last executing test programs: 29m53.76984635s ago: executing program 32 (id=574): gettid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xb, 0x8, 0xc, 0x4, 0x1}, 0x50) r3 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x1, 0x0) fchdir(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000000), 0x208e24b) 28m43.467602234s ago: executing program 2 (id=645): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) r0 = socket$packet(0x11, 0x3, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x10, 0x4) sendto$packet(r0, &(0x7f00000000c0)="3f033608260812002c001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c152bfdf9435e3ffe46", 0xe90c, 0xa0c4, &(0x7f0000000540)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) 28m36.626160031s ago: executing program 2 (id=651): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r2 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x1, 0x0) fchdir(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000000), 0x208e24b) 27m51.409384503s ago: executing program 33 (id=651): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r2 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x1, 0x0) fchdir(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000000), 0x208e24b) 26m28.928500881s ago: executing program 34 (id=673): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r4}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) 26m11.48920295s ago: executing program 35 (id=680): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = getpid() r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$F2FS_IOC_SEC_TRIM_FILE(r1, 0x4018f514, &(0x7f0000000300)={0x4453, 0x7fff, 0x2}) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_delete(r6) 24m59.243684685s ago: executing program 5 (id=691): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="711100"/20, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 24m58.897788503s ago: executing program 5 (id=692): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000340)=0x1, 0x4) syz_usb_connect(0x3, 0x64, &(0x7f0000000b40)=ANY=[], 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ffb}]}) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) io_setup(0x8a, &(0x7f0000000680)=0x0) io_submit(r1, 0x0, 0x0) clock_gettime(0x0, 0x0) pipe(&(0x7f0000000280)) 24m58.131827393s ago: executing program 5 (id=693): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r3}, 0x10) timer_settime(0x0, 0x0, 0x0, 0x0) gettid() write(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r5 = dup2(r4, r4) write$tun(r5, 0x0, 0x46) 24m12.409238105s ago: executing program 36 (id=693): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r3}, 0x10) timer_settime(0x0, 0x0, 0x0, 0x0) gettid() write(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r5 = dup2(r4, r4) write$tun(r5, 0x0, 0x46) 23m56.209198019s ago: executing program 37 (id=700): open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x42, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22}, 0x94) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB="540000001400b595000000000000000002000000", @ANYRES32=r3, @ANYBLOB="140001000040000000000000000000000000000014000200fe8000000000000000000000000000aa140006"], 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x80) 22m16.593345551s ago: executing program 38 (id=715): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000000000404355420000000000000109022400010000000009040000010300050009210000000122070009058103"], 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000e868495fb58d00b6ad1f50ad32d6ad25dfd73a015e0ca6a0f68a7d007dc6751dfb265a0e3ccae669e173a64bc1cfd514600650a58f145ff1205fc9ddaa275e687d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc64e57cbb7aee976f2b54421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983cd44c05bd0a48dfe3e26e7a23129d6606ed28a69989d552af6d9a9df2c3af36e0360070011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a1a83109753f54b21cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b81a7000000e7ffffff00000000d7900a820b63278f4e9a217b98ef7042ad2a928903000000cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c06054002238260000000000040587c1ed797aa21a38e1e389f640a0b8b0000000000a835ad0f61ba739cd0c31b05c00fba8a4aee676d7caa2e53b91a68ff2e60da7b01a2e5785a238afa4aba70c08b0d71b6f72d6a8d87fb08533d97ad96d3943c4cc8306dac433a5cdf78b04963d679d5a5d07e618a1ef9057fec00f9e93021f5a8d30e716de8cde9c6000000000c3b64d10f0939b42b33ab2a8717096c58bb3bb1d457d8bb96870f5a7e2ba31fd69bb80235d957eaa9a40b764e5381ffa604aaafb76a980e72b408f686b185736693089213b4e140f8f38e5589663115093889deb646122a5dc5a9e5ba4d37749a36b880110e2bf524b79bc91105f1d3f7d0de694a9417d68694f17ba5e27ea1cec518b93fadcfe0de010ae9be3273ff73c34b5695080a35bfa5c69e3b533e1b939c81b3beda037b7191cb0000000000000000000010e5d683b8938db5c305cf7e6e62a6890ba9e1f4ee64f8202b59de5036569febfaa95f4633db108b2f786333ec7bacc927f4a1785165b5d2444b4c022bb5cff472e6a0c8ee9d6d8df83b704669147b732ac508c9b9f0ca0a1ce45319d43d4643eb285835daf2065b57bebd61ad6671296c27253a5f9688d57c91ccd40ffe2dbc5dd1613a2e6f5b363cc8d205ce6ef3c3c6ded7dd3dfdb39008d8997213f68cdc971c1d6fdacb7729a5560880a77525e9cfb94ef1735dfe74e6b948697f7e3580436b532a82e315d56b17a5dba98436cc24babaae409f0aab0b40af116001bc85492455956e853ead08b5793d4ecf72378a3dfd9cc837b1c66212d9a2be8fd6341c2f837c7fe09924a51ec42912856cce3d3b2d092c80813aad03e1e63a655f4138730f302df339f30a4fbd453c9a0fba381d071ad7cb80a52bec572e29b0b9b55c235806b97e166609f8083ce776075c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000080)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\"\a'], 0x0}, 0x0) 20m8.464911358s ago: executing program 39 (id=771): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0xfeffff, 0x113, 0x3f00f000, &(0x7f0000000700)="c45c573d395de5b2891a7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1b6f969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) 19m48.629724931s ago: executing program 40 (id=772): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000404000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0xffffffffffffffff, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x8002, 0x11323}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @gre={{0x8}, {0x8, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x20040040) 17m13.59371854s ago: executing program 41 (id=803): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r3, r2}, 0xc) 16m49.370614032s ago: executing program 2 (id=809): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x18) uname(&(0x7f0000000080)=""/209) 16m48.903429027s ago: executing program 2 (id=816): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000000)=0x930d, 0x4) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'erspan0\x00', 0x0}) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) 16m48.542314096s ago: executing program 2 (id=817): r0 = eventfd(0x1) r1 = fcntl$dupfd(r0, 0x0, r0) writev(r1, &(0x7f0000002480)=[{&(0x7f0000002400)='1', 0x1}], 0x1) 16m48.193304854s ago: executing program 2 (id=818): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = socket(0xa, 0x801, 0x0) getsockopt(r3, 0x0, 0x40, &(0x7f0000b3ffac)=""/84, &(0x7f00000000c0)=0x54) 16m2.648710097s ago: executing program 42 (id=818): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = socket(0xa, 0x801, 0x0) getsockopt(r3, 0x0, 0x40, &(0x7f0000b3ffac)=""/84, &(0x7f00000000c0)=0x54) 14m40.6548885s ago: executing program 0 (id=846): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x4b, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x20000023896) 14m37.788248359s ago: executing program 0 (id=847): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x0, 0x0, 0x0, 0x4007}}) 14m36.797881161s ago: executing program 0 (id=848): socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) syz_open_dev$usbfs(&(0x7f00000000c0), 0x800000001fe, 0x1) 14m10.060714304s ago: executing program 0 (id=851): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x25, 0x0, 0x2, 0x80ffffff}]}) 14m9.529969982s ago: executing program 0 (id=852): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 14m9.109299563s ago: executing program 0 (id=853): r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getpgid(0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, 0x0) 13m24.028908492s ago: executing program 43 (id=853): r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getpgid(0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, 0x0) 13m16.59468092s ago: executing program 3 (id=865): socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$inet6(0xa, 0x3, 0x3) r3 = socket$inet6(0xa, 0x2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, r2}, 0x2) sendmsg$inet6(r3, 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x3, 0x0, 0x3, 0xf, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_key={0x3, 0x9, 0x70, 0x0, "1cdc0dca1d9f68846960e56de429"}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x7}}]}, 0x78}, 0x1, 0x7}, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) r7 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000008c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r7, 0x40505412, &(0x7f0000000700)={0x5, 0x2, 0x80, 0x0, 0x11}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=0000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 13m15.618775181s ago: executing program 3 (id=866): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f00000003c0)={0x8, 'ipvlan0\x00', {'dvmrp0\x00'}, 0x100}) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffed7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000001c0)="4321427ea75d52aa33a3dc36d3fb9c96b339f665927a3b1f0178426f321effc4ff1e5d1e78bc289d1167") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev, 0x4}, 0x1c) syz_open_procfs(0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r7, 0x0, 0x0) 12m43.044007619s ago: executing program 3 (id=871): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 12m42.530048435s ago: executing program 3 (id=872): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x18) r1 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x800000001fe, 0x82) r2 = dup(r1) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000000)={0x20, 0x3, 0xfff8, 0x20b0, 0x0, 0x100000, 0x0}) 12m42.158420345s ago: executing program 3 (id=873): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r0, &(0x7f0000000000), 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 12m41.888196609s ago: executing program 3 (id=874): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) 11m56.488099105s ago: executing program 44 (id=874): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) 11m29.494964901s ago: executing program 5 (id=878): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_usb_connect(0x3, 0x35, &(0x7f0000000340)={{0x12, 0x1, 0x0, 0xb5, 0x8f, 0x55, 0x40, 0x582, 0xb9d5, 0x73f7, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x8, 0x0, 0x1, 0xff, 0xf5, 0x6a, 0x0, [@uac_as={[@format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0x7f, 0x4, 0xe}]}], [{{0x9, 0x5, 0xb, 0x2, 0x3ff, 0x3, 0x4, 0xa}}]}}]}}]}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) 11m28.800506248s ago: executing program 5 (id=886): bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) timer_create(0x2, &(0x7f0000000240)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x7fffffffffffffff]}, 0x8, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ppoll(&(0x7f0000000000)=[{r0}, {r0, 0x2000}], 0x2, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffff9c, &(0x7f00000004c0), 0x0, 0x0) 11m26.002165203s ago: executing program 5 (id=887): syz_open_dev$tty20(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0, r4}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x2) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newqdisc={0x30, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x4}}]}, 0x30}}, 0x0) 10m40.674031476s ago: executing program 45 (id=887): syz_open_dev$tty20(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0, r4}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x2) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newqdisc={0x30, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x4}}]}, 0x30}}, 0x0) 10m11.903729494s ago: executing program 4 (id=901): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="ac1414"], 0x40}, 0x0) 10m11.588523271s ago: executing program 4 (id=902): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000005b80)={{{@in6=@remote, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x7}}, {{@in=@dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0x6c}, 0x0, @in6=@dev, 0x20000000}}, 0xe8) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0xfe, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @dest_unreach={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x3c, 0x0, 0x0, 0x4de, 0x0, 0x1, 0x0, @dev, @local}}}}}}, 0x0) 10m11.267401528s ago: executing program 4 (id=903): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x18) chmod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x8) 10m10.85085621s ago: executing program 4 (id=904): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) fcntl$F_GET_RW_HINT(r2, 0x40b, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000480)=@abs={0x0, 0x0, 0x8004e24}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00000000000000000000000800040001000000", 0x24) 9m36.404788014s ago: executing program 4 (id=906): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000c40)={0x0, 0xfe72}) syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) 9m35.634597875s ago: executing program 4 (id=907): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x1a, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000190c0), 0x121381, 0x0) ioctl$TCSETSF(r6, 0x5404, 0x0) write(r6, &(0x7f0000000640)='u', 0x1) syz_open_pts(r6, 0x0) 8m49.738810346s ago: executing program 46 (id=907): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x1a, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000190c0), 0x121381, 0x0) ioctl$TCSETSF(r6, 0x5404, 0x0) write(r6, &(0x7f0000000640)='u', 0x1) syz_open_pts(r6, 0x0) 6m23.887246642s ago: executing program 7 (id=1040): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000280)={0x591002, 0x1, 0xc}, 0x18) 6m23.519786461s ago: executing program 7 (id=1042): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0x181001) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000400)=""/4096) 6m22.649965396s ago: executing program 7 (id=1044): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) munlockall() 6m22.089080364s ago: executing program 7 (id=1046): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000100)='io_uring_register\x00', r1}, 0x10) r2 = syz_io_uring_setup(0x371d, &(0x7f0000000440)={0x0, 0x4fff, 0x2, 0xa, 0x62}, &(0x7f0000000380), &(0x7f0000000740)) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) 6m21.234709868s ago: executing program 7 (id=1049): unshare(0x22020400) r0 = syz_io_uring_setup(0xcd8, &(0x7f0000000200)={0x0, 0x465e, 0x400, 0x3, 0x100234}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_RENAMEAT={0x23, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='./file0\x00'}) io_uring_enter(r0, 0x40f9, 0x217, 0xa5, 0x0, 0x0) 6m19.153611916s ago: executing program 7 (id=1055): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LIST_PHY(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)={0x14, r2, 0x30b, 0x0, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x44}, 0x20000004) 5m33.557732436s ago: executing program 47 (id=1055): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000e868495fb58d00b6ad1f50ad32d6ad25dfd73a015e0ca6a0f68a7d007dc6751dfb265a0e3ccae669e173a64bc1cfd514600650a58f145ff1205fc9ddaa275e687d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc64e57cbb7aee976f2b54421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983cd44c05bd0a48dfe3e26e7a23129d6606ed28a69989d552af6d9a9df2c3af36e0360070011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a1a83109753f54b21cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b81a7000000e7ffffff00000000d7900a820b63278f4e9a217b98ef7042ad2a928903000000cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c06054002238260000000000040587c1ed797aa21a38e1e389f640a0b8b0000000000a835ad0f61ba739cd0c31b05c00fba8a4aee676d7caa2e53b91a68ff2e60da7b01a2e5785a238afa4aba70c08b0d71b6f72d6a8d87fb08533d97ad96d3943c4cc8306dac433a5cdf78b04963d679d5a5d07e618a1ef9057fec00f9e93021f5a8d30e716de8cde9c6000000000c3b64d10f0939b42b33ab2a8717096c58bb3bb1d457d8bb96870f5a7e2ba31fd69bb80235d957eaa9a40b764e5381ffa604aaafb76a980e72b408f686b185736693089213b4e140f8f38e5589663115093889deb646122a5dc5a9e5ba4d37749a36b880110e2bf524b79bc91105f1d3f7d0de694a9417d68694f17ba5e27ea1cec518b93fadcfe0de010ae9be3273ff73c34b5695080a35bfa5c69e3b533e1b939c81b3beda037b7191cb0000000000000000000010e5d683b8938db5c305cf7e6e62a6890ba9e1f4ee64f8202b59de5036569febfaa95f4633db108b2f786333ec7bacc927f4a1785165b5d2444b4c022bb5cff472e6a0c8ee9d6d8df83b704669147b732ac508c9b9f0ca0a1ce45319d43d4643eb285835daf2065b57bebd61ad6671296c27253a5f9688d57c91ccd40ffe2dbc5dd1613a2e6f5b363cc8d205ce6ef3c3c6ded7dd3dfdb39008d8997213f68cdc971c1d6fdacb7729a5560880a77525e9cfb94ef1735dfe74e6b948697f7e3580436b532a82e315d56b17a5dba98436cc24babaae409f0aab0b40af116001bc85492455956e853ead08b5793d4ecf72378a3dfd9cc837b1c66212d9a2be8fd6341c2f837c7fe09924a51ec42912856cce3d3b2d092c80813aad03e1e63a655f4138730f302df339f30a4fbd453c9a0fba381d071ad7cb80a52bec572e29b0b9b55c235806b97e166609f8083ce776075c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LIST_PHY(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)={0x14, r2, 0x30b, 0x0, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x44}, 0x20000004) 5m26.793895855s ago: executing program 1 (id=1143): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) syz_socket_connect_nvme_tcp() 5m26.364937577s ago: executing program 1 (id=1144): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x9, 0x4, &(0x7f0000000100)) getrandom(0x0, 0x0, 0x0) 5m26.147804588s ago: executing program 1 (id=1145): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2, 0x0, 0x5}}, 0x14}}, 0x0) 5m25.92695063s ago: executing program 1 (id=1146): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000440), 0x103940) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000180)={0x80, 0x2a, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000040)={0x80, 0x18, 0x2, 0xfffffff7, 0x0, 0x9}) 5m25.596570036s ago: executing program 1 (id=1147): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x4, 0x9, 0xab8, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1, 0x80, 0xf}}) dup2(r1, r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000300)='./file1\x00', 0x100) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r3, 0x4c80, 0xffffffffffffffb6) 4m57.078243497s ago: executing program 1 (id=1149): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r4, 0x0, 0xfffffffffffffffc}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x80, 0x7, 0xd4, 0x80000000, {{0x9, 0x4, 0x1, 0x2c, 0x24, 0x66, 0x0, 0x4, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x26}, {[@ssrr={0x89, 0x3, 0xb1}, @timestamp={0x44, 0xc, 0x5a, 0x0, 0x2, [0x7858, 0x8]}]}}}}}) recvfrom(r3, &(0x7f00000002c0)=""/217, 0xd9, 0x40000000, &(0x7f0000000400)=@ll={0x11, 0x11, r5, 0x1, 0x9, 0x6, @random="eb31beea2234"}, 0x80) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x0, &(0x7f0000000500)=0x687f30e7) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000004c0)={0x0, 'syz_tun\x00', {}, 0x8}) 4m11.838856878s ago: executing program 48 (id=1149): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r4, 0x0, 0xfffffffffffffffc}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x80, 0x7, 0xd4, 0x80000000, {{0x9, 0x4, 0x1, 0x2c, 0x24, 0x66, 0x0, 0x4, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x26}, {[@ssrr={0x89, 0x3, 0xb1}, @timestamp={0x44, 0xc, 0x5a, 0x0, 0x2, [0x7858, 0x8]}]}}}}}) recvfrom(r3, &(0x7f00000002c0)=""/217, 0xd9, 0x40000000, &(0x7f0000000400)=@ll={0x11, 0x11, r5, 0x1, 0x9, 0x6, @random="eb31beea2234"}, 0x80) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x0, &(0x7f0000000500)=0x687f30e7) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000004c0)={0x0, 'syz_tun\x00', {}, 0x8}) 2m56.347804549s ago: executing program 8 (id=1277): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = gettid() tkill(r2, 0x12) 2m55.530344962s ago: executing program 8 (id=1279): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x50032, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000040000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) 2m54.361840042s ago: executing program 8 (id=1282): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000380), 0x101040) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000600), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000003c0)={0x9c9, 0x0, 0x0, 'queue1\x00', 0x200000}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000280)={0x0, 0x0, {0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f00000000c0)={0x0, 0x74, 0x40, 0x0, 0x5}) 2m53.848101379s ago: executing program 8 (id=1283): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) unshare(0x24040000) r2 = syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x3, 0x800}, &(0x7f0000001200)=0x0, &(0x7f0000001040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_UNLINKAT={0x24, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x200, 0x1}) io_uring_enter(r2, 0x47f9, 0x0, 0x0, 0x0, 0x0) 2m52.938329886s ago: executing program 8 (id=1286): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2a05004, 0x0) chroot(&(0x7f0000000100)='./file0\x00') mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3a95004, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00') 2m52.257386001s ago: executing program 8 (id=1288): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'macvtap0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000240)={'wg2\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r4}, @IFLA_HSR_SLAVE2={0x8, 0x2, r5}]}}}]}, 0x40}}, 0x0) 2m51.853651821s ago: executing program 49 (id=1288): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'macvtap0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000240)={'wg2\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r4}, @IFLA_HSR_SLAVE2={0x8, 0x2, r5}]}}}]}, 0x40}}, 0x0) 31.608213031s ago: executing program 9 (id=1538): rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) 31.22760721s ago: executing program 9 (id=1541): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r1}, &(0x7f0000000580), &(0x7f0000000940)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, 0x0, 0x30) 30.735638256s ago: executing program 9 (id=1543): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f00000005c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x320, &(0x7f0000000180)=[{&(0x7f0000000340)="89000000120081ae08060cdc030000007f03e3f7000000006ee2ffca1b1f1400000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec001210000140090c0c00bdad446b9bbc7a46e39882a5dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1, 0x0, 0x0, 0xff0f0000}, 0x0) 30.417426432s ago: executing program 9 (id=1545): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 30.002344103s ago: executing program 9 (id=1548): ioctl$TCSETSF(0xffffffffffffffff, 0x5457, 0x0) 29.827657642s ago: executing program 9 (id=1549): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x4001, 0x1, 0x0, 0x9}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff99, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r4, r1}, 0xc) 4.117327028s ago: executing program 6 (id=1606): open(&(0x7f0000000400)='./file0\x00', 0x64842, 0x2) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) dup(r0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c00000000010104000000000000000002001000240002801400018008000100e000000108000200e00000010c00028005000100000000001c0010800800014000000000d97405010000000008000240000000000800", @ANYRES64=r1], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 3.898010629s ago: executing program 6 (id=1607): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, 0x0, 0x621c2, 0x0) ftruncate(r1, 0x8800000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80042, 0x0) sendfile(r2, r1, 0x0, 0x558410e9) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="1c0000003e000701fcfffffffedbdf25017c0000060004"], 0x1c}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) 3.778677615s ago: executing program 6 (id=1608): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='sys_enter\x00', r1, 0x0, 0x5}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x48241, 0x141) pwrite64(r2, 0x0, 0x0, 0x8000c61) 3.553505636s ago: executing program 6 (id=1609): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) unshare(0x22020400) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x40400) read(r1, &(0x7f0000000240)=""/195, 0xc3) 838.854146ms ago: executing program 6 (id=1610): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0180000000000000000001000000000000000b00000000030014"], 0x28}}, 0x40000) 0s ago: executing program 6 (id=1611): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000e80)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00\x00~'], 0x1c}}, 0x4004044) kernel console output (not intermixed with test programs): id=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11077 comm="syz.2.809" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1636.552011][ T31] audit: type=1326 audit(1636.490:2408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11077 comm="syz.2.809" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1636.552116][ T31] audit: type=1326 audit(1636.490:2409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11077 