last executing test programs: 49m51.495658922s ago: executing program 32 (id=1): socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)=@generic={&(0x7f0000000100)='./bus\x00', r3}, 0x18) 45m43.091138526s ago: executing program 33 (id=248): socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x800) recvmmsg(r1, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000640)=""/85, 0x55}, {0x0}], 0x2}, 0x4}], 0x100000, 0x10022, 0x0) 30m23.963731577s ago: executing program 34 (id=1335): socket$netlink(0x10, 0x3, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r2}, 0x18) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000ac0)=@updpolicy={0x4dc, 0x13, 0x1, 0x70bd2b, 0x0, {{@in6=@private0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x2, 0x0, 0x0, 0x0, 0xa, 0x40, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x7}}, [@algo_comp={0x74, 0x3, {{'deflate\x00'}, 0x160, "2df0db2643ccbea7504373e4adf315585d607ba00bf165cc15c07839eaf38233f2f9c38570e3bea65919b50b"}}, @replay_thresh={0x8, 0xb, 0x7ff}, @mark={0xc, 0x15, {0x35075d, 0x5}}, @algo_comp={0x124, 0x3, {{'lzjh\x00'}, 0x6e0, "759bee90a3948738238ae7a651773d64def9b0cd8e9345abde862cbe796146bc6a33ed2bd3cc9d1cda3a3225e070d7d655cde054e8b75ef1b568b5b1df29e203ccc61e8a12b3cb03efe770bf03c531cbdcb022319515596a88dc4231f7825e273271ca8c2964c142321afae79631757f90efa41f546ea6c1abb64448c12f1dac0888740067e6388452a87fc1b69981a260abe908a71a15f686c52d6decab12538259bacce243f2dd5b3684bf5edaf9b24f60a9277a782ca50983cad918a1a74651e60a49873fabe3b74dd785e619d46826a9f29bff31784c6c3145da"}}, @policy={0xac, 0x7, {{@in=@loopback, @in=@broadcast, 0x4e20, 0x0, 0x4e21, 0x401, 0xa, 0x30, 0x0, 0x1}, {0x8000, 0x24, 0x5, 0xa7d2, 0x9, 0x9, 0x4, 0x5}, {0x0, 0x1, 0x588}, 0x635, 0x0, 0x0, 0x0, 0x0, 0x2}}, @tmpl={0x184, 0x5, [{{@in=@multicast1, 0x4d6, 0x33}, 0xa, @in=@broadcast, 0x3501, 0x3, 0x3, 0x2, 0x4, 0x9, 0x9}, {{@in=@empty, 0x4d4, 0x32}, 0xa, @in=@multicast2, 0x3503, 0x4, 0x1, 0x59, 0x5, 0x8}, {{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, 0x4d6, 0x3c}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3503, 0x1, 0x2, 0x1, 0xa, 0x800, 0xfb82}, {{@in=@loopback, 0x4d6, 0x32}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x1, 0x2, 0xf8, 0x8, 0x2, 0x1}, {{@in6=@loopback, 0x4d5, 0x3c}, 0xa, @in6=@loopback, 0x3507, 0x0, 0x2, 0x9, 0x8659, 0x8, 0x1}, {{@in6=@mcast1, 0x4d3}, 0x0, @in6=@mcast2, 0x3504, 0x1, 0x0, 0x6, 0x8320, 0x1, 0x8001}]}, @algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x4dc}, 0x1, 0x0, 0x0, 0x4010}, 0x4000) 29m57.141785468s ago: executing program 35 (id=1350): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_emit_ethernet(0x5a, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000000)=0x800, 0x4) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x6, 0x8012, r3, 0x0) 26m49.161125975s ago: executing program 36 (id=1510): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000100)="1400000052004f7fb3e45f2024d2f1c9fb470000", 0x14) recvmmsg(r5, &(0x7f0000005c80), 0x1b, 0x10122, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x20, &(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/11, 0xb}}, 0x10) 24m48.544016361s ago: executing program 37 (id=1583): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7f, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r4}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x80, 0x0, 0x0, 0xfffffffd, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x2a}}}}}) 22m18.87147901s ago: executing program 38 (id=1907): openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) r1 = syz_clone(0x111, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x8, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setaffinity(0x0, 0x4, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f0000000040), 0x10000, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 20m38.24865429s ago: executing program 39 (id=1991): prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f00000000c0)='/dev/input/event#\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x200000000248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x23}, 0x38) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) socket$inet6_icmp(0xa, 0x2, 0x3a) r4 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0xe501, 0x3, 0x208, 0xb8, 0xa, 0x1000000, 0x0, 0x0, 0x170, 0x230, 0x230, 0x170, 0x223, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x20c49a, 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x20c49a, 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x268) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r5) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 20m23.712927323s ago: executing program 6 (id=2014): syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @dest_unreach={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @private=0xa010102, @local, {[@ra={0x94, 0x4}, @cipso={0x86, 0x25, 0x0, [{0x0, 0x10, "f79eb4cf48b5a5788fc15a45b5b1"}, {0x0, 0xf, "749018c9a54b61394327f11535"}]}]}}}}}}}, 0x0) 20m23.449458817s ago: executing program 6 (id=2015): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8c}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4000000}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) capset(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) r3 = socket$inet6(0xa, 0x2, 0x0) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x45b, 0x2, 0x0) 19m40.20042739s ago: executing program 40 (id=2015): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8c}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4000000}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) capset(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) r3 = socket$inet6(0xa, 0x2, 0x0) shutdown(r3, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x45b, 0x2, 0x0) 19m17.69583414s ago: executing program 9 (id=2047): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) 19m16.50566169s ago: executing program 9 (id=2048): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mremap(&(0x7f00005ab000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 19m11.020300522s ago: executing program 9 (id=2057): clock_adjtime(0x0, &(0x7f0000000680)={0x19b1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1000, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4b}) 19m10.497348338s ago: executing program 9 (id=2058): munlock(&(0x7f0000fe9000/0x14000)=nil, 0x14000) 19m9.934597029s ago: executing program 9 (id=2059): syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x4000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000c00)=""/59, 0x3b, 0x545) r5 = socket$inet6(0xa, 0x2, 0x0) getrandom(0x0, 0x0, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty, 0xffffffff}, 0x1c) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="12000000050000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r6, &(0x7f0000000240), &(0x7f00000000c0)=@udp6=r5}, 0x20) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) read$eventfd(r5, &(0x7f0000000040), 0x8) 18m26.688200056s ago: executing program 41 (id=2059): syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x4000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000c00)=""/59, 0x3b, 0x545) r5 = socket$inet6(0xa, 0x2, 0x0) getrandom(0x0, 0x0, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty, 0xffffffff}, 0x1c) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="12000000050000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r6, &(0x7f0000000240), &(0x7f00000000c0)=@udp6=r5}, 0x20) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) read$eventfd(r5, &(0x7f0000000040), 0x8) 17m13.700841376s ago: executing program 42 (id=2084): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000950000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) sendmsg$nl_xfrm(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x5e}, {@in6=@loopback, 0x4d4, 0x32}, @in=@dev, {0xfffffffffffffffd}, {0x0, 0x200000000, 0x0, 0x100000}, {0x0, 0x0, 0x2}, 0x70bd2a, 0x0, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x20000011}, 0x0) 12m14.598837197s ago: executing program 43 (id=2245): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x800, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x1, &(0x7f0000000280)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x6, 0x8012, r0, 0x0) 10m18.641929038s ago: executing program 44 (id=2305): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000f0000000000000c00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x3, 0x26) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 9m14.772149308s ago: executing program 1 (id=2396): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x2000000, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xfff3}}}, 0x24}}, 0x0) 8m43.023435864s ago: executing program 1 (id=2402): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) mount_setattr(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x8800, &(0x7f0000000200)={0x5, 0x84}, 0x20) 8m42.459167775s ago: executing program 1 (id=2403): r0 = syz_open_procfs(0x0, &(0x7f0000000780)='net/softnet_stat\x00') read$FUSE(r0, &(0x7f00000042c0)={0x2020}, 0x2020) pread64(r0, &(0x7f0000000180)=""/246, 0xf6, 0x20d5) 8m17.017921126s ago: executing program 1 (id=2403): r0 = syz_open_procfs(0x0, &(0x7f0000000780)='net/softnet_stat\x00') read$FUSE(r0, &(0x7f00000042c0)={0x2020}, 0x2020) pread64(r0, &(0x7f0000000180)=""/246, 0xf6, 0x20d5) 8m16.552030884s ago: executing program 1 (id=2412): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) fsopen(&(0x7f0000000040)='fuseblk\x00', 0x0) 8m16.065658186s ago: executing program 1 (id=2414): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeeb, 0x8031, r0, 0x21af6000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 7m32.886936764s ago: executing program 45 (id=2414): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeeb, 0x8031, r0, 0x21af6000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 6m42.457594357s ago: executing program 5 (id=2487): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) execve(0x0, 0x0, 0x0) 6m42.127757069s ago: executing program 5 (id=2488): r0 = io_uring_setup(0x77bb, &(0x7f00000000c0)={0x0, 0xd709, 0x2, 0xf7fffffe, 0x2000062}) io_uring_enter(r0, 0x800000, 0x2, 0xf, &(0x7f0000000000)={[0x2000000]}, 0x18) 6m41.894301408s ago: executing program 5 (id=2489): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x18) r3 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x10000008}}}, 0x88) 6m41.548951902s ago: executing program 5 (id=2490): r0 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r1, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001000)=@newtfilter={0x4c, 0x2c, 0xf3f, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, {0xb, 0xfff3}, {}, {0x7, 0xffff}}, [@filter_kind_options=@f_flow={{0x9}, {0x1c, 0x2, [@TCA_FLOW_PERTURB={0x8, 0xc, 0x7e5}, @TCA_FLOW_MODE={0x8, 0x2, 0x1}, @TCA_FLOW_KEYS={0x8, 0x1, 0x1}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20041090}, 0xd0) 6m41.236962681s ago: executing program 5 (id=2491): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x275a, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r0, 0x26, &(0x7f0000000280)={0x1, 0x0, 0x9, 0x9}) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) 6m38.826682005s ago: executing program 5 (id=2492): r0 = syz_clone(0x111, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x201, &(0x7f0000000100)={0x0}) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x48100) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x2b, 0xd, 0x4, 0x8, 0x5, 0x5f8c602e, 0x8, 0x0, 0x0, 0x80, 0x8}}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setaffinity(0x0, 0x4, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x0, 0x61, 0x10, 0x94}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 6m10.406080131s ago: executing program 4 (id=2502): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000006b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='br_fdb_add\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000001c000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="4000aa000a0002"], 0x28}}, 0x0) 6m9.365244583s ago: executing program 4 (id=2503): socket$inet_tcp(0x2, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000003680)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 6m9.137560331s ago: executing program 4 (id=2504): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000a40)="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", 0x691}], 0x1) 6m8.710084795s ago: executing program 4 (id=2505): unshare(0x62040200) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x0) 6m8.223873247s ago: executing program 4 (id=2506): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="6a0ac4ff0000000071106d00000000009500080000000002"], &(0x7f0000000480)='GPL\x00'}, 0x80) 6m7.831495316s ago: executing program 4 (id=2507): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) syz_clone(0x400a1400, 0x0, 0x0, 0x0, 0x0, 0x0) 5m55.266467552s ago: executing program 46 (id=2492): r0 = syz_clone(0x111, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x201, &(0x7f0000000100)={0x0}) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x48100) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x2b, 0xd, 0x4, 0x8, 0x5, 0x5f8c602e, 0x8, 0x0, 0x0, 0x80, 0x8}}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setaffinity(0x0, 0x4, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x0, 0x61, 0x10, 0x94}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 5m24.129857671s ago: executing program 47 (id=2507): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) syz_clone(0x400a1400, 0x0, 0x0, 0x0, 0x0, 0x0) 5m8.341974833s ago: executing program 7 (id=2512): r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'vlan0\x00', &(0x7f0000000380)=@ethtool_channels={0x1, 0x6, 0xb, 0x6, 0x0, 0x80000000, 0x1, 0x2, 0x2}}) 5m7.972657199s ago: executing program 7 (id=2513): r0 = add_key$user(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000280)="d25a", 0x2, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000240)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0) 5m7.660173079s ago: executing program 7 (id=2514): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="200000006a0001050000000000000000470d00000000000008000a"], 0x20}}, 0x0) 5m7.315415762s ago: executing program 7 (id=2515): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000600)='sys_enter\x00', r2}, 0x10) utimes(0x0, 0x0) 5m7.028644298s ago: executing program 7 (id=2516): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000024c0)={0x2c, r1, 0x801, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24008000}, 0x2400c000) 5m5.11532329s ago: executing program 7 (id=2517): socket$vsock_stream(0x28, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x18) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = socket(0x10, 0x80803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=ANY=[@ANYBLOB="1c0000005e000102000000000000000000000000682ce665c9"], 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) recvmmsg(r3, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r4, &(0x7f0000000000), 0x4000000000001f2, 0x0) 4m31.478423915s ago: executing program 8 (id=2527): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000002500)='./file0\x00', &(0x7f0000002540)='system.posix_acl_access\x00', &(0x7f0000002640)={{}, {0x1, 0x4}, [], {0x4, 0x4}, [], {0x10, 0x1}, {0x20, 0x4}}, 0x24, 0x2) 4m31.19620861s ago: executing program 8 (id=2528): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x13, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x29, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @sack_perm, @timestamp, @timestamp, @timestamp, @timestamp], 0x20000149) 4m30.831771246s ago: executing program 8 (id=2529): syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x0) 4m30.611501184s ago: executing program 8 (id=2530): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) r2 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') execveat$binfmt(0xffffffffffffff9c, r2, &(0x7f0000000400)={[], 0x23}, 0x0, 0x0) 4m30.243614471s ago: executing program 8 (id=2531): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f0000000040)=0x8, 0x4) 4m29.824937694s ago: executing program 8 (id=2532): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x8000000000002) sched_setscheduler(r0, 0x2, &(0x7f0000000240)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) unshare(0x60060200) 4m22.040606416s ago: executing program 48 (id=2517): socket$vsock_stream(0x28, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x18) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = socket(0x10, 0x80803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=ANY=[@ANYBLOB="1c0000005e000102000000000000000000000000682ce665c9"], 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) recvmmsg(r3, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r4, &(0x7f0000000000), 0x4000000000001f2, 0x0) 3m46.130672237s ago: executing program 49 (id=2532): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x8000000000002) sched_setscheduler(r0, 0x2, &(0x7f0000000240)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) unshare(0x60060200) 3m37.690963422s ago: executing program 6 (id=2533): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@generic={0x6b, 0x1, 0x1, 0x8f}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3m37.165305758s ago: executing program 6 (id=2535): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=@base={0xf, 0x4, 0x4, 0x20002, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 3m36.623485897s ago: executing program 6 (id=2536): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000440), 0x1, 0x0) write$selinux_validatetrans(r1, 0x0, 0xff0f) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000000100000008000100030000001400048005"], 0x38}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="2400000076001f03000000000000000008000000ffffffff0c000d80080003"], 0x24}], 0x1}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @mcast2, 0xc}, 0x1c) getsockopt$sock_buf(r3, 0x1, 0x19, 0x0, &(0x7f0000003080)=0x7a) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r7, &(0x7f0000004080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}}], 0x1, 0x0) dup3(r7, r6, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) move_mount(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1) 3m35.48047382s ago: executing program 6 (id=2537): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x50) 3m5.538228749s ago: executing program 9 (id=2534): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = fsopen(&(0x7f0000001340)='cgroup2\x00', 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r6 = fsmount(r5, 0x0, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) preadv2(r7, &(0x7f00000003c0)=[{&(0x7f0000001380)=""/4096, 0x1000}], 0x1, 0x7, 0x4, 0x0) 2m51.81611963s ago: executing program 50 (id=2537): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x50) 2m22.116161332s ago: executing program 51 (id=2534): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = fsopen(&(0x7f0000001340)='cgroup2\x00', 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r6 = fsmount(r5, 0x0, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) preadv2(r7, &(0x7f00000003c0)=[{&(0x7f0000001380)=""/4096, 0x1000}], 0x1, 0x7, 0x4, 0x0) 2m3.957639624s ago: executing program 2 (id=2542): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000019080)=@abs={0x1, 0x0, 0x4e20}, 0x6e) setresgid(0xee00, 0x0, 0x0) listen(r0, 0x0) setresgid(0x0, 0x0, 0xee01) listen(r0, 0x2) 2m3.651487877s ago: executing program 2 (id=2543): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x74, 0x2, 0x0, 0x1}, {0x6, 0x0, 0x0, 0x474}]}) 2m2.845988551s ago: executing program 2 (id=2544): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r1}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 2m2.140126351s ago: executing program 2 (id=2545): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) 2m1.387750387s ago: executing program 2 (id=2546): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x1}, 0x1c) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x8000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x131) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) socket$packet(0x11, 0xa, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 2m0.323514267s ago: executing program 2 (id=2547): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000180)={0x7, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020100090a000000007fffffff0000000200100000e9000000e9000000000000030005000000000002000000ac1414000000000000000000030006000000000002"], 0x50}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x40000000000007b, 0x4004) 1m16.689354409s ago: executing program 52 (id=2547): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000180)={0x7, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020100090a000000007fffffff0000000200100000e9000000e9000000000000030005000000000002000000ac1414000000000000000000030006000000000002"], 0x50}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x40000000000007b, 0x4004) 47.125291695s ago: executing program 0 (id=2569): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000007000000020000000400000005"], 0x87) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000000010003"], 0x50) socket$nl_route(0x10, 0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x2000035e, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000630120000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff61}, 0x90) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 46.490182624s ago: executing program 0 (id=2570): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000017c0)=@ipv4_newrule={0x28, 0x1e, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x1}, [@FRA_TUN_ID={0xc, 0xc, 0x1, 0x0, 0x4}]}, 0x28}}, 0x0) 46.09556984s ago: executing program 0 (id=2571): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 44.523340663s ago: executing program 0 (id=2572): bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip6_vti0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @private=0xa010100}, 0x10) sendmmsg$inet(r2, &(0x7f0000000f40)=[{{&(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10, 0x0}}], 0x68000, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010000108000000000000000000020000", @ANYRES32=0x0, @ANYBLOB="2a1004000000000008001b00000000"], 0x28}, 0x1, 0x0, 0x0, 0x20048050}, 0x4000) 41.218441019s ago: executing program 0 (id=2574): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000001040)={0x3, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000002540)={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 40.875442868s ago: executing program 0 (id=2575): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = inotify_init() setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x2}}}, 0x108) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x1, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e23, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}}}, 0x108) close_range(r3, 0xffffffffffffffff, 0x0) r5 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 1.904107221s ago: executing program 3 (id=2583): pipe(&(0x7f0000000000)={0xffffffffffffffff}) pipe(0x0) tee(r0, r0, 0x6, 0x0) 1.544767062s ago: executing program 3 (id=2584): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x14, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x19}]}, @IFLA_GROUP={0x8}]}, 0x3c}}, 0x0) 1.267113731s ago: executing program 3 (id=2585): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0x100, 0x9, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000005c0), &(0x7f00000005c0), 0x208, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000340), 0x7, r0, 0x0, 0xfeff}, 0x38) 792.602798ms ago: executing program 3 (id=2586): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x40000000, 0x0) ptrace$peek(0x2, r0, 0x0) 392.307894ms ago: executing program 3 (id=2587): timer_create(0x3, 0x0, &(0x7f0000044000)=0x0) timer_delete(r0) 0s ago: executing program 3 (id=2588): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x300000a, 0x4031, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x9, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000001000390400000000000000", @ANYRES32=r4, @ANYBLOB="01ffffffff0000001800128008000100677265000c000280080007007f"], 0x38}, 0x1, 0x0, 0x0, 0x54}, 0x0) sendto$packet(r1, &(0x7f00000003c0)="02", 0x1, 0x6044810, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) timer_gettime(0x0, &(0x7f0000000100)) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_destroy(r6) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r7, 0x2) r8 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r8, 0x1) kernel console output (not intermixed with test programs): from