T31] audit: type=1326 audit(1500.580:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12052 comm="syz.4.1909" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1500.669774][ T31] audit: type=1326 audit(1500.580:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12052 comm="syz.4.1909" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1322f8 code=0x7ffc0000 [ 1500.675099][ T31] audit: type=1326 audit(1500.580:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12052 comm="syz.4.1909" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1322f8 code=0x7ffc0000 [ 1500.676759][ T31] audit: type=1326 audit(1500.580:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12052 comm="syz.4.1909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1500.678965][ T31] audit: type=1326 audit(1500.580:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12052 comm="syz.4.1909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1500.683850][ T31] audit: type=1326 audit(1500.600:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12052 comm="syz.4.1909" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1501.559736][T11902] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1501.576654][T11902] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1502.276812][T12117] hid-generic 0000:3000000:0000.0007: unknown main item tag 0x4 [ 1502.280409][T12117] hid-generic 0000:3000000:0000.0007: unknown main item tag 0x2 [ 1502.281245][T12117] hid-generic 0000:3000000:0000.0007: unknown main item tag 0x0 [ 1502.281881][T12117] hid-generic 0000:3000000:0000.0007: unknown main item tag 0x0 [ 1502.282437][T12117] hid-generic 0000:3000000:0000.0007: unknown main item tag 0x0 [ 1502.282978][T12117] hid-generic 0000:3000000:0000.0007: unknown main item tag 0x0 [ 1502.283482][T12117] hid-generic 0000:3000000:0000.0007: unknown main item tag 0x0 [ 1502.290497][T12117] hid-generic 0000:3000000:0000.0007: unknown main item tag 0x0 [ 1502.291096][T12117] hid-generic 0000:3000000:0000.0007: unknown main item tag 0x0 [ 1502.292458][T12117] hid-generic 0000:3000000:0000.0007: unknown main item tag 0x0 [ 1502.336551][T12117] hid-generic 0000:3000000:0000.0007: hidraw0: HID v0.00 Device [sy] on syz0 [ 1504.361605][T11902] hsr_slave_0: entered promiscuous mode [ 1504.362429][T11902] hsr_slave_1: entered promiscuous mode [ 1504.362803][T11902] debugfs: 'hsr0' already exists in 'hsr' [ 1504.362832][T11902] Cannot create hsr debugfs directory [ 1505.105001][T11902] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1505.112965][T11902] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1505.118049][T11902] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1505.122024][T11902] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1507.174676][T11902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1507.792806][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 1507.793851][ T31] audit: type=1400 audit(1507.710:1260): avc: denied { setopt } for pid=12131 comm="syz.4.1916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1508.489549][T11902] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1508.489701][T11902] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1514.211234][T11902] veth0_vlan: entered promiscuous mode [ 1514.272994][T11902] veth1_vlan: entered promiscuous mode [ 1514.535372][T11902] veth0_macvtap: entered promiscuous mode [ 1514.608367][T11902] veth1_macvtap: entered promiscuous mode [ 1514.743291][ T7373] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1514.743887][ T7373] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1514.744202][ T7373] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1514.744445][ T7373] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1515.347824][T12331] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1515.350780][T12331] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1516.654881][ T31] audit: type=1326 audit(1516.560:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.5.1918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1516.656901][ T31] audit: type=1326 audit(1516.560:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.5.1918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1516.658828][ T31] audit: type=1326 audit(1516.560:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.5.1918" exe="/syz-executor" sig=0 arch=40000028 syscall=397 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1516.661802][ T31] audit: type=1326 audit(1516.560:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.5.1918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1516.663561][ T31] audit: type=1326 audit(1516.560:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.5.1918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1517.088095][ T31] audit: type=1400 audit(1517.000:1266): avc: denied { nlmsg_read } for pid=12343 comm="syz.5.1920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1517.088557][ T31] audit: type=1326 audit(1517.000:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12343 comm="syz.5.1920" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1517.107674][ T31] audit: type=1326 audit(1517.020:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12343 comm="syz.5.1920" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1517.109523][ T31] audit: type=1326 audit(1517.020:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12343 comm="syz.5.1920" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1517.112384][ T31] audit: type=1326 audit(1517.020:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12343 comm="syz.5.1920" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1518.183654][T12355] netlink: 'syz.5.1924': attribute type 13 has an invalid length. [ 1522.148330][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 1522.149235][ T31] audit: type=1326 audit(1522.060:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12383 comm="syz.5.1932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1522.178821][ T31] audit: type=1326 audit(1522.090:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12383 comm="syz.5.1932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1522.185235][ T31] audit: type=1326 audit(1522.100:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12383 comm="syz.5.1932" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1522.188170][ T31] audit: type=1326 audit(1522.100:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12383 comm="syz.5.1932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1522.190648][ T31] audit: type=1326 audit(1522.110:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12383 comm="syz.5.1932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1522.194378][ T31] audit: type=1326 audit(1522.110:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12383 comm="syz.5.1932" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1522.198036][ T31] audit: type=1326 audit(1522.110:1304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12383 comm="syz.5.1932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1522.211533][ T31] audit: type=1326 audit(1522.130:1305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12383 comm="syz.5.1932" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1522.217194][ T31] audit: type=1326 audit(1522.130:1306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12383 comm="syz.5.1932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1522.219278][ T31] audit: type=1326 audit(1522.130:1307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12383 comm="syz.5.1932" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1525.851993][T12418] netlink: 84 bytes leftover after parsing attributes in process `syz.5.1943'. [ 1527.078705][T12446] syzkaller0: entered promiscuous mode [ 1527.079014][T12446] syzkaller0: entered allmulticast mode [ 1527.152208][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 1527.152461][ T31] audit: type=1326 audit(1527.070:1341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12448 comm="syz.5.1956" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1527.171676][ T31] audit: type=1326 audit(1527.090:1342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12448 comm="syz.5.1956" exe="/syz-executor" sig=0 arch=40000028 syscall=370 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1527.174934][ T31] audit: type=1326 audit(1527.090:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12448 comm="syz.5.1956" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1529.110863][ T31] audit: type=1400 audit(1529.020:1344): avc: denied { setopt } for pid=12482 comm="syz.4.1966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1531.725412][T12511] smc: net device bond0 applied user defined pnetid SYZ0 [ 1531.728173][T12511] smc: net device bond0 erased user defined pnetid SYZ0 [ 1532.076204][T12513] netlink: 'syz.5.1974': attribute type 4 has an invalid length. [ 1533.573765][ T31] audit: type=1326 audit(1533.480:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12535 comm="syz.4.1982" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1533.586801][ T31] audit: type=1326 audit(1533.490:1346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12535 comm="syz.4.1982" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1533.588800][ T31] audit: type=1326 audit(1533.500:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12535 comm="syz.4.1982" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1533.607534][ T31] audit: type=1326 audit(1533.500:1348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12535 comm="syz.4.1982" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1533.609434][ T31] audit: type=1326 audit(1533.500:1349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12535 comm="syz.4.1982" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1533.612250][ T31] audit: type=1326 audit(1533.510:1350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12535 comm="syz.4.1982" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1533.613909][ T31] audit: type=1326 audit(1533.510:1351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12535 comm="syz.4.1982" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1533.622092][ T31] audit: type=1326 audit(1533.540:1352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12535 comm="syz.4.1982" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1533.624924][ T31] audit: type=1326 audit(1533.540:1353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12535 comm="syz.4.1982" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1533.631002][ T31] audit: type=1326 audit(1533.540:1354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12535 comm="syz.4.1982" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1534.824590][T12563] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 1538.925248][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 1538.926433][ T31] audit: type=1400 audit(1538.840:1389): avc: denied { compute_member } for pid=12618 comm="syz.5.2010" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1539.115192][ T31] audit: type=1326 audit(1539.030:1390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12623 comm="syz.5.2011" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1539.132060][ T31] audit: type=1326 audit(1539.040:1391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12623 comm="syz.5.2011" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1539.133071][ T31] audit: type=1326 audit(1539.050:1392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12623 comm="syz.5.2011" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1539.135568][ T31] audit: type=1326 audit(1539.050:1393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12623 comm="syz.5.2011" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1539.346233][ T31] audit: type=1326 audit(1539.260:1394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12625 comm="syz.4.2012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1539.358521][ T31] audit: type=1326 audit(1539.270:1395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12625 comm="syz.4.2012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1539.451091][ T31] audit: type=1326 audit(1539.280:1396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12625 comm="syz.4.2012" exe="/syz-executor" sig=0 arch=40000028 syscall=11 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1539.451561][ T31] audit: type=1326 audit(1539.340:1397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12625 comm="syz.4.2012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1539.460622][ T31] audit: type=1326 audit(1539.340:1398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12625 comm="syz.4.2012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1540.084085][ T7373] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1540.128096][ T7373] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1540.132169][ T7373] bond0 (unregistering): Released all slaves [ 1540.272113][ T7373] hsr_slave_0: left promiscuous mode [ 1540.275058][ T7373] hsr_slave_1: left promiscuous mode [ 1541.003948][T12655] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2018'. [ 1543.134049][T12701] netlink: 28 bytes leftover after parsing attributes in process `+}[@'. [ 1543.135955][T12701] netlink: 28 bytes leftover after parsing attributes in process `+}[@'. [ 1543.935352][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 1543.935491][ T31] audit: type=1326 audit(1543.850:1462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12707 comm="syz.5.2032" exe="/syz-executor" sig=0 arch=40000028 syscall=168 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1544.461545][ T31] audit: type=1326 audit(1544.380:1463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12707 comm="syz.5.2032" exe="/syz-executor" sig=0 arch=40000028 syscall=0 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1544.467193][ T31] audit: type=1326 audit(1544.380:1464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12707 comm="syz.5.2032" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1544.468532][ T31] audit: type=1326 audit(1544.380:1465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12707 comm="syz.5.2032" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1545.821082][ T31] audit: type=1400 audit(1545.720:1466): avc: denied { append } for pid=12745 comm="syz.4.2042" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1546.192262][ T31] audit: type=1326 audit(1546.110:1467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12749 comm="syz.4.2044" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1546.194028][ T31] audit: type=1326 audit(1546.110:1468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12749 comm="syz.4.2044" exe="/syz-executor" sig=0 arch=40000028 syscall=114 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1547.649726][ T31] audit: type=1326 audit(1547.560:1469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12749 comm="syz.4.2044" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef4f8 code=0x7ffc0000 [ 1547.669169][ T31] audit: type=1326 audit(1547.580:1470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12749 comm="syz.4.2044" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1547.674345][ T31] audit: type=1326 audit(1547.590:1471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12749 comm="syz.4.2044" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1549.818390][ T31] audit: type=1400 audit(1549.730:1472): avc: denied { lock } for pid=12842 comm="syz.5.2066" path="socket:[21275]" dev="sockfs" ino=21275 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1551.552641][ T31] audit: type=1404 audit(1551.470:1473): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1551.601955][ T31] audit: type=1404 audit(1551.510:1474): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1551.788786][ T31] audit: type=1400 audit(1551.690:1475): avc: denied { write } for pid=12858 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1551.794085][ T31] audit: type=1400 audit(1551.710:1476): avc: denied { open } for pid=12858 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1551.836474][ T31] audit: type=1400 audit(1551.750:1477): avc: denied { read } for pid=12860 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1551.888197][ T31] audit: type=1400 audit(1551.800:1478): avc: denied { map_create } for pid=12860 comm="syz.4.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1551.888594][ T31] audit: type=1400 audit(1551.800:1479): avc: denied { bpf } for pid=12860 comm="syz.4.2070" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1551.888805][ T31] audit: type=1400 audit(1551.800:1480): avc: denied { map_read map_write } for pid=12860 comm="syz.4.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1551.907442][ T31] audit: type=1400 audit(1551.820:1481): avc: denied { prog_load } for pid=12860 comm="syz.4.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1552.502811][T12872] netlink: 36 bytes leftover after parsing attributes in process `syz.4.2073'. [ 1553.962344][T12903] netlink: 36 bytes leftover after parsing attributes in process `syz.4.2081'. [ 1554.862275][T12918] serio: Serial port ptm0 [ 1555.146528][T12922] netlink: 14 bytes leftover after parsing attributes in process `syz.4.2087'. [ 1556.395220][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 1556.395548][ T31] audit: type=1400 audit(1556.310:1509): avc: denied { create } for pid=12942 comm="syz.4.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1556.404785][ T31] audit: type=1400 audit(1556.320:1510): avc: denied { ioctl } for pid=12942 comm="syz.4.2088" path="socket:[22011]" dev="sockfs" ino=22011 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1556.408289][ T31] audit: type=1400 audit(1556.320:1511): avc: denied { write } for pid=12942 comm="syz.4.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1557.316586][ T31] audit: type=1400 audit(1557.230:1512): avc: denied { ioctl } for pid=12948 comm="syz.5.2089" path="socket:[22013]" dev="sockfs" ino=22013 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1557.640951][ T31] audit: type=1326 audit(1557.550:1513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12954 comm="syz.4.2090" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1557.733513][ T31] audit: type=1326 audit(1557.590:1514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12954 comm="syz.4.2090" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1557.734612][ T31] audit: type=1326 audit(1557.640:1515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12954 comm="syz.4.2090" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1557.810677][ T31] audit: type=1326 audit(1557.720:1516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12954 comm="syz.4.2090" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1557.841934][ T31] audit: type=1326 audit(1557.760:1517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12954 comm="syz.4.2090" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1557.857300][ T31] audit: type=1326 audit(1557.770:1518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12954 comm="syz.4.2090" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1559.436521][T12976] SELinux: policydb version 0 does not match my version range 15-35 [ 1559.454311][T12976] SELinux: failed to load policy [ 1560.044438][T12986] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1560.197428][T12986] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1560.371015][T12986] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1560.609723][T12986] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1560.950631][ T7373] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1560.979160][ T7373] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1560.999009][ T7373] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1561.062515][ T7373] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1561.685055][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 1561.685942][ T31] audit: type=1400 audit(1561.600:1539): avc: denied { read } for pid=13017 comm="syz.4.2106" dev="nsfs" ino=4026532909 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1561.687850][ T31] audit: type=1400 audit(1561.600:1540): avc: denied { open } for pid=13017 comm="syz.4.2106" path="net:[4026532909]" dev="nsfs" ino=4026532909 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1561.701575][T13019] netlink: 16 bytes leftover after parsing attributes in process `syz.4.2106'. [ 1561.870891][ T31] audit: type=1400 audit(1561.780:1541): avc: denied { create } for pid=13022 comm="syz.4.2108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1561.923234][ T31] audit: type=1400 audit(1561.840:1542): avc: denied { setopt } for pid=13022 comm="syz.4.2108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1562.103559][ T31] audit: type=1400 audit(1562.020:1543): avc: denied { execmem } for pid=13024 comm="syz.5.2109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1562.892250][ T31] audit: type=1326 audit(1562.810:1544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13032 comm="syz.4.2111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1562.895769][ T31] audit: type=1326 audit(1562.810:1545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13032 comm="syz.4.2111" exe="/syz-executor" sig=0 arch=40000028 syscall=43 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1562.898437][ T31] audit: type=1326 audit(1562.810:1546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13032 comm="syz.4.2111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1562.915565][ T31] audit: type=1326 audit(1562.830:1547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13032 comm="syz.4.2111" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x13497c code=0x7ffc0000 [ 1562.915912][ T31] audit: type=1326 audit(1562.830:1548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13032 comm="syz.4.2111" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x134758 code=0x7ffc0000 [ 1566.192895][T13067] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1566.788450][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 1566.788847][ T31] audit: type=1400 audit(1566.700:1605): avc: denied { write } for pid=13073 comm="syz.4.2119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1574.526206][ T31] audit: type=1400 audit(1574.430:1606): avc: denied { bind } for pid=13125 comm="syz.4.2133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1574.543979][ T31] audit: type=1400 audit(1574.440:1607): avc: denied { setopt } for pid=13125 comm="syz.4.2133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1574.576205][ T31] audit: type=1400 audit(1574.440:1608): avc: denied { write } for pid=13125 comm="syz.4.2133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1574.814189][ T31] audit: type=1400 audit(1574.720:1609): avc: denied { create } for pid=13128 comm="syz.4.2134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1574.825141][ T31] audit: type=1400 audit(1574.740:1610): avc: denied { bind } for pid=13128 comm="syz.4.2134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1575.457939][ T31] audit: type=1326 audit(1575.370:1611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13131 comm="syz.4.2135" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1575.511849][ T31] audit: type=1326 audit(1575.400:1612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13131 comm="syz.4.2135" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1575.533031][ T31] audit: type=1326 audit(1575.440:1613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13131 comm="syz.4.2135" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1575.582638][ T31] audit: type=1326 audit(1575.480:1614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13131 comm="syz.4.2135" exe="/syz-executor" sig=0 arch=40000028 syscall=21 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1575.644358][ T31] audit: type=1400 audit(1575.560:1615): avc: denied { mounton } for pid=13131 comm="syz.4.2135" path="/232/file0" dev="tmpfs" ino=1194 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1586.058063][T13151] hid_parser_main: 6 callbacks suppressed [ 1586.059109][T13151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x1 [ 1586.064205][T13151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1586.072034][T13151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1586.072405][T13151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1586.072717][T13151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1586.072857][T13151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1586.073129][T13151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1586.073243][T13151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1586.073339][T13151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1586.073429][T13151] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1586.093572][T13151] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz0] on syz1 [ 1587.774315][T13174] random: crng reseeded on system resumption [ 1587.791226][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 1587.791526][ T31] audit: type=1400 audit(1587.690:1632): avc: denied { append } for pid=13172 comm="syz.5.2146" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1587.793377][T13174] Restarting kernel threads ... [ 1587.801035][T13174] Done restarting kernel threads. [ 1588.032888][ T31] audit: type=1400 audit(1587.950:1633): avc: denied { write } for pid=13175 comm="syz.5.2147" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1588.494988][ T31] audit: type=1400 audit(1588.410:1634): avc: denied { connect } for pid=13181 comm="syz.5.2149" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1592.383789][T13223] hid_parser_main: 28 callbacks suppressed [ 1592.384236][T13223] hid-generic 0000:3000000:0000.0009: unknown main item tag 0x4 [ 1592.384545][T13223] hid-generic 0000:3000000:0000.0009: unknown main item tag 0x2 [ 1592.385049][T13223] hid-generic 0000:3000000:0000.0009: unknown main item tag 0x3 [ 1592.463554][T13223] hid-generic 0000:3000000:0000.0009: hidraw0: HID v0.00 Device [sy] on syz0 [ 1598.374376][T13244] netlink: 'syz.5.2167': attribute type 21 has an invalid length. [ 1598.626335][ T31] audit: type=1326 audit(1598.540:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13245 comm="syz.5.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1598.628378][ T31] audit: type=1326 audit(1598.540:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13245 comm="syz.5.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1598.630727][ T31] audit: type=1326 audit(1598.540:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13245 comm="syz.5.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=330 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1598.632845][ T31] audit: type=1326 audit(1598.540:1638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13245 comm="syz.5.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1598.634629][ T31] audit: type=1326 audit(1598.540:1639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13245 comm="syz.5.