comm="syz.2.809" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1636.552217][ T31] audit: type=1326 audit(1636.500:2410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11077 comm="syz.2.809" exe="/syz-executor" sig=0 arch=40000028 syscall=122 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1636.552308][ T31] audit: type=1326 audit(1636.500:2411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11077 comm="syz.2.809" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1636.552397][ T31] audit: type=1326 audit(1636.500:2412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11077 comm="syz.2.809" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1688.462835][ T7539] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1689.446376][ T7539] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1689.552562][ T7539] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1689.706641][ T7539] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1690.388419][ T7539] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1690.403272][ T7539] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1690.418321][ T7539] bond0 (unregistering): Released all slaves [ 1690.498613][ T7539] hsr_slave_0: left promiscuous mode [ 1690.514019][ T7539] hsr_slave_1: left promiscuous mode [ 1690.550323][ T7539] veth1_macvtap: left promiscuous mode [ 1690.550800][ T7539] veth0_macvtap: left promiscuous mode [ 1690.551283][ T7539] veth1_vlan: left promiscuous mode [ 1690.551633][ T7539] veth0_vlan: left promiscuous mode [ 1691.952922][T11167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1692.002806][T11167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1695.601177][T11167] hsr_slave_0: entered promiscuous mode [ 1695.632914][T11167] hsr_slave_1: entered promiscuous mode [ 1695.639115][T11167] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1695.655540][T11167] Cannot create hsr debugfs directory [ 1697.654278][T11167] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1697.698047][T11167] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1697.747430][T11167] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1697.814237][T11167] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1700.761581][T11167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1708.962416][T11167] veth0_vlan: entered promiscuous mode [ 1709.018774][T11167] veth1_vlan: entered promiscuous mode [ 1709.179935][T11167] veth0_macvtap: entered promiscuous mode [ 1709.237611][T11167] veth1_macvtap: entered promiscuous mode [ 1709.387630][T11167] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1709.388776][T11167] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1709.392760][T11167] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1709.400643][T11167] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1710.550827][ T31] audit: type=1400 audit(1710.500:2413): avc: denied { validate_trans } for pid=11580 comm="syz.3.825" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1763.227474][ T31] audit: type=1326 audit(1763.100:2414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11773 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1763.227968][ T31] audit: type=1326 audit(1763.170:2415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11773 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1763.230794][ T31] audit: type=1326 audit(1763.180:2416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11773 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1763.241449][ T31] audit: type=1326 audit(1763.190:2417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11773 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1763.241932][ T31] audit: type=1326 audit(1763.190:2418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11773 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1763.252102][ T31] audit: type=1326 audit(1763.200:2419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11773 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=363 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1763.252747][ T31] audit: type=1326 audit(1763.200:2420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11773 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1763.252850][ T31] audit: type=1326 audit(1763.200:2421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11773 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1764.051218][T11784] netlink: 68 bytes leftover after parsing attributes in process `syz.0.844'. [ 1764.433958][ T31] audit: type=1400 audit(1764.360:2422): avc: denied { accept } for pid=11786 comm="syz.0.845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1765.105971][ T31] audit: type=1400 audit(1765.060:2423): avc: denied { wake_alarm } for pid=11778 comm="syz.3.843" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1810.489889][ T31] audit: type=1400 audit(1811.407:2424): avc: denied { create } for pid=11848 comm="syz.3.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1825.880922][ T7539] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1825.966346][ T7539] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1826.062226][ T7539] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1826.186699][ T7539] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1827.008262][ T7539] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1827.044887][ T7539] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1827.056806][ T7539] bond0 (unregistering): Released all slaves [ 1827.197964][ T7539] hsr_slave_0: left promiscuous mode [ 1827.213993][ T7539] hsr_slave_1: left promiscuous mode [ 1827.220891][ T7539] veth1_macvtap: left promiscuous mode [ 1827.284955][ T7539] veth0_macvtap: left promiscuous mode [ 1827.285725][ T7539] veth1_vlan: left promiscuous mode [ 1827.286342][ T7539] veth0_vlan: left promiscuous mode [ 1829.694899][ T31] audit: type=1400 audit(1830.647:2425): avc: denied { ioctl } for pid=11869 comm="syz.3.858" path="socket:[15701]" dev="sockfs" ino=15701 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1845.381963][T11907] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1845.392013][T11907] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1847.226308][T11907] hsr_slave_0: entered promiscuous mode [ 1847.232416][T11907] hsr_slave_1: entered promiscuous mode [ 1848.658690][T11907] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1848.688054][T11907] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1848.749829][T11907] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1848.770879][T11907] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1849.921308][T12252] fuse: Unknown parameter 'use00000000000000000000' [ 1851.835679][T11907] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1862.884965][T11907] veth0_vlan: entered promiscuous mode [ 1862.951968][T11907] veth1_vlan: entered promiscuous mode [ 1863.126363][T11907] veth0_macvtap: entered promiscuous mode [ 1863.149708][T11907] veth1_macvtap: entered promiscuous mode [ 1863.294454][T11907] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1863.294967][T11907] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1863.295265][T11907] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1863.295498][T11907] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1877.576339][T10438] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 1877.789214][T10438] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1877.789565][T10438] usb 2-1: New USB device found, idVendor=17ef, idProduct=6047, bcdDevice= 0.00 [ 1877.789829][T10438] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1877.793676][T10438] usb 2-1: config 0 descriptor?? [ 1879.133505][T10438] usbhid 2-1:0.0: can't add hid device: -71 [ 1879.134371][T10438] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 1879.140392][T10438] usb 2-1: USB disconnect, device number 23 [ 1879.690057][T10438] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 1879.871717][T10438] usb 2-1: Using ep0 maxpacket: 16 [ 1879.934977][T10438] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1879.935381][T10438] usb 2-1: New USB device found, idVendor=056a, idProduct=032c, bcdDevice= 0.00 [ 1879.935659][T10438] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1879.940969][T10438] usb 2-1: config 0 descriptor?? [ 1880.178244][T12364] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1880.179991][T12364] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1880.223823][T12364] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1880.226698][T12364] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1880.291393][T10438] usbhid 2-1:0.0: can't add hid device: -71 [ 1880.291858][T10438] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 1880.344108][T10438] usb 2-1: USB disconnect, device number 24 [ 1884.205293][ T31] audit: type=1400 audit(1885.157:2426): avc: denied { relabelfrom } for pid=12396 comm="syz.3.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1884.205788][ T31] audit: type=1400 audit(1885.157:2427): avc: denied { relabelto } for pid=12396 comm="syz.3.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1909.718393][ T31] audit: type=1326 audit(1910.667:2428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12451 comm="syz.1.875" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1909.743524][ T31] audit: type=1326 audit(1910.687:2429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12451 comm="syz.1.875" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1909.747021][ T31] audit: type=1326 audit(1910.697:2430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12451 comm="syz.1.875" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1909.753843][ T31] audit: type=1326 audit(1910.697:2431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12451 comm="syz.1.875" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1909.774062][ T31] audit: type=1326 audit(1910.717:2432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12451 comm="syz.1.875" exe="/syz-executor" sig=0 arch=40000028 syscall=24 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1909.775712][ T31] audit: type=1326 audit(1910.717:2433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12451 comm="syz.1.875" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1909.779531][ T31] audit: type=1326 audit(1910.717:2434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12451 comm="syz.1.875" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 1930.091460][ T7539] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1930.182514][ T7539] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1930.242921][ T7539] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1930.269773][ T7539] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1930.802584][ T7539] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1930.812355][ T7539] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1930.825515][ T7539] bond0 (unregistering): Released all slaves [ 1930.914553][ T7539] hsr_slave_0: left promiscuous mode [ 1930.927684][ T7539] hsr_slave_1: left promiscuous mode [ 1930.992223][ T7539] veth1_macvtap: left promiscuous mode [ 1930.994335][ T7539] veth0_macvtap: left promiscuous mode [ 1930.995664][ T7539] veth1_vlan: left promiscuous mode [ 1930.996607][ T7539] veth0_vlan: left promiscuous mode [ 1933.204819][T11142] usb 2-1: new low-speed USB device number 25 using dummy_hcd [ 1933.448480][T11142] usb 2-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 1933.449631][T11142] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1933.466735][T11142] usb 2-1: config 0 descriptor?? [ 1936.084563][T12481] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1936.091028][T12481] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1939.084207][T11142] asix 2-1:0.