veth0 (while UP) [ 1519.080080][T10949] !60ªX¹¦À: entered allmulticast mode [ 1519.082149][T10949] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 1520.498305][T11000] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1552'. [ 1521.652400][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1521.652860][ T29] audit: type=1400 audit(1521.570:378): avc: denied { connect } for pid=11056 comm="syz.5.1555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1521.781509][ T29] audit: type=1400 audit(1521.690:379): avc: denied { read } for pid=11056 comm="syz.5.1555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1522.027738][T11061] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1522.030354][T11061] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1522.181148][T10901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1522.212542][T10901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1525.123087][T10901] hsr_slave_0: entered promiscuous mode [ 1525.125034][T10901] hsr_slave_1: entered promiscuous mode [ 1526.285792][T10901] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1526.324484][T10901] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1526.362013][T10901] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1526.391500][T10901] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1527.607641][ T29] audit: type=1400 audit(1527.520:380): avc: denied { wake_alarm } for pid=11088 comm="syz.5.1557" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1528.952397][T10901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1538.531659][T10901] veth0_vlan: entered promiscuous mode [ 1538.578868][T10901] veth1_vlan: entered promiscuous mode [ 1538.723266][T10901] veth0_macvtap: entered promiscuous mode [ 1538.762211][T10901] veth1_macvtap: entered promiscuous mode [ 1538.920968][ T9533] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1538.922220][ T9533] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1538.930357][ T9533] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1538.931950][ T9533] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1578.061791][ T29] audit: type=1400 audit(1577.980:381): avc: denied { read } for pid=11333 comm="syz.5.1570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1578.366392][T11341] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1572'. [ 1578.425772][ T29] audit: type=1400 audit(1578.340:382): avc: denied { setopt } for pid=11342 comm="syz.5.1573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1585.125101][T11351] netlink: 'syz.6.1576': attribute type 3 has an invalid length. [ 1588.369361][ T7145] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1588.375082][ T7145] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 1588.462310][ T7145] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1588.462764][ T7145] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 1588.521927][ T7145] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1588.522291][ T7145] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 1588.601106][ T7145] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1588.601558][ T7145] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 1589.002531][ T7145] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1589.019069][ T7145] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1589.023945][ T7145] bond0 (unregistering): Released all slaves [ 1589.125863][ T7145] hsr_slave_0: left promiscuous mode [ 1589.129348][ T7145] hsr_slave_1: left promiscuous mode [ 1589.145812][ T7145] veth1_macvtap: left promiscuous mode [ 1589.146453][ T7145] veth0_macvtap: left promiscuous mode [ 1589.147521][ T7145] veth1_vlan: left promiscuous mode [ 1589.148248][ T7145] veth0_vlan: left promiscuous mode [ 1593.284163][ T29] audit: type=1400 audit(1593.200:383): avc: denied { getopt } for pid=11396 comm="syz.5.1580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1600.718145][T11448] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1600.720996][T11448] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1624.791444][T11501] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1624.794644][T11501] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1631.314211][T11527] netlink: 64 bytes leftover after parsing attributes in process `syz.6.1615'. [ 1641.493925][T11529] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1641.501377][T11529] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1643.045353][T11529] hsr_slave_0: entered promiscuous mode [ 1643.059083][T11529] hsr_slave_1: entered promiscuous mode [ 1643.060626][T11529] debugfs: 'hsr0' already exists in 'hsr' [ 1643.060945][T11529] Cannot create hsr debugfs directory [ 1643.549996][T11529] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1643.561183][T11529] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1643.576503][T11529] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1643.601706][T11529] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1644.860609][T11529] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1648.122692][T11529] veth0_vlan: entered promiscuous mode [ 1648.159838][T11529] veth1_vlan: entered promiscuous mode [ 1648.280072][T11529] veth0_macvtap: entered promiscuous mode [ 1648.285475][T11529] veth1_macvtap: entered promiscuous mode [ 1648.374855][ T9533] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1648.375193][ T9533] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1648.375273][ T9533] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1648.375354][ T9533] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1655.216442][ T29] audit: type=1400 audit(2426.203:384): avc: denied { relabelfrom } for pid=11939 comm="syz.7.1634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1655.216965][ T29] audit: type=1400 audit(2426.203:385): avc: denied { relabelto } for pid=11939 comm="syz.7.1634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1670.357149][T12023] pim6reg1: entered promiscuous mode [ 1670.378272][T12023] pim6reg1: entered allmulticast mode [ 1673.624103][ T29] audit: type=1400 audit(2445.529:386): avc: denied { create } for pid=12073 comm="syz.6.1672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1679.876485][T12164] pim6reg1: entered promiscuous mode [ 1679.876982][T12164] pim6reg1: entered allmulticast mode [ 1680.885178][T12177] pim6reg1: entered promiscuous mode [ 1680.886449][T12177] pim6reg1: entered allmulticast mode [ 1682.213428][ T29] audit: type=1400 audit(2454.537:387): avc: denied { create } for pid=12194 comm="syz.7.1699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1687.585529][T12333] pim6reg1: entered promiscuous mode [ 1687.585842][T12333] pim6reg1: entered allmulticast mode [ 1697.751340][T12489] veth0_vlan: entered allmulticast mode [ 1697.794444][T12489] : renamed from veth0_vlan [ 1698.685017][T12507] wg2: entered promiscuous mode [ 1698.685299][T12507] wg2: entered allmulticast mode [ 1699.779542][T12539] syzkaller0: entered promiscuous mode [ 1699.780142][T12539] syzkaller0: entered allmulticast mode [ 1704.652376][T12601] pim6reg1: entered promiscuous mode [ 1704.653347][T12601] pim6reg1: entered allmulticast mode [ 1705.142219][T12610] pim6reg1: entered promiscuous mode [ 1705.157521][T12610] pim6reg1: entered allmulticast mode [ 1708.382837][T12678] syzkaller0: entered promiscuous mode [ 1708.383386][T12678] syzkaller0: entered allmulticast mode [ 1709.586121][T12689] syzkaller0: entered promiscuous mode [ 1709.586606][T12689] syzkaller0: entered allmulticast mode [ 1712.897135][T12762] pim6reg1: entered promiscuous mode [ 1712.898599][T12762] pim6reg1: entered allmulticast mode [ 1713.624411][T12773] pim6reg1: entered promiscuous mode [ 1713.624797][T12773] pim6reg1: entered allmulticast mode [ 1718.073821][T12883] pim6reg1: entered promiscuous mode [ 1718.074763][T12883] pim6reg1: entered allmulticast mode [ 1726.253315][T13043] pim6reg1: entered promiscuous mode [ 1726.266483][T13043] pim6reg1: entered allmulticast mode [ 1734.095980][T13145] veth0_vlan: entered allmulticast mode [ 1734.138137][T13145] veth0_vlan: left promiscuous mode [ 1734.139989][T13145] veth0_vlan: entered promiscuous mode [ 1737.441789][T13223] wg2: entered promiscuous mode [ 1737.442747][T13223] wg2: entered allmulticast mode [ 1738.584676][ T7145] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1738.707888][ T7145] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1738.871744][ T7145] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1739.022615][ T7145] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1739.588394][ T7145] bond1 (unregistering): (slave gretap1): Releasing active interface [ 1739.726193][ T7145] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1739.741652][ T7145] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1739.757794][ T7145] bond0 (unregistering): Released all slaves [ 1739.782947][ T7145] bond1 (unregistering): Released all slaves [ 1739.804949][ T7145] bond2 (unregistering): Released all slaves [ 1739.900441][T13278] pim6reg1: entered promiscuous mode [ 1739.900908][T13278] pim6reg1: entered allmulticast mode [ 1740.158449][ T7145] hsr_slave_0: left promiscuous mode [ 1740.162242][ T7145] hsr_slave_1: left promiscuous mode [ 1740.182077][ T7145] macsec0: left promiscuous mode [ 1740.183884][ T7145] veth0_macvtap: left allmulticast mode [ 1740.185149][ T7145] veth1_macvtap: left promiscuous mode [ 1740.191663][ T7145] veth0_macvtap: left promiscuous mode [ 1740.192875][ T7145] veth1_vlan: left promiscuous mode [ 1740.193839][ T7145] veth0_vlan: left promiscuous mode [ 1753.062222][ T29] audit: type=1400 audit(2528.926:388): avc: denied { mount } for pid=13378 comm="syz.6.1918" name="/" dev="ramfs" ino=20365 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1754.173669][T13386] wireguard0: entered promiscuous mode [ 1754.174017][T13386] wireguard0: entered allmulticast mode [ 1790.815748][T13450] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1790.841860][T13450] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1793.653283][T13450] hsr_slave_0: entered promiscuous mode [ 1793.654929][T13450] hsr_slave_1: entered promiscuous mode [ 1793.671245][T13450] debugfs: 'hsr0' already exists in 'hsr' [ 1793.673451][T13450] Cannot create hsr debugfs directory [ 1794.142493][T13450] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1794.184922][T13450] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1794.213227][T13450] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1794.244374][T13450] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1795.866726][T13450] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1798.466297][T13450] veth0_vlan: entered promiscuous mode [ 1798.523877][T13450] veth1_vlan: entered promiscuous mode [ 1798.664804][T13450] veth0_macvtap: entered promiscuous mode [ 1798.686165][T13450] veth1_macvtap: entered promiscuous mode [ 1798.783019][ T1344] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1798.818559][ T1344] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1798.821836][T11595] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1798.822436][T11595] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1801.294922][T13814] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1801.335790][T13814] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1806.738639][ T29] audit: type=1400 audit(2585.279:389): avc: denied { create } for pid=13837 comm="syz.8.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1806.745963][ T29] audit: type=1400 audit(2585.279:390): avc: denied { sys_admin } for pid=13837 comm="syz.8.1940" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1806.958785][T13841] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1806.960651][T13841] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1807.134310][T13846] netlink: 'syz.6.1943': attribute type 4 has an invalid length. [ 1807.160329][T13846] netlink: 'syz.6.1943': attribute type 4 has an invalid length. [ 1807.408851][ T29] audit: type=1326 audit(2585.972:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13849 comm="syz.6.1945" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x0 [ 1837.428533][ T29] audit: type=1400 audit(2617.497:392): avc: denied { attach_queue } for pid=13914 comm="syz.6.1971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1838.498083][T13927] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1839.292474][T13936] netlink: 96 bytes leftover after parsing attributes in process `syz.6.1980'. [ 1845.640024][ T29] audit: type=1400 audit(2626.106:393): avc: denied { connect } for pid=13971 comm="syz.6.1993" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1845.725011][ T29] audit: type=1400 audit(2626.200:394): avc: denied { write } for pid=13971 comm="syz.6.1993" laddr=172.20.20.170 lport=256 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1870.418432][ T29] audit: type=1400 audit(2652.120:395): avc: denied { load_policy } for pid=13980 comm="syz.6.1995" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1870.446804][T13981] SELinux: failed to load policy [ 1875.060859][ T9533] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1875.103849][T14001] capability: warning: `syz.6.2003' uses 32-bit capabilities (legacy support in use) [ 1875.182899][ T9533] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1875.313293][ T9533] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1875.432125][ T9533] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1876.191676][ T9533] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1876.217561][ T9533] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1876.223335][ T9533] bond0 (unregistering): Released all slaves [ 1876.322343][ T9533] hsr_slave_0: left promiscuous mode [ 1876.349622][ T9533] hsr_slave_1: left promiscuous mode [ 1876.379164][ T9533] veth1_macvtap: left promiscuous mode [ 1876.379594][ T9533] veth0_macvtap: left promiscuous mode [ 1876.379834][ T9533] veth1_vlan: left promiscuous mode [ 1877.782603][T14028] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=14028 comm=syz.6.2009 [ 1877.807394][T14028] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=14028 comm=syz.6.2009 [ 1892.778773][T14058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1892.824345][T14058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1896.052213][T14058] hsr_slave_0: entered promiscuous mode [ 1896.054655][T14058] hsr_slave_1: entered promiscuous mode [ 1896.056422][T14058] debugfs: 'hsr0' already exists in 'hsr' [ 1896.057279][T14058] Cannot create hsr debugfs directory [ 1896.930465][T14058] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 1896.946724][T14058] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 1896.984544][T14058] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 1897.006091][T14058] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 1899.590767][T14058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1906.236640][T14058] veth0_vlan: entered promiscuous mode [ 1906.282463][T14058] veth1_vlan: entered promiscuous mode [ 1906.425375][T14058] veth0_macvtap: entered promiscuous mode [ 1906.472275][T14058] veth1_macvtap: entered promiscuous mode [ 1906.664241][ T355] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1906.666292][ T355] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1906.670442][ T355] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1906.670848][ T355] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1912.731017][ T29] audit: type=1400 audit(2696.547:396): avc: denied { read } for pid=14471 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1913.463560][ T29] audit: type=1400 audit(2697.313:397): avc: denied { prog_load } for pid=14473 comm="syz.9.2022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1913.484314][ T29] audit: type=1400 audit(2697.334:398): avc: denied { bpf } for pid=14473 comm="syz.9.2022" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1913.573269][ T29] audit: type=1400 audit(2697.429:399): avc: denied { write } for pid=14473 comm="syz.9.2022" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1913.595113][ T29] audit: type=1400 audit(2697.429:400): avc: denied { open } for pid=14473 comm="syz.9.2022" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1913.595564][ T29] audit: type=1400 audit(2697.429:401): avc: denied { ioctl } for pid=14473 comm="syz.9.2022" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1913.634975][T14474] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1913.637468][T14474] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1913.744343][ T29] audit: type=1400 audit(2697.607:402): avc: denied { perfmon } for pid=14473 comm="syz.9.2022" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1913.885055][ T29] audit: type=1400 audit(2697.754:403): avc: denied { prog_run } for pid=14473 comm="syz.9.2022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1913.987967][ T29] audit: type=1400 audit(2697.870:404): avc: denied { map_create } for pid=14473 comm="syz.9.2022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1913.988465][ T29] audit: type=1400 audit(2697.870:405): avc: denied { map_read map_write } for pid=14473 comm="syz.9.2022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1917.686825][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 1917.687196][ T29] audit: type=1400 audit(2701.744:412): avc: denied { read } for pid=14485 comm="syz.9.2026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1918.729111][ T29] audit: type=1400 audit(2702.825:413): avc: denied { execmem } for pid=14490 comm="syz.9.2028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1921.217211][ T29] audit: type=1400 audit(2705.449:414): avc: denied { read } for pid=14490 comm="syz.9.2028" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1921.218261][ T29] audit: type=1400 audit(2705.449:415): avc: denied { open } for pid=14490 comm="syz.9.2028" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1921.224571][ T29] audit: type=1400 audit(2705.460:416): avc: denied { ioctl } for pid=14490 comm="syz.9.2028" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1945.429454][ T29] audit: type=1400 audit(2730.865:417): avc: denied { execute } for pid=14494 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1945.474711][ T29] audit: type=1400 audit(2730.907:418): avc: denied { execute_no_trans } for pid=14494 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1945.543994][ T29] audit: type=1400 audit(2730.981:419): avc: denied { read } for pid=14495 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1945.572780][ T29] audit: type=1400 audit(2731.012:420): avc: denied { open } for pid=14495 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1945.573140][ T29] audit: type=1400 audit(2731.012:421): avc: denied { mounton } for pid=14495 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1945.815121][ T29] audit: type=1400 audit(2731.274:422): avc: denied { sys_module } for pid=14495 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1950.080021][T14495] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1950.086302][T14495] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1950.643318][ T29] audit: type=1400 audit(2736.345:423): avc: denied { name_bind } for pid=14683 comm="syz.9.2034" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1953.238980][T14495] hsr_slave_0: entered promiscuous mode [ 1953.251879][T14495] hsr_slave_1: entered promiscuous mode [ 1953.253353][T14495] debugfs: 'hsr0' already exists in 'hsr' [ 1953.254031][T14495] Cannot create hsr debugfs directory [ 1953.764911][ T29] audit: type=1400 audit(2739.610:424): avc: denied { create } for pid=14766 comm="syz.9.2039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1954.713885][ T29] audit: type=1400 audit(2740.618:425): avc: denied { write } for pid=14814 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1954.734359][ T29] audit: type=1400 audit(2740.618:426): avc: denied { open } for pid=14814 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1954.868397][ T29] audit: type=1400 audit(2740.775:427): avc: denied { search } for pid=14814 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1954.869483][ T29] audit: type=1400 audit(2740.775:428): avc: denied { search } for pid=14814 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1954.869923][ T29] audit: type=1400 audit(2740.775:429): avc: denied { search } for pid=14814 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1954.870005][ T29] audit: type=1400 audit(2740.775:430): avc: denied { search } for pid=14814 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1954.998163][ T29] audit: type=1400 audit(2740.912:431): avc: denied { read open } for pid=14829 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1954.999860][ T29] audit: type=1400 audit(2740.912:432): avc: denied { getattr } for pid=14829 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1955.167575][T14495] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1955.265907][T14495] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1955.345955][T14495] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1955.467476][T14495] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1955.637901][ T29] audit: type=1400 audit(2741.584:433): avc: denied { add_name } for pid=14814 comm="dhcpcd-run-hook" name="resolv.conf.eth4.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1955.638365][ T29] audit: type=1400 audit(2741.584:434): avc: denied { create } for pid=14814 comm="dhcpcd-run-hook" name="resolv.conf.eth4.