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1599.024586][ T31] audit: type=1400 audit(1598.940:1640): avc: denied { name_bind } for pid=13248 comm="syz.5.2169" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1600.193719][ T31] audit: type=1400 audit(1600.110:1641): avc: denied { read write } for pid=13256 comm="syz.5.2172" name="binder1" dev="binder" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1600.203797][ T31] audit: type=1400 audit(1600.110:1642): avc: denied { open } for pid=13256 comm="syz.5.2172" path="/dev/binderfs/binder1" dev="binder" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1600.866787][ T31] audit: type=1400 audit(1600.780:1643): avc: denied { create } for pid=13263 comm="syz.5.2173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1601.204556][ T31] audit: type=1400 audit(1601.120:1644): avc: denied { create } for pid=13265 comm="syz.5.2174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1602.101713][T13275] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2176'. [ 1602.103062][T13275] bridge_slave_1: default FDB implementation only supports local addresses [ 1603.135465][T13286] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1603.707952][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 1603.708760][ T31] audit: type=1400 audit(1603.620:1671): avc: denied { getopt } for pid=13297 comm="syz.5.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1604.092490][ T31] audit: type=1400 audit(1604.010:1672): avc: denied { create } for pid=13302 comm="syz.5.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1604.514433][ T31] audit: type=1400 audit(1604.400:1673): avc: denied { watch } for pid=13302 comm="syz.5.2187" path="/166" dev="tmpfs" ino=860 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1606.280226][ T31] audit: type=1400 audit(1606.170:1674): avc: denied { kexec_image_load } for pid=13318 comm="syz.5.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 1606.327308][T13320] netlink: 'syz.5.2192': attribute type 4 has an invalid length. [ 1606.626628][ T31] audit: type=1400 audit(1606.540:1675): avc: denied { create } for pid=13324 comm="syz.5.2194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1606.633623][ T31] audit: type=1400 audit(1606.550:1676): avc: denied { write } for pid=13324 comm="syz.5.2194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1607.025103][T13328] tap0: tun_chr_ioctl cmd 1074025675 [ 1607.026539][T13328] tap0: persist enabled [ 1607.028603][T13328] tap0: tun_chr_ioctl cmd 1074025675 [ 1607.029687][T13328] tap0: persist enabled [ 1612.204572][T13346] netlink: 'syz.5.2200': attribute type 4 has an invalid length. [ 1612.608401][ T31] audit: type=1326 audit(1612.520:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13350 comm="syz.5.2202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1612.609715][ T31] audit: type=1326 audit(1612.520:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13350 comm="syz.5.2202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1612.717721][ T31] audit: type=1326 audit(1612.630:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13350 comm="syz.5.2202" exe="/syz-executor" sig=0 arch=40000028 syscall=274 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1612.718085][ T31] audit: type=1326 audit(1612.630:1680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13350 comm="syz.5.2202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1612.718286][ T31] audit: type=1326 audit(1612.630:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13350 comm="syz.5.2202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1612.722996][ T31] audit: type=1326 audit(1612.640:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13350 comm="syz.5.2202" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1612.727381][ T31] audit: type=1400 audit(1612.640:1683): avc: denied { sqpoll } for pid=13350 comm="syz.5.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1612.729688][ T31] audit: type=1326 audit(1612.640:1684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13350 comm="syz.5.2202" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1322f8 code=0x7ffc0000 [ 1612.740794][ T31] audit: type=1326 audit(1612.650:1685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13350 comm="syz.5.2202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1612.741915][ T31] audit: type=1326 audit(1612.660:1686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13350 comm="syz.5.2202" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1619.676732][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 1619.677043][ T31] audit: type=1326 audit(1619.590:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13372 comm="syz.5.2209" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1619.699529][ T31] audit: type=1326 audit(1619.590:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13372 comm="syz.5.2209" exe="/syz-executor" sig=0 arch=40000028 syscall=168 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1619.748085][ T31] audit: type=1326 audit(1619.660:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13372 comm="syz.5.2209" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1619.751404][ T31] audit: type=1326 audit(1619.660:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13372 comm="syz.5.2209" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1620.426275][ T31] audit: type=1400 audit(1620.340:1694): avc: denied { execute } for pid=13378 comm="syz.5.2211" name="file0" dev="tmpfs" ino=987 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1620.431644][ T31] audit: type=1400 audit(1620.350:1695): avc: denied { execute_no_trans } for pid=13378 comm="syz.5.2211" path="/190/file0" dev="tmpfs" ino=987 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1622.404396][ T31] audit: type=1326 audit(1622.320:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13390 comm="syz.5.2215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1622.415411][ T31] audit: type=1326 audit(1622.330:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13390 comm="syz.5.2215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1622.420128][ T31] audit: type=1326 audit(1622.330:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13390 comm="syz.5.2215" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1622.420222][ T31] audit: type=1326 audit(1622.330:1699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13390 comm="syz.5.2215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1623.137058][T13398] netlink: 'syz.5.2217': attribute type 6 has an invalid length. [ 1625.241153][T13424] netlink: 'syz.5.2222': attribute type 1 has an invalid length. [ 1625.455038][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 1625.455337][ T31] audit: type=1326 audit(1625.370:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13449 comm="syz.5.2223" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1625.464898][ T31] audit: type=1326 audit(1625.380:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13449 comm="syz.5.2223" exe="/syz-executor" sig=0 arch=40000028 syscall=220 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1628.712605][T13403] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1628.717033][T13403] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1628.819680][ T31] audit: type=1326 audit(1628.730:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13566 comm="syz.5.2225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1628.821930][ T31] audit: type=1326 audit(1628.730:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13566 comm="syz.5.2225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1628.848208][ T31] audit: type=1326 audit(1628.750:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13566 comm="syz.5.2225" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1628.848552][ T31] audit: type=1326 audit(1628.750:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13566 comm="syz.5.2225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1628.848765][ T31] audit: type=1326 audit(1628.750:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13566 comm="syz.5.2225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1628.872378][ T31] audit: type=1326 audit(1628.790:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13566 comm="syz.5.2225" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1628.896154][ T31] audit: type=1326 audit(1628.800:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13566 comm="syz.5.2225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1628.896586][ T31] audit: type=1326 audit(1628.800:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13566 comm="syz.5.2225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1630.165284][T13403] hsr_slave_0: entered promiscuous mode [ 1630.178209][T13403] hsr_slave_1: entered promiscuous mode [ 1631.733263][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 1631.733660][ T31] audit: type=1400 audit(1631.640:1757): avc: denied { create } for pid=13403 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1631.756242][T13403] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1631.757442][ T31] audit: type=1400 audit(1631.670:1758): avc: denied { write } for pid=13403 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1631.757708][ T31] audit: type=1400 audit(1631.670:1759): avc: denied { read } for pid=13403 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1631.800574][ T31] audit: type=1400 audit(1631.700:1760): avc: denied { read } for pid=13735 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1631.806326][T13403] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1631.868106][ T31] audit: type=1400 audit(1631.780:1761): avc: denied { allowed } for pid=13735 comm="syz.5.2227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1631.894323][ T31] audit: type=1400 audit(1631.810:1762): avc: denied { create } for pid=13735 comm="syz.5.2227" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1631.945605][T13403] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1631.974852][T13403] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1633.268564][ T31] audit: type=1400 audit(1633.180:1763): avc: denied { perfmon } for pid=13748 comm=ACED capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.284814][ T31] audit: type=1400 audit(1633.200:1764): avc: denied { prog_run } for pid=13748 comm=ACED scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1633.521683][ T31] audit: type=1400 audit(1633.420:1765): avc: denied { write } for pid=13752 comm="syz.5.2229" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1633.538756][ T31] audit: type=1400 audit(1633.450:1766): avc: denied { open } for pid=13752 comm="syz.5.2229" path="/dev/rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1634.428468][T13403] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1636.623718][T13774] netlink: 24 bytes leftover after parsing attributes in process `syz.5.2233'. [ 1637.144630][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 1637.144991][ T31] audit: type=1400 audit(1637.060:1778): avc: denied { ioctl } for pid=13791 comm="syz.5.2235" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1637.890363][ T31] audit: type=1400 audit(1637.800:1779): avc: denied { execmem } for pid=13802 comm="syz.5.2238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1641.938700][ T31] audit: type=1326 audit(1641.850:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13802 comm="syz.5.2238" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1641.944232][ T31] audit: type=1326 audit(1641.850:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13802 comm="syz.5.2238" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1641.959653][ T31] audit: type=1326 audit(1641.850:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13802 comm="syz.5.2238" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1641.971515][ T31] audit: type=1326 audit(1641.860:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13802 comm="syz.5.2238" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1641.973221][ T31] audit: type=1326 audit(1641.880:1784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13802 comm="syz.5.2238" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1641.974725][ T31] audit: type=1326 audit(1641.880:1785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13802 comm="syz.5.2238" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1641.981906][ T31] audit: type=1326 audit(1641.880:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13802 comm="syz.5.2238" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1641.983579][ T31] audit: type=1326 audit(1641.890:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13802 comm="syz.5.2238" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1645.654495][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1645.654729][ T31] audit: type=1400 audit(1645.550:1800): avc: denied { create } for pid=13841 comm="syz.5.2242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1645.672230][ T31] audit: type=1400 audit(1645.590:1801): avc: denied { write } for pid=13841 comm="syz.5.2242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1646.022689][T13403] veth0_vlan: entered promiscuous mode [ 1646.044302][T13403] veth1_vlan: entered promiscuous mode [ 1646.155790][T13403] veth0_macvtap: entered promiscuous mode [ 1646.177863][T13403] veth1_macvtap: entered promiscuous mode [ 1646.267167][ T7373] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1646.267629][ T7373] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1646.267742][ T7373] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1646.267818][ T7373] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1646.395283][ T31] audit: type=1400 audit(1646.310:1802): avc: denied { name_bind } for pid=13850 comm="syz.5.2245" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1646.397377][ T31] audit: type=1400 audit(1646.310:1803): avc: denied { node_bind } for pid=13850 comm="syz.5.2245" saddr=ff01::1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1646.466360][ T31] audit: type=1400 audit(1646.380:1804): avc: denied { mounton } for pid=13403 comm="syz-executor" path="/syzkaller.Mo0lxq/syz-tmp" dev="vda" ino=822 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1646.468416][ T31] audit: type=1400 audit(1646.380:1805): avc: denied { mount } for pid=13403 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1646.470607][ T31] audit: type=1400 audit(1646.380:1806): avc: denied { mounton } for pid=13403 comm="syz-executor" path="/syzkaller.Mo0lxq/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1646.495618][ T31] audit: type=1400 audit(1646.410:1807): avc: denied { mount } for pid=13403 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1646.500870][ T31] audit: type=1400 audit(1646.410:1808): avc: denied { mounton } for pid=13403 comm="syz-executor" path="/syzkaller.Mo0lxq/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1646.524170][ T31] audit: type=1400 audit(1646.440:1809): avc: denied { mounton } for pid=13403 comm="syz-executor" path="/syzkaller.Mo0lxq/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=24036 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1646.956758][T13860] x_tables: ip_tables: recent.0 match: invalid size 216 (kernel) != (user) 4096 [ 1648.602520][T13874] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1648.604195][T13874] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1649.644933][T13887] netlink: 28 bytes leftover after parsing attributes in process `syz.6.2251'. [ 1650.654698][T13896] netlink: 'syz.5.2254': attribute type 1 has an invalid length. [ 1650.714740][T13896] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1650.948495][T13896] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1650.949402][T13896] bond1: (slave vxcan3): The slave device specified does not support setting the MAC address [ 1650.967883][T13896] bond1: (slave vxcan3): Error -95 calling set_mac_address [ 1651.096656][ T31] kauditd_printk_skb: 102 callbacks suppressed [ 1651.097795][ T31] audit: type=1400 audit(1651.010:1912): avc: denied { name_bind } for pid=13936 comm="syz.6.2256" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1651.114377][ T31] audit: type=1400 audit(1651.030:1913): avc: denied { append } for pid=13936 comm="syz.6.2256" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1651.533362][T13952] macvtap0: refused to change device tx_queue_len [ 1651.855222][ T31] audit: type=1400 audit(1651.760:1914): avc: denied { create } for pid=13949 comm="syz.5.2258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1651.880600][ T31] audit: type=1400 audit(1651.790:1915): avc: denied { write } for pid=13949 comm="syz.5.2258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1653.790724][ T31] audit: type=1400 audit(1653.700:1916): avc: denied { allowed } for pid=13979 comm="syz.6.2267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1653.799533][ T31] audit: type=1400 audit(1653.710:1917): avc: denied { create } for pid=13979 comm="syz.6.2267" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1653.940498][ T31] audit: type=1400 audit(1653.850:1918): avc: denied { bind } for pid=13981 comm="syz.5.2268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1654.101376][ T31] audit: type=1326 audit(1654.020:1919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13988 comm="syz.5.2270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1654.102431][ T31] audit: type=1326 audit(1654.020:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13988 comm="syz.5.2270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1654.111194][ T31] audit: type=1326 audit(1654.020:1921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13988 comm="syz.5.2270" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1656.187244][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 1656.187712][ T31] audit: type=1400 audit(1656.100:1939): avc: denied { setopt } for pid=14014 comm="syz.5.2279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1656.913083][ T31] audit: type=1400 audit(1656.830:1940): avc: denied { create } for pid=14021 comm="syz.5.2281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1656.944218][ T31] audit: type=1400 audit(1656.850:1941): avc: denied { ioctl } for pid=14021 comm="syz.5.2281" path="socket:[23338]" dev="sockfs" ino=23338 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1657.543898][ T31] audit: type=1400 audit(1657.450:1942): avc: denied { create } for pid=14025 comm="syz.5.2283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1658.462076][ T31] audit: type=1400 audit(1658.370:1943): avc: denied { ioctl } for pid=14030 comm="syz.5.2284" path="socket:[24139]" dev="sockfs" ino=24139 ioctlcmd=0x9428 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1659.784001][ T31] audit: type=1326 audit(1659.700:1944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14040 comm="syz.5.2288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1659.789795][ T31] audit: type=1326 audit(1659.700:1945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14040 comm="syz.5.2288" exe="/syz-executor" sig=0 arch=40000028 syscall=355 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1659.803794][ T31] audit: type=1326 audit(1659.720:1946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14040 comm="syz.5.2288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1659.805746][ T31] audit: type=1326 audit(1659.720:1947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14040 comm="syz.5.2288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1659.945393][ T31] audit: type=1400 audit(1659.860:1948): avc: denied { load_policy } for pid=14044 comm="syz.5.2289" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1659.951543][T14045] SELinux: policydb version 0 does not match my version range 15-35 [ 1659.951980][T14045] SELinux: failed to load policy [ 1670.413419][T14092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14092 comm=syz.5.2303 [ 1672.760488][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 1672.760677][ T31] audit: type=1400 audit(1672.670:1957): avc: denied { wake_alarm } for pid=14120 comm="syz.5.2312" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1673.663447][ T31] audit: type=1400 audit(1673.580:1958): avc: denied { write } for pid=14131 comm="syz.5.2314" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1673.921381][T14134] netlink: 28 bytes leftover after parsing attributes in process `syz.5.2315'. [ 1673.930731][T14134] netlink: 28 bytes leftover after parsing attributes in process `syz.5.2315'. [ 1679.754693][ T31] audit: type=1400 audit(1679.670:1959): avc: denied { bind } for pid=14148 comm="syz.5.2322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1679.761596][ T31] audit: type=1400 audit(1679.680:1960): avc: denied { setopt } for pid=14148 comm="syz.5.2322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1685.405151][ T31] audit: type=1326 audit(1685.320:1961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14187 comm="syz.5.2336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1685.413901][ T31] audit: type=1326 audit(1685.330:1962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14187 comm="syz.5.2336" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1685.416433][ T31] audit: type=1326 audit(1685.330:1963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14187 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1685.417599][ T31] audit: type=1326 audit(1685.330:1964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14187 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1685.418525][ T31] audit: type=1326 audit(1685.330:1965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14187 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1685.444704][ T31] audit: type=1326 audit(1685.350:1966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14187 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1685.445110][ T31] audit: type=1326 audit(1685.360:1967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14187 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1685.445326][ T31] audit: type=1326 audit(1685.360:1968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14187 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1685.456453][ T31] audit: type=1326 audit(1685.370:1969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14187 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1685.463549][ T31] audit: type=1326 audit(1685.380:1970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14187 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1688.996081][T14200] netlink: 'syz.5.2340': attribute type 13 has an invalid length. [ 1691.622525][ T31] kauditd_printk_skb: 571 callbacks suppressed [ 1691.622995][ T31] audit: type=1400 audit(1691.540:2542): avc: denied { open } for pid=14188 comm="syz.6.2337" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1691.842885][ T31] audit: type=1400 audit(1691.760:2543): avc: denied { write } for pid=14188 comm="syz.6.2337" name="igmp" dev="proc" ino=4026532745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1695.204573][ T31] audit: type=1400 audit(1695.110:2544): avc: denied { ioctl } for pid=14219 comm="syz.5.2346" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5437 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1696.231473][ T31] audit: type=1400 audit(1696.130:2545): avc: denied { allowed } for pid=14225 comm="syz.5.2348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1696.256220][ T31] audit: type=1400 audit(1696.170:2546): avc: denied { create } for pid=14225 comm="syz.5.2348" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1696.270645][ T31] audit: type=1400 audit(1696.180:2547): avc: denied { map } for pid=14225 comm="syz.5.2348" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=24348 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1696.274475][ T31] audit: type=1400 audit(1696.180:2548): avc: denied { read write } for pid=14225 comm="syz.5.2348" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=24348 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1699.516359][ T31] audit: type=1400 audit(1699.420:2549): avc: denied { create } for pid=14228 comm="syz.5.2349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1701.418387][T14239] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2352'. [ 1701.852796][ T31] audit: type=1400 audit(1701.770:2550): avc: denied { create } for pid=14242 comm="syz.5.2353" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1701.880500][ T31] audit: type=1400 audit(1701.770:2551): avc: denied { write } for pid=14242 comm="syz.5.2353" name="file0" dev="tmpfs" ino=1572 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1701.892310][ T31] audit: type=1400 audit(1701.790:2552): avc: denied { open } for pid=14242 comm="syz.5.2353" path="/305/file0" dev="tmpfs" ino=1572 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1702.051562][ T31] audit: type=1400 audit(1701.960:2553): avc: denied { unlink } for pid=11902 comm="syz-executor" name="file0" dev="tmpfs" ino=1572 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1702.622300][ T31] audit: type=1400 audit(1702.540:2554): avc: denied { create } for pid=14246 comm="syz.5.2355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1702.650273][ T31] audit: type=1400 audit(1702.560:2555): avc: denied { write } for pid=14246 comm="syz.5.2355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1702.737922][ T31] audit: type=1400 audit(1702.650:2556): avc: denied { read } for pid=14246 comm="syz.5.2355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1711.623838][ T31] audit: type=1400 audit(1711.540:2557): avc: denied { create } for pid=14252 comm="syz.6.2356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1711.873906][ T31] audit: type=1326 audit(1711.790:2558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14254 comm="syz.6.2357" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1711.874341][ T31] audit: type=1326 audit(1711.790:2559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14254 comm="syz.6.2357" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1711.883413][ T31] audit: type=1326 audit(1711.800:2560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14254 comm="syz.6.2357" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1712.001727][ T31] audit: type=1326 audit(1711.910:2561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14254 comm="syz.6.2357" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1712.001923][ T31] audit: type=1326 audit(1711.910:2562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14254 comm="syz.6.2357" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1712.082727][ T31] audit: type=1326 audit(1711.940:2563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14254 comm="syz.6.2357" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1712.422973][ T31] audit: type=1326 audit(1712.340:2564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14254 comm="syz.6.2357" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1712.427909][ T31] audit: type=1326 audit(1712.340:2565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14254 comm="syz.6.2357" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1712.480860][ T31] audit: type=1326 audit(1712.360:2566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14254 comm="syz.6.2357" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1713.270551][T14258] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2358'. [ 1713.306752][T14258] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2358'. [ 1718.034756][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 1718.035077][ T31] audit: type=1326 audit(1717.950:2589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14282 comm="syz.6.2367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1718.037598][ T31] audit: type=1326 audit(1717.950:2590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14282 comm="syz.6.2367" exe="/syz-executor" sig=0 arch=40000028 syscall=81 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1718.039177][ T31] audit: type=1326 audit(1717.950:2591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14282 comm="syz.6.2367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1718.043097][ T31] audit: type=1326 audit(1717.960:2592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14282 comm="syz.6.2367" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1718.432572][ T31] audit: type=1400 audit(1718.350:2593): avc: denied { mounton } for pid=14287 comm="syz.6.2369" path="/40/file0" dev="tmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1718.435666][ T31] audit: type=1400 audit(1718.350:2594): avc: denied { mount } for pid=14287 comm="syz.6.2369" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1718.439265][ T31] audit: type=1400 audit(1718.350:2595): avc: denied { unmount } for pid=14287 comm="syz.6.2369" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1719.054044][ T31] audit: type=1400 audit(1718.970:2596): avc: denied { execmem } for pid=14298 comm="syz.6.