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -110 [ 1939.085740][T11142] asix 2-1:0.0: probe with driver asix failed with error -110 [ 1940.094608][T12481] hsr_slave_0: entered promiscuous mode [ 1940.095640][T12481] hsr_slave_1: entered promiscuous mode [ 1940.100234][T12481] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1940.100447][T12481] Cannot create hsr debugfs directory [ 1941.282435][T12481] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1941.320681][T12481] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1941.335581][T12481] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1941.365822][T12481] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1941.682629][T11779] usb 2-1: USB disconnect, device number 25 [ 1942.462302][T12858] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12858 comm=syz.1.881 [ 1942.995323][ T9528] usb 2-1: new high-speed USB device number 26 using dummy_hcd [ 1943.144302][ T9528] usb 2-1: Using ep0 maxpacket: 16 [ 1943.169530][ T9528] usb 2-1: config 0 interface 0 has no altsetting 0 [ 1943.169952][ T9528] usb 2-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.00 [ 1943.170275][ T9528] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1943.188170][ T9528] usb 2-1: config 0 descriptor?? [ 1943.484577][ T9528] usbhid 2-1:0.0: can't add hid device: -71 [ 1943.485046][ T9528] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 1943.501553][ T9528] usb 2-1: USB disconnect, device number 26 [ 1943.619221][T12481] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1954.930312][T12481] veth0_vlan: entered promiscuous mode [ 1955.022010][T12481] veth1_vlan: entered promiscuous mode [ 1955.279884][T12481] veth0_macvtap: entered promiscuous mode [ 1955.307884][T12481] veth1_macvtap: entered promiscuous mode [ 1955.468535][T12481] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1955.485102][T12481] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1955.488712][T12481] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1955.491263][T12481] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1956.715638][T12947] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1956.716778][T12947] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1966.504077][T12976] netlink: 12 bytes leftover after parsing attributes in process `syz.5.887'. [ 1971.345697][ T7539] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1971.504953][ T7539] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1971.683519][ T7539] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1971.810616][ T7539] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1972.618321][ T7539] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1972.683607][ T7539] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1972.724661][ T7539] bond0 (unregistering): Released all slaves [ 1972.831851][ T7539] hsr_slave_0: left promiscuous mode [ 1972.844718][ T7539] hsr_slave_1: left promiscuous mode [ 1972.881987][ T7539] veth1_macvtap: left promiscuous mode [ 1972.882453][ T7539] veth0_macvtap: left promiscuous mode [ 1972.882996][ T7539] veth1_vlan: left promiscuous mode [ 1972.883164][ T7539] veth0_vlan: left promiscuous mode [ 1978.694149][ T31] audit: type=1400 audit(1979.637:2435): avc: denied { read write } for pid=11907 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1978.712615][ T31] audit: type=1400 audit(1979.657:2436): avc: denied { open } for pid=11907 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1978.715525][ T31] audit: type=1400 audit(1979.657:2437): avc: denied { ioctl } for pid=11907 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2011.337349][T13090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2011.364344][T13090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2014.238111][T13090] hsr_slave_0: entered promiscuous mode [ 2014.245517][T13090] hsr_slave_1: entered promiscuous mode [ 2014.249784][T13090] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2014.250705][T13090] Cannot create hsr debugfs directory [ 2015.708646][T13090] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 2015.739675][T13090] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 2015.816870][T13090] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 2015.878990][T13090] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 2018.091279][T13090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2025.092072][T13503] netlink: 8 bytes leftover after parsing attributes in process `syz.1.900'. [ 2031.570283][T13090] veth0_vlan: entered promiscuous mode [ 2031.639244][T13090] veth1_vlan: entered promiscuous mode [ 2031.908765][T13090] veth0_macvtap: entered promiscuous mode [ 2031.967986][T13090] veth1_macvtap: entered promiscuous mode [ 2032.289919][T13090] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2032.290315][T13090] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2032.304072][T13090] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2032.304477][T13090] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2119.371186][T13592] usb 2-1: new high-speed USB device number 27 using dummy_hcd [ 2119.531079][T13592] usb 2-1: Using ep0 maxpacket: 8 [ 2119.572693][T13592] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2119.582159][T13592] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2119.591280][T13592] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 2119.592702][T13592] usb 2-1: New USB device found, idVendor=04b4, idProduct=0001, bcdDevice= 0.00 [ 2119.602273][T13592] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2119.671178][T13592] usb 2-1: config 0 descriptor?? [ 2120.142289][T13592] cypress 0003:04B4:0001.0004: item fetching failed at offset 3/5 [ 2120.212810][T13592] cypress 0003:04B4:0001.0004: parse failed [ 2120.226891][T13592] cypress 0003:04B4:0001.0004: probe with driver cypress failed with error -22 [ 2120.305341][T13654] usb 2-1: USB disconnect, device number 27 [ 2121.306532][T13681] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2121.312101][T13681] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2123.322309][T13681] hsr_slave_0: entered promiscuous mode [ 2123.334886][T13681] hsr_slave_1: entered promiscuous mode [ 2123.336570][T13681] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2123.337599][T13681] Cannot create hsr debugfs directory [ 2124.541468][T13681] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 2124.546714][T13681] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 2124.556467][T13681] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 2124.564430][T13681] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 2127.692880][T13681] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2142.682137][T13681] veth0_vlan: entered promiscuous mode [ 2142.778904][T13681] veth1_vlan: entered promiscuous mode [ 2143.055720][T13681] veth0_macvtap: entered promiscuous mode [ 2143.096126][T13681] veth1_macvtap: entered promiscuous mode [ 2143.388356][T13681] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2143.388656][T13681] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2143.398351][T13681] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2143.399291][T13681] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2153.916667][ T31] audit: type=1326 audit(2154.867:2438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14125 comm="syz.7.914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2153.919527][ T31] audit: type=1326 audit(2154.867:2439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14125 comm="syz.7.914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2153.943847][ T31] audit: type=1326 audit(2154.877:2440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14125 comm="syz.7.914" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fdb8 code=0x7ffc0000 [ 2153.944265][ T31] audit: type=1326 audit(2154.877:2441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14125 comm="syz.7.914" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fdb8 code=0x7ffc0000 [ 2153.944523][ T31] audit: type=1326 audit(2154.877:2442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14125 comm="syz.7.914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2153.944777][ T31] audit: type=1326 audit(2154.877:2443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14125 comm="syz.7.914" exe="/syz-executor" sig=0 arch=40000028 syscall=332 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2153.945004][ T31] audit: type=1326 audit(2154.877:2444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14125 comm="syz.7.914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2153.945261][ T31] audit: type=1326 audit(2154.877:2445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14125 comm="syz.7.914" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2154.458002][T14129] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2154.461764][T14129] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2157.575987][ T31] audit: type=1400 audit(2158.527:2446): avc: denied { mounton } for pid=14147 comm="syz.7.918" path="/proc/17/cgroup" dev="proc" ino=18680 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 2158.982936][T14160] ptrace attach of "/syz-executor exec"[14161] was attempted by "/syz-executor exec"[14160] [ 2175.154986][ T6716] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2175.274801][ T6716] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2175.407448][ T6716] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2175.504998][ T6716] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2176.486570][ T6716] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2176.509453][ T6716] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2176.524016][ T6716] bond0 (unregistering): Released all slaves [ 2176.674015][ T6716] hsr_slave_0: left promiscuous mode [ 2176.703628][ T6716] hsr_slave_1: left promiscuous mode [ 2176.755065][ T6716] veth1_macvtap: left promiscuous mode [ 2176.755569][ T6716] veth0_macvtap: left promiscuous mode [ 2176.756055][ T6716] veth1_vlan: left promiscuous mode [ 2176.756398][ T6716] veth0_vlan: left promiscuous mode [ 2201.626191][ T31] audit: type=1326 audit(2202.567:2447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14266 comm="syz.7.934" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2201.664374][ T31] audit: type=1326 audit(2202.587:2448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14266 comm="syz.7.934" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2201.671645][ T31] audit: type=1326 audit(2202.607:2449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14266 comm="syz.7.934" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2201.674823][ T31] audit: type=1326 audit(2202.627:2450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14266 comm="syz.7.934" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2203.691754][T14281] SELinux: syz.1.939 (14281) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 2204.384028][ T31] audit: type=1400 audit(2205.327:2451): avc: denied { bind } for pid=14287 comm="syz.7.942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2204.415404][ T31] audit: type=1400 audit(2205.347:2452): avc: denied { write } for pid=14287 comm="syz.7.942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2205.289176][T14297] netlink: 'syz.7.947': attribute type 13 has an invalid length. [ 2206.957193][T14297] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2206.958112][T14297] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2206.960572][T14297] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2206.962151][T14297] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2208.561692][ T31] audit: type=1400 audit(2209.507:2453): avc: denied { setcurrent } for pid=14320 comm="syz.1.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2208.563360][ T31] audit: type=1401 audit(2209.507:2454): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 2208.999838][T14323] netlink: 16 bytes leftover after parsing attributes in process `syz.1.955'. [ 2209.400932][T14327] netlink: 8 bytes leftover after parsing attributes in process `syz.1.956'. [ 2209.401418][T14327] netlink: 4 bytes leftover after parsing attributes in process `syz.1.956'. [ 2209.634717][T14327] wireguard0: entered promiscuous mode [ 2209.635847][T14327] wireguard0: entered allmulticast mode [ 2211.378029][ T31] audit: type=1326 audit(2212.327:2455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14346 comm="syz.7.962" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2211.380622][ T31] audit: type=1326 audit(2212.327:2456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14346 comm="syz.7.962" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2211.426917][ T31] audit: type=1326 audit(2212.337:2457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14346 comm="syz.7.962" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2211.427669][ T31] audit: type=1326 audit(2212.347:2458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14346 comm="syz.7.962" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2211.514717][ T31] audit: type=1326 audit(2212.407:2459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14346 comm="syz.7.962" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2211.515328][ T31] audit: type=1326 audit(2212.407:2460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14346 comm="syz.7.962" exe="/syz-executor" sig=0 arch=40000028 syscall=51 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2211.515786][ T31] audit: type=1326 audit(2212.417:2461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14346 comm="syz.7.962" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2211.516043][ T31] audit: type=1326 audit(2212.417:2462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14346 comm="syz.7.962" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2211.525297][T14346] Process accounting resumed [ 2216.545215][T14378] netlink: 24 bytes leftover after parsing attributes in process `syz.7.969'. [ 2217.005250][T14380] netlink: 8 bytes leftover after parsing attributes in process `syz.7.970'. [ 2217.006617][T14380] netlink: 8 bytes leftover after parsing attributes in process `syz.7.970'. [ 2217.010136][T14380] netlink: 8 bytes leftover after parsing attributes in process `syz.7.970'. [ 2217.793693][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 2217.794142][ T31] audit: type=1400 audit(2218.727:2464): avc: denied { module_request } for pid=14384 comm="syz.7.972" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2218.968440][ T31] audit: type=1400 audit(2219.917:2465): avc: denied { watch } for pid=14396 comm="syz.7.973" path="/44/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 2218.984159][T14397] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 2219.001998][ T31] audit: type=1400 audit(2219.947:2466): avc: denied { relabelto } for pid=14396 comm="syz.7.973" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 2219.005012][ T31] audit: type=1400 audit(2219.947:2467): avc: denied { associate } for pid=14396 comm="syz.7.973" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 2219.286801][ T31] audit: type=1400 audit(2220.237:2468): avc: denied { map } for pid=14398 comm="syz.7.974" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19109 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2219.334995][ T31] audit: type=1400 audit(2220.247:2469): avc: denied { read write } for pid=14398 comm="syz.7.974" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19109 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2219.524314][ T31] audit: type=1400 audit(2220.457:2470): avc: denied { read } for pid=14398 comm="syz.7.