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1955.667259][ T29] audit: type=1400 audit(2741.615:435): avc: denied { write open } for pid=14814 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth4.link" dev="tmpfs" ino=108 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1955.674814][ T29] audit: type=1400 audit(2741.626:436): avc: denied { append } for pid=14814 comm="dhcpcd-run-hook" name="resolv.conf.eth4.link" dev="tmpfs" ino=108 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1955.741331][ T29] audit: type=1400 audit(2741.699:437): avc: denied { getattr } for pid=14814 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1955.850686][ T29] audit: type=1400 audit(2741.804:438): avc: denied { getattr } for pid=14814 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1955.863097][ T29] audit: type=1400 audit(2741.814:439): avc: denied { ioctl } for pid=14814 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1956.244427][ T29] audit: type=1400 audit(2742.213:440): avc: denied { read } for pid=14848 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1956.675323][ T29] audit: type=1400 audit(2742.675:441): avc: denied { remove_name } for pid=14851 comm="rm" name="resolv.conf.eth4.link" dev="tmpfs" ino=108 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1956.698862][ T29] audit: type=1400 audit(2742.696:442): avc: denied { unlink } for pid=14851 comm="rm" name="resolv.conf.eth4.link" dev="tmpfs" ino=108 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1958.199085][T14495] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1968.079587][T14495] veth0_vlan: entered promiscuous mode [ 1968.142373][T14495] veth1_vlan: entered promiscuous mode [ 1968.305439][T14495] veth0_macvtap: entered promiscuous mode [ 1968.360524][T14495] veth1_macvtap: entered promiscuous mode [ 1968.552349][T14563] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1968.553510][T14563] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1968.554573][T14563] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1968.555566][T14563] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1968.834055][ T29] audit: type=1400 audit(2755.420:443): avc: denied { mounton } for pid=14495 comm="syz-executor" path="/syzkaller.Anw6H4/syz-tmp" dev="vda" ino=825 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1968.853975][ T29] audit: type=1400 audit(2755.451:444): avc: denied { mount } for pid=14495 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1968.862740][ T29] audit: type=1400 audit(2755.472:445): avc: denied { mounton } for pid=14495 comm="syz-executor" path="/syzkaller.Anw6H4/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1968.868508][ T29] audit: type=1400 audit(2755.472:446): avc: denied { mount } for pid=14495 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1968.957673][ T29] audit: type=1400 audit(2755.556:447): avc: denied { mounton } for pid=14495 comm="syz-executor" path="/syzkaller.Anw6H4/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1968.971773][ T29] audit: type=1400 audit(2755.588:448): avc: denied { mounton } for pid=14495 comm="syz-executor" path="/syzkaller.Anw6H4/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=23694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1969.093760][ T29] audit: type=1400 audit(2755.714:449): avc: denied { unmount } for pid=14495 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1969.097908][ T29] audit: type=1400 audit(2755.714:450): avc: denied { mounton } for pid=14495 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1969.119729][ T29] audit: type=1400 audit(2755.735:451): avc: denied { mount } for pid=14495 comm="syz-executor" name="/" dev="gadgetfs" ino=12935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1969.120058][ T29] audit: type=1400 audit(2755.735:452): avc: denied { mount } for pid=14495 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1969.809039][T14920] SELinux: failed to load policy [ 1970.235678][T14924] netlink: 104 bytes leftover after parsing attributes in process `syz.0.2049'. [ 1970.264795][T14924] netlink: 104 bytes leftover after parsing attributes in process `syz.0.2049'. [ 1979.452161][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 1979.452692][ T29] audit: type=1400 audit(2766.590:466): avc: denied { mount } for pid=14944 comm="syz.0.2056" name="/" dev="ramfs" ino=23166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1982.299494][ T29] audit: type=1400 audit(2769.561:467): avc: denied { create } for pid=14973 comm="syz.0.2061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1982.328258][ T29] audit: type=1400 audit(2769.571:468): avc: denied { sys_admin } for pid=14973 comm="syz.0.2061" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1982.479209][ T29] audit: type=1400 audit(2769.760:469): avc: denied { mount } for pid=14973 comm="syz.0.2061" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1983.969802][ T29] audit: type=1326 audit(2771.314:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14982 comm="syz.0.2064" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1983.970210][ T29] audit: type=1326 audit(2771.314:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14982 comm="syz.0.2064" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1983.970575][ T29] audit: type=1326 audit(2771.324:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14982 comm="syz.0.2064" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1983.991891][ T29] audit: type=1326 audit(2771.345:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14982 comm="syz.0.2064" exe="/syz-executor" sig=0 arch=40000028 syscall=439 compat=0 ip=0x132970 code=0x7ffc0000 [ 1984.002117][ T29] audit: type=1400 audit(2771.345:474): avc: denied { execute } for pid=14982 comm="syz.0.2064" name="cgroup" dev="tmpfs" ino=80 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=lnk_file permissive=1 [ 1984.055983][ T29] audit: type=1326 audit(2771.345:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14982 comm="syz.0.2064" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1991.374889][T14563] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1991.575869][T14563] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1991.716399][T14563] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1991.878655][T14563] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1992.707269][T14563] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1992.713578][T14563] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1992.729706][T14563] bond0 (unregistering): Released all slaves [ 1992.924323][T14563] hsr_slave_0: left promiscuous mode [ 1992.963419][T14563] hsr_slave_1: left promiscuous mode [ 1993.030485][T14563] veth1_macvtap: left promiscuous mode [ 1993.030803][T14563] veth0_macvtap: left promiscuous mode [ 1993.031232][T14563] veth1_vlan: left promiscuous mode [ 1993.031404][T14563] veth0_vlan: left promiscuous mode [ 1994.621774][ T29] audit: type=1400 audit(2782.515:476): avc: denied { create } for pid=15000 comm="syz.0.2068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1994.968120][ T29] audit: type=1400 audit(2782.872:477): avc: denied { bind } for pid=15000 comm="syz.0.2068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1994.972740][ T29] audit: type=1400 audit(2782.883:478): avc: denied { setopt } for pid=15000 comm="syz.0.2068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1994.983306][ T29] audit: type=1400 audit(2782.883:479): avc: denied { write } for pid=15000 comm="syz.0.2068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1994.984484][T15032] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2068'. [ 1994.988928][T15032] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2068'. [ 2015.621990][T15079] netlink: 'syz.0.2069': attribute type 7 has an invalid length. [ 2023.888988][ T9533] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2024.010035][ T9533] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2024.172137][ T9533] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2024.314064][ T9533] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2025.248818][ T9533] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2025.297044][ T9533] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2025.334025][ T9533] bond0 (unregistering): Released all slaves [ 2025.570660][T15086] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2025.645512][ T9533] hsr_slave_0: left promiscuous mode [ 2025.663983][ T9533] hsr_slave_1: left promiscuous mode [ 2025.709707][ T9533] veth1_macvtap: left promiscuous mode [ 2025.710112][ T9533] veth0_macvtap: left promiscuous mode [ 2025.710321][ T9533] veth1_vlan: left promiscuous mode [ 2025.710455][ T9533] veth0_vlan: left promiscuous mode [ 2027.017204][T15086] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2030.201154][T15086] hsr_slave_0: entered promiscuous mode [ 2030.202882][T15086] hsr_slave_1: entered promiscuous mode [ 2030.222849][T15086] debugfs: 'hsr0' already exists in 'hsr' [ 2030.223190][T15086] Cannot create hsr debugfs directory [ 2032.511437][T15086] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2032.563571][T15086] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2032.607846][T15086] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2032.611909][T15086] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2033.957568][T15086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2043.060538][T15086] veth0_vlan: entered promiscuous mode [ 2043.126275][T15086] veth1_vlan: entered promiscuous mode [ 2043.372626][T15086] veth0_macvtap: entered promiscuous mode [ 2043.397076][T15086] veth1_macvtap: entered promiscuous mode [ 2043.568770][ T1344] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2043.570101][ T1344] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2043.571710][ T1344] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2043.572830][ T1344] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2044.272570][T15531] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2044.277926][T15531] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2045.840354][T15548] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2078'. [ 2045.841037][T15548] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2078'. [ 2065.102386][ T363] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2065.281119][ T363] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2065.345454][ T363] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2065.410909][ T363] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2065.911047][ T363] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2065.938640][ T363] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2065.950991][ T363] bond0 (unregistering): Released all slaves [ 2065.980853][ T363] bond1 (unregistering): Released all slaves [ 2066.089567][ T363] hsr_slave_0: left promiscuous mode [ 2066.092365][ T363] hsr_slave_1: left promiscuous mode [ 2066.123202][ T363] veth1_macvtap: left promiscuous mode [ 2066.123584][ T363] veth0_macvtap: left promiscuous mode [ 2066.123882][ T363] veth1_vlan: left promiscuous mode [ 2066.124018][ T363] veth0_vlan: left promiscuous mode [ 2096.754587][T15728] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2096.758630][T15728] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2098.798464][T15728] hsr_slave_0: entered promiscuous mode [ 2098.827169][T15728] hsr_slave_1: entered promiscuous mode [ 2100.586640][T15728] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2100.620524][T15728] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2100.669780][T15728] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2100.709559][T15728] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2103.160132][T15728] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2112.466404][T15728] veth0_vlan: entered promiscuous mode [ 2112.558379][T15728] veth1_vlan: entered promiscuous mode [ 2112.779622][T15728] veth0_macvtap: entered promiscuous mode [ 2112.837619][T15728] veth1_macvtap: entered promiscuous mode [ 2113.111311][T14563] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2113.111866][T14563] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2113.112247][T14563] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2113.112334][T14563] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2113.833505][T16165] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2087'. [ 2146.941588][ T29] audit: type=1326 audit(2942.410:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16281 comm="syz.0.2099" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2146.948651][ T29] audit: type=1326 audit(2942.421:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16281 comm="syz.0.2099" exe="/syz-executor" sig=0 arch=40000028 syscall=252 compat=0 ip=0x132970 code=0x7ffc0000 [ 2147.449064][ T29] audit: type=1400 audit(2942.925:482): avc: denied { block_suspend } for pid=16281 comm="syz.0.2099" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2147.456304][ T29] audit: type=1326 audit(2942.956:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16281 comm="syz.0.2099" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2147.463410][ T29] audit: type=1326 audit(2942.956:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16281 comm="syz.0.2099" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2147.938228][ T29] audit: type=1400 audit(2943.460:485): avc: denied { unmount } for pid=14495 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2148.239244][ T29] audit: type=1326 audit(2943.775:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16294 comm="syz.0.2101" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2148.249941][ T29] audit: type=1326 audit(2943.775:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16294 comm="syz.0.2101" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2148.272767][ T29] audit: type=1326 audit(2943.817:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16294 comm="syz.0.2101" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2148.273220][ T29] audit: type=1326 audit(2943.817:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16294 comm="syz.0.2101" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2148.889417][T16299] netlink: 'syz.0.2102': attribute type 12 has an invalid length. [ 2149.183377][T16301] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2103'. [ 2156.636529][T16323] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2105'. [ 2167.219255][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 2167.219699][ T29] audit: type=1400 audit(2963.700:500): avc: denied { create } for pid=16325 comm="syz.3.2106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2167.243524][ T29] audit: type=1400 audit(2963.721:501): avc: denied { bind } for pid=16325 comm="syz.3.2106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2167.248121][ T29] audit: type=1400 audit(2963.732:502): avc: denied { listen } for pid=16325 comm="syz.3.2106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2167.273773][ T29] audit: type=1400 audit(2963.763:503): avc: denied { connect } for pid=16325 comm="syz.3.2106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2168.463372][T16334] sch_fq: defrate 0 ignored. [ 2169.906142][ T29] audit: type=1400 audit(2966.524:504): avc: denied { allowed } for pid=16341 comm="syz.3.2113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2169.949072][ T29] audit: type=1400 audit(2966.566:505): avc: denied { create } for pid=16341 comm="syz.3.2113" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2177.190105][ T29] audit: type=1400 audit(2974.177:506): avc: denied { map } for pid=16345 comm="syz.3.2115" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=24535 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2177.210453][ T29] audit: type=1400 audit(2974.198:507): avc: denied { read write } for pid=16345 comm="syz.3.2115" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=24535 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2177.597818][T13227] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 2177.793258][T13227] usb 1-1: config 1 has an invalid descriptor of length 102, skipping remainder of the config [ 2177.793610][T13227] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 2177.806690][T13227] usb 1-1: config 1 has an invalid descriptor of length 102, skipping remainder of the config [ 2177.807230][T13227] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 2177.859687][T13227] usb 1-1: config 1 has an invalid descriptor of length 102, skipping remainder of the config [ 2177.860022][T13227] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 2177.874298][T13227] usb 1-1: config 1 has an invalid descriptor of length 102, skipping remainder of the config [ 2177.874651][T13227] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 2177.895844][T13227] usb 1-1: config 1 has an invalid descriptor of length 102, skipping remainder of the config [ 2177.896190][T13227] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 2177.981846][T13227] usb 1-1: string descriptor 0 read error: -22 [ 2177.982290][T13227] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 2177.982350][T13227] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2178.029803][T13227] usb 1-1: invalid UAC_HEADER (v1) [ 2178.086809][T13227] snd-usb-audio 1-1:1.0: probe with driver snd-usb-audio failed with error -22 [ 2178.232340][T13227] usb 1-1: USB disconnect, device number 2 [ 2185.676689][T16388] netem: change failed [ 2195.583346][ T29] audit: type=1400 audit(2993.462:508): avc: denied { sqpoll } for pid=16397 comm="syz.0.2125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2196.667893][ T29] audit: type=1326 audit(2994.606:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16403 comm="syz.3.2127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2196.668352][ T29] audit: type=1326 audit(2994.617:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16403 comm="syz.3.2127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2196.696287][ T29] audit: type=1326 audit(2994.648:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16403 comm="syz.3.2127" exe="/syz-executor" sig=0 arch=40000028 syscall=360 compat=0 ip=0x132970 code=0x7ffc0000 [ 2196.698367][ T29] audit: type=1326 audit(2994.648:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16403 comm="syz.3.2127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2196.708495][ T29] audit: type=1326 audit(2994.669:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16403 comm="syz.3.2127" exe="/syz-executor" sig=0 arch=40000028 syscall=317 compat=0 ip=0x132970 code=0x7ffc0000 [ 2196.710609][ T29] audit: type=1400 audit(2994.669:514): avc: denied { watch } for pid=16403 comm="syz.3.2127" path="/14" dev="tmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2196.712914][ T29] audit: type=1326 audit(2994.669:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16403 comm="syz.3.2127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2196.772737][ T29] audit: type=1326 audit(2994.711:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16403 comm="syz.3.2127" exe="/syz-executor" sig=0 arch=40000028 syscall=41 compat=0 ip=0x132970 code=0x7ffc0000 [ 2196.774584][ T29] audit: type=1326 audit(2994.711:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16403 comm="syz.3.2127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2204.730950][T16500] netlink: 124 bytes leftover after parsing attributes in process `syz.3.2152'. [ 2205.509526][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 2205.511665][ T29] audit: type=1400 audit(3003.908:544): avc: denied { write } for pid=16505 comm="syz.3.2155" name="protocols" dev="proc" ino=4026532678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2211.754426][ T355] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2211.912123][ T355] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2212.024481][ T355] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2212.131805][ T355] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2212.629093][ T355] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2212.663881][ T355] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2212.676120][ T355] bond0 (unregistering): Released all slaves [ 2212.839792][ T355] hsr_slave_0: left promiscuous mode [ 2212.854473][ T355] hsr_slave_1: left promiscuous mode [ 2212.891613][ T355] veth1_macvtap: left promiscuous mode [ 2212.892037][ T355] veth0_macvtap: left promiscuous mode [ 2212.892267][ T355] veth1_vlan: left promiscuous mode [ 2212.892445][ T355] veth0_vlan: left promiscuous mode [ 2228.331252][T16515] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 2228.483687][T16515] usb 1-1: Using ep0 maxpacket: 16 [ 2228.525491][T16515] usb 1-1: config 0 has an invalid interface number: 84 but max is 0 [ 2228.525852][T16515] usb 1-1: config 0 has no interface number 0 [ 2228.526180][T16515] usb 1-1: config 0 interface 84 has no altsetting 0 [ 2228.588151][T16515] usb 1-1: New USB device found, idVendor=4f40, idProduct=2974, bcdDevice=33.ff [ 2228.588404][T16515] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2228.588572][T16515] usb 1-1: Product: syz [ 2228.588680][T16515] usb 1-1: Manufacturer: syz [ 2228.588797][T16515] usb 1-1: SerialNumber: syz [ 2228.594860][T16515] usb 1-1: config 0 descriptor?? [ 2228.836895][T16515] usb-storage 1-1:0.84: USB Mass Storage device detected [ 2228.846883][T16515] usb-storage 1-1:0.84: USB Mass Storage not supported on this host controller [ 2228.940237][T16515] usb-storage 1-1:0.84: probe with driver usb-storage failed with error -22 [ 2228.969195][T16515] usb 1-1: USB disconnect, device number 3 [ 2256.955932][ T29] audit: type=1400 audit(3057.909:545): avc: denied { create } for pid=16658 comm="syz.3.2169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2257.337445][ T29] audit: type=1400 audit(3058.319:546): avc: denied { create } for pid=16647 comm="syz.0.2164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2257.359748][ T29] audit: type=1400 audit(3058.340:547): avc: denied { setopt } for pid=16647 comm="syz.0.2164" lport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2264.932494][ T29] audit: type=1400 audit(3066.287:548): avc: denied { append } for pid=16669 comm="syz.3.2173" name="timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2279.781526][T16684] netlink: 'syz.0.2178': attribute type 12 has an invalid length. [ 2282.870576][ T29] audit: type=1400 audit(3085.120:549): avc: denied { mounton } for pid=16695 comm="syz.3.2184" path="/41/file0" dev="tmpfs" ino=224 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2282.871578][T16696] tmpfs: Unknown parameter '0xffffffffffffffff' [ 2282.979548][T16696] veth3: entered promiscuous mode [ 2296.849015][ T29] audit: type=1400 audit(3099.775:550): avc: denied { create } for pid=16729 comm="syz.0.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2296.893018][ T29] audit: type=1400 audit(3099.796:551): avc: denied { write } for pid=16729 comm="syz.0.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2309.095667][ T29] audit: type=1400 audit(3112.646:552): avc: denied { mount } for pid=16743 comm="syz.3.2195" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 2312.051943][T16512] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 2312.204214][T16512] usb 1-1: Using ep0 maxpacket: 8 [ 2312.228303][T16512] usb 1-1: unable to get BOS descriptor or descriptor too short [ 2312.237556][T16512] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 2312.237881][T16512] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 2312.237942][T16512] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 2312.258347][T16512] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 2312.258757][T16512] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2312.259009][T16512] usb 1-1: Product: syz [ 2312.259053][T16512] usb 1-1: Manufacturer: é©±ë¹æ±¿â–›í“¼ì¡¦â¢ã€°äŠ²ä£»å­…è‘‡ç¥Ý©çº¹ã©ãŽã¯ëžŸã©£å†„殲艹噩﷾䫢ᶻĭᙠ럄瘕﫫⓷楻æ®ì…”즩ï«ï¦¸å´¡ëœè ê´“ì•㳥肫∔î»á™šë••ⵑꪃ웥抾ëŠê»–ì‚©ç‰‰á‡«â˜®ïº [ 2312.259085][T16512] usb 1-1: SerialNumber: syz [ 2312.494072][T16512] usb 1-1: 0:2 : does not exist [ 2312.540552][T16512] usb 1-1: USB disconnect, device number 4 [ 2313.023476][T16812] syz.0.2207(16812): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 2315.938363][T16445] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 2316.163247][T16445] usb 1-1: Using ep0 maxpacket: 16 [ 2316.194040][T16445] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 2316.195688][T16445] usb 1-1: config 1 interface 0 altsetting 247 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 2316.197144][T16445] usb 1-1: config 1 interface 0 has no altsetting 0 [ 2316.245421][T16445] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2316.246618][T16445] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2316.247697][T16445] usb 1-1: Product: syz [ 2316.248407][T16445] usb 1-1: Manufacturer: syz [ 2316.249173][T16445] usb 1-1: SerialNumber: syz [ 2316.513338][T16445] usb 1-1: bad CDC descriptors [ 2316.531252][T16445] usb 1-1: USB disconnect, device number 5 [ 2316.767801][T16849] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2209'. [ 2316.780820][T16849] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2209'. [ 2316.782131][T16849] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2209'. [ 2316.885522][ T29] audit: type=1400 audit(3120.824:553): avc: denied { setopt } for pid=16848 comm="syz.0.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2316.900433][ T29] audit: type=1400 audit(3120.845:554): avc: denied { read } for pid=16848 comm="syz.0.