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1726.477112][ T31] audit: type=1400 audit(1726.390:2597): avc: denied { bind } for pid=14304 comm="syz.5.2374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1726.497964][ T31] audit: type=1400 audit(1726.410:2598): avc: denied { setopt } for pid=14304 comm="syz.5.2374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1727.059240][ T31] audit: type=1400 audit(1726.970:2599): avc: denied { create } for pid=14311 comm="syz.5.2376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1727.059647][ T31] audit: type=1400 audit(1726.970:2600): avc: denied { write } for pid=14311 comm="syz.5.2376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1727.060530][ T31] audit: type=1400 audit(1726.970:2601): avc: denied { nlmsg_write } for pid=14311 comm="syz.5.2376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1728.004658][ T31] audit: type=1400 audit(1727.910:2602): avc: denied { kexec_image_load } for pid=14315 comm="syz.5.2378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 1728.420537][ T31] audit: type=1400 audit(1728.330:2603): avc: denied { ioctl } for pid=14318 comm="syz.5.2379" path="socket:[24481]" dev="sockfs" ino=24481 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1728.432838][ T31] audit: type=1400 audit(1728.350:2604): avc: denied { read } for pid=14318 comm="syz.5.2379" dev="nsfs" ino=4026533052 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1728.433197][ T31] audit: type=1400 audit(1728.350:2605): avc: denied { open } for pid=14318 comm="syz.5.2379" path="net:[4026533052]" dev="nsfs" ino=4026533052 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1729.685006][ T31] audit: type=1326 audit(1729.590:2606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14324 comm="syz.5.2380" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1730.217049][T14329] netlink: 44 bytes leftover after parsing attributes in process `syz.5.2381'. [ 1745.587851][T14353] netlink: 'syz.6.2388': attribute type 6 has an invalid length. [ 1745.783272][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 1745.783520][ T31] audit: type=1400 audit(1745.700:2613): avc: denied { ioctl } for pid=14354 comm="syz.6.2389" path="socket:[24730]" dev="sockfs" ino=24730 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1745.804867][ T31] audit: type=1400 audit(1745.720:2614): avc: denied { bind } for pid=14354 comm="syz.6.2389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1746.439681][ T31] audit: type=1400 audit(1746.350:2615): avc: denied { name_bind } for pid=14359 comm="syz.6.2391" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1746.448369][ T31] audit: type=1400 audit(1746.360:2616): avc: denied { node_bind } for pid=14359 comm="syz.6.2391" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1747.422800][ T31] audit: type=1400 audit(1747.340:2617): avc: denied { create } for pid=14367 comm="syz.6.2394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1747.432792][ T31] audit: type=1400 audit(1747.350:2618): avc: denied { connect } for pid=14367 comm="syz.6.2394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1747.754006][ T31] audit: type=1326 audit(1747.670:2619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14369 comm="syz.6.2395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1747.760224][ T31] audit: type=1326 audit(1747.670:2620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14369 comm="syz.6.2395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1747.812518][ T31] audit: type=1326 audit(1747.690:2621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14369 comm="syz.6.2395" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1747.814552][ T31] audit: type=1326 audit(1747.690:2622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14369 comm="syz.6.2395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1748.035064][T14374] SELinux: Context system_u:object_r:traceroute_exec_t:s0 is not valid (left unmapped). [ 1748.405111][T14381] netlink: 20 bytes leftover after parsing attributes in process `syz.6.2398'. [ 1754.960276][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 1754.971073][ T31] audit: type=1326 audit(1754.840:2639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14404 comm="syz.5.2405" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1755.031482][ T31] audit: type=1326 audit(1754.850:2640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14404 comm="syz.5.2405" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1755.031910][ T31] audit: type=1326 audit(1754.860:2641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14404 comm="syz.5.2405" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1755.032270][ T31] audit: type=1326 audit(1754.870:2642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14404 comm="syz.5.2405" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1755.032533][ T31] audit: type=1326 audit(1754.880:2643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14404 comm="syz.5.2405" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1755.032845][ T31] audit: type=1326 audit(1754.880:2644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14404 comm="syz.5.2405" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1755.032923][ T31] audit: type=1326 audit(1754.900:2645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14404 comm="syz.5.2405" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1755.032978][ T31] audit: type=1326 audit(1754.910:2646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14404 comm="syz.5.2405" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1755.033021][ T31] audit: type=1326 audit(1754.910:2647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14404 comm="syz.5.2405" exe="/syz-executor" sig=0 arch=40000028 syscall=136 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1755.033102][ T31] audit: type=1326 audit(1754.910:2648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14404 comm="syz.5.2405" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1760.260883][T14437] veth0_to_team: entered promiscuous mode [ 1760.448831][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 1760.449113][ T31] audit: type=1326 audit(1760.360:2665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.5.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1760.465288][ T31] audit: type=1326 audit(1760.380:2666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.5.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1760.468683][ T31] audit: type=1326 audit(1760.380:2667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.5.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1760.493707][ T31] audit: type=1326 audit(1760.410:2668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.5.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1760.501583][ T31] audit: type=1326 audit(1760.410:2669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.5.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1760.514882][ T31] audit: type=1326 audit(1760.410:2670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.5.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1760.516004][ T31] audit: type=1326 audit(1760.430:2671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.5.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1760.533426][ T31] audit: type=1326 audit(1760.450:2672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.5.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1760.537894][ T31] audit: type=1326 audit(1760.450:2673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.5.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1760.539515][ T31] audit: type=1326 audit(1760.450:2674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14439 comm="syz.5.2418" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1762.353325][T14471] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2428'. [ 1762.375595][T14471] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2428'. [ 1763.185827][T14489] netlink: 7 bytes leftover after parsing attributes in process `syz.5.2435'. [ 1763.203573][T14489] netlink: 7 bytes leftover after parsing attributes in process `syz.5.2435'. [ 1765.676258][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 1765.676524][ T31] audit: type=1400 audit(1765.590:2711): avc: denied { connect } for pid=14505 comm="syz.5.2440" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1765.679392][ T31] audit: type=1400 audit(1765.590:2712): avc: denied { write } for pid=14505 comm="syz.5.2440" path="socket:[24896]" dev="sockfs" ino=24896 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1766.493308][ T31] audit: type=1400 audit(1766.410:2713): avc: denied { load_policy } for pid=14513 comm="syz.5.2443" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1766.501731][T14516] SELinux: policydb version 0 does not match my version range 15-35 [ 1766.512739][T14516] SELinux: failed to load policy [ 1767.577918][ T31] audit: type=1326 audit(1767.490:2714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14534 comm="syz.5.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1767.710959][ T31] audit: type=1326 audit(1767.610:2715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14534 comm="syz.5.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1767.711413][ T31] audit: type=1326 audit(1767.610:2716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14534 comm="syz.5.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1767.711708][ T31] audit: type=1326 audit(1767.610:2717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14534 comm="syz.5.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1767.725185][ T31] audit: type=1326 audit(1767.640:2718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14534 comm="syz.5.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1767.728317][ T31] audit: type=1326 audit(1767.640:2719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14534 comm="syz.5.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1767.736575][ T31] audit: type=1326 audit(1767.650:2720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14534 comm="syz.5.2452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1768.615087][T14550] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2456'. [ 1768.622832][T14550] netlink: 40 bytes leftover after parsing attributes in process `syz.5.2456'. [ 1769.592682][T14584] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1769.597002][T14584] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1771.660636][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 1771.661079][ T31] audit: type=1400 audit(1771.570:2729): avc: denied { connect } for pid=14609 comm="syz.5.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1772.385229][ T31] audit: type=1326 audit(1772.300:2730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14619 comm="syz.5.2473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1772.398440][ T31] audit: type=1326 audit(1772.310:2731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14619 comm="syz.5.2473" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1772.399105][ T31] audit: type=1326 audit(1772.310:2732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14619 comm="syz.5.2473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1772.411235][ T31] audit: type=1326 audit(1772.330:2733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14619 comm="syz.5.2473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1772.449421][ T31] audit: type=1326 audit(1772.360:2734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14619 comm="syz.5.2473" exe="/syz-executor" sig=0 arch=40000028 syscall=40 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1772.450470][ T31] audit: type=1326 audit(1772.360:2735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14619 comm="syz.5.2473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1772.472162][ T31] audit: type=1326 audit(1772.390:2736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14619 comm="syz.5.2473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1777.251359][ T31] audit: type=1400 audit(1777.160:2737): avc: denied { read } for pid=14661 comm="syz.5.2486" path="socket:[24999]" dev="sockfs" ino=24999 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1778.562181][T14675] SELinux: policydb version 0 does not match my version range 15-35 [ 1778.562868][T14675] SELinux: failed to load policy [ 1778.716743][ T31] audit: type=1326 audit(1778.630:2738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14679 comm="syz.5.2493" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1778.724314][ T31] audit: type=1326 audit(1778.640:2739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14679 comm="syz.5.2493" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1778.735440][ T31] audit: type=1326 audit(1778.650:2740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14679 comm="syz.5.2493" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1778.743756][ T31] audit: type=1326 audit(1778.660:2741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14679 comm="syz.5.2493" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1778.755064][ T31] audit: type=1326 audit(1778.660:2742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14679 comm="syz.5.2493" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1778.755470][ T31] audit: type=1326 audit(1778.670:2743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14679 comm="syz.5.2493" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1778.763830][ T31] audit: type=1326 audit(1778.680:2744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14679 comm="syz.5.2493" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1778.773282][ T31] audit: type=1326 audit(1778.680:2745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14679 comm="syz.5.2493" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1778.775783][ T31] audit: type=1326 audit(1778.690:2746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14679 comm="syz.5.2493" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1778.936120][T14685] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14685 comm=syz.5.2494 [ 1783.681408][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 1783.682484][ T31] audit: type=1400 audit(1783.600:2758): avc: denied { bind } for pid=14711 comm="syz.6.2503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1783.697815][ T31] audit: type=1400 audit(1783.610:2759): avc: denied { node_bind } for pid=14711 comm="syz.6.2503" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1784.923716][ T31] audit: type=1326 audit(1784.840:2760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14718 comm="syz.6.2506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1784.931409][ T31] audit: type=1326 audit(1784.850:2761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14718 comm="syz.6.2506" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1784.937175][ T31] audit: type=1326 audit(1784.850:2762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14718 comm="syz.6.2506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1784.942118][ T31] audit: type=1326 audit(1784.860:2763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14718 comm="syz.6.2506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1784.948926][ T31] audit: type=1326 audit(1784.860:2764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14718 comm="syz.6.2506" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1784.957637][ T31] audit: type=1326 audit(1784.870:2765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14718 comm="syz.6.2506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1785.053920][ T31] audit: type=1326 audit(1784.970:2766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14718 comm="syz.6.2506" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1785.143536][ T31] audit: type=1326 audit(1785.060:2767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14718 comm="syz.6.2506" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1788.692621][T14728] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2509'. [ 1788.821216][T14728] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2509'. [ 1789.224759][T14732] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2509'. [ 1789.362156][T14728] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2509'. [ 1789.507435][T14732] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2509'. [ 1789.964075][T14732] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2509'. [ 1792.798725][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 1792.799558][ T31] audit: type=1400 audit(1792.710:2775): avc: denied { bind } for pid=14760 comm="syz.6.2516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1794.732513][T14778] netlink: 348 bytes leftover after parsing attributes in process `+}[@'. [ 1794.750563][ T31] audit: type=1400 audit(1794.660:2776): avc: denied { ioctl } for pid=14769 comm="+}[@" path="socket:[26117]" dev="sockfs" ino=26117 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1799.259149][ T31] audit: type=1326 audit(1799.170:2777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14823 comm="syz.6.2530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1799.283195][ T31] audit: type=1326 audit(1799.200:2778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14823 comm="syz.6.2530" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1799.289064][ T31] audit: type=1326 audit(1799.200:2779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14823 comm="syz.6.2530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1799.302738][ T31] audit: type=1326 audit(1799.220:2780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14823 comm="syz.6.2530" exe="/syz-executor" sig=0 arch=40000028 syscall=161 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1799.305906][ T31] audit: type=1326 audit(1799.220:2781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14823 comm="syz.6.2530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1799.945913][T14828] netlink: 36 bytes leftover after parsing attributes in process `syz.6.2531'. [ 1809.537599][ T31] audit: type=1400 audit(1809.450:2782): avc: denied { ioctl } for pid=14868 comm="syz.5.2537" path="socket:[26219]" dev="sockfs" ino=26219 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1809.622695][T14869] wireguard0: entered promiscuous mode [ 1809.623446][T14869] wireguard0: entered allmulticast mode [ 1811.893326][ T31] audit: type=1400 audit(1811.800:2783): avc: denied { append } for pid=14892 comm="syz.5.2545" name="001" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1819.015297][T14889] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1819.018555][T14889] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1819.018987][T14889] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1819.019391][T14889] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1819.019752][T14889] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1819.025477][T14889] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1819.027266][T14889] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1819.028919][T14889] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1819.033401][T14889] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1819.035206][T14889] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1819.166935][T14889] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz0] on syz1 [ 1819.595310][ T31] audit: type=1326 audit(1819.510:2784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14917 comm="syz.5.2552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1819.603657][ T31] audit: type=1326 audit(1819.510:2785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14917 comm="syz.5.2552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1819.610785][ T31] audit: type=1326 audit(1819.520:2786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14917 comm="syz.5.2552" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1819.616095][ T31] audit: type=1326 audit(1819.530:2787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14917 comm="syz.5.2552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1819.636306][ T31] audit: type=1326 audit(1819.550:2788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14917 comm="syz.5.2552" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1819.640325][ T31] audit: type=1326 audit(1819.550:2789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14917 comm="syz.5.2552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1819.666943][ T31] audit: type=1326 audit(1819.560:2790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14917 comm="syz.5.2552" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1819.668450][ T31] audit: type=1326 audit(1819.570:2791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14917 comm="syz.5.2552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1819.671577][ T31] audit: type=1326 audit(1819.570:2792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14917 comm="syz.5.2552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1819.691204][ T31] audit: type=1326 audit(1819.610:2793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14917 comm="syz.5.2552" exe="/syz-executor" sig=0 arch=40000028 syscall=150 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1825.547210][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 1825.547502][ T31] audit: type=1400 audit(1825.460:2796): avc: denied { name_bind } for pid=14923 comm="syz.6.2554" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1825.590877][T14924] geneve2: entered promiscuous mode [ 1825.591866][T14924] geneve2: entered allmulticast mode [ 1826.811293][T14960] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 1827.358639][ T31] audit: type=1326 audit(1827.270:2797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14965 comm="syz.6.2560" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1827.379459][ T31] audit: type=1326 audit(1827.290:2798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14965 comm="syz.6.2560" exe="/syz-executor" sig=0 arch=40000028 syscall=353 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1827.393027][ T31] audit: type=1326 audit(1827.310:2799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14965 comm="syz.6.2560" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1827.789144][ T31] audit: type=1326 audit(1827.700:2800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14969 comm="syz.6.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1827.831006][ T31] audit: type=1326 audit(1827.740:2801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14969 comm="syz.6.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=329 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1827.834743][ T31] audit: type=1326 audit(1827.740:2802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14969 comm="syz.6.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1827.839669][ T31] audit: type=1326 audit(1827.750:2803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14969 comm="syz.6.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1828.264508][ T31] audit: type=1400 audit(1828.180:2804): avc: denied { block_suspend } for pid=14973 comm="syz.6.2563" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1831.090705][ T31] audit: type=1400 audit(1831.000:2805): avc: denied { execute } for pid=14995 comm="syz.6.2566" path="/149/cpuset.memory_pressure_enabled" dev="tmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1832.261308][ T31] audit: type=1326 audit(1832.170:2806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15002 comm="syz.6.2569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1832.268083][ T31] audit: type=1326 audit(1832.170:2807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15002 comm="syz.6.2569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1832.281529][ T31] audit: type=1326 audit(1832.170:2808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15002 comm="syz.6.2569" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1832.302814][ T31] audit: type=1326 audit(1832.170:2809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15002 comm="syz.6.2569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1832.303237][ T31] audit: type=1326 audit(1832.170:2810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15002 comm="syz.6.2569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1832.303528][ T31] audit: type=1326 audit(1832.190:2811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15002 comm="syz.6.2569" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1832.303765][ T31] audit: type=1326 audit(1832.190:2812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15002 comm="syz.6.2569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1832.305470][ T31] audit: type=1326 audit(1832.190:2813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15002 comm="syz.6.2569" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1832.305802][ T31] audit: type=1326 audit(1832.190:2814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15002 comm="syz.6.2569" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1834.883497][T15025] tmpfs: Unsupported parameter 'mpol' [ 1841.294471][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 1841.294819][ T31] audit: type=1400 audit(1841.210:2828): avc: denied { setopt } for pid=15043 comm="syz.6.2580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1841.303309][T15044] netlink: 36 bytes leftover after parsing attributes in process `syz.6.2580'. [ 1841.343188][T15044] netlink: 224 bytes leftover after parsing attributes in process `syz.6.2580'. [ 1841.956473][T15051] netlink: 340 bytes leftover after parsing attributes in process `syz.6.2582'. [ 1846.149416][ T31] audit: type=1326 audit(1846.060:2829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15085 comm="syz.6.2593" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1846.153217][ T31] audit: type=1326 audit(1846.070:2830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15085 comm="syz.6.2593" exe="/syz-executor" sig=0 arch=40000028 syscall=451 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1846.153369][ T31] audit: type=1326 audit(1846.070:2831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15085 comm="syz.6.2593" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1846.284683][ T31] audit: type=1400 audit(1846.200:2832): avc: denied { create } for pid=15088 comm="syz.6.2594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1846.294424][ T31] audit: type=1400 audit(1846.210:2833): avc: denied { setopt } for pid=15088 comm="syz.6.2594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1849.126838][T15134] syzkaller0: entered promiscuous mode [ 1849.127222][T15134] syzkaller0: entered allmulticast mode [ 1852.152615][T15168] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2616'. [ 1853.803034][ T31] audit: type=1400 audit(1853.720:2834): avc: denied { read } for pid=15179 comm="syz.5.2620" path="socket:[25595]" dev="sockfs" ino=25595 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1854.166381][T15184] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1854.235744][T15184] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1854.317296][T15184] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1854.388453][T15184] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1854.519258][ T7373] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1854.544156][ T7373] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1854.572542][ T7373] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1854.601126][ T3445] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1855.188951][T15184] SELinux: ebitmap: truncated map [ 1855.194277][T15184] SELinux: failed to load policy [ 1857.205482][ T31] audit: type=1326 audit(1857.100:2835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15228 comm="syz.5.2626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1857.249644][ T31] audit: type=1326 audit(1857.150:2836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15228 comm="syz.5.2626" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1857.274416][ T31] audit: type=1326 audit(1857.190:2837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15228 comm="syz.5.2626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1857.275524][ T31] audit: type=1326 audit(1857.190:2838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15228 comm="syz.5.2626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1857.277881][ T31] audit: type=1326 audit(1857.190:2839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15228 comm="syz.5.2626" exe="/syz-executor" sig=0 arch=40000028 syscall=15 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1857.279458][ T31] audit: type=1326 audit(1857.190:2840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15228 comm="syz.5.2626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1857.280982][ T31] audit: type=1326 audit(1857.190:2841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15228 comm="syz.5.2626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1857.710836][ T31] audit: type=1326 audit(1857.620:2842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15234 comm="syz.5.2628" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1857.714658][ T31] audit: type=1326 audit(1857.630:2843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15234 comm="syz.5.2628" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1858.981059][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 1858.981329][ T31] audit: type=1400 audit(1858.880:2857): avc: denied { setopt } for pid=15242 comm="syz.6.2631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1867.273237][ T31] audit: type=1326 audit(1867.190:2858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15281 comm="syz.5.