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2233.127014][ T31] audit: type=1400 audit(2234.077:2471): avc: denied { remove_name } for pid=14440 comm="syz.7.989" name="file0" dev="cgroup2" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 2234.164124][T14446] netlink: 176 bytes leftover after parsing attributes in process `syz.7.991'. [ 2236.755397][T14457] netdevsim netdevsim7: loading /lib/firmware/. failed with error -22 [ 2236.763886][T14457] netdevsim netdevsim7: Direct firmware load for . failed with error -22 [ 2236.770955][ T31] audit: type=1400 audit(2237.717:2472): avc: denied { firmware_load } for pid=14456 comm="syz.7.996" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2236.775608][T14457] netdevsim netdevsim7: Falling back to sysfs fallback for: . [ 2241.466048][T14474] netdevsim netdevsim7: loading /lib/firmware/. failed with error -22 [ 2241.466569][T14474] netdevsim netdevsim7: Direct firmware load for . failed with error -22 [ 2241.469437][T14474] netdevsim netdevsim7: Falling back to sysfs fallback for: . [ 2244.666273][ T31] audit: type=1326 audit(2245.617:2473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14479 comm="syz.7.1003" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2244.696103][ T31] audit: type=1326 audit(2245.647:2474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14479 comm="syz.7.1003" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2244.698182][ T31] audit: type=1326 audit(2245.647:2475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14479 comm="syz.7.1003" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2244.754258][ T31] audit: type=1326 audit(2245.667:2476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14479 comm="syz.7.1003" exe="/syz-executor" sig=0 arch=40000028 syscall=397 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2244.754716][ T31] audit: type=1326 audit(2245.667:2477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14479 comm="syz.7.1003" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2244.755019][ T31] audit: type=1326 audit(2245.667:2478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14479 comm="syz.7.1003" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2245.291990][ T31] audit: type=1326 audit(2246.237:2479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14486 comm="syz.1.1005" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2245.318781][ T31] audit: type=1326 audit(2246.267:2480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14486 comm="syz.1.1005" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2245.335507][ T31] audit: type=1326 audit(2246.267:2481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14486 comm="syz.1.1005" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2245.360576][ T31] audit: type=1326 audit(2246.307:2482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14486 comm="syz.1.1005" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2250.856624][T14539] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1013'. [ 2252.576085][T14558] pim6reg1: entered promiscuous mode [ 2252.584830][T14558] pim6reg1: entered allmulticast mode [ 2252.873842][T14570] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1019'. [ 2252.875916][T14570] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1019'. [ 2253.263845][T14570] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1019'. [ 2253.264386][T14570] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1019'. [ 2254.073968][T14570] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1019'. [ 2254.078205][T14570] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1019'. [ 2254.407055][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 2254.407450][ T31] audit: type=1326 audit(2255.357:2497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14580 comm="syz.1.1022" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2254.412397][ T31] audit: type=1326 audit(2255.357:2498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14580 comm="syz.1.1022" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2254.417031][ T31] audit: type=1326 audit(2255.367:2499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14580 comm="syz.1.1022" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2254.436489][ T31] audit: type=1326 audit(2255.377:2500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14580 comm="syz.1.1022" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2254.444648][ T31] audit: type=1326 audit(2255.397:2501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14580 comm="syz.1.1022" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2254.451482][ T31] audit: type=1326 audit(2255.397:2502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14580 comm="syz.1.1022" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2254.469262][ T31] audit: type=1326 audit(2255.417:2503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14580 comm="syz.1.1022" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2254.533520][ T31] audit: type=1326 audit(2255.467:2504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14580 comm="syz.1.1022" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2254.535322][ T31] audit: type=1326 audit(2255.467:2505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14580 comm="syz.1.1022" exe="/syz-executor" sig=0 arch=40000028 syscall=325 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2254.537124][ T31] audit: type=1326 audit(2255.467:2506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14580 comm="syz.1.1022" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2256.207208][T14593] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1024'. [ 2259.433498][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 2259.433968][ T31] audit: type=1326 audit(2260.377:2527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14631 comm="syz.7.1032" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2259.451916][ T31] audit: type=1326 audit(2260.397:2528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14631 comm="syz.7.1032" exe="/syz-executor" sig=0 arch=40000028 syscall=220 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2259.593791][ T31] audit: type=1326 audit(2260.537:2529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14631 comm="syz.7.1032" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2259.595944][ T31] audit: type=1326 audit(2260.547:2530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14631 comm="syz.7.1032" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2261.505791][ T31] audit: type=1400 audit(2262.447:2531): avc: denied { create } for pid=14649 comm="syz.1.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2261.535966][ T31] audit: type=1400 audit(2262.487:2532): avc: denied { bind } for pid=14649 comm="syz.1.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2261.609650][ T31] audit: type=1400 audit(2262.547:2533): avc: denied { connect } for pid=14649 comm="syz.1.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2263.183353][ T31] audit: type=1326 audit(2264.127:2534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14668 comm="syz.7.1044" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2263.184859][ T31] audit: type=1326 audit(2264.127:2535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14668 comm="syz.7.1044" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2263.213555][ T31] audit: type=1326 audit(2264.157:2536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14668 comm="syz.7.1044" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2263.952548][T14678] netlink: 'syz.1.1047': attribute type 10 has an invalid length. [ 2263.969226][T14678] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1047'. [ 2263.970217][T14678] vxcan0: entered promiscuous mode [ 2263.992010][T14678] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 2264.891938][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 2264.892396][ T31] audit: type=1400 audit(2265.837:2551): avc: denied { bind } for pid=14688 comm="syz.1.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2264.949734][ T31] audit: type=1400 audit(2265.897:2552): avc: denied { setopt } for pid=14688 comm="syz.1.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2266.122574][ T31] audit: type=1326 audit(2267.057:2553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14695 comm="syz.1.1053" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2266.123031][ T31] audit: type=1326 audit(2267.057:2554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14695 comm="syz.1.1053" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2266.128687][ T31] audit: type=1326 audit(2267.077:2555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14695 comm="syz.1.1053" exe="/syz-executor" sig=0 arch=40000028 syscall=155 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2266.128872][ T31] audit: type=1326 audit(2267.077:2556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14695 comm="syz.1.1053" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2266.129212][ T31] audit: type=1326 audit(2267.077:2557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14695 comm="syz.1.1053" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2267.246426][ T31] audit: type=1400 audit(2268.197:2558): avc: denied { read } for pid=14708 comm="syz.1.1057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2270.453836][ T31] audit: type=1326 audit(2271.397:2559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.1.1059" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2270.454254][ T31] audit: type=1326 audit(2271.397:2560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.1.1059" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2270.471028][ T31] audit: type=1326 audit(2271.407:2561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.1.1059" exe="/syz-executor" sig=0 arch=40000028 syscall=346 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2270.497213][ T31] audit: type=1326 audit(2271.417:2562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.1.1059" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2270.532252][ T31] audit: type=1326 audit(2271.417:2563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.1.1059" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2270.549360][ T31] audit: type=1326 audit(2271.437:2564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.1.1059" exe="/syz-executor" sig=0 arch=40000028 syscall=301 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2270.550984][ T31] audit: type=1326 audit(2271.437:2565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.1.1059" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2270.552411][ T31] audit: type=1326 audit(2271.447:2566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.1.1059" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2270.571368][ T31] audit: type=1326 