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2317.325748][ T29] audit: type=1400 audit(3121.286:555): avc: denied { name_bind } for pid=16848 comm="syz.0.2209" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2317.331149][ T29] audit: type=1400 audit(3121.296:556): avc: denied { node_bind } for pid=16848 comm="syz.0.2209" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2318.557301][T13212] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 2318.837928][T13212] usb 1-1: not running at top speed; connect to a high speed hub [ 2318.853633][T13212] usb 1-1: config 4 has an invalid interface number: 107 but max is 1 [ 2318.853997][T13212] usb 1-1: config 4 has no interface number 0 [ 2318.854339][T13212] usb 1-1: config 4 interface 1 has no altsetting 0 [ 2318.854395][T13212] usb 1-1: config 4 interface 107 has no altsetting 0 [ 2318.923012][T13212] usb 1-1: New USB device found, idVendor=15ba, idProduct=002a, bcdDevice=90.2b [ 2318.925708][T13212] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2318.925785][T13212] usb 1-1: Product: syz [ 2318.925811][T13212] usb 1-1: Manufacturer: syz [ 2318.925833][T13212] usb 1-1: SerialNumber: syz [ 2319.181071][T13212] ftdi_sio 1-1:4.1: FTDI USB Serial Device converter detected [ 2319.182815][T13212] ftdi_sio ttyUSB0: unknown device type: 0x902b [ 2319.206776][T13212] usb 1-1: USB disconnect, device number 6 [ 2319.220709][T13212] ftdi_sio 1-1:4.1: device disconnected [ 2319.425995][ T29] audit: type=1400 audit(3123.490:557): avc: denied { create } for pid=16872 comm="syz.0.2213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2319.436482][ T29] audit: type=1400 audit(3123.501:558): avc: denied { ioctl } for pid=16872 comm="syz.0.2213" path="socket:[27032]" dev="sockfs" ino=27032 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2319.464665][ T29] audit: type=1400 audit(3123.532:559): avc: denied { write } for pid=16872 comm="syz.0.2213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2321.883398][T16887] netlink: 96 bytes leftover after parsing attributes in process `syz.0.2218'. [ 2322.442218][ T29] audit: type=1326 audit(3126.650:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16890 comm="syz.0.2220" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2322.448880][ T29] audit: type=1326 audit(3126.661:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16890 comm="syz.0.2220" exe="/syz-executor" sig=0 arch=40000028 syscall=360 compat=0 ip=0x132970 code=0x7ffc0000 [ 2322.451503][ T29] audit: type=1326 audit(3126.661:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16890 comm="syz.0.2220" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2322.457752][ T29] audit: type=1326 audit(3126.671:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16890 comm="syz.0.2220" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2322.477078][ T29] audit: type=1326 audit(3126.692:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16890 comm="syz.0.2220" exe="/syz-executor" sig=0 arch=40000028 syscall=317 compat=0 ip=0x132970 code=0x7ffc0000 [ 2322.477532][ T29] audit: type=1326 audit(3126.692:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16890 comm="syz.0.2220" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2322.478803][ T29] audit: type=1326 audit(3126.692:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16890 comm="syz.0.2220" exe="/syz-executor" sig=0 arch=40000028 syscall=41 compat=0 ip=0x132970 code=0x7ffc0000 [ 2322.479632][ T29] audit: type=1326 audit(3126.692:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16890 comm="syz.0.2220" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2322.481102][ T29] audit: type=1326 audit(3126.692:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16890 comm="syz.0.2220" exe="/syz-executor" sig=0 arch=40000028 syscall=318 compat=0 ip=0x132970 code=0x7ffc0000 [ 2322.539375][ T29] audit: type=1326 audit(3126.703:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16890 comm="syz.0.2220" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2327.782078][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 2327.782711][ T29] audit: type=1400 audit(3132.267:573): avc: denied { create } for pid=16900 comm="syz.0.2224" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2340.698408][T16916] cgroup: noprefix used incorrectly [ 2341.438936][ T29] audit: type=1326 audit(3146.596:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16921 comm="syz.3.2232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2341.464645][ T29] audit: type=1326 audit(3146.596:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16921 comm="syz.3.2232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2341.470885][ T29] audit: type=1326 audit(3146.638:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16921 comm="syz.3.2232" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x132970 code=0x7ffc0000 [ 2341.485005][ T29] audit: type=1400 audit(3146.649:577): avc: denied { wake_alarm } for pid=16921 comm="syz.3.2232" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2341.486104][ T29] audit: type=1326 audit(3146.649:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16921 comm="syz.3.2232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2341.486198][ T29] audit: type=1326 audit(3146.649:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16921 comm="syz.3.2232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2341.489105][ T29] audit: type=1326 audit(3146.659:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16921 comm="syz.3.2232" exe="/syz-executor" sig=0 arch=40000028 syscall=259 compat=0 ip=0x132970 code=0x7ffc0000 [ 2341.502997][ T29] audit: type=1326 audit(3146.670:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16921 comm="syz.3.2232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2341.507208][ T29] audit: type=1326 audit(3146.680:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16921 comm="syz.3.2232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2343.308247][ T29] audit: type=1400 audit(3148.570:583): avc: denied { mounton } for pid=16929 comm="syz.3.2236" path="/" dev="ramfs" ino=27093 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 2347.243245][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 2347.244225][ T29] audit: type=1400 audit(3152.696:585): avc: denied { unlink } for pid=14495 comm="syz-executor" name="file0" dev="tmpfs" ino=589 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2348.123673][ T29] audit: type=1400 audit(3153.620:586): avc: denied { unmount } for pid=15728 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2351.998259][ T29] audit: type=1400 audit(3157.682:587): avc: denied { map } for pid=16951 comm="syz.0.2245" path="socket:[27123]" dev="sockfs" ino=27123 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2352.012051][ T29] audit: type=1400 audit(3157.682:588): avc: denied { read accept } for pid=16951 comm="syz.0.2245" path="socket:[27123]" dev="sockfs" ino=27123 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2360.547012][ T29] audit: type=1400 audit(3166.658:589): avc: denied { create } for pid=16982 comm="syz.3.2257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2360.564158][ T29] audit: type=1400 audit(3166.679:590): avc: denied { write } for pid=16982 comm="syz.3.2257" path="socket:[27206]" dev="sockfs" ino=27206 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2379.205360][T17011] netlink: 52 bytes leftover after parsing attributes in process `syz.3.2260'. [ 2396.853445][T17036] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2396.879891][T17036] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2400.798934][T17036] hsr_slave_0: entered promiscuous mode [ 2400.813322][T17036] hsr_slave_1: entered promiscuous mode [ 2400.815478][T17036] debugfs: 'hsr0' already exists in 'hsr' [ 2400.815897][T17036] Cannot create hsr debugfs directory [ 2401.978747][T17036] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2402.008722][T17036] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2402.029649][T17036] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2402.071733][T17036] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2404.672268][T17036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2413.815776][T17036] veth0_vlan: entered promiscuous mode [ 2413.891491][T17036] veth1_vlan: entered promiscuous mode [ 2414.151364][T17036] veth0_macvtap: entered promiscuous mode [ 2414.173577][T17036] veth1_macvtap: entered promiscuous mode [ 2414.465473][ T363] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2414.466121][ T363] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2414.466593][ T363] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2414.466880][ T363] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2415.062935][T17441] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2270'. [ 2436.134307][T17529] netem: change failed [ 2436.428539][T17531] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2436.429455][T17531] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2436.555530][T17531] netlink: 'syz.3.2285': attribute type 5 has an invalid length. [ 2436.555964][T17531] netlink: 'syz.3.2285': attribute type 1 has an invalid length. [ 2436.915376][ T29] audit: type=1326 audit(433774794.825:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17535 comm="syz.3.2286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2436.919465][ T29] audit: type=1326 audit(433774794.835:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17535 comm="syz.3.2286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2436.921399][ T29] audit: type=1326 audit(433774794.835:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17535 comm="syz.3.2286" exe="/syz-executor" sig=0 arch=40000028 syscall=250 compat=0 ip=0x132970 code=0x7ffc0000 [ 2436.923722][ T29] audit: type=1326 audit(433774794.835:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17535 comm="syz.3.2286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2439.130176][ T29] audit: type=1400 audit(433774797.155:595): avc: denied { ioctl } for pid=17550 comm="syz.3.2291" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=27707 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2441.804398][T17556] netlink: 136 bytes leftover after parsing attributes in process `syz.3.2292'. [ 2441.804884][T17556] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. [ 2442.439039][T17562] bridge_slave_0: entered promiscuous mode [ 2463.423805][ T29] audit: type=1326 audit(433774822.655:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17584 comm="syz.1.2304" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2463.427041][ T29] audit: type=1326 audit(433774822.666:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17584 comm="syz.1.2304" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2463.438668][ T29] audit: type=1326 audit(433774822.676:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17584 comm="syz.1.2304" exe="/syz-executor" sig=0 arch=40000028 syscall=228 compat=0 ip=0x132970 code=0x7ffc0000 [ 2463.440457][ T29] audit: type=1326 audit(433774822.676:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17584 comm="syz.1.2304" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2465.510670][ T29] audit: type=1400 audit(433774824.860:600): avc: denied { ioctl } for pid=17599 comm="syz.1.2311" path="socket:[28701]" dev="sockfs" ino=28701 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2465.553334][ T29] audit: type=1400 audit(433774824.891:601): avc: denied { bind } for pid=17599 comm="syz.1.2311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2467.623977][ T29] audit: type=1326 audit(433774827.064:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17611 comm="syz.1.2315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2467.628414][ T29] audit: type=1326 audit(433774827.075:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17611 comm="syz.1.2315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2467.631321][ T29] audit: type=1326 audit(433774827.075:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17611 comm="syz.1.2315" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2467.638622][ T29] audit: type=1326 audit(433774827.085:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17611 comm="syz.1.2315" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2469.902824][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 2469.903489][ T29] audit: type=1400 audit(433774829.468:617): avc: denied { connect } for pid=17586 comm="syz.3.2305" lport=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2496.136937][ T29] audit: type=1326 audit(433774857.005:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17644 comm="syz.1.2327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2496.144052][ T29] audit: type=1326 audit(433774857.005:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17644 comm="syz.1.2327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2496.156906][ T29] audit: type=1326 audit(433774857.026:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17644 comm="syz.1.2327" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x132970 code=0x7ffc0000 [ 2496.158637][ T29] audit: type=1326 audit(433774857.026:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17644 comm="syz.1.2327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2496.165199][ T29] audit: type=1326 audit(433774857.036:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17644 comm="syz.1.2327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2496.319688][ T363] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2496.445991][ T363] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2496.527836][ T363] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2496.614993][ T363] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2497.229939][ T363] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2497.262581][ T363] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2497.280188][ T363] bond0 (unregistering): Released all slaves [ 2497.315873][T17665] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 2497.420640][ T363] hsr_slave_0: left promiscuous mode [ 2497.431324][ T363] hsr_slave_1: left promiscuous mode [ 2497.469129][ T363] veth1_macvtap: left promiscuous mode [ 2497.469753][ T363] veth0_macvtap: left promiscuous mode [ 2497.470006][ T363] veth1_vlan: left promiscuous mode [ 2497.470140][ T363] veth0_vlan: left promiscuous mode [ 2498.158063][ T29] audit: type=1326 audit(433774859.125:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.1.2334" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2498.182971][ T29] audit: type=1326 audit(433774859.146:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.1.2334" exe="/syz-executor" sig=0 arch=40000028 syscall=226 compat=0 ip=0x132970 code=0x7ffc0000 [ 2498.184914][ T29] audit: type=1326 audit(433774859.146:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17670 comm="syz.1.2334" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2499.084841][T17675] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 2499.108342][T17673] netlink: 260 bytes leftover after parsing attributes in process `syz.1.2335'. [ 2503.640560][ T29] audit: type=1400 audit(433774864.868:626): avc: denied { mount } for pid=17677 comm="syz.1.2336" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2515.405890][T17695] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2515.434123][T17695] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2519.074293][T17695] hsr_slave_0: entered promiscuous mode [ 2519.076622][T17695] hsr_slave_1: entered promiscuous mode [ 2519.081265][T17695] debugfs: 'hsr0' already exists in 'hsr' [ 2519.081791][T17695] Cannot create hsr debugfs directory [ 2520.590202][T17695] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 2520.720183][T17695] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 2521.006729][T17695] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 2521.121785][T17695] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 2523.909712][T17695] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2531.026604][T13235] usb 2-1: new high-speed USB device number 42 using dummy_hcd [ 2531.189022][T13235] usb 2-1: Using ep0 maxpacket: 8 [ 2531.214953][T13235] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2531.215376][T13235] usb 2-1: New USB device found, idVendor=2801, idProduct=0201, bcdDevice=2a.d5 [ 2531.215616][T13235] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2531.220455][T13235] usb 2-1: config 0 descriptor?? [ 2531.483068][T13253] usb 2-1: USB disconnect, device number 42 [ 2540.344378][ T29] audit: type=1400 audit(433774903.416:627): avc: denied { mount } for pid=18172 comm="syz.1.2352" name="/" dev="configfs" ino=45 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 2540.369259][ T29] audit: type=1400 audit(433774903.437:628): avc: denied { search } for pid=18172 comm="syz.1.2352" name="/" dev="configfs" ino=45 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2540.376536][ T29] audit: type=1400 audit(433774903.448:629): avc: denied { search } for pid=18172 comm="syz.1.2352" name="/" dev="configfs" ino=45 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2540.393269][ T29] audit: type=1400 audit(433774903.448:630): avc: denied { read open } for pid=18172 comm="syz.1.2352" path="/" dev="configfs" ino=45 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2540.396926][T17695] veth0_vlan: entered promiscuous mode [ 2540.423471][T17695] veth1_vlan: entered promiscuous mode [ 2540.586184][T17695] veth0_macvtap: entered promiscuous mode [ 2540.606877][T17695] veth1_macvtap: entered promiscuous mode [ 2540.772789][T18116] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2540.773375][T18116] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2540.773922][T18116] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2540.776174][T18116] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2543.743325][ T29] audit: type=1400 audit(433774906.912:631): avc: denied { create } for pid=18198 comm="syz.4.2359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2543.743754][ T29] audit: type=1400 audit(433774906.923:632): avc: denied { map } for pid=18198 comm="syz.4.2359" path="socket:[29364]" dev="sockfs" ino=29364 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2543.744044][ T29] audit: type=1400 audit(433774906.923:633): avc: denied { read } for pid=18198 comm="syz.4.2359" path="socket:[29364]" dev="sockfs" ino=29364 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2553.928273][ T29] audit: type=1326 audit(433774917.651:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18258 comm="syz.1.2372" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x0 [ 2559.944466][T18291] netlink: 64 bytes leftover after parsing attributes in process `syz.1.2378'. [ 2560.912194][ T29] audit: type=1400 audit(433774925.000:635): avc: denied { ioctl } for pid=18302 comm="syz.1.2381" path="socket:[28289]" dev="sockfs" ino=28289 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2560.933032][ T29] audit: type=1400 audit(433774925.021:636): avc: denied { bind } for pid=18302 comm="syz.1.2381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2588.571835][T18407] netlink: 96 bytes leftover after parsing attributes in process `syz.4.2398'. [ 2610.133973][T18425] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2610.167075][T18425] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2613.407651][T18425] hsr_slave_0: entered promiscuous mode [ 2613.409260][T18425] hsr_slave_1: entered promiscuous mode [ 2613.434634][T18425] debugfs: 'hsr0' already exists in 'hsr' [ 2613.434980][T18425] Cannot create hsr debugfs directory [ 2614.053987][T18425] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2614.152932][T18425] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2614.281380][T18425] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2614.399862][T18425] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2614.659025][T18425] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2614.705346][T18425] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2614.788274][T18425] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2614.827268][T18425] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2617.265773][T18425] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2626.041048][ T29] audit: type=1326 audit(433774993.353:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18785 comm="syz.4.2404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2626.046552][ T29] audit: type=1326 audit(433774993.353:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18785 comm="syz.4.2404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2626.046918][ T29] audit: type=1326 audit(433774993.363:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18785 comm="syz.4.2404" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2626.058386][ T29] audit: type=1326 audit(433774993.384:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18785 comm="syz.4.2404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2626.058851][ T29] audit: type=1326 audit(433774993.395:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18785 comm="syz.4.2404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2626.061433][ T29] audit: type=1326 audit(433774993.395:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18785 comm="syz.4.2404" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2626.070562][ T29] audit: type=1326 audit(433774993.405:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18785 comm="syz.4.2404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2626.078662][ T29] audit: type=1326 audit(433774993.416:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18785 comm="syz.4.2404" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132970 code=0x7ffc0000 [ 2626.093449][ T29] audit: type=1326 audit(433774993.437:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18785 comm="syz.4.2404" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2626.111929][ T29] audit: type=1326 audit(433774993.447:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18785 comm="syz.4.2404" exe="/syz-executor" sig=0 arch=40000028 syscall=232 compat=0 ip=0x132970 code=0x7ffc0000 [ 2626.743252][T18425] veth0_vlan: entered promiscuous mode [ 2627.077873][T18425] veth1_vlan: entered promiscuous mode [ 2627.450885][T18425] veth0_macvtap: entered promiscuous mode [ 2627.498540][T18425] veth1_macvtap: entered promiscuous mode [ 2628.034792][T18116] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2628.036157][T18116] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2628.036426][T18116] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2628.036588][T18116] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2629.163341][T18802] SELinux: ebitmap: truncated map [ 2629.246175][T18802] SELinux: failed to load policy [ 2659.750014][T18823] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2659.829591][T18823] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2659.905448][T18823] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2660.067066][T18823] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2661.139868][T18823] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2661.177831][T18823] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2661.183606][T18823] bond0 (unregistering): Released all slaves [ 2661.276401][T18823] hsr_slave_0: left promiscuous mode [ 2661.281490][T18823] hsr_slave_1: left promiscuous mode [ 2661.293315][T18823] veth1_macvtap: left promiscuous mode [ 2661.293785][T18823] veth0_macvtap: left promiscuous mode [ 2661.294248][T18823] veth1_vlan: left promiscuous mode [ 2661.294664][T18823] veth0_vlan: left promiscuous mode [ 2663.766290][T18916] netlink: 96 bytes leftover after parsing attributes in process `syz.4.2421'. [ 2663.952557][T18918] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2422'. [ 2663.959694][T18918] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2422'. [ 2663.977818][T18918] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2422'. [ 2663.981377][T18918] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2422'. [ 2663.982003][T18918] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2422'. [ 2663.982392][T18918] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2422'. [ 2663.982800][T18918] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2422'. [ 2663.983238][T18918] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2422'. [ 2663.983586][T18918] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2422'. [ 2667.464485][T18931] input: syz1 as /devices/virtual/input/input4 [ 2670.584520][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 2670.593200][ T29] audit: type=1326 audit(433775040.132:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18970 comm="syz.4.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2670.596858][ T29] audit: type=1326 audit(433775040.142:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18970 comm="syz.4.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=183 compat=0 ip=0x132970 code=0x7ffc0000 [ 2670.606899][ T29] audit: type=1326 audit(433775040.142:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18970 comm="syz.4.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2670.610306][ T29] audit: type=1326 audit(433775040.153:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18970 comm="syz.4.2429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2681.456898][T18990] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2681.488525][T18990] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2685.547152][T18990] hsr_slave_0: entered promiscuous mode [ 2685.562489][T18990] hsr_slave_1: entered promiscuous mode [ 2687.264898][T18990] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 2687.291663][T18990] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 2687.372269][T18990] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 2687.386560][T18990] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 2690.325713][T18990] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2701.062161][T18990] veth0_vlan: entered promiscuous mode [ 2701.141136][T18990] veth1_vlan: entered promiscuous mode [ 2701.498872][T18990] veth0_macvtap: entered promiscuous mode [ 2701.558058][T18990] veth1_macvtap: entered promiscuous mode [ 2701.910374][T18827] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2701.924809][T18827] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2701.934019][T18827] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2701.940150][T18827] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2703.009901][T19423] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2703.041978][T19423] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2708.907348][T19465] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2708.938362][T19465] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2709.469885][ T29] audit: type=1400 audit(433775081.926:653): avc: denied { read } for pid=19469 comm="syz.5.2460" name="file0" dev="tmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2709.470337][ T29] audit: type=1400 audit(433775081.926:654): avc: denied { open } for pid=19469 comm="syz.5.2460" path="/14/file0" dev="tmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2713.657262][T19499] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=19499 comm=syz.4.2471 [ 2716.270656][ T29] audit: type=1326 audit(433775089.096:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19514 comm="syz.5.2477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2716.301208][ T29] audit: type=1326 audit(433775089.127:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19514 comm="syz.5.2477" exe="/syz-executor" sig=0 arch=40000028 syscall=144 compat=0 ip=0x132970 code=0x7ffc0000 [ 2716.301567][ T29] audit: type=1326 audit(433775089.127:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19514 comm="syz.5.2477" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2717.114869][T19524] netlink: 'syz.5.2480': attribute type 13 has an invalid length. [ 2718.952383][ T29] audit: type=1326 audit(433775091.920:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19535 comm="syz.5.