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1867.280650][ T31] audit: type=1326 audit(1867.190:2859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15281 comm="syz.5.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1867.302390][ T31] audit: type=1326 audit(1867.220:2860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15281 comm="syz.5.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1867.304816][ T31] audit: type=1326 audit(1867.220:2861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15281 comm="syz.5.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1867.343708][T15285] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 1867.364860][ T31] audit: type=1326 audit(1867.250:2862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15281 comm="syz.5.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1867.370777][ T31] audit: type=1326 audit(1867.260:2863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15281 comm="syz.5.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=227 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1867.420765][ T31] audit: type=1400 audit(1867.320:2864): avc: denied { relabelto } for pid=15281 comm="syz.5.2642" name="bus" dev="tmpfs" ino=2171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 1867.484481][ T31] audit: type=1400 audit(1867.320:2865): avc: denied { associate } for pid=15281 comm="syz.5.2642" name="bus" dev="tmpfs" ino=2171 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 1867.490300][ T31] audit: type=1326 audit(1867.390:2866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15281 comm="syz.5.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1867.496768][ T31] audit: type=1326 audit(1867.390:2867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15281 comm="syz.5.2642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 1868.082727][ T32] INFO: task kworker/0:1:7624 blocked for more than 430 seconds. [ 1868.084697][ T32] Not tainted syzkaller #0 [ 1868.088775][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.091545][ T32] task:kworker/0:1 state:D stack:0 pid:7624 tgid:7624 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.094838][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.102649][ T32] Call trace: [ 1868.104457][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.107712][ T32] r10:dfa15d84 r9:00000002 r8:60000113 r7:82916594 r6:dfa15d8c r5:85676000 [ 1868.109497][ T32] r4:85676000 [ 1868.111326][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.112804][ T32] r5:85676000 r4:82916590 [ 1868.114106][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.120467][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.121922][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 [ 1868.124985][ T32] r4:00000000 [ 1868.126798][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.129044][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.131302][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.132542][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3ffc0 [ 1868.133884][ T32] r4:00000000 [ 1868.134919][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.142361][ T32] r9:83018005 r8:85676000 r7:00000000 r6:83018000 r5:00001000 r4:7f26c000 [ 1868.144315][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.151402][ T32] r5:00001000 r4:df941000 [ 1868.152478][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.154408][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.156274][ T32] r5:85a6bf8c r4:85c88100 [ 1868.157898][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.160925][ T32] r7:dddced40 r6:83018000 r5:85a6bf8c r4:85c88100 [ 1868.162319][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.164383][ T32] r10:61c88647 r9:85676000 r8:85c8812c r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.166021][ T32] r4:85c88100 [ 1868.167102][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.180694][ T32] r10:00000000 r9:85c88100 r8:8027ade4 r7:dfa99e60 r6:85c88580 r5:85676000 [ 1868.181000][ T32] r4:00000001 [ 1868.181242][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.181638][ T32] Exception stack(0xdfa15fb0 to 0xdfa15ff8) [ 1868.181989][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1868.182172][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.182335][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.182536][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.182733][ T32] r4:860315c0 [ 1868.183736][ T32] INFO: task kworker/0:1:7624 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.183989][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.184648][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.185102][ T32] Call trace: [ 1868.185652][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.185976][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.186186][ T32] r4:00000000 [ 1868.186427][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.186684][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.186920][ T32] 1d20: 80d1a000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.187141][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.187357][ T32] 1d60: 80000113 ffffffff [ 1868.187562][ T32] r5:80000113 r4:80239bd0 [ 1868.187759][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.188040][ T32] r4:82ac8f64 [ 1868.188226][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.188477][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.188682][ T32] r4:dfd21dc0 [ 1868.188914][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.189227][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.189414][ T32] r4:00000000 [ 1868.189621][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.301638][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.303901][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.305068][ T32] r5:00001000 r4:dfba1000 [ 1868.305872][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.306904][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.307885][ T32] r5:86641b8c r4:85766d00 [ 1868.308556][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.309661][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.311529][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.312590][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.314725][ T32] r4:85766d00 [ 1868.322167][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.322620][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.322789][ T32] r4:00000001 [ 1868.322926][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.323120][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.323374][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.323546][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.323696][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.323851][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.324062][ T32] r4:85c64040 [ 1868.333077][ T32] INFO: task kworker/0:8:8729 blocked for more than 430 seconds. [ 1868.334132][ T32] Not tainted syzkaller #0 [ 1868.334996][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.337107][ T32] task:kworker/0:8 state:D stack:0 pid:8729 tgid:8729 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.338716][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.340419][ T32] Call trace: [ 1868.341605][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.348156][ T32] r10:dfaa5d84 r9:00000002 r8:60000113 r7:82916594 r6:dfaa5d8c r5:83fba400 [ 1868.349302][ T32] r4:83fba400 [ 1868.349510][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1868.349748][ T32] r5:83fba400 r4:82916590 [ 1868.350194][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.350545][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.350783][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 [ 1868.350915][ T32] r4:00000000 [ 1868.351030][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.351202][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.351399][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.351611][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a51e80 [ 1868.351743][ T32] r4:00000000 [ 1868.351859][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.352058][ T32] r9:83018005 r8:83fba400 r7:00000000 r6:83018000 r5:00001000 r4:7f25e000 [ 1868.352180][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.352429][ T32] r5:00001000 r4:df994000 [ 1868.352576][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.352756][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.352947][ T32] r5:85a6a38c r4:849ff380 [ 1868.353076][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.353280][ T32] r7:dddced40 r6:83018000 r5:85a6a38c r4:849ff380 [ 1868.353399][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.353600][ T32] r10:61c88647 r9:83fba400 r8:849ff3ac r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.353739][ T32] r4:849ff380 [ 1868.353863][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.354067][ T32] r10:00000000 r9:849ff380 r8:8027ade4 r7:df9fde60 r6:849ffc80 r5:83fba400 [ 1868.354207][ T32] r4:00000001 [ 1868.354340][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.354502][ T32] Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) [ 1868.354685][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1868.354864][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.355006][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.355151][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.355278][ T32] r4:85bf5200 [ 1868.355810][ T32] INFO: task kworker/0:8:8729 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.355981][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.356404][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.356778][ T32] Call trace: [ 1868.357018][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.357228][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.357372][ T32] r4:00000000 [ 1868.357553][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.357734][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.357934][ T32] 1d20: 835c9000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.391309][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.392418][ T32] 1d60: 80000113 ffffffff [ 1868.417527][ T32] r5:80000113 r4:80239bd0 [ 1868.418816][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.419096][ T32] r4:82ac8f64 [ 1868.419223][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.419475][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.419509][ T32] r4:dfd21dc0 [ 1868.419693][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.420491][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.472553][ T32] r4:00000000 [ 1868.472775][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.473014][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.473486][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.474654][ T32] r5:00001000 r4:dfba1000 [ 1868.474830][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.474922][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.474985][ T32] r5:86641b8c r4:85766d00 [ 1868.475004][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.475063][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.475081][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.475196][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.475235][ T32] r4:85766d00 [ 1868.475278][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.475413][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.475440][ T32] r4:00000001 [ 1868.475491][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.475548][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.475813][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.475875][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.475905][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.475940][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.476107][ T32] r4:85c64040 [ 1868.501140][ T32] INFO: task kworker/1:15:9519 blocked for more than 430 seconds. [ 1868.503087][ T32] Not tainted syzkaller #0 [ 1868.503272][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.503422][ T32] task:kworker/1:15 state:D stack:0 pid:9519 tgid:9519 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.503542][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.503730][ T32] Call trace: [ 1868.503810][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.503945][ T32] r10:dfb5dd84 r9:00000002 r8:60000113 r7:82916594 r6:dfb5dd8c r5:867c3c00 [ 1868.503979][ T32] r4:867c3c00 [ 1868.503999][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.504058][ T32] r5:867c3c00 r4:82916590 [ 1868.504075][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.504131][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.504195][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 [ 1868.504241][ T32] r4:00000000 [ 1868.504264][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.504313][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.504368][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.504437][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bf5780 [ 1868.504456][ T32] r4:00000000 [ 1868.504471][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.504536][ T32] r9:83018205 r8:867c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f284000 [ 1868.504557][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.504610][ T32] r5:00001000 r4:dfb2f000 [ 1868.504691][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.504785][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.504845][ T32] r5:85da838c r4:849f6400 [ 1868.504865][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.504932][ T32] r7:ddde2d40 r6:83018200 r5:85da838c r4:849f6400 [ 1868.505075][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.505149][ T32] r10:61c88647 r9:867c3c00 r8:849f642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.505171][ T32] r4:849f6400 [ 1868.505188][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.505311][ T32] r10:00000000 r9:849f6400 r8:8027ade4 r7:dfbd1e60 r6:849df680 r5:867c3c00 [ 1868.505338][ T32] r4:00000001 [ 1868.505419][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.505474][ T32] Exception stack(0xdfb5dfb0 to 0xdfb5dff8) [ 1868.505524][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1868.505675][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.505716][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.505788][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.505814][ T32] r4:85b55500 [ 1868.506241][ T32] INFO: task kworker/1:15:9519 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.506283][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.506355][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.506454][ T32] Call trace: [ 1868.506484][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.506827][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.506871][ T32] r4:00000000 [ 1868.506926][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.506994][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.507028][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.507139][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.507170][ T32] 1d60: 80000113 ffffffff [ 1868.507230][ T32] r5:80000113 r4:80239bd0 [ 1868.507254][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.507315][ T32] r4:82ac8f64 [ 1868.507410][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.507483][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.507789][ T32] r4:dfd21dc0 [ 1868.507822][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.507894][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.507916][ T32] r4:00000000 [ 1868.507932][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.508000][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.508020][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.508074][ T32] r5:00001000 r4:dfba1000 [ 1868.508107][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.508159][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.508213][ T32] r5:86641b8c r4:85766d00 [ 1868.508259][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.508325][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.508663][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.508902][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.508945][ T32] r4:85766d00 [ 1868.508960][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.509021][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.509038][ T32] r4:00000001 [ 1868.509194][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.509318][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.509410][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.509450][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.509480][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.509608][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.509637][ T32] r4:85c64040 [ 1868.509722][ T32] INFO: task kworker/0:18:10164 blocked for more than 430 seconds. [ 1868.509773][ T32] Not tainted syzkaller #0 [ 1868.537340][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.537492][ T32] task:kworker/0:18 state:D stack:0 pid:10164 tgid:10164 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.537647][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.537761][ T32] Call trace: [ 1868.537816][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.537902][ T32] r10:dfb09d84 r9:00000002 r8:60000113 r7:82916594 r6:dfb09d8c r5:83b40c00 [ 1868.537925][ T32] r4:83b40c00 [ 1868.537939][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.537990][ T32] r5:83b40c00 r4:82916590 [ 1868.538106][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.538174][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.538236][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 [ 1868.538294][ T32] r4:00000000 [ 1868.538317][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.538370][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.538421][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.538481][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662100 [ 1868.538541][ T32] r4:00000000 [ 1868.538563][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.538656][ T32] r9:83018005 r8:83b40c00 r7:00000000 r6:83018000 r5:00001000 r4:7f26c000 [ 1868.538676][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.538730][ T32] r5:00001000 r4:df83b000 [ 1868.538750][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.538981][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.539062][ T32] r5:85decf8c r4:849f6b80 [ 1868.539083][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.539147][ T32] r7:dddced40 r6:83018000 r5:85decf8c r4:849f6b80 [ 1868.539165][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.539234][ T32] r10:61c88647 r9:83b40c00 r8:849f6bac r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.539253][ T32] r4:849f6b80 [ 1868.539267][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.539328][ T32] r10:00000000 r9:849f6b80 r8:8027ade4 r7:dfb2de60 r6:85c31300 r5:83b40c00 [ 1868.539349][ T32] r4:00000001 [ 1868.539367][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.539413][ T32] Exception stack(0xdfb09fb0 to 0xdfb09ff8) [ 1868.539602][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1868.539641][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.539668][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.539698][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.539890][ T32] r4:85c1ec40 [ 1868.551559][ T32] INFO: task kworker/0:18:10164 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.551672][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.551868][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.551980][ T32] Call trace: [ 1868.552053][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.552144][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.552168][ T32] r4:00000000 [ 1868.552185][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.552266][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.552309][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.552338][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.552360][ T32] 1d60: 80000113 ffffffff [ 1868.552393][ T32] r5:80000113 r4:80239bd0 [ 1868.552411][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.552474][ T32] r4:82ac8f64 [ 1868.552490][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.552580][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.552663][ T32] r4:dfd21dc0 [ 1868.552763][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.552883][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.552911][ T32] r4:00000000 [ 1868.552999][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.553067][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.553086][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.553197][ T32] r5:00001000 r4:dfba1000 [ 1868.553228][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.553279][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.553333][ T32] r5:86641b8c r4:85766d00 [ 1868.553351][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.553417][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.553436][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.553497][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.553517][ T32] r4:85766d00 [ 1868.553571][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.553651][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.553712][ T32] r4:00000001 [ 1868.553736][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.553789][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.553847][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.553934][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.553968][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.554019][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.554095][ T32] r4:85c64040 [ 1868.554162][ T32] INFO: task kworker/0:26:10892 blocked for more than 430 seconds. [ 1868.554201][ T32] Not tainted syzkaller #0 [ 1868.554248][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.554270][ T32] task:kworker/0:26 state:D stack:0 pid:10892 tgid:10892 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.554369][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.554421][ T32] Call trace: [ 1868.554510][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.554606][ T32] r10:dfb85d84 r9:00000002 r8:60000113 r7:82916594 r6:dfb85d8c r5:8422e000 [ 1868.554630][ T32] r4:8422e000 [ 1868.554645][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.554785][ T32] r5:8422e000 r4:82916590 [ 1868.554819][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.554880][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.554940][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 [ 1868.554959][ T32] r4:00000000 [ 1868.554978][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.555026][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.555071][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.555195][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a51100 [ 1868.555243][ T32] r4:00000000 [ 1868.555424][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.555499][ T32] r9:83018005 r8:8422e000 r7:00000000 r6:83018000 r5:00001000 r4:7f26e000 [ 1868.555517][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.555570][ T32] r5:00001000 r4:df99b000 [ 1868.555585][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.555633][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.555686][ T32] r5:85e1b78c r4:85ea3380 [ 1868.555703][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.555796][ T32] r7:dddced40 r6:83018000 r5:85e1b78c r4:85ea3380 [ 1868.555821][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.555880][ T32] r10:61c88647 r9:8422e000 r8:85ea33ac r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.555899][ T32] r4:85ea3380 [ 1868.555914][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.555994][ T32] r10:00000000 r9:85ea3380 r8:8027ade4 r7:dfb09e60 r6:85ea3400 r5:8422e000 [ 1868.556017][ T32] r4:00000001 [ 1868.556316][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.556377][ T32] Exception stack(0xdfb85fb0 to 0xdfb85ff8) [ 1868.556408][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1868.556478][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.556512][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.556603][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.556653][ T32] r4:85c36080 [ 1868.556954][ T32] INFO: task kworker/0:26:10892 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.556998][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.557067][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.557199][ T32] Call trace: [ 1868.557314][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.557551][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.557582][ T32] r4:00000000 [ 