audit(2271.447:2567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.1.1059" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2270.581724][ T31] audit: type=1326 audit(2271.447:2568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14723 comm="syz.1.1059" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2271.244510][T14728] netlink: 116 bytes leftover after parsing attributes in process `syz.1.1060'. [ 2275.934614][T14754] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1069'. [ 2275.935321][T14754] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1069'. [ 2276.197400][T14754] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1069'. [ 2276.197925][T14754] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1069'. [ 2276.659389][T14754] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1069'. [ 2276.659896][T14754] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1069'. [ 2281.389355][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 2281.389740][ T31] audit: type=1400 audit(2282.337:2593): avc: denied { write } for pid=14784 comm="syz.1.1080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2281.949109][T14787] smc: net device bond0 applied user defined pnetid SYZ2 [ 2281.954660][T14787] smc: net device bond0 erased user defined pnetid SYZ2 [ 2282.626440][T14791] SELinux: Context Ü is not valid (left unmapped). [ 2284.266132][ T7539] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2284.360286][ T7539] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2284.456888][ T7539] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2284.598624][ T7539] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2285.167388][ T7539] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2285.220171][ T7539] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2285.239602][ T7539] bond0 (unregistering): Released all slaves [ 2285.376128][ T7539] hsr_slave_0: left promiscuous mode [ 2285.388270][ T7539] hsr_slave_1: left promiscuous mode [ 2285.408830][ T7539] veth1_macvtap: left promiscuous mode [ 2285.409354][ T7539] veth0_macvtap: left promiscuous mode [ 2285.409584][ T7539] veth1_vlan: left promiscuous mode [ 2285.409770][ T7539] veth0_vlan: left promiscuous mode [ 2288.058833][T14842] netlink: 'syz.1.1087': attribute type 3 has an invalid length. [ 2293.482515][T14869] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1093'. [ 2294.771703][ T31] audit: type=1400 audit(2295.717:2594): avc: denied { watch_reads } for pid=14884 comm="syz.1.1097" path="/120" dev="tmpfs" ino=622 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2297.405495][ T31] audit: type=1326 audit(2298.357:2595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14906 comm="syz.1.1102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2297.406074][ T31] audit: type=1326 audit(2298.357:2596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14906 comm="syz.1.1102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2297.406292][ T31] audit: type=1326 audit(2298.357:2597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14906 comm="syz.1.1102" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2297.410226][ T31] audit: type=1326 audit(2298.357:2598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14906 comm="syz.1.1102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2297.410954][ T31] audit: type=1326 audit(2298.357:2599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14906 comm="syz.1.1102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2297.411096][ T31] audit: type=1326 audit(2298.357:2600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14906 comm="syz.1.1102" exe="/syz-executor" sig=0 arch=40000028 syscall=187 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2297.411235][ T31] audit: type=1326 audit(2298.357:2601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14906 comm="syz.1.1102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2297.434006][ T31] audit: type=1326 audit(2298.367:2602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14906 comm="syz.1.1102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2299.181359][T14924] wireguard0: left promiscuous mode [ 2299.182130][T14924] wireguard0: left allmulticast mode [ 2302.851088][T14947] netlink: 'syz.1.1110': attribute type 21 has an invalid length. [ 2302.854002][T14947] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1110'. [ 2302.875821][T14947] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1110'. [ 2303.327703][ T31] audit: type=1326 audit(2304.277:2603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.1.1111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2303.337944][ T31] audit: type=1326 audit(2304.287:2604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.1.1111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2303.357008][ T31] audit: type=1326 audit(2304.307:2605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.1.1111" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2303.359736][ T31] audit: type=1326 audit(2304.307:2606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.1.1111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2303.367878][ T31] audit: type=1326 audit(2304.317:2607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.1.1111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2303.368002][ T31] audit: type=1326 audit(2304.317:2608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.1.1111" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2303.368047][ T31] audit: type=1326 audit(2304.317:2609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.1.1111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2303.378958][ T31] audit: type=1326 audit(2304.327:2610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.1.1111" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2303.379090][ T31] audit: type=1326 audit(2304.327:2611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.1.1111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2303.380694][ T31] audit: type=1326 audit(2304.327:2612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14949 comm="syz.1.1111" exe="/syz-executor" sig=0 arch=40000028 syscall=337 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2308.514928][T14978] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1119'. [ 2309.531255][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2309.531466][ T31] audit: type=1326 audit(2310.477:2623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14988 comm="syz.1.1122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2309.561472][ T31] audit: type=1326 audit(2310.497:2624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14988 comm="syz.1.1122" exe="/syz-executor" sig=0 arch=40000028 syscall=185 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2309.562360][ T31] audit: type=1326 audit(2310.507:2625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14988 comm="syz.1.1122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2309.576049][ T31] audit: type=1326 audit(2310.527:2626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14988 comm="syz.1.1122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2310.030956][ T31] audit: type=1400 audit(2310.977:2627): avc: denied { getopt } for pid=14994 comm="syz.1.1124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2313.180861][T15013] SELinux: Context system_u:object_r:scsi_generic_device_t:s0 is not valid (left unmapped). [ 2313.182167][ T31] audit: type=1400 audit(2314.127:2628): avc: denied { relabelto } for pid=15009 comm="syz.1.1128" name="cgroup.procs" dev="cgroup" ino=43 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2313.202745][ T31] audit: type=1400 audit(2314.147:2629): avc: denied { associate } for pid=15009 comm="syz.1.1128" name="cgroup.procs" dev="cgroup" ino=43 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2314.556058][ T31] audit: type=1326 audit(2315.497:2630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15028 comm="syz.1.1132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2314.556542][ T31] audit: type=1326 audit(2315.507:2631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15028 comm="syz.1.1132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2314.556819][ T31] audit: type=1326 audit(2315.507:2632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15028 comm="syz.1.1132" exe="/syz-executor" sig=0 arch=40000028 syscall=358 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2314.557120][ T31] audit: type=1326 audit(2315.507:2633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15028 comm="syz.1.1132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2314.557378][ T31] audit: type=1326 audit(2315.507:2634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15028 comm="syz.1.1132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2315.401467][T15038] pim6reg: entered allmulticast mode [ 2315.409979][T15038] pim6reg: left allmulticast mode [ 2318.791983][T15005] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2318.817505][T15005] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2321.709340][T15005] hsr_slave_0: entered promiscuous mode [ 2321.721446][T15005] hsr_slave_1: entered promiscuous mode [ 2321.738014][T15005] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2321.739092][T15005] Cannot create hsr debugfs directory [ 2323.188519][T15005] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 2323.218970][T15005] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 2323.236022][T15005] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 2323.309273][T15005] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 2325.764912][T15005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2337.122898][T15005] veth0_vlan: entered promiscuous mode [ 2337.302102][T15005] veth1_vlan: entered promiscuous mode [ 2337.502966][T15005] veth0_macvtap: entered promiscuous mode [ 2337.622552][T15005] veth1_macvtap: entered promiscuous mode [ 2337.911036][T15005] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2337.912493][T15005] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2337.930279][T15005] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2337.931338][T15005] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2338.192881][ T31] audit: type=1400 audit(2339.137:2635): avc: denied { mounton } for pid=15005 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2338.617815][T15491] ªªªªª: renamed from vlan1 (while UP) [ 2365.162485][T15582] netlink: 100 bytes leftover after parsing attributes in process `syz.6.1150'. [ 2366.441600][T15591] SELinux: failed to load policy [ 2366.756728][ T31] audit: type=1326 audit(2367.707:2636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.6.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2366.758313][ T31] audit: type=1326 audit(2367.707:2637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.6.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2366.779371][ T31] audit: type=1326 audit(2367.707:2638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.6.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2366.781868][ T31] audit: type=1326 audit(2367.727:2639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.6.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2366.783844][ T31] audit: type=1326 audit(2367.727:2640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.6.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2366.786562][ T31] audit: type=1326 audit(2367.737:2641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.6.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2366.788330][ T31] audit: type=1326 audit(2367.737:2642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.6.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2366.798101][ T31] audit: type=1326 audit(2367.747:2643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.6.