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2718.955290][ T29] audit: type=1326 audit(433775091.920:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19535 comm="syz.5.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 2718.958093][ T29] audit: type=1326 audit(433775091.920:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19535 comm="syz.5.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2718.964633][ T29] audit: type=1326 audit(433775091.930:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19535 comm="syz.5.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132970 code=0x7ffc0000 [ 2719.004424][ T29] audit: type=1326 audit(433775091.962:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19538 comm="syz.5.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x160424 code=0x7ffc0000 [ 2720.445902][ T29] audit: type=1326 audit(433775093.473:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19538 comm="syz.5.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132970 code=0x7ffc0000 [ 2720.446353][ T29] audit: type=1326 audit(433775093.473:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19535 comm="syz.5.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132970 code=0x7ffc0000 [ 2722.178481][T19549] netlink: 'syz.5.2484': attribute type 12 has an invalid length. [ 2724.238293][T19567] batadv_slave_0: Caught tx_queue_len zero misconfig [ 2752.346803][ T29] audit: type=1326 audit(433775126.962:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19617 comm="syz.4.2494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2752.356866][ T29] audit: type=1326 audit(433775126.973:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19617 comm="syz.4.2494" exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x132970 code=0x7ffc0000 [ 2752.360031][ T29] audit: type=1326 audit(433775126.983:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19617 comm="syz.4.2494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2752.447978][ T29] audit: type=1326 audit(433775127.078:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19617 comm="syz.4.2494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2752.527936][ T29] audit: type=1326 audit(433775127.162:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19617 comm="syz.4.2494" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2752.538314][ T29] audit: type=1326 audit(433775127.162:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19617 comm="syz.4.2494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2752.538889][ T29] audit: type=1326 audit(433775127.162:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19617 comm="syz.4.2494" exe="/syz-executor" sig=0 arch=40000028 syscall=244 compat=0 ip=0x132970 code=0x7ffc0000 [ 2752.697672][ T29] audit: type=1326 audit(433775127.340:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19617 comm="syz.4.2494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2752.697927][ T29] audit: type=1326 audit(433775127.340:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19617 comm="syz.4.2494" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2752.698094][ T29] audit: type=1326 audit(433775127.340:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19617 comm="syz.4.2494" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 2778.507397][T19695] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2778.854957][T19695] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2782.659066][T19695] hsr_slave_0: entered promiscuous mode [ 2782.668947][T19695] hsr_slave_1: entered promiscuous mode [ 2782.676461][T19695] debugfs: 'hsr0' already exists in 'hsr' [ 2782.684324][T19695] Cannot create hsr debugfs directory [ 2784.885529][T19695] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 2784.924554][T19695] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 2784.963594][T19695] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 2784.978798][T19695] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 2787.959430][T19695] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2802.616207][T19695] veth0_vlan: entered promiscuous mode [ 2802.881601][T19695] veth1_vlan: entered promiscuous mode [ 2803.195819][T19695] veth0_macvtap: entered promiscuous mode [ 2803.236757][T19695] veth1_macvtap: entered promiscuous mode [ 2803.450118][ T9533] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2803.512853][ T7145] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2803.513235][ T7145] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2803.513497][ T7145] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2804.987606][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 2804.987969][ T29] audit: type=1326 audit(433775182.234:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.7.2508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2804.993508][ T29] audit: type=1326 audit(433775182.234:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.7.2508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2805.004552][ T29] audit: type=1326 audit(433775182.255:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.7.2508" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2805.013001][ T29] audit: type=1326 audit(433775182.255:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.7.2508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2805.027094][ T29] audit: type=1326 audit(433775182.266:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.7.2508" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2805.027594][ T29] audit: type=1326 audit(433775182.276:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.7.2508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2805.027805][ T29] audit: type=1326 audit(433775182.276:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.7.2508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2805.091003][ T29] audit: type=1326 audit(433775182.318:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.7.2508" exe="/syz-executor" sig=0 arch=40000028 syscall=100 compat=0 ip=0x132970 code=0x7ffc0000 [ 2805.091392][ T29] audit: type=1326 audit(433775182.318:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.7.2508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2805.091469][ T29] audit: type=1326 audit(433775182.350:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.7.2508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2811.638847][T20088] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2811.666762][T20088] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2816.048014][T20088] hsr_slave_0: entered promiscuous mode [ 2816.085139][T20088] hsr_slave_1: entered promiscuous mode [ 2816.109654][T20088] debugfs: 'hsr0' already exists in 'hsr' [ 2816.110017][T20088] Cannot create hsr debugfs directory [ 2818.352838][T20088] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 2818.362344][T20088] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 2818.399557][T20088] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 2818.427592][T20088] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 2821.984456][T20088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2840.181952][T20088] veth0_vlan: entered promiscuous mode [ 2840.251848][T20088] veth1_vlan: entered promiscuous mode [ 2840.537584][T20088] veth0_macvtap: entered promiscuous mode [ 2840.601020][T20088] veth1_macvtap: entered promiscuous mode [ 2840.938832][ T7145] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2840.941560][ T7145] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2840.941971][ T7145] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2840.950879][ T7145] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2842.340743][ T29] audit: type=1326 audit(433775221.444:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20535 comm="syz.8.2509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2842.341302][ T29] audit: type=1326 audit(433775221.444:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20535 comm="syz.8.2509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2842.367887][ T29] audit: type=1326 audit(433775221.476:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20535 comm="syz.8.2509" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 2842.368367][ T29] audit: type=1326 audit(433775221.476:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20535 comm="syz.8.2509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2842.368726][ T29] audit: type=1326 audit(433775221.476:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20535 comm="syz.8.2509" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2842.445655][ T29] audit: type=1326 audit(433775221.560:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20535 comm="syz.8.2509" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132970 code=0x7ffc0000 [ 2842.515008][ T29] audit: type=1326 audit(433775221.623:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20538 comm="syz.8.2509" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x160424 code=0x7ffc0000 [ 2843.956958][ T29] audit: type=1326 audit(433775223.134:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20538 comm="syz.8.2509" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132970 code=0x7ffc0000 [ 2843.957502][ T29] audit: type=1326 audit(433775223.134:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20535 comm="syz.8.2509" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132970 code=0x7ffc0000 [ 2847.089564][T18823] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2847.307611][T18823] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2847.413132][T18823] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2847.430935][T20554] __nla_validate_parse: 11 callbacks suppressed [ 2847.435207][T20554] netlink: 12 bytes leftover after parsing attributes in process `syz.8.2520'. [ 2847.931725][T18823] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2849.798672][T18823] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2849.889338][T18823] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2849.902201][T18823] bond0 (unregistering): Released all slaves [ 2850.059662][T18823] hsr_slave_0: left promiscuous mode [ 2850.068840][T18823] hsr_slave_1: left promiscuous mode [ 2850.100578][T18823] veth1_macvtap: left promiscuous mode [ 2850.101034][T18823] veth0_macvtap: left promiscuous mode [ 2850.101275][T18823] veth1_vlan: left promiscuous mode [ 2850.101454][T18823] veth0_vlan: left promiscuous mode [ 2852.548585][ T29] audit: type=1326 audit(433775232.110:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20582 comm="syz.8.2524" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2852.549034][ T29] audit: type=1326 audit(433775232.163:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20582 comm="syz.8.2524" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2852.549336][ T29] audit: type=1326 audit(433775232.163:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20582 comm="syz.8.2524" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2852.624147][ T29] audit: type=1326 audit(433775232.226:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20582 comm="syz.8.2524" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2852.624524][ T29] audit: type=1326 audit(433775232.226:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20582 comm="syz.8.2524" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2852.656811][ T29] audit: type=1326 audit(433775232.268:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20582 comm="syz.8.2524" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 2852.669520][ T29] audit: type=1326 audit(433775232.278:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20582 comm="syz.8.2524" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2852.704480][ T29] audit: type=1326 audit(433775232.320:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20582 comm="syz.8.2524" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2852.704950][ T29] audit: type=1326 audit(433775232.320:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20582 comm="syz.8.2524" exe="/syz-executor" sig=0 arch=40000028 syscall=384 compat=0 ip=0x132970 code=0x7ffc0000 [ 2852.705329][ T29] audit: type=1326 audit(433775232.320:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20582 comm="syz.8.2524" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 2875.080500][T20626] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2875.109101][T20626] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2879.219660][T20626] hsr_slave_0: entered promiscuous mode [ 2879.221994][T20626] hsr_slave_1: entered promiscuous mode [ 2879.228048][T20626] debugfs: 'hsr0' already exists in 'hsr' [ 2879.236447][T20626] Cannot create hsr debugfs directory [ 2881.706599][T20626] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 2881.745160][T20626] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 2881.802630][T20626] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 2881.850303][T20626] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 2885.192175][T20626] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2889.215408][T20626] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2902.967087][T18832] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2903.196296][T18832] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2903.406635][T18832] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2903.519321][T18832] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2903.704822][T20626] veth0_vlan: entered promiscuous mode [ 2903.851861][T20626] veth1_vlan: entered promiscuous mode [ 2904.458639][T18832] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2904.519548][T18832] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2904.547858][T18832] bond0 (unregistering): Released all slaves [ 2904.821868][T18832] hsr_slave_0: left promiscuous mode [ 2904.842214][T18832] hsr_slave_1: left promiscuous mode [ 2904.871089][T18832] veth1_macvtap: left promiscuous mode [ 2904.871525][T18832] veth0_macvtap: left promiscuous mode [ 2904.871799][T18832] veth1_vlan: left promiscuous mode [ 2904.871963][T18832] veth0_vlan: left promiscuous mode [ 2907.127490][T20626] veth0_macvtap: entered promiscuous mode [ 2907.132799][T20626] veth1_macvtap: entered promiscuous mode [ 2907.359720][T18116] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2907.360447][T18116] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2907.360588][T18116] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2907.360699][T18116] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2909.495424][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 2909.496056][ T29] audit: type=1400 audit(433775291.949:723): avc: denied { validate_trans } for pid=21174 comm="syz.6.2536" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 2909.662768][ T29] audit: type=1400 audit(433775292.127:724): avc: denied { getopt } for pid=21174 comm="syz.6.2536" laddr=fe80::a8aa:aaff:feaa:aa15 lport=60560 faddr=ff02::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2913.115549][T21060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2913.226574][T21060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2918.493641][T21060] hsr_slave_0: entered promiscuous mode [ 2918.495376][T21060] hsr_slave_1: entered promiscuous mode [ 2918.496060][T21060] debugfs: 'hsr0' already exists in 'hsr' [ 2918.496125][T21060] Cannot create hsr debugfs directory [ 2920.721975][T21060] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 2920.760578][T21060] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 2920.788298][T21060] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 2920.813777][T21060] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 2924.993410][T21060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2937.610489][T21060] veth0_vlan: entered promiscuous mode [ 2937.668009][T21060] veth1_vlan: entered promiscuous mode [ 2938.391658][T21060] veth0_macvtap: entered promiscuous mode [ 2938.485645][T21060] veth1_macvtap: entered promiscuous mode [ 2938.757423][T18828] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2938.758492][T18828] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2938.759191][T18828] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2938.759716][T18828] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2956.587457][ T9533] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2956.762203][ T9533] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2956.948712][ T9533] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2957.101607][ T9533] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2958.111063][ T9533] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2958.138030][ T9533] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2958.142033][ T9533] bond0 (unregistering): Released all slaves [ 2958.763845][ T9533] hsr_slave_0: left promiscuous mode [ 2958.784805][ T9533] hsr_slave_1: left promiscuous mode [ 2958.871242][ T9533] veth1_macvtap: left promiscuous mode [ 2958.871821][ T9533] veth0_macvtap: left promiscuous mode [ 2958.872386][ T9533] veth1_vlan: left promiscuous mode [ 2958.872896][ T9533] veth0_vlan: left promiscuous mode [ 2966.297937][T21550] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2966.350086][T21550] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2971.240337][T21550] hsr_slave_0: entered promiscuous mode [ 2971.284185][T21550] hsr_slave_1: entered promiscuous mode [ 2971.290542][T21550] debugfs: 'hsr0' already exists in 'hsr' [ 2971.321186][T21550] Cannot create hsr debugfs directory [ 2973.885611][T21550] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2973.903334][T21550] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2973.915280][T21550] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2973.996575][T21550] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2977.518483][T21550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2989.099726][T18832] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2989.316367][T18832] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2989.479043][T18832] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2989.659792][T18832] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2990.661540][T18832] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2990.715329][T18832] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2990.745837][T18832] bond0 (unregistering): Released all slaves [ 2990.953333][T18832] hsr_slave_0: left promiscuous mode [ 2990.972087][T18832] hsr_slave_1: left promiscuous mode [ 2991.136587][T18832] veth1_macvtap: left promiscuous mode [ 2991.137291][T18832] veth0_macvtap: left promiscuous mode [ 2991.137984][T18832] veth1_vlan: left promiscuous mode [ 2991.138382][T18832] veth0_vlan: left promiscuous mode [ 2994.286549][T18832] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2994.583215][T18832] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2994.630894][T21550] veth0_vlan: entered promiscuous mode [ 2994.688638][T18832] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2994.748750][T21550] veth1_vlan: entered promiscuous mode [ 2994.864112][T18832] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2995.511114][T21550] veth0_macvtap: entered promiscuous mode [ 2995.974174][T21550] veth1_macvtap: entered promiscuous mode [ 2996.455129][T18832] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2996.499707][T18832] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2996.503683][T18832] bond0 (unregistering): Released all slaves [ 2996.658668][T18832] hsr_slave_0: left promiscuous mode [ 2996.663390][T18832] hsr_slave_1: left promiscuous mode [ 2996.679832][T18832] veth1_macvtap: left promiscuous mode [ 2996.680760][T18832] veth0_macvtap: left promiscuous mode [ 2996.681534][T18832] veth1_vlan: left promiscuous mode [ 2996.682385][T18832] veth0_vlan: left promiscuous mode [ 2998.468513][T18116] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2998.471249][T18830] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2998.471933][T18830] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2998.472350][T18830] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3000.595817][ T29] audit: type=1400 audit(433775387.585:725): avc: denied { mount } for pid=22149 comm="syz.2.2540" name="/" dev="sockfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3000.857601][T21954] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3000.905777][T21954] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3001.393526][ T29] audit: type=1400 audit(433775388.415:726): avc: denied { execute } for pid=22200 comm="syz.2.2541" path="/2/cpuacct.usage_percpu" dev="tmpfs" ino=29 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3002.129573][ T29] audit: type=1326 audit(433775389.192:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22209 comm="syz.2.2543" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x0 [ 3005.194781][T21954] hsr_slave_0: entered promiscuous mode [ 3005.231922][T21954] hsr_slave_1: entered promiscuous mode [ 3007.034896][T21954] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 3007.061327][T21954] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 3007.073726][T21954] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 3007.107887][T21954] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 3010.031207][T21954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3022.911725][T21954] veth0_vlan: entered promiscuous mode [ 3022.954534][T21954] veth1_vlan: entered promiscuous mode [ 3023.240866][T21954] veth0_macvtap: entered promiscuous mode [ 3023.297072][T21954] veth1_macvtap: entered promiscuous mode [ 3023.559333][T18828] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3023.560114][T18828] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3023.560738][T18828] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3023.561713][T18828] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3026.990946][ T29] audit: type=1326 audit(433775415.290:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.0.2551" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 3027.009251][ T29] audit: type=1326 audit(433775415.311:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.0.2551" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 3027.029139][ T29] audit: type=1326 audit(433775415.332:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.0.2551" exe="/syz-executor" sig=0 arch=40000028 syscall=15 compat=0 ip=0x132970 code=0x7ffc0000 [ 3027.029615][ T29] audit: type=1326 audit(433775415.332:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22459 comm="syz.0.2551" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 3029.457996][T18827] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3029.631781][T18827] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3029.813621][T18827] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3029.953954][T18827] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3030.751708][T18827] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3030.777147][T18827] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3030.782424][T18827] bond0 (unregistering): Released all slaves [ 3030.921633][T18827] hsr_slave_0: left promiscuous mode [ 3030.932273][T18827] hsr_slave_1: left promiscuous mode [ 3030.985472][T18827] veth1_macvtap: left promiscuous mode [ 3030.985881][T18827] veth0_macvtap: left promiscuous mode [ 3030.986320][T18827] veth1_vlan: left promiscuous mode [ 3030.986482][T18827] veth0_vlan: left promiscuous mode [ 3031.414043][ T29] audit: type=1326 audit(433775419.919:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22472 comm="syz.0.