1868.557664][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.557859][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.557902][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.557984][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.558015][ T32] 1d60: 80000113 ffffffff [ 1868.558040][ T32] r5:80000113 r4:80239bd0 [ 1868.558056][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.558212][ T32] r4:82ac8f64 [ 1868.558247][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.558313][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.558335][ T32] r4:dfd21dc0 [ 1868.558349][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.558412][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.558472][ T32] r4:00000000 [ 1868.558516][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.558736][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.558762][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.558815][ T32] r5:00001000 r4:dfba1000 [ 1868.558831][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.558945][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.559060][ T32] r5:86641b8c r4:85766d00 [ 1868.559135][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.559217][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.559242][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.559399][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.559447][ T32] r4:85766d00 [ 1868.559509][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.559573][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.559591][ T32] r4:00000001 [ 1868.559610][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.559653][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.559677][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.559748][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.559844][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.586172][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.586268][ T32] r4:85c64040 [ 1868.586312][ T32] INFO: task kworker/1:25:10919 blocked for more than 430 seconds. [ 1868.586378][ T32] Not tainted syzkaller #0 [ 1868.586403][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.586420][ T32] task:kworker/1:25 state:D stack:0 pid:10919 tgid:10919 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.586598][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.586763][ T32] Call trace: [ 1868.586799][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.586897][ T32] r10:dfce9d84 r9:00000002 r8:60000113 r7:82916594 r6:dfce9d8c r5:858a3c00 [ 1868.586921][ T32] r4:858a3c00 [ 1868.586936][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.586992][ T32] r5:858a3c00 r4:82916590 [ 1868.587007][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.587089][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.587158][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 [ 1868.587179][ T32] r4:00000000 [ 1868.587194][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.587255][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.587308][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.587372][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a51240 [ 1868.587392][ T32] r4:00000000 [ 1868.587412][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.587476][ T32] r9:83018205 r8:858a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f270000 [ 1868.587495][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.587577][ T32] r5:00001000 r4:df9eb000 [ 1868.587597][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.587641][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.587694][ T32] r5:85e1ab8c r4:85766400 [ 1868.587751][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.587827][ T32] r7:ddde2d40 r6:83018200 r5:85e1ab8c r4:85766400 [ 1868.587846][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.587910][ T32] r10:61c88647 r9:858a3c00 r8:8576642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.587929][ T32] r4:85766400 [ 1868.587993][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.588061][ T32] r10:00000000 r9:85766400 r8:8027ade4 r7:dfcede60 r6:85766980 r5:858a3c00 [ 1868.588081][ T32] r4:00000001 [ 1868.588095][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.588140][ T32] Exception stack(0xdfce9fb0 to 0xdfce9ff8) [ 1868.588170][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1868.588200][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.588238][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.588273][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.588293][ T32] r4:849d8ac0 [ 1868.588743][ T32] INFO: task kworker/1:25:10919 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.588784][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.588851][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.588942][ T32] Call trace: [ 1868.589043][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.589110][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.589129][ T32] r4:00000000 [ 1868.589143][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.589187][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.589231][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.589265][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.589286][ T32] 1d60: 80000113 ffffffff [ 1868.589308][ T32] r5:80000113 r4:80239bd0 [ 1868.589323][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.589442][ T32] r4:82ac8f64 [ 1868.589468][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.589535][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.589629][ T32] r4:dfd21dc0 [ 1868.589657][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.589723][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.589743][ T32] r4:00000000 [ 1868.589784][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.598188][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.598328][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.598429][ T32] r5:00001000 r4:dfba1000 [ 1868.598444][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.598491][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.598688][ T32] r5:86641b8c r4:85766d00 [ 1868.598715][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.598785][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.598805][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.598868][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.598887][ T32] r4:85766d00 [ 1868.598905][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.598964][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.598990][ T32] r4:00000001 [ 1868.599070][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.599128][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.599225][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.599330][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.599371][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.599408][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.599430][ T32] r4:85c64040 [ 1868.599548][ T32] INFO: task kworker/0:27:10939 blocked for more than 430 seconds. [ 1868.599606][ T32] Not tainted syzkaller #0 [ 1868.599631][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.599649][ T32] task:kworker/0:27 state:D stack:0 pid:10939 tgid:10939 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.599726][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.610885][ T32] Call trace: [ 1868.610999][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.611116][ T32] r10:dfb19d84 r9:00000002 r8:60010013 r7:82916594 r6:dfb19d8c r5:858a6000 [ 1868.611136][ T32] r4:858a6000 [ 1868.611152][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.611202][ T32] r5:858a6000 r4:82916590 [ 1868.611255][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.611356][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.611423][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 [ 1868.611463][ T32] r4:00000000 [ 1868.611515][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.611570][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.611727][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.611800][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f6d280 [ 1868.611820][ T32] r4:00000000 [ 1868.611836][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.611898][ T32] r9:83018005 r8:858a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f272000 [ 1868.611917][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.611974][ T32] r5:00001000 r4:dfa0b000 [ 1868.611993][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.612044][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.612145][ T32] r5:85a6ab8c r4:85ea3000 [ 1868.612170][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.612244][ T32] r7:dddced40 r6:83018000 r5:85a6ab8c r4:85ea3000 [ 1868.612263][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.612347][ T32] r10:61c88647 r9:858a6000 r8:85ea302c r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.612469][ T32] r4:85ea3000 [ 1868.612553][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.612622][ T32] r10:00000000 r9:85ea3000 r8:8027ade4 r7:dfb09e60 r6:85f21b00 r5:858a6000 [ 1868.612640][ T32] r4:00000001 [ 1868.612711][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.612807][ T32] Exception stack(0xdfb19fb0 to 0xdfb19ff8) [ 1868.613249][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1868.613324][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.613359][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.613448][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.613515][ T32] r4:85c2b5c0 [ 1868.613943][ T32] INFO: task kworker/0:27:10939 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.613989][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.614085][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.614145][ T32] Call trace: [ 1868.614217][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.614303][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.614325][ T32] r4:00000000 [ 1868.614340][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.614388][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.614423][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.614457][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.614480][ T32] 1d60: 80000113 ffffffff [ 1868.614504][ T32] r5:80000113 r4:80239bd0 [ 1868.614613][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.614713][ T32] r4:82ac8f64 [ 1868.614734][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.614950][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.614995][ T32] r4:dfd21dc0 [ 1868.615010][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.615074][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.615093][ T32] r4:00000000 [ 1868.615108][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.615169][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.615187][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.615250][ T32] r5:00001000 r4:dfba1000 [ 1868.615268][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.615315][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.615367][ T32] r5:86641b8c r4:85766d00 [ 1868.615384][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.615443][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.615460][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.615522][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.615542][ T32] r4:85766d00 [ 1868.615590][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.615721][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.615749][ T32] r4:00000001 [ 1868.615764][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.615807][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.615836][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.615868][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.615934][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.615995][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.616020][ T32] r4:85c64040 [ 1868.623073][ T32] INFO: task kworker/1:26:10942 blocked for more than 430 seconds. [ 1868.623226][ T32] Not tainted syzkaller #0 [ 1868.623292][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.623318][ T32] task:kworker/1:26 state:D stack:0 pid:10942 tgid:10942 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.623405][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.623486][ T32] Call trace: [ 1868.623645][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.623744][ T32] r10:df9e9d84 r9:00000002 r8:60000113 r7:82916594 r6:df9e9d8c r5:858a6c00 [ 1868.623767][ T32] r4:858a6c00 [ 1868.623783][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.623833][ T32] r5:858a6c00 r4:82916590 [ 1868.623849][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.623926][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.624021][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 [ 1868.624082][ T32] r4:00000000 [ 1868.624146][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.624235][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.624294][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.624356][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c2b940 [ 1868.624377][ T32] r4:00000000 [ 1868.624392][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.624457][ T32] r9:83018205 r8:858a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f276000 [ 1868.624531][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.624587][ T32] r5:00001000 r4:dfa1b000 [ 1868.624621][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.624707][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.624766][ T32] r5:85e1af8c r4:85b4e080 [ 1868.624784][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.624851][ T32] r7:ddde2d40 r6:83018200 r5:85e1af8c r4:85b4e080 [ 1868.624869][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.624934][ T32] r10:61c88647 r9:858a6c00 r8:85b4e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.624988][ T32] r4:85b4e080 [ 1868.625008][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.625074][ T32] r10:00000000 r9:85b4e080 r8:8027ade4 r7:dfcede60 r6:85b4e680 r5:858a6c00 [ 1868.625094][ T32] r4:00000001 [ 1868.625109][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.625239][ T32] Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) [ 1868.625279][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1868.625312][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.625341][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.625375][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.625398][ T32] r4:85f6d080 [ 1868.625785][ T32] INFO: task kworker/1:26:10942 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.625825][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.625890][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.625962][ T32] Call trace: [ 1868.625999][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.626071][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.626216][ T32] r4:00000000 [ 1868.626246][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.626298][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.626332][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.626363][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.626408][ T32] 1d60: 80000113 ffffffff [ 1868.626556][ T32] r5:80000113 r4:80239bd0 [ 1868.626664][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.626754][ T32] r4:82ac8f64 [ 1868.626949][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.627029][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.627050][ T32] r4:dfd21dc0 [ 1868.627065][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.627129][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.627149][ T32] r4:00000000 [ 1868.627165][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.627271][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.627297][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.627355][ T32] r5:00001000 r4:dfba1000 [ 1868.627371][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.627420][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.627690][ T32] r5:86641b8c r4:85766d00 [ 1868.627716][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.627779][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.627797][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.627860][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.627883][ T32] r4:85766d00 [ 1868.627900][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.627960][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.627984][ T32] r4:00000001 [ 1868.628046][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.628101][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.628132][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.628231][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.628320][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.628446][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.628468][ T32] r4:85c64040 [ 1868.628502][ T32] INFO: task kworker/0:28:10946 blocked for more than 430 seconds. [ 1868.628536][ T32] Not tainted syzkaller #0 [ 1868.628558][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.628601][ T32] task:kworker/0:28 state:D stack:0 pid:10946 tgid:10946 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.628666][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.628713][ T32] Call trace: [ 1868.628860][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.629043][ T32] r10:dfbf5d84 r9:00000002 r8:60000113 r7:82916594 r6:dfbf5d8c r5:8422d400 [ 1868.629072][ T32] r4:8422d400 [ 1868.629090][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.629144][ T32] r5:8422d400 r4:82916590 [ 1868.629158][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.629205][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.629279][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 [ 1868.629299][ T32] r4:00000000 [ 1868.629316][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.629364][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.629412][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.629497][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547af80 [ 1868.629524][ T32] r4:00000000 [ 1868.629539][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.629601][ T32] r9:83018005 r8:8422d400 r7:00000000 r6:83018000 r5:00001000 r4:7f27a000 [ 1868.629659][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.629754][ T32] r5:00001000 r4:dfa55000 [ 1868.629878][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.644091][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.644386][ T32] r5:8553238c r4:85ea3c00 [ 1868.644487][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.644560][ T32] r7:dddced40 r6:83018000 r5:8553238c r4:85ea3c00 [ 1868.644580][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.644646][ T32] r10:61c88647 r9:8422d400 r8:85ea3c2c r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.644690][ T32] r4:85ea3c00 [ 1868.644712][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.644776][ T32] r10:00000000 r9:85ea3c00 r8:8027ade4 r7:dfb09e60 r6:85ea3180 r5:8422d400 [ 1868.644797][ T32] r4:00000001 [ 1868.644886][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.644958][ T32] Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) [ 1868.645004][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1868.645036][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.645062][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.645158][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.645205][ T32] r4:85c2bb40 [ 1868.645639][ T32] INFO: task kworker/0:28:10946 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.645697][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.645864][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.646019][ T32] Call trace: [ 1868.646159][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.646236][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.646337][ T32] r4:00000000 [ 1868.646360][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.646512][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.646552][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.646626][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.646651][ T32] 1d60: 80000113 ffffffff [ 1868.646673][ T32] r5:80000113 r4:80239bd0 [ 1868.646689][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.646750][ T32] r4:82ac8f64 [ 1868.646767][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.646829][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.646847][ T32] r4:dfd21dc0 [ 1868.647006][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.647182][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.647211][ T32] r4:00000000 [ 1868.647236][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.647301][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.647321][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.647374][ T32] r5:00001000 r4:dfba1000 [ 1868.647390][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.647436][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.647488][ T32] r5:86641b8c r4:85766d00 [ 1868.647525][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.647593][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.647628][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.647751][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.647958][ T32] r4:85766d00 [ 1868.647987][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.648053][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.648192][ T32] r4:00000001 [ 1868.648712][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.648768][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.648799][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.648834][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.648865][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.649010][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.649040][ T32] r4:85c64040 [ 1868.649075][ T32] INFO: task kworker/1:27:10954 blocked for more than 430 seconds. [ 1868.649431][ T32] Not tainted syzkaller #0 [ 1868.649624][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.649923][ T32] task:kworker/1:27 state:D stack:0 pid:10954 tgid:10954 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.659251][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.659349][ T32] Call trace: [ 1868.659383][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.659464][ T32] r10:dfc0dd84 r9:00000002 r8:60000113 r7:82916594 r6:dfc0dd8c r5:858a0c00 [ 1868.659488][ T32] r4:858a0c00 [ 1868.659540][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.659769][ T32] r5:858a0c00 r4:82916590 [ 1868.659806][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.663188][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.663382][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 [ 1868.663436][ T32] r4:00000000 [ 1868.663473][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.663542][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.663599][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.663656][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bf5080 [ 1868.663712][ T32] r4:00000000 [ 1868.663734][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.663796][ T32] r9:83018205 r8:858a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f278000 [ 1868.663813][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.663921][ T32] r5:00001000 r4:dfa2d000 [ 1868.663944][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.664000][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.664054][ T32] r5:85e1bb8c r4:847fb280 [ 1868.664070][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.664156][ T32] r7:ddde2d40 r6:83018200 r5:85e1bb8c r4:847fb280 [ 1868.664190][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.664301][ T32] r10:61c88647 r9:858a0c00 r8:847fb2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.664327][ T32] r4:847fb280 [ 1868.664345][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.664402][ T32] r10:00000000 r9:847fb280 r8:8027ade4 r7:dfcede60 r6:847fb200 r5:858a0c00 [ 1868.664471][ T32] r4:00000001 [ 1868.664510][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.664562][ T32] Exception stack(0xdfc0dfb0 to 0xdfc0dff8) [ 1868.664599][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1868.664628][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.664653][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.664683][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.664773][ T32] r4:85af22c0 [ 1868.665160][ T32] INFO: task kworker/1:27:10954 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.665205][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.665309][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.665365][ T32] Call trace: [ 1868.665504][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.665659][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.665695][ T32] r4:00000000 [ 1868.665712][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.665762][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.665824][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.665897][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.666079][ T32] 1d60: 80000113 ffffffff [ 1868.666228][ T32] r5:80000113 r4:80239bd0 [ 1868.666257][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.666335][ T32] r4:82ac8f64 [ 1868.666361][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.666429][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.666476][ T32] r4:dfd21dc0 [ 1868.666714][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.666793][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.666811][ T32] r4:00000000 [ 1868.666825][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.666885][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.666904][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.666998][ T32] r5:00001000 r4:dfba1000 [ 1868.667021][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.667070][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.667123][ T32] r5:86641b8c r4:85766d00 [ 1868.667141][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.667198][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.667226][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.667293][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.667354][ T32] r4:85766d00 [ 1868.667474][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.667539][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.667562][ T32] r4:00000001 [ 1868.667578][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.667623][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.667649][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.667718][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.667747][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.667776][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.667797][ T32] r4:85c64040 [ 1868.667875][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.667996][ T32] INFO: task kworker/1:28:10958 blocked for more than 430 seconds. [ 1868.668086][ T32] Not tainted syzkaller #0 [ 1868.668115][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.668132][ T32] task:kworker/1:28 state:D stack:0 pid:10958 tgid:10958 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.668191][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.668248][ T32] Call trace: [ 1868.668362][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.668446][ T32] r10:dfc55d84 r9:00000002 r8:60000113 r7:82916594 r6:dfc55d8c r5:858a1800 [ 1868.668495][ T32] r4:858a1800 [ 1868.668544][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.668632][ T32] r5:858a1800 r4:82916590 [ 1868.668653][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.668702][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.668763][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 [ 1868.668782][ T32] r4:00000000 [ 1868.668797][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.668846][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.668896][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.668991][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86172040 [ 1868.669044][ T32] r4:00000000 [ 1868.669088][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.669184][ T32] r9:83018205 r8:858a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f28e000 [ 1868.669206][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.669272][ T32] r5:00001000 r4:dfbb5000 [ 1868.669288][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.669332][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.669379][ T32] r5:85dedf8c r4:8607e000 [ 1868.669394][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.669455][ T32] r7:ddde2d40 r6:83018200 r5:85dedf8c r4:8607e000 [ 1868.669473][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.669568][ T32] r10:61c88647 r9:858a1800 r8:8607e02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.669620][ T32] r4:8607e000 [ 1868.669675][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.669873][ T32] r10:00000000 r9:8607e000 r8:8027ade4 r7:dfcede60 r6:8607e080 r5:858a1800 [ 1868.670555][ T32] r4:00000001 [ 1868.670634][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.670693][ T32] Exception stack(0xdfc55fb0 to 0xdfc55ff8) [ 1868.670721][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1868.670752][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.670778][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.670810][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.670826][ T32] r4:85af2800 [ 1868.671177][ T32] INFO: task kworker/1:28:10958 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.671232][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.671336][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.671392][ T32] Call trace: [ 1868.671419][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.671511][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.671536][ T32] r4:00000000 [ 1868.671554][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.671634][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.671681][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.671806][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.671836][ T32] 1d60: 80000113 ffffffff [ 1868.671858][ T32] r5:80000113 r4:80239bd0 [ 1868.671875][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.671934][ T32] r4:82ac8f64 [ 1868.671987][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.672054][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.672073][ T32] r4:dfd21dc0 [ 1868.672089][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.672152][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.672172][ T32] r4:00000000 [ 1868.672269][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.672341][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.672380][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.672473][ T32] r5:00001000 r4:dfba1000 [ 1868.672559][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.672619][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.672694][ T32] r5:86641b8c r4:85766d00 [ 1868.672717][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.672782][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.672801][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.672901][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.672928][ T32] r4:85766d00 [ 1868.672944][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.673003][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.673025][ T32] r4:00000001 [ 1868.673039][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.673108][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.673141][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.673174][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.673203][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.673296][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.673323][ T32] r4:85c64040 [ 1868.673340][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.673369][ T32] INFO: task kworker/0:29:10966 blocked for more than 430 seconds. [ 1868.673410][ T32] Not tainted syzkaller #0 [ 1868.673472][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.673513][ T32] task:kworker/0:29 state:D stack:0 pid:10966 tgid:10966 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.673639][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.673683][ T32] Call trace: [ 1868.673712][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.673777][ T32] r10:dfc91d84 r9:00000002 r8:60000113 r7:82916594 r6:dfc91d8c r5:8564d400 [ 1868.673822][ T32] r4:8564d400 [ 1868.673883][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.673937][ T32] r5:8564d400 r4:82916590 [ 1868.673952][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.674005][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.674060][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc91e08 [ 1868.674104][ T32] r4:00000000 [ 1868.674125][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.674213][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.674281][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.674339][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e15c80 [ 1868.674360][ T32] r4:00000000 [ 1868.674373][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.674430][ T32] r9:83018005 r8:8564d400 r7:00000000 r6:83018000 r5:00001000 r4:7f27c000 [ 1868.674481][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.674538][ T32] r5:00001000 r4:dfa82000 [ 1868.674621][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.674684][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.674735][ T32] r5:85a6af8c r4:85ea3a00 [ 1868.674756][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.674849][ T32] r7:dddced40 r6:83018000 r5:85a6af8c r4:85ea3a00 [ 1868.674869][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.674930][ T32] r10:61c88647 r9:8564d400 r8:85ea3a2c r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.674984][ T32] r4:85ea3a00 [ 1868.675004][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.675091][ T32] r10:00000000 r9:85ea3a00 r8:8027ade4 r7:dfb09e60 r6:85b01400 r5:8564d400 [ 1868.675123][ T32] r4:00000001 [ 1868.675140][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.675186][ T32] Exception stack(0xdfc91fb0 to 0xdfc91ff8) [ 1868.675216][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.675257][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.675286][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.675323][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.675345][ T32] r4:8547aa40 [ 1868.675628][ T32] INFO: task kworker/0:29:10966 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.675708][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.675821][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.675873][ T32] Call trace: [ 1868.675899][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.675971][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.675995][ T32] r4:00000000 [ 1868.676047][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.676147][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.676187][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.676267][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.676338][ T32] 1d60: 80000113 ffffffff [ 1868.676368][ T32] r5:80000113 r4:80239bd0 [ 1868.676385][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.676475][ T32] r4:82ac8f64 [ 1868.676498][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.676563][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.676581][ T32] r4:dfd21dc0 [ 1868.676596][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.676657][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.676676][ T32] r4:00000000 [ 1868.676694][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.676756][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.676775][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.676830][ T32] r5:00001000 r4:dfba1000 [ 1868.676884][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.676940][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.677004][ T32] r5:86641b8c r4:85766d00 [ 1868.677059][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.677131][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.677151][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.677209][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.677248][ T32] r4:85766d00 [ 1868.677266][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.677329][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.677352][ T32] r4:00000001 [ 1868.677366][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.677462][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.677540][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.677581][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.677637][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.677675][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.677697][ T32] r4:85c64040 [ 1868.677714][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.677769][ T32] INFO: task kworker/0:30:10977 blocked for more than 430 seconds. [ 1868.677809][ T32] Not tainted syzkaller #0 [ 1868.677829][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.677882][ T32] task:kworker/0:30 state:D stack:0 pid:10977 tgid:10977 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.678004][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.678106][ T32] Call trace: [ 1868.678142][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.678206][ T32] r10:dfca1d84 r9:00000002 r8:60000113 r7:82916594 r6:dfca1d8c r5:85b78000 [ 1868.678303][ T32] r4:85b78000 [ 1868.678336][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.678399][ T32] r5:85b78000 r4:82916590 [ 1868.678415][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.678506][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.678687][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 [ 1868.678711][ T32] r4:00000000 [ 1868.678729][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.678782][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.678833][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.678938][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d360c0 [ 1868.678963][ T32] r4:00000000 [ 1868.678981][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.679042][ T32] r9:83018005 r8:85b78000 r7:00000000 r6:83018000 r5:00001000 r4:7f27e000 [ 1868.679059][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.679112][ T32] r5:00001000 r4:dfac3000 [ 1868.679131][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.679179][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.679243][ T32] r5:8553278c r4:85ea3b80 [ 1868.679262][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.679329][ T32] r7:dddced40 r6:83018000 r5:8553278c r4:85ea3b80 [ 1868.679348][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.679412][ T32] r10:61c88647 r9:85b78000 r8:85ea3bac r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.679433][ T32] r4:85ea3b80 [ 1868.679448][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.679547][ T32] r10:00000000 r9:85ea3b80 r8:8027ade4 r7:dfb09e60 r6:85b01e80 r5:85b78000 [ 1868.679575][ T32] r4:00000001 [ 1868.679593][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.679674][ T32] Exception stack(0xdfca1fb0 to 0xdfca1ff8) [ 1868.679718][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.679749][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.679852][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.681492][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.681544][ T32] r4:85d36a80 [ 1868.681902][ T32] INFO: task kworker/0:30:10977 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.681947][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.682111][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.682214][ T32] Call trace: [ 1868.682267][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.682341][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.682363][ T32] r4:00000000 [ 1868.682378][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.682428][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.682464][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.682494][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.682517][ T32] 1d60: 80000113 ffffffff [ 1868.682597][ T32] r5:80000113 r4:80239bd0 [ 1868.682622][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.682722][ T32] r4:82ac8f64 [ 1868.682783][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.682906][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.683022][ T32] r4:dfd21dc0 [ 1868.683058][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.683130][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.683170][ T32] r4:00000000 [ 1868.683191][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.683292][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.683316][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.683374][ T32] r5:00001000 r4:dfba1000 [ 1868.683392][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.683443][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.683494][ T32] r5:86641b8c r4:85766d00 [ 1868.683554][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.683620][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.683639][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.683701][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.683761][ T32] r4:85766d00 [ 1868.683784][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.683913][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.683939][ T32] r4:00000001 [ 1868.683988][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.684039][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.684069][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.684118][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.684153][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.684185][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.684204][ T32] r4:85c64040 [ 1868.684269][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.684308][ T32] INFO: task kworker/0:31:10988 blocked for more than 430 seconds. [ 1868.684351][ T32] Not tainted syzkaller #0 [ 1868.684416][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.684437][ T32] task:kworker/0:31 state:D stack:0 pid:10988 tgid:10988 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.684503][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.684587][ T32] Call trace: [ 1868.684641][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.684710][ T32] r10:dfcb9d84 r9:00000002 r8:60000113 r7:82916594 r6:dfcb9d8c r5:8608bc00 [ 1868.684731][ T32] r4:8608bc00 [ 1868.684746][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.684800][ T32] r5:8608bc00 r4:82916590 [ 1868.684816][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.684904][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.684976][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 [ 1868.685019][ T32] r4:00000000 [ 1868.685100][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.685155][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.685229][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.685298][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763040 [ 1868.685319][ T32] r4:00000000 [ 1868.685335][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.685397][ T32] r9:83018005 r8:8608bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f280000 [ 1868.685441][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.685499][ T32] r5:00001000 r4:dfadd000 [ 1868.685515][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.685557][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.685604][ T32] r5:85530f8c r4:85ea3f00 [ 1868.685619][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.685677][ T32] r7:dddced40 r6:83018000 r5:85530f8c r4:85ea3f00 [ 1868.685694][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.685831][ T32] r10:61c88647 r9:8608bc00 r8:85ea3f2c r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.685869][ T32] r4:85ea3f00 [ 1868.685881][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.685959][ T32] r10:00000000 r9:85ea3f00 r8:8027ade4 r7:dfb09e60 r6:85b27600 r5:8608bc00 [ 1868.685989][ T32] r4:00000001 [ 1868.686040][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.686156][ T32] Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) [ 1868.686230][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1868.686328][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.686361][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.686411][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.686435][ T32] r4:85d36dc0 [ 1868.686678][ T32] INFO: task kworker/0:31:10988 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.686754][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.686841][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.686893][ T32] Call trace: [ 1868.686943][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.687012][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.687114][ T32] r4:00000000 [ 1868.687171][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.687233][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.687272][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.687333][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.687399][ T32] 1d60: 80000113 ffffffff [ 1868.687465][ T32] r5:80000113 r4:80239bd0 [ 1868.687485][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.687539][ T32] r4:82ac8f64 [ 1868.687556][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.687694][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.687721][ T32] r4:dfd21dc0 [ 1868.687769][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.687941][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.687969][ T32] r4:00000000 [ 1868.687986][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.688160][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.688268][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.688331][ T32] r5:00001000 r4:dfba1000 [ 1868.688368][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.688422][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.688473][ T32] r5:86641b8c r4:85766d00 [ 1868.688489][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.688588][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.688641][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.688709][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.688768][ T32] r4:85766d00 [ 1868.688788][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.688888][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.688951][ T32] r4:00000001 [ 1868.689011][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.689054][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.689086][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.689118][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.689146][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.689177][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.689195][ T32] r4:85c64040 [ 1868.689209][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.689248][ T32] INFO: task kworker/0:32:11017 blocked for more than 430 seconds. [ 1868.689285][ T32] Not tainted syzkaller #0 [ 1868.689345][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.689368][ T32] task:kworker/0:32 state:D stack:0 pid:11017 tgid:11017 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.689438][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.689481][ T32] Call trace: [ 1868.689542][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.689640][ T32] r10:dfc95d84 r9:00000002 r8:60000113 r7:82916594 r6:dfc95d8c r5:838ea400 [ 1868.689703][ T32] r4:838ea400 [ 1868.689724][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.689779][ T32] r5:838ea400 r4:82916590 [ 1868.689793][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.690718][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.690894][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 [ 1868.690914][ T32] r4:00000000 [ 1868.690928][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.690977][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.691113][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.691175][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c2c280 [ 1868.691195][ T32] r4:00000000 [ 1868.691209][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.691281][ T32] r9:83018005 r8:838ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f282000 [ 1868.691300][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.691352][ T32] r5:00001000 r4:dfb05000 [ 1868.691411][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.691491][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.691554][ T32] r5:8553178c r4:85ea3d00 [ 1868.691599][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.691668][ T32] r7:dddced40 r6:83018000 r5:8553178c r4:85ea3d00 [ 1868.691753][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.691822][ T32] r10:61c88647 r9:838ea400 r8:85ea3d2c r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.691879][ T32] r4:85ea3d00 [ 1868.691943][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.692008][ T32] r10:00000000 r9:85ea3d00 r8:8027ade4 r7:dfb09e60 r6:85ea3c80 r5:838ea400 [ 1868.692026][ T32] r4:00000001 [ 1868.692078][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.692156][ T32] Exception stack(0xdfc95fb0 to 0xdfc95ff8) [ 1868.692196][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1868.692237][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.692265][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.692295][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.692344][ T32] r4:85cda480 [ 1868.692742][ T32] INFO: task kworker/0:32:11017 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.692803][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.692949][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.693051][ T32] Call trace: [ 1868.693121][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.693196][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.693217][ T32] r4:00000000 [ 1868.693278][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.693363][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.693438][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.693474][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.693496][ T32] 1d60: 80000113 ffffffff [ 1868.693519][ T32] r5:80000113 r4:80239bd0 [ 1868.693559][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.693618][ T32] r4:82ac8f64 [ 1868.693634][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.693695][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.693735][ T32] r4:dfd21dc0 [ 1868.693754][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.693821][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.693842][ T32] r4:00000000 [ 1868.693886][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.693945][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.694026][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.694106][ T32] r5:00001000 r4:dfba1000 [ 1868.694157][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.694230][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.694290][ T32] r5:86641b8c r4:85766d00 [ 1868.694349][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.694412][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.694431][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.694491][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.694534][ T32] r4:85766d00 [ 1868.694554][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.694689][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.694822][ T32] r4:00000001 [ 1868.694860][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.694909][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.694940][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.694975][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.695005][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.695039][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.695061][ T32] r4:85c64040 [ 1868.695138][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.695177][ T32] INFO: task kworker/0:33:11056 blocked for more than 430 seconds. [ 1868.695227][ T32] Not tainted syzkaller #0 [ 1868.695254][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.695269][ T32] task:kworker/0:33 state:D stack:0 pid:11056 tgid:11056 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.695462][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.695508][ T32] Call trace: [ 1868.695536][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.695601][ T32] r10:dfda5d84 r9:00000002 r8:60000013 r7:82916594 r6:dfda5d8c r5:8611a400 [ 1868.695622][ T32] r4:8611a400 [ 1868.695637][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.695685][ T32] r5:8611a400 r4:82916590 [ 1868.695699][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.695749][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.695808][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e08 [ 1868.695839][ T32] r4:00000000 [ 1868.695857][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.695903][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.695944][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.696003][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662f00 [ 1868.696022][ T32] r4:00000000 [ 1868.696062][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.696129][ T32] r9:83018005 r8:8611a400 r7:00000000 r6:83018000 r5:00001000 r4:7f286000 [ 1868.696165][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.696288][ T32] r5:00001000 r4:df947000 [ 1868.696373][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.696449][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.696506][ T32] r5:85dec38c r4:85ea6980 [ 1868.696524][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.696612][ T32] r7:dddced40 r6:83018000 r5:85dec38c r4:85ea6980 [ 1868.696727][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.696800][ T32] r10:61c88647 r9:8611a400 r8:85ea69ac r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.696849][ T32] r4:85ea6980 [ 1868.696895][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.697062][ T32] r10:00000000 r9:85ea6980 r8:8027ade4 r7:dfb09e60 r6:85ea6900 r5:8611a400 [ 1868.697090][ T32] r4:00000001 [ 1868.697105][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.697150][ T32] Exception stack(0xdfda5fb0 to 0xdfda5ff8) [ 1868.697176][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1868.697202][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.697233][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.697302][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.697364][ T32] r4:85c98a00 [ 1868.697590][ T32] INFO: task kworker/0:33:11056 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.697662][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.697760][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.697818][ T32] Call trace: [ 1868.697928][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.698008][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.698030][ T32] r4:00000000 [ 1868.698044][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.698092][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.698125][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.698176][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.698204][ T32] 1d60: 80000113 ffffffff [ 