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=165 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2366.800299][ T31] audit: type=1326 audit(2367.747:2644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15593 comm="syz.6.1154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2370.395270][ T31] audit: type=1326 audit(2371.347:2645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15605 comm="syz.6.1158" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2377.542002][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 2377.543671][ T31] audit: type=1326 audit(2378.487:2654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.6.1168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2377.544038][ T31] audit: type=1326 audit(2378.487:2655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.6.1168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2377.644502][ T31] audit: type=1326 audit(2378.587:2656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.6.1168" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2377.645173][ T31] audit: type=1326 audit(2378.587:2657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.6.1168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2377.645491][ T31] audit: type=1326 audit(2378.587:2658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.6.1168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2377.658038][ T31] audit: type=1326 audit(2378.607:2659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.6.1168" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2377.658429][ T31] audit: type=1326 audit(2378.607:2660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.6.1168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2377.658526][ T31] audit: type=1326 audit(2378.607:2661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.6.1168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2377.709216][ T31] audit: type=1326 audit(2378.657:2662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.6.1168" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2377.709921][ T31] audit: type=1326 audit(2378.657:2663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15654 comm="syz.6.1168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2384.235571][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 2384.235977][ T31] audit: type=1400 audit(2385.187:2668): avc: denied { setopt } for pid=15671 comm="syz.6.1174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2386.562525][ T31] audit: type=1400 audit(2387.507:2669): avc: denied { lock } for pid=15682 comm="syz.6.1179" path="socket:[20109]" dev="sockfs" ino=20109 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 2392.071868][T15706] netdevsim netdevsim6: Direct firmware load for @ failed with error -2 [ 2392.072231][T15706] netdevsim netdevsim6: Falling back to sysfs fallback for: @ [ 2395.111905][T15717] pimreg: entered allmulticast mode [ 2395.133585][T15717] pimreg: left allmulticast mode [ 2395.506386][ T31] audit: type=1326 audit(2396.447:2670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15724 comm="syz.6.1191" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2395.506937][ T31] audit: type=1326 audit(2396.457:2671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15724 comm="syz.6.1191" exe="/syz-executor" sig=0 arch=40000028 syscall=372 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2395.541343][ T31] audit: type=1326 audit(2652.488:2672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15724 comm="syz.6.1191" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2395.543831][ T31] audit: type=1326 audit(2652.488:2673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15724 comm="syz.6.1191" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2396.036044][T15733] netlink: 'syz.6.1192': attribute type 2 has an invalid length. [ 2399.617500][T15710] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2399.630209][T15710] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2402.696484][T15710] hsr_slave_0: entered promiscuous mode [ 2402.705134][T15710] hsr_slave_1: entered promiscuous mode [ 2402.707311][T15710] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2402.708281][T15710] Cannot create hsr debugfs directory [ 2404.116647][T15710] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 2404.166454][T15710] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 2404.196174][T15710] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 2404.229205][T15710] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 2406.769848][T15710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2410.111171][T16115] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 2418.336006][T16166] ======================================================= [ 2418.336006][T16166] WARNING: The mand mount option has been deprecated and [ 2418.336006][T16166] and is ignored by this kernel. Remove the mand [ 2418.336006][T16166] option from the mount to silence this warning. [ 2418.336006][T16166] ======================================================= [ 2418.358596][T16166] cgroup: Unknown subsys name 'hugetlb' [ 2419.401878][T15710] veth0_vlan: entered promiscuous mode [ 2419.562211][T15710] veth1_vlan: entered promiscuous mode [ 2419.866815][T15710] veth0_macvtap: entered promiscuous mode [ 2419.923700][T15710] veth1_macvtap: entered promiscuous mode [ 2420.167605][T15710] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2420.167973][T15710] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2420.168064][T15710] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2420.168185][T15710] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2435.273738][ T31] audit: type=1326 audit(2692.208:2674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16225 comm="syz.8.1210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2435.341463][ T31] audit: type=1326 audit(2692.258:2675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16225 comm="syz.8.1210" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2435.341995][ T31] audit: type=1326 audit(2692.258:2676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16225 comm="syz.8.1210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2435.342229][ T31] audit: type=1326 audit(2692.258:2677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16225 comm="syz.8.1210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2435.342317][ T31] audit: type=1326 audit(2692.258:2678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16225 comm="syz.8.1210" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2435.342396][ T31] audit: type=1326 audit(2692.258:2679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16225 comm="syz.8.1210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2435.342823][ T31] audit: type=1326 audit(2692.258:2680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16225 comm="syz.8.1210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2435.342910][ T31] audit: type=1326 audit(2692.258:2681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16225 comm="syz.8.1210" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2435.342988][ T31] audit: type=1326 audit(2692.268:2682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16225 comm="syz.8.1210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2435.343161][ T31] audit: type=1326 audit(2692.268:2683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16225 comm="syz.8.1210" exe="/syz-executor" sig=0 arch=40000028 syscall=150 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2438.614067][T16234] netlink: 24 bytes leftover after parsing attributes in process `syz.8.1211'. [ 2447.412521][T16280] mmap: syz.6.1222 (16280) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 2448.071013][ T31] audit: type=1326 audit(2705.018:2684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16282 comm="syz.6.1223" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2448.071695][ T31] audit: type=1326 audit(2705.018:2685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16282 comm="syz.6.1223" exe="/syz-executor" sig=0 arch=40000028 syscall=387 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2448.072473][ T31] audit: type=1326 audit(2705.018:2686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16282 comm="syz.6.1223" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2450.617000][T16304] veth0: entered allmulticast mode [ 2451.865324][T16313] netlink: 12 bytes leftover after parsing attributes in process `syz.6.1228'. [ 2451.874407][T16313] netlink: 28 bytes leftover after parsing attributes in process `syz.6.1228'. [ 2452.569561][T16325] netlink: 4568 bytes leftover after parsing attributes in process `syz.6.1231'. [ 2453.921375][T16338] random: crng reseeded on system resumption [ 2454.402931][T16342] netlink: 'syz.8.1236': attribute type 10 has an invalid length. [ 2454.411984][T16342] macvtap0: entered allmulticast mode [ 2454.412420][T16342] veth0_macvtap: entered allmulticast mode [ 2456.241160][ T31] audit: type=1326 audit(2713.188:2687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.8.1241" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2456.241721][ T31] audit: type=1326 audit(2713.188:2688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.8.1241" exe="/syz-executor" sig=0 arch=40000028 syscall=365 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2456.241822][ T31] audit: type=1326 audit(2713.188:2689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.8.1241" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2456.241915][ T31] audit: type=1326 audit(2713.188:2690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.8.1241" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2456.262088][ T31] audit: type=1326 audit(2713.208:2691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.8.1241" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2456.270465][ T31] audit: type=1326 audit(2713.218:2692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.8.1241" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2456.271126][ T31] audit: type=1326 audit(2713.218:2693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.8.1241" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2456.271435][ T31] audit: type=1326 audit(2713.218:2694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.8.1241" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2456.376243][ T31] audit: type=1326 audit(2713.308:2695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.8.1241" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2456.376763][ T31] audit: type=1326 audit(2713.318:2696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.8.1241" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2456.880942][T16369] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1243'. [ 2456.946637][T16369] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1243'. [ 2466.886243][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 2466.886746][ T31] audit: type=1326 audit(2723.808:2706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16443 comm="syz.6.1269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2466.915796][ T31] audit: type=1326 audit(2723.858:2707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16443 comm="syz.6.1269" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2466.922377][ T31] audit: type=1326 audit(2723.868:2708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16443 comm="syz.6.1269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2466.927163][ T31] audit: type=1326 audit(2723.868:2709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16443 comm="syz.6.1269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2466.947606][ T31] audit: type=1326 audit(2723.898:2710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16443 comm="syz.6.1269" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2466.956886][ T31] audit: type=1326 audit(2723.908:2711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16443 comm="syz.6.1269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2466.966746][ T31] audit: type=1326 audit(2723.908:2712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16443 comm="syz.6.1269" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2466.977610][ T31] audit: type=1326 audit(2723.928:2713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16443 comm="syz.6.1269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2466.984789][ T31] audit: type=1326 audit(2723.938:2714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16443 comm="syz.6.1269" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2466.989661][ T31] audit: type=1326 audit(2723.938:2715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16443 comm="syz.6.1269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2470.706020][T16476] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 2473.004227][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 2473.005514][ T31] audit: type=1326 audit(2729.948:2725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16494 comm="syz.8.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2473.007715][ T31] audit: type=1326 audit(2729.948:2726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16494 comm="syz.8.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2473.172038][ T31] audit: type=1326 audit(2730.118:2727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16494 comm="syz.8.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2473.221911][ T31] audit: type=1326 audit(2730.118:2728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16494 comm="syz.8.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2473.222506][ T31] audit: type=1326 audit(2730.118:2729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16494 comm="syz.8.