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7fc00000 [ 3058.714530][T22546] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3058.769323][T22546] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3063.102796][T22546] hsr_slave_0: entered promiscuous mode [ 3063.110750][T22546] hsr_slave_1: entered promiscuous mode [ 3063.111947][T22546] debugfs: 'hsr0' already exists in 'hsr' [ 3063.113626][T22546] Cannot create hsr debugfs directory [ 3064.996406][T22546] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 3065.065353][T22546] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 3065.159692][T22546] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 3065.216992][T22546] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 3068.086365][T22546] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3075.416100][ T29] audit: type=1326 audit(433775466.121:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22955 comm="syz.0.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 3075.437036][ T29] audit: type=1326 audit(433775466.142:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22955 comm="syz.0.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 3075.437564][ T29] audit: type=1326 audit(433775466.142:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22955 comm="syz.0.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 3075.478215][ T29] audit: type=1326 audit(433775466.194:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22955 comm="syz.0.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 3075.478828][ T29] audit: type=1326 audit(433775466.194:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22955 comm="syz.0.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 3075.481718][ T29] audit: type=1326 audit(433775466.194:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22955 comm="syz.0.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132970 code=0x7ffc0000 [ 3075.483068][ T29] audit: type=1326 audit(433775466.194:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22955 comm="syz.0.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 3075.531027][ T29] audit: type=1326 audit(433775466.247:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22955 comm="syz.0.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=228 compat=0 ip=0x132970 code=0x7ffc0000 [ 3075.531631][ T29] audit: type=1400 audit(433775466.247:741): avc: denied { setattr } for pid=22955 comm="syz.0.2562" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3075.531933][ T29] audit: type=1326 audit(433775466.247:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22955 comm="syz.0.2562" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 3076.468221][T22967] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=22967 comm=syz.0.2564 [ 3076.474470][T22967] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22967 comm=syz.0.2564 [ 3079.332308][T22996] netlink: 'syz.0.2570': attribute type 12 has an invalid length. [ 3080.677910][T22546] veth0_vlan: entered promiscuous mode [ 3080.757250][T22546] veth1_vlan: entered promiscuous mode [ 3081.182093][T22546] veth0_macvtap: entered promiscuous mode [ 3081.214254][T22546] veth1_macvtap: entered promiscuous mode [ 3081.578843][T18830] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3081.579261][T18830] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3081.579487][T18830] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3081.579644][T18830] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3081.655081][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 3081.655333][ T29] audit: type=1400 audit(433775472.672:756): avc: denied { write } for pid=23008 comm="syz.0.2572" laddr=172.20.20.18 lport=4 faddr=10.1.1.0 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3084.322569][T18116] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 3084.323096][T18116] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 3084.323482][T18116] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 3084.323711][T18116] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 3094.884300][T18116] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3095.053417][T18116] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3095.240313][T18116] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3095.380334][T18116] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3096.047573][T18116] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3096.087852][T18116] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3096.092276][T18116] bond0 (unregistering): Released all slaves [ 3096.315766][T18116] hsr_slave_0: left promiscuous mode [ 3096.318464][T18116] hsr_slave_1: left promiscuous mode [ 3096.403022][T18116] veth1_macvtap: left promiscuous mode [ 3096.403607][T18116] veth0_macvtap: left promiscuous mode [ 3096.404236][T18116] veth1_vlan: left promiscuous mode [ 3096.404655][T18116] veth0_vlan: left promiscuous mode [ 3122.790492][T23132] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3122.797701][T23132] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3124.144051][T23144] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 3126.762426][ T30] INFO: task kworker/0:2:16324 blocked for more than 430 seconds. [ 3126.763350][ T30] Not tainted syzkaller #0 [ 3126.763800][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3126.764214][ T30] task:kworker/0:2 state:D stack:0 pid:16324 tgid:16324 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3126.765030][ T30] Workqueue: events bpf_prog_free_deferred [ 3126.765638][ T30] Call trace: [ 3126.766330][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3126.767044][ T30] r10:dfb79d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfb79d8c r5:86856000 [ 3126.767295][ T30] r4:86856000 [ 3126.767580][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3126.767800][ T30] r5:86856000 r4:8291719c [ 3126.798819][ T29] audit: type=1400 audit(433775520.070:757): avc: denied { write } for pid=3093 comm="syz-executor" path="pipe:[1800]" dev="pipefs" ino=1800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 3126.816612][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3126.817159][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3126.817414][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 [ 3126.817585][ T30] r4:00000000 [ 3126.817805][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3126.817926][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3126.817991][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3126.818055][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ac9900 [ 3126.818079][ T30] r4:00000000 [ 3126.818129][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3126.818196][ T30] r9:83018405 r8:86856000 r7:00000000 r6:83018400 r5:00001000 r4:7f2ec000 [ 3126.818214][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3126.818277][ T30] r5:00001000 r4:ea571000 [ 3126.818294][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3126.818379][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3126.818448][ T30] r5:85c37f8c r4:85ce4f00 [ 3126.818469][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3126.818594][ T30] r7:dddcfd80 r6:83018400 r5:85c37f8c r4:85ce4f00 [ 3126.818621][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3126.818725][ T30] r10:61c88647 r9:86856000 r8:85ce4f2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 3126.818753][ T30] r4:85ce4f00 [ 3126.818772][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3126.818840][ T30] r10:00000000 r9:85ce4f00 r8:80278fec r7:dfb2de60 r6:85ce4380 r5:86856000 [ 3126.818885][ T30] r4:00000001 [ 3126.818908][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3126.819097][ T30] Exception stack(0xdfb79fb0 to 0xdfb79ff8) [ 3126.819297][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 3126.819355][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3126.819428][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3126.819550][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 3126.819580][ T30] r4:85567380 [ 3126.820366][ T30] INFO: task kworker/0:2:16324 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3126.820470][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3126.820626][ T30] Workqueue: events bpf_prog_free_deferred [ 3126.820716][ T30] Call trace: [ 3126.820763][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3126.820843][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3126.820911][ T30] r4:00000000 [ 3126.820984][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3126.821074][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3126.821117][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3126.821152][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3126.821181][ T30] 1d60: 80020113 ffffffff [ 3126.821206][ T30] r5:80020113 r4:80239c10 [ 3126.821223][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3126.821284][ T30] r4:82acb1e4 [ 3126.821359][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3126.821432][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3126.821454][ T30] r4:ea771dc0 [ 3126.821472][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3126.821560][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3126.821590][ T30] r4:00000000 [ 3126.821606][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3126.821673][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3126.821699][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3126.821763][ T30] r5:00001000 r4:e0155000 [ 3126.821783][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3126.821839][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3126.821902][ T30] r5:86181f8c r4:85b21b00 [ 3126.821922][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3126.821998][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3126.822016][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3126.822085][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3126.822108][ T30] r4:85b21b00 [ 3126.822125][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3126.822188][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3126.822210][ T30] r4:00000001 [ 3126.822226][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3126.822275][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3126.822304][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3126.822336][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3126.822367][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3126.822399][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3126.822445][ T30] r4:85ccb3c0 [ 3126.822683][ T30] INFO: task kworker/0:14:16452 blocked for more than 430 seconds. [ 3126.822797][ T30] Not tainted syzkaller #0 [ 3126.822825][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3126.822841][ T30] task:kworker/0:14 state:D stack:0 pid:16452 tgid:16452 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3126.822893][ T30] Workqueue: events bpf_prog_free_deferred [ 3126.822939][ T30] Call trace: [ 3126.823024][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3126.823127][ T30] r10:dfb61d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfb61d8c r5:855b9800 [ 3126.823159][ T30] r4:855b9800 [ 3126.823218][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3126.823352][ T30] r5:855b9800 r4:8291719c [ 3126.823394][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3126.823456][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3126.823519][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 [ 3126.823538][ T30] r4:00000000 [ 3126.823553][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3126.823602][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3126.823649][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3126.823742][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a95600 [ 3126.823768][ T30] r4:00000000 [ 3126.823792][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3126.823854][ T30] r9:83018405 r8:855b9800 r7:00000000 r6:83018400 r5:00001000 r4:7f302000 [ 3126.823871][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3126.823928][ T30] r5:00001000 r4:df9f7000 [ 3126.823943][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3126.823999][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3126.824054][ T30] r5:85c3778c r4:85cddf80 [ 3126.824071][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3126.824175][ T30] r7:dddcfd80 r6:83018400 r5:85c3778c r4:85cddf80 [ 3126.824234][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3126.824308][ T30] r10:61c88647 r9:855b9800 r8:85cddfac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 3126.824328][ T30] r4:85cddf80 [ 3126.824344][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3126.824406][ T30] r10:00000000 r9:85cddf80 r8:80278fec r7:e8215e60 r6:85cdd480 r5:855b9800 [ 3126.824424][ T30] r4:00000001 [ 3126.824441][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3126.824484][ T30] Exception stack(0xdfb61fb0 to 0xdfb61ff8) [ 3126.824513][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3126.824546][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3126.824611][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3126.824687][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3126.824750][ T30] r4:85c05080 [ 3126.824985][ T30] INFO: task kworker/0:14:16452 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3126.825022][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3126.825137][ T30] Workqueue: events bpf_prog_free_deferred [ 3126.825213][ T30] Call trace: [ 3126.825239][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3126.924481][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3126.924555][ T30] r4:00000000 [ 3126.924611][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3126.924721][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3126.924763][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3126.924796][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3126.924818][ T30] 1d60: 80020113 ffffffff [ 3126.924841][ T30] r5:80020113 r4:80239c10 [ 3126.924856][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3126.924915][ T30] r4:82acb1e4 [ 3126.924932][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3126.924999][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3126.925094][ T30] r4:ea771dc0 [ 3126.925121][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3126.925185][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3126.925205][ T30] r4:00000000 [ 3126.925222][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3126.925282][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3126.925302][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3126.925360][ T30] r5:00001000 r4:e0155000 [ 3126.925411][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3126.925474][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3126.925532][ T30] r5:86181f8c r4:85b21b00 [ 3126.925554][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3126.925619][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3126.925658][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3126.925739][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3126.925759][ T30] r4:85b21b00 [ 3126.925774][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3126.925832][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3126.925850][ T30] r4:00000001 [ 3126.925867][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3126.925911][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3126.925937][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3126.925972][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3126.926027][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3126.926071][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3126.926093][ T30] r4:85ccb3c0 [ 3126.951262][ T30] INFO: task kworker/1:1:16512 blocked for more than 430 seconds. [ 3126.951406][ T30] Not tainted syzkaller #0 [ 3126.951431][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3126.951452][ T30] task:kworker/1:1 state:D stack:0 pid:16512 tgid:16512 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3126.951569][ T30] Workqueue: events bpf_prog_free_deferred [ 3126.951680][ T30] Call trace: [ 3126.951711][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3126.951798][ T30] r10:dfa2dd84 r9:00000002 r8:60000113 r7:829171a0 r6:dfa2dd8c r5:841fe000 [ 3126.951824][ T30] r4:841fe000 [ 3126.951840][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3126.951899][ T30] r5:841fe000 r4:8291719c [ 3126.951916][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3126.951981][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3126.952052][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 [ 3126.952072][ T30] r4:00000000 [ 3126.952090][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3126.952142][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3126.952195][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3126.952319][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c6f200 [ 3126.952344][ T30] r4:00000000 [ 3126.952365][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3126.952433][ T30] r9:83018605 r8:841fe000 r7:00000000 r6:83018600 r5:00001000 r4:7f2cc000 [ 3126.952457][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3126.952514][ T30] r5:00001000 r4:ea7f2000 [ 3126.952534][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3126.952591][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3126.952669][ T30] r5:84ed278c r4:85bfcb80 [ 3126.952686][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3126.952755][ T30] r7:ddde3d80 r6:83018600 r5:84ed278c r4:85bfcb80 [ 3126.952774][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3126.952841][ T30] r10:61c88647 r9:841fe000 r8:85bfcbac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3126.952882][ T30] r4:85bfcb80 [ 3126.952915][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3126.952988][ T30] r10:00000000 r9:85bfcb80 r8:80278fec r7:eb011e60 r6:85bfc480 r5:841fe000 [ 3126.953012][ T30] r4:00000001 [ 3126.953028][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3126.953074][ T30] Exception stack(0xdfa2dfb0 to 0xdfa2dff8) [ 3126.953103][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 3126.953139][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3126.953167][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3126.953199][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3126.953218][ T30] r4:85a70d40 [ 3126.953632][ T30] INFO: task kworker/1:1:16512 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3126.953677][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3126.953746][ T30] Workqueue: events bpf_prog_free_deferred [ 3126.953799][ T30] Call trace: [ 3126.953827][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3126.953898][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3126.953950][ T30] r4:00000000 [ 3126.953970][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3126.954025][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3126.954059][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3126.954092][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3126.954142][ T30] 1d60: 80020113 ffffffff [ 3126.954173][ T30] r5:80020113 r4:80239c10 [ 3126.954192][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3126.954252][ T30] r4:82acb1e4 [ 3126.954269][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3126.954355][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3126.954410][ T30] r4:ea771dc0 [ 3126.954433][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3126.954494][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3126.954612][ T30] r4:00000000 [ 3126.954678][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3126.954746][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3126.954763][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3126.954823][ T30] r5:00001000 r4:e0155000 [ 3126.954841][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3126.954895][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3126.954959][ T30] r5:86181f8c r4:85b21b00 [ 3126.954978][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3126.955071][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3126.955095][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3126.955165][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3126.955243][ T30] r4:85b21b00 [ 3126.955266][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3126.955334][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3126.955355][ T30] r4:00000001 [ 3126.955373][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3126.955459][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3126.955497][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3126.955530][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3126.955578][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3126.955618][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3126.955648][ T30] r4:85ccb3c0 [ 3126.955728][ T30] INFO: task kworker/1:4:18218 blocked for more than 430 seconds. [ 3126.955768][ T30] Not tainted syzkaller #0 [ 3126.955793][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3126.955830][ T30] task:kworker/1:4 state:D stack:0 pid:18218 tgid:18218 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3126.955894][ T30] Workqueue: events bpf_prog_free_deferred [ 3126.955979][ T30] Call trace: [ 3126.956054][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3126.956133][ T30] r10:ea835d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea835d8c r5:8397d400 [ 3126.956156][ T30] r4:8397d400 [ 3126.956227][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3126.956294][ T30] r5:8397d400 r4:8291719c [ 3126.956312][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3126.956391][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3126.956470][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea835e08 [ 3126.956513][ T30] r4:00000000 [ 3126.956572][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3126.956698][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3126.956756][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3126.956819][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4d700 [ 3126.956896][ T30] r4:00000000 [ 3126.956918][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3126.956985][ T30] r9:83018605 r8:8397d400 r7:00000000 r6:83018600 r5:00001000 r4:7f2b2000 [ 3126.957004][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3126.957062][ T30] r5:00001000 r4:e4197000 [ 3126.957080][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3126.957156][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3126.957223][ T30] r5:8547538c r4:85b21280 [ 3126.957279][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3126.957358][ T30] r7:ddde3d80 r6:83018600 r5:8547538c r4:85b21280 [ 3126.957416][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3126.957495][ T30] r10:61c88647 r9:8397d400 r8:85b212ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3126.957518][ T30] r4:85b21280 [ 3126.957592][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3126.957672][ T30] r10:00000000 r9:85b21280 r8:80278fec r7:ea829e60 r6:858de380 r5:8397d400 [ 3126.957696][ T30] r4:00000001 [ 3126.957712][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3126.957757][ T30] Exception stack(0xea835fb0 to 0xea835ff8) [ 3126.957784][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 3126.957819][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3126.957850][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3126.957888][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3126.957912][ T30] r4:85ea8580 [ 3126.958118][ T30] INFO: task kworker/1:4:18218 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3126.958153][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3126.958221][ T30] Workqueue: events bpf_prog_free_deferred [ 3126.958270][ T30] Call trace: [ 3126.958295][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3126.958386][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3126.958415][ T30] r4:00000000 [ 3126.958431][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3126.958485][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3126.958549][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3126.958588][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3126.958614][ T30] 1d60: 80020113 ffffffff [ 3126.958649][ T30] r5:80020113 r4:80239c10 [ 3126.958669][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3126.958762][ T30] r4:82acb1e4 [ 3126.958785][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3126.958975][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3126.959005][ T30] r4:ea771dc0 [ 3126.959029][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3126.959153][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3126.959181][ T30] r4:00000000 [ 3126.959334][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3126.959407][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3126.959426][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3126.959487][ T30] r5:00001000 r4:e0155000 [ 3126.959505][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3126.959564][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3126.959675][ T30] r5:86181f8c r4:85b21b00 [ 3126.959701][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3126.959777][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3126.959797][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3126.959907][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3126.959936][ T30] r4:85b21b00 [ 3126.959958][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3126.960028][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3126.960053][ T30] r4:00000001 [ 3126.960070][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3126.960326][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3126.960402][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3126.960438][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3126.960469][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3126.960526][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3126.960551][ T30] r4:85ccb3c0 [ 3126.960589][ T30] INFO: task kworker/1:9:18225 blocked for more than 430 seconds. [ 3126.960672][ T30] Not tainted syzkaller #0 [ 3126.960696][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3126.960951][ T30] task:kworker/1:9 state:D stack:0 pid:18225 tgid:18225 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.055327][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.055439][ T30] Call trace: [ 3127.055474][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3127.055562][ T30] r10:ea8add84 r9:00000002 r8:60000113 r7:829171a0 r6:ea8add8c r5:86a56000 [ 3127.055585][ T30] r4:86a56000 [ 3127.055601][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3127.055671][ T30] r5:86a56000 r4:8291719c [ 3127.055735][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3127.055808][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3127.055879][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ade08 [ 3127.055901][ T30] r4:00000000 [ 3127.055945][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3127.056003][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3127.056066][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.056126][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d5ff80 [ 3127.056146][ T30] r4:00000000 [ 3127.056162][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.056226][ T30] r9:83018605 r8:86a56000 r7:00000000 r6:83018600 r5:00001000 r4:7f34e000 [ 3127.056247][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.056308][ T30] r5:00001000 r4:ea823000 [ 3127.056327][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.056384][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.056477][ T30] r5:84bd1f8c r4:85b21880 [ 3127.056504][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.056612][ T30] r7:ddde3d80 r6:83018600 r5:84bd1f8c r4:85b21880 [ 3127.056643][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.056714][ T30] r10:61c88647 r9:86a56000 r8:85b218ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3127.056735][ T30] r4:85b21880 [ 3127.056752][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.056840][ T30] r10:00000000 r9:85b21880 r8:80278fec r7:ea7fde60 r6:868e4a80 r5:86a56000 [ 3127.056901][ T30] r4:00000001 [ 3127.056923][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.056980][ T30] Exception stack(0xea8adfb0 to 0xea8adff8) [ 3127.057012][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 3127.057047][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.057078][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.057114][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.057136][ T30] r4:868c0dc0 [ 3127.057557][ T30] INFO: task kworker/1:9:18225 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3127.057597][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.057765][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.057818][ T30] Call trace: [ 3127.057891][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3127.057966][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3127.057989][ T30] r4:00000000 [ 3127.058005][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3127.058057][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3127.058135][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3127.058176][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3127.058242][ T30] 1d60: 80020113 ffffffff [ 3127.058273][ T30] r5:80020113 r4:80239c10 [ 3127.058294][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3127.058357][ T30] r4:82acb1e4 [ 3127.058375][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3127.058439][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3127.058463][ T30] r4:ea771dc0 [ 3127.058478][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.058561][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3127.058628][ T30] r4:00000000 [ 3127.058651][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.058717][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3127.058735][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.058792][ T30] r5:00001000 r4:e0155000 [ 3127.058812][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.058870][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.059000][ T30] r5:86181f8c r4:85b21b00 [ 3127.059062][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.059140][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3127.059159][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.059229][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3127.059348][ T30] r4:85b21b00 [ 3127.059446][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.059518][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3127.059539][ T30] r4:00000001 [ 3127.059556][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.059603][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3127.059680][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3127.059768][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.059806][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.059843][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.059865][ T30] r4:85ccb3c0 [ 3127.087624][ T30] INFO: task kworker/1:11:18267 blocked for more than 430 seconds. [ 3127.087759][ T30] Not tainted syzkaller #0 [ 3127.087785][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3127.087809][ T30] task:kworker/1:11 state:D stack:0 pid:18267 tgid:18267 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.087939][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.088035][ T30] Call trace: [ 3127.088102][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3127.088232][ T30] r10:ea3e5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea3e5d8c r5:85d80c00 [ 3127.088261][ T30] r4:85d80c00 [ 3127.088280][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3127.088339][ T30] r5:85d80c00 r4:8291719c [ 3127.088355][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3127.088411][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3127.088518][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea3e5e08 [ 3127.088542][ T30] r4:00000000 [ 3127.088615][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3127.088689][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3127.088764][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.088868][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85be8000 [ 3127.088938][ T30] r4:00000000 [ 3127.088960][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.089029][ T30] r9:83018605 r8:85d80c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2c8000 [ 3127.089052][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.089121][ T30] r5:00001000 r4:ea77d000 [ 3127.089142][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.089199][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.089263][ T30] r5:86803f8c r4:85457d00 [ 3127.089284][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.089444][ T30] r7:ddde3d80 r6:83018600 r5:86803f8c r4:85457d00 [ 3127.089472][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.089579][ T30] r10:61c88647 r9:85d80c00 r8:85457d2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3127.089605][ T30] r4:85457d00 [ 3127.089633][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.089701][ T30] r10:00000000 r9:85457d00 r8:80278fec r7:ea771e60 r6:85663900 r5:85d80c00 [ 3127.089756][ T30] r4:00000001 [ 3127.089816][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.089938][ T30] Exception stack(0xea3e5fb0 to 0xea3e5ff8) [ 3127.089981][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 3127.090018][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.090080][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.090125][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.090154][ T30] r4:8564acc0 [ 3127.090632][ T30] INFO: task kworker/1:11:18267 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3127.090753][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.090828][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.090903][ T30] Call trace: [ 3127.090964][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3127.091043][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3127.091066][ T30] r4:00000000 [ 3127.091082][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3127.091151][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3127.091194][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3127.091231][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3127.091257][ T30] 1d60: 80020113 ffffffff [ 3127.091282][ T30] r5:80020113 r4:80239c10 [ 3127.091300][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3127.091360][ T30] r4:82acb1e4 [ 3127.091377][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3127.091442][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3127.091463][ T30] r4:ea771dc0 [ 3127.091524][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.091593][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3127.091612][ T30] r4:00000000 [ 3127.091636][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.091700][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3127.091757][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.091826][ T30] r5:00001000 r4:e0155000 [ 3127.091910][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.131281][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.131466][ T30] r5:86181f8c r4:85b21b00 [ 3127.131519][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.131592][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3127.131611][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.131722][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3127.131769][ T30] r4:85b21b00 [ 3127.131791][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.131953][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3127.131992][ T30] r4:00000001 [ 3127.132010][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.132064][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3127.132101][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3127.132159][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.132206][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.132243][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.132282][ T30] r4:85ccb3c0 [ 3127.132329][ T30] INFO: task kworker/0:26:18311 blocked for more than 430 seconds. [ 3127.132370][ T30] Not tainted syzkaller #0 [ 3127.132396][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3127.132438][ T30] task:kworker/0:26 state:D stack:0 pid:18311 tgid:18311 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.132540][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.132627][ T30] Call trace: [ 3127.132684][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3127.132766][ T30] r10:ea419d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea419d8c r5:86a55400 [ 3127.132790][ T30] r4:86a55400 [ 3127.132806][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3127.132863][ T30] r5:86a55400 r4:8291719c [ 3127.132890][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3127.132949][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3127.133017][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea419e08 [ 3127.133081][ T30] r4:00000000 [ 3127.133119][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3127.133215][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3127.133313][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.133382][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd9fc0 [ 3127.133405][ T30] r4:00000000 [ 3127.133423][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.133489][ T30] r9:83018405 r8:86a55400 r7:00000000 r6:83018400 r5:00001000 r4:7f35a000 [ 3127.133509][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.133565][ T30] r5:00001000 r4:eb8d4000 [ 3127.133581][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.133638][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.133698][ T30] r5:858ffb8c r4:85b2dd00 [ 3127.133715][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.133782][ T30] r7:dddcfd80 r6:83018400 r5:858ffb8c r4:85b2dd00 [ 3127.133802][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.133879][ T30] r10:61c88647 r9:86a55400 r8:85b2dd2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 3127.133931][ T30] r4:85b2dd00 [ 3127.133954][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.134030][ T30] r10:00000000 r9:85b2dd00 r8:80278fec r7:ea651e60 r6:85457b80 r5:86a55400 [ 3127.134056][ T30] r4:00000001 [ 3127.134073][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.134147][ T30] Exception stack(0xea419fb0 to 0xea419ff8) [ 3127.134182][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 3127.134217][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.134247][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.134282][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.134307][ T30] r4:861a8180 [ 3127.134709][ T30] INFO: task kworker/0:26:18311 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3127.134749][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.134806][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.134855][ T30] Call trace: [ 3127.134889][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3127.135140][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3127.135183][ T30] r4:00000000 [ 3127.135201][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3127.135260][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3127.135293][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3127.135324][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3127.135412][ T30] 1d60: 80020113 ffffffff [ 3127.135447][ T30] r5:80020113 r4:80239c10 [ 3127.135499][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3127.135636][ T30] r4:82acb1e4 [ 3127.135661][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3127.135723][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3127.135746][ T30] r4:ea771dc0 [ 3127.135802][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.135915][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3127.135940][ T30] r4:00000000 [ 3127.136014][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.136128][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3127.136154][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.136256][ T30] r5:00001000 r4:e0155000 [ 3127.136383][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.136447][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.136507][ T30] r5:86181f8c r4:85b21b00 [ 3127.136524][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.136625][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3127.136651][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.136721][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3127.136742][ T30] r4:85b21b00 [ 3127.136757][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.136822][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3127.136873][ T30] r4:00000001 [ 3127.136910][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.136963][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3127.137015][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3127.137054][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.137084][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.137118][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.137139][ T30] r4:85ccb3c0 [ 3127.137169][ T30] INFO: task kworker/0:28:18317 blocked for more than 430 seconds. [ 3127.137200][ T30] Not tainted syzkaller #0 [ 3127.137223][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3127.137240][ T30] task:kworker/0:28 state:D stack:0 pid:18317 tgid:18317 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.137433][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.137708][ T30] Call trace: [ 3127.137756][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3127.137831][ T30] r10:dfbcdd84 r9:00000002 r8:60070013 r7:829171a0 r6:dfbcdd8c r5:84e1d400 [ 3127.137854][ T30] r4:84e1d400 [ 3127.137878][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3127.137942][ T30] r5:84e1d400 r4:8291719c [ 3127.137982][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3127.138132][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3127.138340][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 [ 3127.138375][ T30] r4:00000000 [ 3127.138392][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3127.138453][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3127.138537][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.138651][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85eb1d80 [ 3127.138680][ T30] r4:00000000 [ 3127.138698][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.138822][ T30] r9:83018405 r8:84e1d400 r7:00000000 r6:83018400 r5:00001000 r4:7f354000 [ 3127.138851][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.138929][ T30] r5:00001000 r4:ea913000 [ 3127.138980][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.139090][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.139168][ T30] r5:860fb78c r4:85b2d780 [ 3127.139248][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.139338][ T30] r7:dddcfd80 r6:83018400 r5:860fb78c r4:85b2d780 [ 3127.139443][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.183684][ T30] r10:61c88647 r9:84e1d400 r8:85b2d7ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 3127.183764][ T30] r4:85b2d780 [ 3127.183791][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.183921][ T30] r10:00000000 r9:85b2d780 r8:80278fec r7:ea419e60 r6:85457000 r5:84e1d400 [ 3127.183943][ T30] r4:00000001 [ 3127.183991][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.184052][ T30] Exception stack(0xdfbcdfb0 to 0xdfbcdff8) [ 3127.184093][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 3127.184129][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.184162][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.184198][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.184221][ T30] r4:85c6f6c0 [ 3127.184688][ T30] INFO: task kworker/0:28:18317 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3127.184735][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.184829][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.184904][ T30] Call trace: [ 3127.184934][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3127.185007][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3127.185029][ T30] r4:00000000 [ 3127.185050][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3127.185105][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3127.185144][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3127.185179][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3127.185224][ T30] 1d60: 80020113 ffffffff [ 3127.185252][ T30] r5:80020113 r4:80239c10 [ 3127.185268][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3127.185331][ T30] r4:82acb1e4 [ 3127.185348][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3127.185409][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3127.185429][ T30] r4:ea771dc0 [ 3127.185445][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.185505][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3127.185527][ T30] r4:00000000 [ 3127.185543][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.185609][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3127.185634][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.185696][ T30] r5:00001000 r4:e0155000 [ 3127.185716][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.185807][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.185885][ T30] r5:86181f8c r4:85b21b00 [ 3127.185906][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.185977][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3127.185998][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.186078][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3127.186100][ T30] r4:85b21b00 [ 3127.186116][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.186219][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3127.186272][ T30] r4:00000001 [ 3127.186308][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.186363][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3127.186394][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3127.186427][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.186460][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.186548][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.186582][ T30] r4:85ccb3c0 [ 3127.186620][ T30] INFO: task kworker/0:29:18318 blocked for more than 430 seconds. [ 3127.186666][ T30] Not tainted syzkaller #0 [ 3127.186694][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3127.186715][ T30] task:kworker/0:29 state:D stack:0 pid:18318 tgid:18318 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.186778][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.186829][ T30] Call trace: [ 3127.186858][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3127.186939][ T30] r10:e00bdd84 r9:00000002 r8:60000013 r7:829171a0 r6:e00bdd8c r5:84f78000 [ 3127.186962][ T30] r4:84f78000 [ 3127.187011][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3127.217379][ T30] r5:84f78000 r4:8291719c [ 3127.217451][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3127.217557][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3127.217635][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00bde08 [ 3127.217657][ T30] r4:00000000 [ 3127.217709][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3127.217774][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3127.217836][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.217971][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:860ce040 [ 3127.218001][ T30] r4:00000000 [ 3127.218019][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.218086][ T30] r9:83018405 r8:84f78000 r7:00000000 r6:83018400 r5:00001000 r4:7f358000 [ 3127.218108][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.218173][ T30] r5:00001000 r4:eafdf000 [ 3127.218192][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.218248][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.218328][ T30] r5:85e8878c r4:85b2db80 [ 3127.218353][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.218427][ T30] r7:dddcfd80 r6:83018400 r5:85e8878c r4:85b2db80 [ 3127.218449][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.218546][ T30] r10:61c88647 r9:84f78000 r8:85b2dbac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 3127.218571][ T30] r4:85b2db80 [ 3127.218588][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.218661][ T30] r10:00000000 r9:85b2db80 r8:80278fec r7:dfbcde60 r6:85457080 r5:84f78000 [ 3127.218685][ T30] r4:00000001 [ 3127.218701][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.218750][ T30] Exception stack(0xe00bdfb0 to 