1868.698234][ T32] r5:80000113 r4:80239bd0 [ 1868.698250][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.698343][ T32] r4:82ac8f64 [ 1868.698363][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.698426][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.698446][ T32] r4:dfd21dc0 [ 1868.698459][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.698519][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.698539][ T32] r4:00000000 [ 1868.698621][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.698691][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.698755][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.698851][ T32] r5:00001000 r4:dfba1000 [ 1868.698908][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.698999][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.699060][ T32] r5:86641b8c r4:85766d00 [ 1868.699129][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.699193][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.699212][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.699356][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.699383][ T32] r4:85766d00 [ 1868.699398][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.699454][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.699508][ T32] r4:00000001 [ 1868.699565][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.699615][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.699646][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.699732][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.699769][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.703673][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.703811][ T32] r4:85c64040 [ 1868.703841][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.703879][ T32] INFO: task kworker/0:34:11217 blocked for more than 430 seconds. [ 1868.703922][ T32] Not tainted syzkaller #0 [ 1868.703945][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.703962][ T32] task:kworker/0:34 state:D stack:0 pid:11217 tgid:11217 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.704041][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.704119][ T32] Call trace: [ 1868.704148][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.704231][ T32] r10:dfe9dd84 r9:00000002 r8:60000013 r7:82916594 r6:dfe9dd8c r5:8608c800 [ 1868.704252][ T32] r4:8608c800 [ 1868.704268][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.704320][ T32] r5:8608c800 r4:82916590 [ 1868.704337][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.704387][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.704450][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe9de08 [ 1868.704498][ T32] r4:00000000 [ 1868.704536][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.704588][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.704643][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.704710][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86170a40 [ 1868.704730][ T32] r4:00000000 [ 1868.704745][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.704805][ T32] r9:83018005 r8:8608c800 r7:00000000 r6:83018000 r5:00001000 r4:7f292000 [ 1868.704822][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.704890][ T32] r5:00001000 r4:dfbfd000 [ 1868.704911][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.704959][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.705008][ T32] r5:85f4738c r4:856ebc00 [ 1868.705024][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.705086][ T32] r7:dddced40 r6:83018000 r5:85f4738c r4:856ebc00 [ 1868.705105][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.705171][ T32] r10:61c88647 r9:8608c800 r8:856ebc2c r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.705193][ T32] r4:856ebc00 [ 1868.705209][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.705283][ T32] r10:00000000 r9:856ebc00 r8:8027ade4 r7:dfb09e60 r6:86174280 r5:8608c800 [ 1868.705303][ T32] r4:00000001 [ 1868.705321][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.705367][ T32] Exception stack(0xdfe9dfb0 to 0xdfe9dff8) [ 1868.705398][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1868.705430][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.705458][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.705493][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.705513][ T32] r4:855735c0 [ 1868.705925][ T32] INFO: task kworker/0:34:11217 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.705962][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.706035][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.706087][ T32] Call trace: [ 1868.706127][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.706193][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.706212][ T32] r4:00000000 [ 1868.706241][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.706292][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.706324][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.706358][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.706381][ T32] 1d60: 80000113 ffffffff [ 1868.706402][ T32] r5:80000113 r4:80239bd0 [ 1868.706419][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.706476][ T32] r4:82ac8f64 [ 1868.706492][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.706555][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.706615][ T32] r4:dfd21dc0 [ 1868.706632][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.706695][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.706714][ T32] r4:00000000 [ 1868.706728][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.706836][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.706860][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.706917][ T32] r5:00001000 r4:dfba1000 [ 1868.706934][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.706984][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.707095][ T32] r5:86641b8c r4:85766d00 [ 1868.707117][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.707177][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.707196][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.707270][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.707293][ T32] r4:85766d00 [ 1868.707313][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.707370][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.707433][ T32] r4:00000001 [ 1868.707453][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.707496][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.707521][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.707548][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.707645][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.707683][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.707731][ T32] r4:85c64040 [ 1868.707809][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.707842][ T32] INFO: task kworker/0:35:11224 blocked for more than 430 seconds. [ 1868.707877][ T32] Not tainted syzkaller #0 [ 1868.707899][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.707938][ T32] task:kworker/0:35 state:D stack:0 pid:11224 tgid:11224 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.708098][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.708144][ T32] Call trace: [ 1868.708250][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.708318][ T32] r10:dfea5d84 r9:00000002 r8:60000113 r7:82916594 r6:dfea5d8c r5:8581e000 [ 1868.708337][ T32] r4:8581e000 [ 1868.708390][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.708473][ T32] r5:8581e000 r4:82916590 [ 1868.708495][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.708570][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.708632][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfea5e08 [ 1868.708649][ T32] r4:00000000 [ 1868.708662][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.708845][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.708941][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.709061][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bf0640 [ 1868.709084][ T32] r4:00000000 [ 1868.709097][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.709197][ T32] r9:83018005 r8:8581e000 r7:00000000 r6:83018000 r5:00001000 r4:7f288000 [ 1868.709231][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.709286][ T32] r5:00001000 r4:df9b0000 [ 1868.709349][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.709407][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.709462][ T32] r5:8578b38c r4:86174300 [ 1868.709477][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.709538][ T32] r7:dddced40 r6:83018000 r5:8578b38c r4:86174300 [ 1868.709593][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.709661][ T32] r10:61c88647 r9:8581e000 r8:8617432c r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.709681][ T32] r4:86174300 [ 1868.709696][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.709756][ T32] r10:00000000 r9:86174300 r8:8027ade4 r7:dfe9de60 r6:86174380 r5:8581e000 [ 1868.709775][ T32] r4:00000001 [ 1868.709788][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.710541][ T32] Exception stack(0xdfea5fb0 to 0xdfea5ff8) [ 1868.710682][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1868.710712][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.710736][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.710767][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.710785][ T32] r4:8593ee80 [ 1868.711143][ T32] INFO: task kworker/0:35:11224 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.711181][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.711270][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.711330][ T32] Call trace: [ 1868.711356][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.711420][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.711439][ T32] r4:00000000 [ 1868.711453][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.711498][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.711530][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.711560][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.711580][ T32] 1d60: 80000113 ffffffff [ 1868.711601][ T32] r5:80000113 r4:80239bd0 [ 1868.711616][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.711706][ T32] r4:82ac8f64 [ 1868.711728][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.711787][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.711806][ T32] r4:dfd21dc0 [ 1868.711822][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.711900][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.711922][ T32] r4:00000000 [ 1868.711989][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.712057][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.712075][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.712205][ T32] r5:00001000 r4:dfba1000 [ 1868.712234][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.712300][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.712357][ T32] r5:86641b8c r4:85766d00 [ 1868.712393][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.712457][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.712475][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.712535][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.712554][ T32] r4:85766d00 [ 1868.712568][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.712626][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.712665][ T32] r4:00000001 [ 1868.712684][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.712726][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.712754][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.712784][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.712813][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.712843][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.712881][ T32] r4:85c64040 [ 1868.712903][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.712989][ T32] INFO: task kworker/0:36:11230 blocked for more than 430 seconds. [ 1868.713080][ T32] Not tainted syzkaller #0 [ 1868.713110][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.713126][ T32] task:kworker/0:36 state:D stack:0 pid:11230 tgid:11230 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.713182][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.713230][ T32] Call trace: [ 1868.713258][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.713339][ T32] r10:dfea1d84 r9:00000002 r8:600e0113 r7:82916594 r6:dfea1d8c r5:8494b000 [ 1868.713367][ T32] r4:8494b000 [ 1868.713383][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.713435][ T32] r5:8494b000 r4:82916590 [ 1868.713451][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.713504][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.713564][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfea1e08 [ 1868.713585][ T32] r4:00000000 [ 1868.713601][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.713651][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.713699][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.713761][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84865680 [ 1868.713781][ T32] r4:00000000 [ 1868.713797][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.713879][ T32] r9:83018005 r8:8494b000 r7:00000000 r6:83018000 r5:00001000 r4:7f28a000 [ 1868.713902][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.713956][ T32] r5:00001000 r4:dfb95000 [ 1868.713973][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.714037][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.714097][ T32] r5:8578bb8c r4:86174400 [ 1868.714140][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.714207][ T32] r7:dddced40 r6:83018000 r5:8578bb8c r4:86174400 [ 1868.714253][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.714322][ T32] r10:61c88647 r9:8494b000 r8:8617442c r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.714346][ T32] r4:86174400 [ 1868.714361][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.714420][ T32] r10:00000000 r9:86174400 r8:8027ade4 r7:dfe9de60 r6:86174480 r5:8494b000 [ 1868.714440][ T32] r4:00000001 [ 1868.714455][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.714498][ T32] Exception stack(0xdfea1fb0 to 0xdfea1ff8) [ 1868.714525][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.714558][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.714625][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.714659][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.714680][ T32] r4:85bf0f00 [ 1868.714916][ T32] INFO: task kworker/0:36:11230 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.714953][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.715045][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.715101][ T32] Call trace: [ 1868.715153][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.715236][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.715280][ T32] r4:00000000 [ 1868.715300][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.715351][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.715386][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.715419][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.715443][ T32] 1d60: 80000113 ffffffff [ 1868.715469][ T32] r5:80000113 r4:80239bd0 [ 1868.715484][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.715576][ T32] r4:82ac8f64 [ 1868.715599][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.715666][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.715686][ T32] r4:dfd21dc0 [ 1868.715700][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.715760][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.715783][ T32] r4:00000000 [ 1868.715798][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.715899][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.715923][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.715983][ T32] r5:00001000 r4:dfba1000 [ 1868.715998][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.716131][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.716185][ T32] r5:86641b8c r4:85766d00 [ 1868.716205][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.716276][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.716294][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.716357][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.716376][ T32] r4:85766d00 [ 1868.716390][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.716450][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.716473][ T32] r4:00000001 [ 1868.716489][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.716533][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.716603][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.716696][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.716734][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.716808][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.716834][ T32] r4:85c64040 [ 1868.716850][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.716877][ T32] INFO: task kworker/1:29:11231 blocked for more than 430 seconds. [ 1868.716908][ T32] Not tainted syzkaller #0 [ 1868.716929][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.716983][ T32] task:kworker/1:29 state:D stack:0 pid:11231 tgid:11231 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.717044][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.717167][ T32] Call trace: [ 1868.717237][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.717305][ T32] r10:dfde9d84 r9:00000002 r8:60000113 r7:82916594 r6:dfde9d8c r5:8611ec00 [ 1868.717352][ T32] r4:8611ec00 [ 1868.717375][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.717430][ T32] r5:8611ec00 r4:82916590 [ 1868.717445][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.717493][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.717559][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfde9e08 [ 1868.717586][ T32] r4:00000000 [ 1868.717604][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.717652][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.717740][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.717829][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86172800 [ 1868.717849][ T32] r4:00000000 [ 1868.717887][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.717955][ T32] r9:83018205 r8:8611ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f296000 [ 1868.717983][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.718040][ T32] r5:00001000 r4:dfc47000 [ 1868.718056][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.718141][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.718235][ T32] r5:85f4778c r4:85bfac00 [ 1868.718302][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.718389][ T32] r7:ddde2d40 r6:83018200 r5:85f4778c r4:85bfac00 [ 1868.718411][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.718500][ T32] r10:61c88647 r9:8611ec00 r8:85bfac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.718530][ T32] r4:85bfac00 [ 1868.718608][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.718677][ T32] r10:00000000 r9:85bfac00 r8:8027ade4 r7:dfcede60 r6:85bfa580 r5:8611ec00 [ 1868.718697][ T32] r4:00000001 [ 1868.718770][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.718823][ T32] Exception stack(0xdfde9fb0 to 0xdfde9ff8) [ 1868.718854][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1868.718887][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.718917][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.718951][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.718971][ T32] r4:856628c0 [ 1868.719226][ T32] INFO: task kworker/1:29:11231 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.719276][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.719452][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.719510][ T32] Call trace: [ 1868.719574][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.719649][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.719669][ T32] r4:00000000 [ 1868.719684][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.719735][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.719770][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.719896][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.721255][ T32] 1d60: 80000113 ffffffff [ 1868.721306][ T32] r5:80000113 r4:80239bd0 [ 1868.721327][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.721402][ T32] r4:82ac8f64 [ 1868.721418][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.721483][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.721505][ T32] r4:dfd21dc0 [ 1868.721556][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.721633][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.721655][ T32] r4:00000000 [ 1868.721669][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.721728][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.721745][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.721801][ T32] r5:00001000 r4:dfba1000 [ 1868.721816][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.721902][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.721962][ T32] r5:86641b8c r4:85766d00 [ 1868.721987][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.722047][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.722100][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.722223][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.722254][ T32] r4:85766d00 [ 1868.722329][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.722404][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.722423][ T32] r4:00000001 [ 1868.722439][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.722589][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.723325][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.723485][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.723706][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.723751][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.723787][ T32] r4:85c64040 [ 1868.723814][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.723867][ T32] INFO: task kworker/0:37:11235 blocked for more than 430 seconds. [ 1868.723913][ T32] Not tainted syzkaller #0 [ 1868.723934][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.724028][ T32] task:kworker/0:37 state:D stack:0 pid:11235 tgid:11235 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.724325][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.724408][ T32] Call trace: [ 1868.724442][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.724510][ T32] r10:dfec5d84 r9:00000002 r8:60000013 r7:82916594 r6:dfec5d8c r5:8611bc00 [ 1868.724625][ T32] r4:8611bc00 [ 1868.724747][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.724847][ T32] r5:8611bc00 r4:82916590 [ 1868.724867][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.724959][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.725031][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec5e08 [ 1868.725050][ T32] r4:00000000 [ 1868.725066][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.725122][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.725173][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.725239][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c04940 [ 1868.725280][ T32] r4:00000000 [ 1868.725298][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.725357][ T32] r9:83018005 r8:8611bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f28c000 [ 1868.725378][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.725490][ T32] r5:00001000 r4:dfba9000 [ 1868.725546][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.725597][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.725672][ T32] r5:8578af8c r4:86174500 [ 1868.725736][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.725798][ T32] r7:dddced40 r6:83018000 r5:8578af8c r4:86174500 [ 1868.725813][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.725909][ T32] r10:61c88647 r9:8611bc00 r8:8617452c r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.725983][ T32] r4:86174500 [ 1868.726006][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.726067][ T32] r10:00000000 r9:86174500 r8:8027ade4 r7:dfe9de60 r6:85bfa480 r5:8611bc00 [ 1868.726091][ T32] r4:00000001 [ 1868.726105][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.726146][ T32] Exception stack(0xdfec5fb0 to 0xdfec5ff8) [ 1868.726172][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1868.726201][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.726233][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.726265][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.726285][ T32] r4:84865380 [ 1868.726714][ T32] INFO: task kworker/0:37:11235 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.726753][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.726929][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.727005][ T32] Call trace: [ 1868.727029][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.727092][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.727112][ T32] r4:00000000 [ 1868.727148][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.727254][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.727295][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.727384][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.727414][ T32] 1d60: 80000113 ffffffff [ 1868.727507][ T32] r5:80000113 r4:80239bd0 [ 1868.727527][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.727576][ T32] r4:82ac8f64 [ 1868.727615][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.727679][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.727702][ T32] r4:dfd21dc0 [ 1868.727776][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.727853][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.727874][ T32] r4:00000000 [ 1868.727888][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.727947][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.727983][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.728039][ T32] r5:00001000 r4:dfba1000 [ 1868.728054][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.728141][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.728230][ T32] r5:86641b8c r4:85766d00 [ 1868.728253][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.728355][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.728420][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.728529][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.728556][ T32] r4:85766d00 [ 1868.728572][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.728630][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.728648][ T32] r4:00000001 [ 1868.728661][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.728702][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.728731][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.728800][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.728915][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.728950][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.728979][ T32] r4:85c64040 [ 1868.729023][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.729053][ T32] INFO: task kworker/0:38:11257 blocked for more than 430 seconds. [ 1868.729160][ T32] Not tainted syzkaller #0 [ 1868.729201][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.729270][ T32] task:kworker/0:38 state:D stack:0 pid:11257 tgid:11257 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.729332][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.729373][ T32] Call trace: [ 1868.729398][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.729454][ T32] r10:dfed9d84 r9:00000002 r8:60000013 r7:82916594 r6:dfed9d8c r5:8590e000 [ 1868.729473][ T32] r4:8590e000 [ 1868.729487][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.729570][ T32] r5:8590e000 r4:82916590 [ 1868.729590][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.729640][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.729781][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfed9e08 [ 1868.730542][ T32] r4:00000000 [ 1868.730613][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.730727][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.730837][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.730906][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860f2040 [ 1868.730965][ T32] r4:00000000 [ 1868.731008][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.731141][ T32] r9:83018005 r8:8590e000 r7:00000000 r6:83018000 r5:00001000 r4:7f290000 [ 1868.731166][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.731229][ T32] r5:00001000 r4:dfbed000 [ 1868.731247][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.731294][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.731388][ T32] r5:85f1678c r4:86530f80 [ 1868.731410][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.731468][ T32] r7:dddced40 r6:83018000 r5:85f1678c r4:86530f80 [ 1868.731486][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.731543][ T32] r10:61c88647 r9:8590e000 r8:86530fac r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.731562][ T32] r4:86530f80 [ 1868.731576][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.731636][ T32] r10:00000000 r9:86530f80 r8:8027ade4 r7:dfe9de60 r6:8596a000 r5:8590e000 [ 1868.731655][ T32] r4:00000001 [ 1868.731669][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.731713][ T32] Exception stack(0xdfed9fb0 to 0xdfed9ff8) [ 1868.731762][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1868.731832][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.731905][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.731942][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.731964][ T32] r4:8648b680 [ 1868.732340][ T32] INFO: task kworker/0:38:11257 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.732379][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.732507][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.732699][ T32] Call trace: [ 1868.732756][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.732826][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.732846][ T32] r4:00000000 [ 1868.732861][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.732905][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.732990][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.733065][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.733092][ T32] 1d60: 80000113 ffffffff [ 1868.733113][ T32] r5:80000113 r4:80239bd0 [ 1868.733128][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.733247][ T32] r4:82ac8f64 [ 1868.733270][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.733354][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.733376][ T32] r4:dfd21dc0 [ 1868.733389][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.733444][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.733501][ T32] r4:00000000 [ 1868.733537][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.733619][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.733641][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.733691][ T32] r5:00001000 r4:dfba1000 [ 1868.733753][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.733802][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.733867][ T32] r5:86641b8c r4:85766d00 [ 1868.733888][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.733946][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.733993][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.734059][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.734079][ T32] r4:85766d00 [ 1868.734094][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.734157][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.734179][ T32] r4:00000001 [ 1868.734192][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.734245][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.734272][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.734339][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.734374][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.734457][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.734519][ T32] r4:85c64040 [ 1868.734543][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.768347][ T32] INFO: task kworker/0:40:11354 blocked for more than 430 seconds. [ 1868.768488][ T32] Not tainted syzkaller #0 [ 1868.768517][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.768535][ T32] task:kworker/0:40 state:D stack:0 pid:11354 tgid:11354 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.768639][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.768713][ T32] Call trace: [ 1868.768782][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.768871][ T32] r10:e022dd84 r9:00000002 r8:60000013 r7:82916594 r6:e022dd8c r5:86750000 [ 1868.768895][ T32] r4:86750000 [ 1868.768946][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.769014][ T32] r5:86750000 r4:82916590 [ 1868.769031][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.769085][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.769150][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e022de08 [ 1868.769169][ T32] r4:00000000 [ 1868.769183][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.769238][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.769293][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.769360][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86170c40 [ 1868.769462][ T32] r4:00000000 [ 1868.769519][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.769629][ T32] r9:83018005 r8:86750000 r7:00000000 r6:83018000 r5:00001000 r4:7f294000 [ 1868.769678][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.769739][ T32] r5:00001000 r4:dfc21000 [ 1868.769755][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.769797][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.776477][ T32] r5:85f4678c r4:860f1180 [ 1868.776550][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.776663][ T32] r7:dddced40 r6:83018000 r5:85f4678c r4:860f1180 [ 1868.776682][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.776789][ T32] r10:61c88647 r9:86750000 r8:860f11ac r7:82804d40 r6:dddced40 r5:dddced60 [ 1868.776815][ T32] r4:860f1180 [ 1868.776832][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.777044][ T32] r10:00000000 r9:860f1180 r8:8027ade4 r7:dfe9de60 r6:860f1380 r5:86750000 [ 1868.777087][ T32] r4:00000001 [ 1868.777165][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.777232][ T32] Exception stack(0xe022dfb0 to 0xe022dff8) [ 1868.777476][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 1868.777521][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.777554][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.777862][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.777969][ T32] r4:861706c0 [ 1868.778424][ T32] INFO: task kworker/0:40:11354 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.778464][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.778664][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.778720][ T32] Call trace: [ 1868.778868][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.779260][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.779302][ T32] r4:00000000 [ 1868.779318][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.779368][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.779402][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.779429][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.779451][ T32] 1d60: 80000113 ffffffff [ 1868.779471][ T32] r5:80000113 r4:80239bd0 [ 1868.779486][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.779540][ T32] r4:82ac8f64 [ 1868.779711][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.779789][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.779862][ T32] r4:dfd21dc0 [ 1868.797999][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.798193][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.798226][ T32] r4:00000000 [ 1868.798243][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.798346][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.798455][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.798531][ T32] r5:00001000 r4:dfba1000 [ 1868.798596][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.798711][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.798784][ T32] r5:86641b8c r4:85766d00 [ 1868.798803][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.798867][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.798885][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.798940][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.798955][ T32] r4:85766d00 [ 1868.798969][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.799034][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.799054][ T32] r4:00000001 [ 1868.799069][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.799113][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.799226][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.799269][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.799395][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.799449][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.799472][ T32] r4:85c64040 [ 1868.799494][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.799564][ T32] INFO: task kworker/1:30:11363 blocked for more than 430 seconds. [ 1868.799611][ T32] Not tainted syzkaller #0 [ 1868.799633][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.799749][ T32] task:kworker/1:30 state:D stack:0 pid:11363 tgid:11363 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.803605][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.803754][ T32] Call trace: [ 1868.803811][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.803988][ T32] r10:e0239d84 r9:00000002 r8:60000013 r7:82916594 r6:e0239d8c r5:8611d400 [ 1868.804017][ T32] r4:8611d400 [ 1868.804075][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.804143][ T32] r5:8611d400 r4:82916590 [ 1868.804266][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.804366][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.804436][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0239e08 [ 1868.804457][ T32] r4:00000000 [ 1868.804471][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.804515][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.804562][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.804626][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86172b80 [ 1868.804645][ T32] r4:00000000 [ 1868.804784][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.804869][ T32] r9:83018205 r8:8611d400 r7:00000000 r6:83018200 r5:00001000 r4:7f298000 [ 1868.804888][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.804941][ T32] r5:00001000 r4:dfc57000 [ 1868.805032][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.805092][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.805213][ T32] r5:85defb8c r4:85c10d80 [ 1868.805255][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.805323][ T32] r7:ddde2d40 r6:83018200 r5:85defb8c r4:85c10d80 [ 1868.805341][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.805403][ T32] r10:61c88647 r9:8611d400 r8:85c10dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.805489][ T32] r4:85c10d80 [ 1868.805679][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.805776][ T32] r10:00000000 r9:85c10d80 r8:8027ade4 r7:dfcede60 r6:85c10e00 r5:8611d400 [ 1868.805802][ T32] r4:00000001 [ 1868.805817][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.805880][ T32] Exception stack(0xe0239fb0 to 0xe0239ff8) [ 1868.805909][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1868.805936][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.805989][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.806091][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.806116][ T32] r4:861723c0 [ 1868.806509][ T32] INFO: task kworker/1:30:11363 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.806550][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.806841][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.806898][ T32] Call trace: [ 1868.806951][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.807030][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.807165][ T32] r4:00000000 [ 1868.807186][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.807248][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.807285][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.807758][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.807791][ T32] 1d60: 80000113 ffffffff [ 1868.807816][ T32] r5:80000113 r4:80239bd0 [ 1868.807835][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.807889][ T32] r4:82ac8f64 [ 1868.807905][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.807967][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.807989][ T32] r4:dfd21dc0 [ 1868.808005][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.808063][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.808082][ T32] r4:00000000 [ 1868.808096][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.808162][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.808215][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.808280][ T32] r5:00001000 r4:dfba1000 [ 1868.808297][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.808344][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.808392][ T32] r5:86641b8c r4:85766d00 [ 1868.808408][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.808463][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.808479][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.808536][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.808579][ T32] r4:85766d00 [ 1868.808597][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.808657][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.808677][ T32] r4:00000001 [ 1868.808734][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.808857][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.808891][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.808918][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.808942][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.808973][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.808994][ T32] r4:85c64040 [ 1868.809073][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.809108][ T32] INFO: task kworker/1:31:11365 blocked for more than 430 seconds. [ 1868.809147][ T32] Not tainted syzkaller #0 [ 1868.809230][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1868.809252][ T32] task:kworker/1:31 state:D stack:0 pid:11365 tgid:11365 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.809514][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.809691][ T32] Call trace: [ 1868.813904][ T32] [<81a3c5dc>] (__schedule) from [<81a3d570>] (schedule+0x2c/0x130) [ 1868.814061][ T32] r10:e0231d84 r9:00000002 r8:60000113 r7:82916594 r6:e0231d8c r5:86118c00 [ 1868.814085][ T32] r4:86118c00 [ 1868.814122][ T32] [<81a3d544>] (schedule) from [<81a3d958>] (schedule_preempt_disabled+0x18/0x24) [ 1868.814180][ T32] r5:86118c00 r4:82916590 [ 1868.814234][ T32] [<81a3d940>] (schedule_preempt_disabled) from [<81a40508>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1868.814295][ T32] [<81a401b8>] (__mutex_lock.constprop.0) from [<81a40cb0>] (__mutex_lock_slowpath+0x14/0x18) [ 1868.814360][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0231e08 [ 1868.814407][ T32] r4:00000000 [ 1868.814427][ T32] [<81a40c9c>] (__mutex_lock_slowpath) from [<81a40cf0>] (mutex_lock+0x3c/0x40) [ 1868.814478][ T32] [<81a40cb4>] (mutex_lock) from [<804e0404>] (_vm_unmap_aliases+0x68/0x240) [ 1868.814536][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.814713][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c2b380 [ 1868.814743][ T32] r4:00000000 [ 1868.814786][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.814860][ T32] r9:83018205 r8:86118c00 r7:00000000 r6:83018200 r5:00001000 r4:7f29a000 [ 1868.814911][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.814974][ T32] r5:00001000 r4:dfcc5000 [ 1868.814993][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.815041][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.815094][ T32] r5:85f4638c r4:85c10e80 [ 1868.815192][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.815283][ T32] r7:ddde2d40 r6:83018200 r5:85f4638c r4:85c10e80 [ 1868.815301][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.815465][ T32] r10:61c88647 r9:86118c00 r8:85c10eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.815501][ T32] r4:85c10e80 [ 1868.815518][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.815582][ T32] r10:00000000 r9:85c10e80 r8:8027ade4 r7:dfcede60 r6:85c10400 r5:86118c00 [ 1868.815603][ T32] r4:00000001 [ 1868.815617][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.815663][ T32] Exception stack(0xe0231fb0 to 0xe0231ff8) [ 1868.815697][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.815729][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.815757][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.815793][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.815813][ T32] r4:861727c0 [ 1868.816302][ T32] INFO: task kworker/1:31:11365 is blocked on a mutex likely owned by task kworker/1:19:10857. [ 1868.816350][ T32] task:kworker/1:19 state:R running task stack:0 pid:10857 tgid:10857 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1868.816515][ T32] Workqueue: events bpf_prog_free_deferred [ 1868.816696][ T32] Call trace: [ 1868.816730][ T32] [<81a3c5dc>] (__schedule) from [<81a3d9a4>] (preempt_schedule_irq+0x40/0xa8) [ 1868.816815][ T32] r10:8280c9b4 r9:84172400 r8:80200c04 r7:dfd21d54 r6:ffffffff r5:84172400 [ 1868.816839][ T32] r4:00000000 [ 1868.816872][ T32] [<81a3d964>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1868.816927][ T32] Exception stack(0xdfd21d20 to 0xdfd21d68) [ 1868.816960][ T32] 1d20: 84e8c000 eb50f000 00000001 80239bb8 7f284000 00000001 82ac8f44 82ac8320 [ 1868.816991][ T32] 1d40: 7f284000 eb50f000 8280c9b4 dfd21d9c dfd21da0 dfd21d70 80230af0 80239bd0 [ 1868.817013][ T32] 1d60: 80000113 ffffffff [ 1868.817072][ T32] r5:80000113 r4:80239bd0 [ 1868.817095][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e01c8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1868.817150][ T32] r4:82ac8f64 [ 1868.817166][ T32] [<804dff44>] (__purge_vmap_area_lazy) from [<804e0580>] (_vm_unmap_aliases+0x1e4/0x240) [ 1868.817274][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd21dc0 r5:dfd21e08 [ 1868.817298][ T32] r4:dfd21dc0 [ 1868.817312][ T32] [<804e039c>] (_vm_unmap_aliases) from [<804e41e4>] (vfree+0x16c/0x210) [ 1868.817367][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85edcdc0 [ 1868.817389][ T32] r4:00000000 [ 1868.817403][ T32] [<804e4078>] (vfree) from [<8054ce24>] (execmem_free+0x30/0x50) [ 1868.817463][ T32] r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f290000 [ 1868.817517][ T32] [<8054cdf4>] (execmem_free) from [<803c3294>] (bpf_jit_free_exec+0x10/0x14) [ 1868.817574][ T32] r5:00001000 r4:dfba1000 [ 1868.817590][ T32] [<803c3284>] (bpf_jit_free_exec) from [<803c3674>] (bpf_jit_free+0x68/0xe4) [ 1868.817636][ T32] [<803c360c>] (bpf_jit_free) from [<803c471c>] (bpf_prog_free_deferred+0x140/0x158) [ 1868.817782][ T32] r5:86641b8c r4:85766d00 [ 1868.817805][ T32] [<803c45dc>] (bpf_prog_free_deferred) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1868.817867][ T32] r7:ddde2d40 r6:83018200 r5:86641b8c r4:85766d00 [ 1868.817886][ T32] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1868.817949][ T32] r10:61c88647 r9:84172400 r8:85766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 1868.817971][ T32] r4:85766d00 [ 1868.817988][ T32] [<8027ade4>] (worker_thread) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.818048][ T32] r10:00000000 r9:85766d00 r8:8027ade4 r7:dfbd1e60 r6:85766e80 r5:84172400 [ 1868.818066][ T32] r4:00000001 [ 1868.818081][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.818239][ T32] Exception stack(0xdfd21fb0 to 0xdfd21ff8) [ 1868.818377][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.818491][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.818529][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.818611][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.818639][ T32] r4:85c64040 [ 1868.818659][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1868.829398][ T32] NMI backtrace for cpu 0 [ 1868.830177][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 1868.830638][ T32] Hardware name: ARM-Versatile Express [ 1868.830736][ T32] Call trace: [ 1868.830790][ T32] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1868.830894][ T32] r7:00000000 r6:000d0013 r5:600d0093 r4:822603d4 [ 1868.830912][ T32] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1868.830957][ T32] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1868.831155][ T32] r5:00000000 r4:00000001 [ 1868.831173][ T32] [<8021fb9c>] (dump_stack) from [<81a261f0>] (nmi_cpu_backtrace+0x160/0x17c) [ 1868.831247][ T32] [<81a26090>] (nmi_cpu_backtrace) from [<81a2633c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 1868.831307][ T32] r7:00000000 r6:8280c690 r5:8281ac94 r4:ffffffff [ 1868.831322][ T32] [<81a2620c>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 1868.831388][ T32] r9:82abd564 r8:82804d40 r7:000264c4 r6:00007c7a r5:8281b248 r4:8e5f350c [ 1868.831405][ T32] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037d8d4>] (watchdog+0x4d4/0x81c) [ 1868.831460][ T32] [<8037d400>] (watchdog) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.831550][ T32] r10:00000000 r9:00000000 r8:8037d400 r7:830cf500 r6:830cf500 r5:8321ec00 [ 1868.831572][ T32] r4:00000001 [ 1868.831636][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.831771][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 1868.831859][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1868.832103][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.832139][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.832216][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.832248][ T32] r4:83397f40 [ 1868.834314][ T32] Sending NMI from CPU 0 to CPUs 1: [ 1868.835325][ C1] NMI backtrace for cpu 1 [ 1868.835540][ C1] CPU: 1 UID: 0 PID: 2842 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 1868.835590][ C1] Hardware name: ARM-Versatile Express [ 1868.835642][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 1868.835744][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 1868.835808][ C1] pc : [<81a465a4>] lr : [<80a79680>] psr: 60000113 [ 1868.835846][ C1] sp : eb79deb0 ip : eb79dec0 fp : eb79debc [ 1868.835879][ C1] r10: 82959194 r9 : 00000001 r8 : 00000000 [ 1868.835921][ C1] r7 : 00000117 r6 : 829590f8 r5 : 00000000 r4 : 00000001 [ 1868.835977][ C1] r3 : 000014d0 r2 : 00000000 r1 : 60000113 r0 : 84044840 [ 1868.836091][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1868.836161][ C1] Control: 30c5387d Table: 848b9640 DAC: 00000000 [ 1868.836226][ C1] Call trace: [ 1868.836272][ C1] [<81a4657c>] (_raw_spin_unlock_irqrestore) from [<80a79680>] (pl011_console_device_unlock+0x20/0x24) [ 1868.836340][ C1] [<80a79660>] (pl011_console_device_unlock) from [<802e44a4>] (nbcon_emit_one+0x88/0x100) [ 1868.836399][ C1] [<802e441c>] (nbcon_emit_one) from [<802e46c4>] (nbcon_kthread_func+0x1a8/0x2a4) [ 1868.836458][ C1] r6:8280c690 r5:84228000 r4:829590f8 [ 1868.836475][ C1] [<802e451c>] (nbcon_kthread_func) from [<80281fc8>] (kthread+0x12c/0x280) [ 1868.836538][ C1] r10:00000000 r9:829590f8 r8:802e451c r7:84b76a80 r6:84b76a80 r5:84228000 [ 1868.836558][ C1] r4:00000001 [ 1868.836572][ C1] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1868.836611][ C1] Exception stack(0xeb79dfb0 to 0xeb79dff8) [ 1868.836642][ C1] dfa0: 00000000 00000000 00000000 00000000 [ 1868.836672][ C1] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1868.836697][ C1] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1868.836727][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1868.836746][ C1] r4:8380d980 [ 1868.852502][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 1869.256655][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 1869.260529][ T32] Hardware name: ARM-Versatile Express [ 1869.262616][ T32] Call trace: [ 1869.267906][ T32] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1869.272344][ T32] r7:00000000 r6:8281f77c r5:00000000 r4:822603d4 [ 1869.280097][ T32] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 1869.280723][ T32] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1869.281131][ T32] r5:00000000 r4:82a77d18 [ 1869.284362][ T32] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 1869.290596][ T32] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 1869.291182][ T32] r7:000264c4 [ 1869.291376][ T32] [<80202824>] (panic) from [<8037d734>] (watchdog+0x334/0x81c) [ 1869.291715][ T32] r3:00000001 r2:00000000 r1:00000000 r0:822610c0 [ 1869.291980][ T32] [<8037d400>] (watchdog) from [<80281fc8>] (kthread+0x12c/0x280) [ 1869.292408][ T32] r10:00000000 r9:00000000 r8:8037d400 r7:830cf500 r6:830cf500 r5:8321ec00 [ 1869.292743][ T32] r4:00000001 [ 1869.292909][ T32] [<80281e9c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1869.293226][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 1869.293519][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1869.293858][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1869.294318][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1869.300274][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e9c [ 1869.300746][ T32] r4:83397f40 [ 1869.303486][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 14:20:46 Registers: info registers vcpu 0 CPU#0 R00=829c6a40 R01=8240f934 R02=9358c033 R03=81a3a2b0 R04=82abc2c0 R05=ed79f800 R06=0005b12a R07=000001b2 R08=dddc6000 R09=9358c033 R10=dddc6000 R11=df801d3c R12=df801d40 R13=df801d30 R14=812ec150 R15=81a3a2c0 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=85470ec0 R01=84b3f000 R02=dfac1d08 R03=00000000 R04=dfac1d08 R05=00000000 R06=85470ec0 R07=00000000 R08=dfac1d30 R09=84b3f000 R10=85a72878 R11=dfac1bfc R12=8183f900 R13=dfac1bd0 R14=818377a4 R15=8183f900 PSR=60000113 -ZC- A S svc32 s00=ec000000 s01=ffffffff d00=ffffffffec000000 s02=ac000000 s03=000393d4 d01=000393d4ac000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=0127303b s09=ff033bad d04=ff033bad0127303b s10=00000000 s11=ffffffff d05=ffffffff00000000 s12=001d8299 s13=00448563 d06=00448563001d8299 s14=00000000 s15=00000000 d07=0000000000000000 s16=fe000000 s17=1050de11 d08=1050de11fe000000 s18=0e000000 s19=fffe37e6 d09=fffe37e60e000000 s20=ff86e1c8 s21=00448567 d10=00448567ff86e1c8 s22=ffffffff s23=00000000 d11=00000000ffffffff s24=ef27303b s25=ffffffff d12=ffffffffef27303b s26=ac000000 s27=000393d4 d13=000393d4ac000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=01263d71 s33=ff4bd90d d16=ff4bd90d01263d71 s34=00000000 s35=ffffffff d17=ffffffff00000000 s36=ffdcfa52 s37=00215063 d18=00215063ffdcfa52 s38=ffffffff s39=00000000 d19=00000000ffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=fd53d915 s43=ffffffff d21=fffffffffd53d915 s44=fffffffb s45=ffffffff d22=fffffffffffffffb s46=ff1bf307 s47=ffffffff d23=ffffffffff1bf307 s48=fe034563 s49=1050de11 d24=1050de11fe034563 s50=ef130985 s51=ffffffff d25=ffffffffef130985 s52=ff42b21d s53=001774c4 d26=001774c4ff42b21d s54=017bf6eb s55=ffee1b74 d27=ffee1b74017bf6eb s56=fe68cd73 s57=fffef1d6 d28=fffef1d6fe68cd73 s58=ffff78eb s59=017bf6eb d29=017bf6ebffff78eb s60=a56c430a s61=000393d4 d30=000393d4a56c430a s62=621426b6 s63=ff81a686 d31=ff81a686621426b6 FPSCR: 00000000