0xe00bdff8) [ 3127.218788][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 3127.218822][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.218852][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.218895][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.218917][ T30] r4:85c6fa80 [ 3127.219384][ T30] INFO: task kworker/0:29:18318 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3127.219430][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.219514][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.219880][ T30] Call trace: [ 3127.219922][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3127.220002][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3127.220025][ T30] r4:00000000 [ 3127.220041][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3127.220096][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3127.220132][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3127.220165][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3127.220190][ T30] 1d60: 80020113 ffffffff [ 3127.220255][ T30] r5:80020113 r4:80239c10 [ 3127.220282][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3127.220345][ T30] r4:82acb1e4 [ 3127.220440][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3127.220522][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3127.220543][ T30] r4:ea771dc0 [ 3127.220560][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.220626][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3127.220671][ T30] r4:00000000 [ 3127.220694][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.220765][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3127.220794][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.220854][ T30] r5:00001000 r4:e0155000 [ 3127.220885][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.220949][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.221014][ T30] r5:86181f8c r4:85b21b00 [ 3127.221033][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.221136][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3127.221173][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.221246][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3127.221267][ T30] r4:85b21b00 [ 3127.221283][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.221348][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3127.221371][ T30] r4:00000001 [ 3127.221413][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.221469][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3127.221504][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3127.221538][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.221566][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.221599][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.221621][ T30] r4:85ccb3c0 [ 3127.245813][ T30] INFO: task kworker/0:30:18322 blocked for more than 430 seconds. [ 3127.245947][ T30] Not tainted syzkaller #0 [ 3127.245975][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3127.246000][ T30] task:kworker/0:30 state:D stack:0 pid:18322 tgid:18322 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.246091][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.246183][ T30] Call trace: [ 3127.246240][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3127.246337][ T30] r10:ea99dd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea99dd8c r5:83aba400 [ 3127.246363][ T30] r4:83aba400 [ 3127.246380][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3127.246441][ T30] r5:83aba400 r4:8291719c [ 3127.246457][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3127.246617][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3127.246710][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea99de08 [ 3127.246731][ T30] r4:00000000 [ 3127.246756][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3127.246811][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3127.246870][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.246995][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a950c0 [ 3127.247024][ T30] r4:00000000 [ 3127.247042][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.247110][ T30] r9:83018405 r8:83aba400 r7:00000000 r6:83018400 r5:00001000 r4:7f300000 [ 3127.247169][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.247238][ T30] r5:00001000 r4:df9f1000 [ 3127.247257][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.247317][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.247386][ T30] r5:85c35f8c r4:85b2dd80 [ 3127.247405][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.247487][ T30] r7:dddcfd80 r6:83018400 r5:85c35f8c r4:85b2dd80 [ 3127.247511][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.247584][ T30] r10:61c88647 r9:83aba400 r8:85b2ddac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 3127.247610][ T30] r4:85b2dd80 [ 3127.247628][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.247692][ T30] r10:00000000 r9:85b2dd80 r8:80278fec r7:dfbcde60 r6:85457400 r5:83aba400 [ 3127.247737][ T30] r4:00000001 [ 3127.247767][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.247814][ T30] Exception stack(0xea99dfb0 to 0xea99dff8) [ 3127.247843][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 3127.247883][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.247913][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.247950][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.247972][ T30] r4:85c6f3c0 [ 3127.248394][ T30] INFO: task kworker/0:30:18322 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3127.248431][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.248497][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.248548][ T30] Call trace: [ 3127.248576][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3127.248650][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3127.248672][ T30] r4:00000000 [ 3127.248687][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3127.248740][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3127.248775][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3127.248809][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3127.248863][ T30] 1d60: 80020113 ffffffff [ 3127.248900][ T30] r5:80020113 r4:80239c10 [ 3127.248939][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3127.249032][ T30] r4:82acb1e4 [ 3127.249056][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3127.249122][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3127.249167][ T30] r4:ea771dc0 [ 3127.249190][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.249255][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3127.249275][ T30] r4:00000000 [ 3127.249290][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.249350][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3127.249371][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.249427][ T30] r5:00001000 r4:e0155000 [ 3127.249445][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.249499][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.249559][ T30] r5:86181f8c r4:85b21b00 [ 3127.249577][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.249647][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3127.249666][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.249737][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3127.249757][ T30] r4:85b21b00 [ 3127.249773][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.249836][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3127.249858][ T30] r4:00000001 [ 3127.249881][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.249930][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3127.249958][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3127.249999][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.250032][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.250066][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.250086][ T30] r4:85ccb3c0 [ 3127.250154][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 3127.250249][ T30] INFO: task kworker/0:32:18353 blocked for more than 430 seconds. [ 3127.250281][ T30] Not tainted syzkaller #0 [ 3127.250302][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3127.250316][ T30] task:kworker/0:32 state:D stack:0 pid:18353 tgid:18353 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.250372][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.250421][ T30] Call trace: [ 3127.250449][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3127.250618][ T30] r10:ea3e1d84 r9:00000002 r8:60070113 r7:829171a0 r6:ea3e1d8c r5:85d80000 [ 3127.250654][ T30] r4:85d80000 [ 3127.250672][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3127.250732][ T30] r5:85d80000 r4:8291719c [ 3127.250749][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3127.250803][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3127.250910][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea3e1e08 [ 3127.250941][ T30] r4:00000000 [ 3127.250959][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3127.251016][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3127.251066][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.251126][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f2500 [ 3127.251147][ T30] r4:00000000 [ 3127.251163][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.251225][ T30] r9:83018405 r8:85d80000 r7:00000000 r6:83018400 r5:00001000 r4:7f2ea000 [ 3127.251242][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.251300][ T30] r5:00001000 r4:ea56f000 [ 3127.251316][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.251373][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.251433][ T30] r5:85c3438c r4:85b2d380 [ 3127.251450][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.251546][ T30] r7:dddcfd80 r6:83018400 r5:85c3438c r4:85b2d380 [ 3127.251565][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.251638][ T30] r10:61c88647 r9:85d80000 r8:85b2d3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 3127.251659][ T30] r4:85b2d380 [ 3127.251676][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.251744][ T30] r10:00000000 r9:85b2d380 r8:80278fec r7:eaa9de60 r6:85b2d980 r5:85d80000 [ 3127.251766][ T30] r4:00000001 [ 3127.251810][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.251866][ T30] Exception stack(0xea3e1fb0 to 0xea3e1ff8) [ 3127.251913][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3127.251946][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.251995][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.252038][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.252059][ T30] r4:85b53940 [ 3127.252281][ T30] INFO: task kworker/0:32:18353 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3127.252319][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.252388][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.252466][ T30] Call trace: [ 3127.252490][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3127.252555][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3127.252575][ T30] r4:00000000 [ 3127.252592][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3127.252643][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3127.252709][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3127.252751][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3127.252777][ T30] 1d60: 80020113 ffffffff [ 3127.252802][ T30] r5:80020113 r4:80239c10 [ 3127.252840][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3127.252918][ T30] r4:82acb1e4 [ 3127.252946][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3127.253132][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3127.253164][ T30] r4:ea771dc0 [ 3127.253212][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.253277][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3127.253297][ T30] r4:00000000 [ 3127.253311][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.253368][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3127.253384][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.253441][ T30] r5:00001000 r4:e0155000 [ 3127.253460][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.253517][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.253579][ T30] r5:86181f8c r4:85b21b00 [ 3127.253597][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.253669][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3127.253691][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.312428][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3127.312535][ T30] r4:85b21b00 [ 3127.312561][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.312731][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3127.312797][ T30] r4:00000001 [ 3127.312823][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.312890][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3127.312929][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3127.312967][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.313020][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.313063][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.313089][ T30] r4:85ccb3c0 [ 3127.313131][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 3127.313205][ T30] INFO: task kworker/0:33:18375 blocked for more than 430 seconds. [ 3127.313313][ T30] Not tainted syzkaller #0 [ 3127.313346][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3127.313365][ T30] task:kworker/0:33 state:D stack:0 pid:18375 tgid:18375 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.313485][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.313550][ T30] Call trace: [ 3127.313584][ T30] [<81a63e5c>] (__schedule) from [<81a64df0>] (schedule+0x2c/0x130) [ 3127.313664][ T30] r10:eab25d84 r9:00000002 r8:600b0113 r7:829171a0 r6:eab25d8c r5:85d86000 [ 3127.313686][ T30] r4:85d86000 [ 3127.313707][ T30] [<81a64dc4>] (schedule) from [<81a651d8>] (schedule_preempt_disabled+0x18/0x24) [ 3127.313768][ T30] r5:85d86000 r4:8291719c [ 3127.313788][ T30] [<81a651c0>] (schedule_preempt_disabled) from [<81a67d88>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3127.313863][ T30] [<81a67a38>] (__mutex_lock.constprop.0) from [<81a68530>] (__mutex_lock_slowpath+0x14/0x18) [ 3127.313941][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 [ 3127.313961][ T30] r4:00000000 [ 3127.313977][ T30] [<81a6851c>] (__mutex_lock_slowpath) from [<81a68570>] (mutex_lock+0x3c/0x40) [ 3127.314023][ T30] [<81a68534>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 3127.314077][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.314142][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd54c0 [ 3127.314164][ T30] r4:00000000 [ 3127.314181][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.314251][ T30] r9:83018405 r8:85d86000 r7:00000000 r6:83018400 r5:00001000 r4:7f356000 [ 3127.314272][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.314331][ T30] r5:00001000 r4:eab29000 [ 3127.314351][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.314409][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.314498][ T30] r5:8547978c r4:85b2d100 [ 3127.314548][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.314625][ T30] r7:dddcfd80 r6:83018400 r5:8547978c r4:85b2d100 [ 3127.314664][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.314741][ T30] r10:61c88647 r9:85d86000 r8:85b2d12c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 3127.314763][ T30] r4:85b2d100 [ 3127.314782][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.314851][ T30] r10:00000000 r9:85b2d100 r8:80278fec r7:ea3e1e60 r6:85b2d400 r5:85d86000 [ 3127.314882][ T30] r4:00000001 [ 3127.315042][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.315103][ T30] Exception stack(0xeab25fb0 to 0xeab25ff8) [ 3127.315134][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 3127.315169][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.315273][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.315327][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.315350][ T30] r4:85e71040 [ 3127.315771][ T30] INFO: task kworker/0:33:18375 is blocked on a mutex likely owned by task kworker/1:7:18223. [ 3127.315811][ T30] task:kworker/1:7 state:R running task stack:0 pid:18223 tgid:18223 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3127.315982][ T30] Workqueue: events bpf_prog_free_deferred [ 3127.316091][ T30] Call trace: [ 3127.316121][ T30] [<81a63e5c>] (__schedule) from [<81a65224>] (preempt_schedule_irq+0x40/0xa8) [ 3127.316198][ T30] r10:8280c9b4 r9:86a53c00 r8:80200c04 r7:ea771d54 r6:ffffffff r5:86a53c00 [ 3127.316221][ T30] r4:00000000 [ 3127.316236][ T30] [<81a651e4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3127.316327][ T30] Exception stack(0xea771d20 to 0xea771d68) [ 3127.316375][ T30] 1d20: acd85000 ea713000 00000001 80239bf8 7f276000 00000001 82acb1c4 82aca5a0 [ 3127.316412][ T30] 1d40: 7f276000 ea713000 8280c9b4 ea771d9c ea771da0 ea771d70 80230af0 80239c10 [ 3127.316459][ T30] 1d60: 80020113 ffffffff [ 3127.316557][ T30] r5:80020113 r4:80239c10 [ 3127.316577][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 3127.316640][ T30] r4:82acb1e4 [ 3127.316659][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 3127.316725][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea771dc0 r5:ea771e08 [ 3127.316748][ T30] r4:ea771dc0 [ 3127.316764][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 3127.316828][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:869c1700 [ 3127.316886][ T30] r4:00000000 [ 3127.316910][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 3127.316986][ T30] r9:83018605 r8:86a53c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2b0000 [ 3127.317008][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 3127.317070][ T30] r5:00001000 r4:e0155000 [ 3127.317093][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 3127.317149][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 3127.317236][ T30] r5:86181f8c r4:85b21b00 [ 3127.317271][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3127.317446][ T30] r7:ddde3d80 r6:83018600 r5:86181f8c r4:85b21b00 [ 3127.317473][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3127.317582][ T30] r10:61c88647 r9:86a53c00 r8:85b21b2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3127.317628][ T30] r4:85b21b00 [ 3127.317649][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.317736][ T30] r10:00000000 r9:85b21b00 r8:80278fec r7:ea829e60 r6:85b21180 r5:86a53c00 [ 3127.317801][ T30] r4:00000001 [ 3127.317844][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.317913][ T30] Exception stack(0xea771fb0 to 0xea771ff8) [ 3127.317979][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3127.318023][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.318056][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.318094][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.318115][ T30] r4:85ccb3c0 [ 3127.318227][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 3127.370065][ T30] NMI backtrace for cpu 0 [ 3127.370549][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 3127.370757][ T30] Hardware name: ARM-Versatile Express [ 3127.370963][ T30] Call trace: [ 3127.371075][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3127.371195][ T30] r7:00000000 r6:00070113 r5:60070193 r4:822526a8 [ 3127.371219][ T30] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 3127.371277][ T30] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 3127.371368][ T30] r5:00000000 r4:00000001 [ 3127.371392][ T30] [<8021f904>] (dump_stack) from [<81a4da74>] (nmi_cpu_backtrace+0x160/0x17c) [ 3127.371459][ T30] [<81a4d914>] (nmi_cpu_backtrace) from [<81a4dbc0>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 3127.371566][ T30] r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [ 3127.371583][ T30] [<81a4da90>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 3127.371662][ T30] r9:8281ba28 r8:8280c810 r7:00046e33 r6:00007e6e r5:82abf7d4 r4:86ab510c [ 3127.371681][ T30] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (watchdog+0x5d0/0x850) [ 3127.371749][ T30] [<8037f520>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.371822][ T30] r10:00000000 r9:00000000 r8:8037f520 r7:83844000 r6:83844000 r5:832e2400 [ 3127.371845][ T30] r4:00000001 [ 3127.371861][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.371911][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 3127.371960][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 3127.371998][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.372028][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.372103][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.372185][ T30] r4:833c8940 [ 3127.372461][ T30] Sending NMI from CPU 0 to CPUs 1: [ 3127.373509][ C1] NMI backtrace for cpu 1 [ 3127.373718][ C1] CPU: 1 UID: 0 PID: 2818 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 3127.373772][ C1] Hardware name: ARM-Versatile Express [ 3127.373821][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 3127.373924][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 3127.373981][ C1] pc : [<81a6dcc4>] lr : [<80a8f4b8>] psr: 60000113 [ 3127.374019][ C1] sp : eafe9eb0 ip : eafe9ec0 fp : eafe9ebc [ 3127.374051][ C1] r10: 82959594 r9 : 00000001 r8 : 00000000 [ 3127.374092][ C1] r7 : 00000117 r6 : 829594f8 r5 : 00000000 r4 : 00000001 [ 3127.374133][ C1] r3 : 0000160b r2 : 00000000 r1 : 60000113 r0 : 84187c40 [ 3127.374261][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 3127.374337][ C1] Control: 30c5387d Table: 84d37040 DAC: 00000000 [ 3127.374401][ C1] Call trace: [ 3127.374446][ C1] [<81a6dc9c>] (_raw_spin_unlock_irqrestore) from [<80a8f4b8>] (pl011_console_device_unlock+0x20/0x24) [ 3127.374552][ C1] [<80a8f498>] (pl011_console_device_unlock) from [<802e3750>] (nbcon_emit_one+0x88/0x100) [ 3127.374617][ C1] [<802e36c8>] (nbcon_emit_one) from [<802e3970>] (nbcon_kthread_func+0x1a8/0x2a4) [ 3127.374680][ C1] r6:8280c690 r5:84195400 r4:829594f8 [ 3127.374698][ C1] [<802e37c8>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.374769][ C1] r10:00000000 r9:829594f8 r8:802e37c8 r7:84708600 r6:84708600 r5:84195400 [ 3127.374790][ C1] r4:00000001 [ 3127.374805][ C1] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.374856][ C1] Exception stack(0xeafe9fb0 to 0xeafe9ff8) [ 3127.374902][ C1] 9fa0: 00000000 00000000 00000000 00000000 [ 3127.374936][ C1] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.374965][ C1] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.374999][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.375018][ C1] r4:84872240 [ 3127.376516][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 3127.539605][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 3127.540307][ T30] Hardware name: ARM-Versatile Express [ 3127.541046][ T30] Call trace: [ 3127.541643][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3127.542655][ T30] r7:822533cc r6:832e2400 r5:00000000 r4:822526a8 [ 3127.543314][ T30] [<80201b08>] (show_stack) from [<8021f8dc>] (dump_stack_lvl+0x54/0x7c) [ 3127.544348][ T30] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 3127.545405][ T30] r5:00000000 r4:82a78d18 [ 3127.545972][ T30] [<8021f904>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 3127.546856][ T30] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 3127.547829][ T30] r7:00046e33 [ 3127.548437][ T30] [<80202800>] (panic) from [<8037f930>] (watchdog+0x410/0x850) [ 3127.549185][ T30] r3:00000001 r2:00000000 r1:00000001 r0:822533cc [ 3127.550225][ T30] [<8037f520>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 3127.551312][ T30] r10:00000000 r9:00000000 r8:8037f520 r7:83844000 r6:83844000 r5:832e2400 [ 3127.551848][ T30] r4:00000001 [ 3127.552032][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3127.554009][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 3127.559020][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 3127.559834][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3127.560180][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3127.561203][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3127.562065][ T30] r4:833c8940 [ 3127.564928][ T30] Rebooting in 86400 seconds.. VM DIAGNOSIS: 02:14:08 Registers: info registers vcpu 0 CPU#0 R00=e012de38 R01=8243e288 R02=000a4780 R03=80201260 R04=8280cbfc R05=df80a000 R06=82402b50 R07=df80a00c R08=00000000 R09=84842400 R10=0000e1ff R11=df801fd4 R12=df801fd8 R13=df801fb8 R14=81a606ac R15=8020127c PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84187c40 R01=60020113 R02=00000000 R03=000013cb R04=00000001 R05=00000000 R06=829594f8 R07=00000117 R08=00000000 R09=00000001 R10=82959594 R11=eafe9ebc R12=eafe9ec0 R13=eafe9eb0 R14=80a8f4b8 R15=81a6dcc4 PSR=60020193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000