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2473.223636][ T31] audit: type=1326 audit(2730.148:2730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16494 comm="syz.8.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=21 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2473.223789][ T31] audit: type=1326 audit(2730.158:2731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16494 comm="syz.8.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2473.223871][ T31] audit: type=1326 audit(2730.158:2732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16494 comm="syz.8.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2473.223973][ T31] audit: type=1326 audit(2730.158:2733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16494 comm="syz.8.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=61 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2473.224059][ T31] audit: type=1326 audit(2730.158:2734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16494 comm="syz.8.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2473.998365][ T7539] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2474.135250][ T7539] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2474.314372][ T7539] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2474.517112][ T7539] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2475.725030][ T7539] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2475.785769][ T7539] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2475.815097][ T7539] bond0 (unregistering): Released all slaves [ 2476.002876][ T7539] hsr_slave_0: left promiscuous mode [ 2476.045617][ T7539] hsr_slave_1: left promiscuous mode [ 2476.084780][ T7539] veth1_macvtap: left promiscuous mode [ 2476.094291][ T7539] veth0_macvtap: left allmulticast mode [ 2476.095947][ T7539] veth0_macvtap: left promiscuous mode [ 2476.097195][ T7539] veth1_vlan: left promiscuous mode [ 2476.098266][ T7539] veth0_vlan: left promiscuous mode [ 2478.752045][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 2478.752544][ T31] audit: type=1326 audit(2735.698:2741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16539 comm="syz.6.1295" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2478.772621][ T31] audit: type=1326 audit(2735.718:2742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16539 comm="syz.6.1295" exe="/syz-executor" sig=0 arch=40000028 syscall=103 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2478.773739][ T31] audit: type=1326 audit(2735.718:2743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16539 comm="syz.6.1295" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2482.485656][T16685] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 2482.487682][T16685] SELinux: failed to load policy [ 2484.750512][T16506] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2484.771690][T16506] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2489.062821][T16824] netlink: 68 bytes leftover after parsing attributes in process `syz.6.1310'. [ 2489.117383][T16506] hsr_slave_0: entered promiscuous mode [ 2489.135404][T16506] hsr_slave_1: entered promiscuous mode [ 2489.137245][T16506] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2489.138074][T16506] Cannot create hsr debugfs directory [ 2491.198137][T16506] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 2491.208640][T16506] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 2491.296442][T16506] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 2491.311005][T16506] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 2491.484435][T16915] syzkaller0: entered promiscuous mode [ 2491.487619][T16915] syzkaller0: entered allmulticast mode [ 2499.078364][T16959] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2499.266896][T16959] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2499.504931][T16959] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2499.605485][T16506] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2499.637667][T16959] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2500.082042][T16959] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2500.246002][T16959] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2500.326934][T16959] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2500.398265][T16959] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2513.298015][T16506] veth0_vlan: entered promiscuous mode [ 2513.328827][T16506] veth1_vlan: entered promiscuous mode [ 2513.479656][T16506] veth0_macvtap: entered promiscuous mode [ 2513.568241][T16506] veth1_macvtap: entered promiscuous mode [ 2513.846543][T16506] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2513.847742][T16506] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2513.863952][T16506] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2513.869386][T16506] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2515.003145][ T31] audit: type=1326 audit(2771.948:2744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17080 comm="syz.9.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2515.011486][ T31] audit: type=1326 audit(2771.948:2745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17080 comm="syz.9.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2515.011717][ T31] audit: type=1326 audit(2771.948:2746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17080 comm="syz.9.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2515.017936][ T31] audit: type=1326 audit(2771.968:2747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17080 comm="syz.9.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2515.020078][ T31] audit: type=1326 audit(2771.968:2748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17080 comm="syz.9.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2515.020423][ T31] audit: type=1326 audit(2771.968:2749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17080 comm="syz.9.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2515.023055][ T31] audit: type=1326 audit(2771.968:2750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17080 comm="syz.9.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2515.074176][ T31] audit: type=1326 audit(2772.018:2751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17080 comm="syz.9.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2515.112364][ T31] audit: type=1326 audit(2772.038:2752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17080 comm="syz.9.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2515.173552][ T31] audit: type=1326 audit(2772.068:2753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17080 comm="syz.9.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2516.776579][T17102] bond_slave_0: entered promiscuous mode [ 2516.776969][T17102] bond_slave_1: entered promiscuous mode [ 2516.785228][T17102] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 2516.884670][T17102] bond_slave_0: left promiscuous mode [ 2516.884953][T17102] bond_slave_1: left promiscuous mode [ 2520.186095][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 2520.186493][ T31] audit: type=1326 audit(2777.138:2759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17133 comm="syz.9.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2520.191496][ T31] audit: type=1326 audit(2777.138:2760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17133 comm="syz.9.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2520.204090][ T31] audit: type=1326 audit(2777.148:2761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17133 comm="syz.9.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2520.232336][ T31] audit: type=1326 audit(2777.178:2762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17133 comm="syz.9.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2520.258744][ T31] audit: type=1326 audit(2777.178:2763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17133 comm="syz.9.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2520.260530][ T31] audit: type=1326 audit(2777.178:2764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17133 comm="syz.9.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2520.262493][ T31] audit: type=1326 audit(2777.198:2765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17133 comm="syz.9.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=282 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2520.271954][ T31] audit: type=1326 audit(2777.198:2766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17133 comm="syz.9.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2520.276283][ T31] audit: type=1326 audit(2777.228:2767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17133 comm="syz.9.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2520.327831][ T31] audit: type=1326 audit(2777.278:2768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17133 comm="syz.9.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x13467c code=0x7ffc0000 [ 2525.304293][T17179] SELinux: failed to load policy [ 2525.851636][T17184] random: crng reseeded on system resumption [ 2529.010580][T17217] netlink: 28 bytes leftover after parsing attributes in process `syz.9.1358'. [ 2529.966745][T17227] netlink: 28 bytes leftover after parsing attributes in process `syz.9.1360'. [ 2529.968364][T17227] netlink: 28 bytes leftover after parsing attributes in process `syz.9.1360'. [ 2530.894737][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 2530.895872][ T31] audit: type=1326 audit(2787.848:2789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17233 comm="syz.9.1362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2530.911956][ T31] audit: type=1326 audit(2787.858:2790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17233 comm="syz.9.1362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2530.915606][ T31] audit: type=1326 audit(2787.858:2791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17233 comm="syz.9.1362" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2530.917573][ T31] audit: type=1326 audit(2787.858:2792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17233 comm="syz.9.1362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2530.930575][ T31] audit: type=1326 audit(2787.878:2793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17233 comm="syz.9.1362" exe="/syz-executor" sig=0 arch=40000028 syscall=286 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2530.934724][ T31] audit: type=1326 audit(2787.888:2794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17233 comm="syz.9.1362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2531.044071][ T31] audit: type=1326 audit(2787.978:2795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17233 comm="syz.9.1362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2531.385833][ T31] audit: type=1326 audit(2788.338:2796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17237 comm="syz.9.1363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2531.416733][ T31] audit: type=1326 audit(2788.358:2797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17237 comm="syz.9.1363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2531.417282][ T31] audit: type=1326 audit(2788.358:2798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17237 comm="syz.9.1363" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2533.405233][T17255] netlink: 3 bytes leftover after parsing attributes in process `syz.9.1366'. [ 2533.405912][T17255] 0ªX¹¦À: renamed from veth0 (while UP) [ 2533.474776][T17255] 0ªX¹¦À: entered allmulticast mode [ 2533.476370][T17255] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 2533.981344][T17259] netlink: 268 bytes leftover after parsing attributes in process `syz.9.1367'. [ 2539.472730][T17309] netlink: 8 bytes leftover after parsing attributes in process `syz.9.1378'. [ 2539.556910][T17309] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2539.819249][T17309] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2539.878557][T17314] netlink: 'syz.6.1377': attribute type 3 has an invalid length. [ 2539.957928][T17309] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2540.386644][T17309] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2540.586766][T17309] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2540.684335][T17309] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2540.692867][T17309] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2540.769802][T17309] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2541.467759][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 2541.469019][ T31] audit: type=1326 audit(2798.418:2846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17344 comm="syz.6.1383" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2541.470834][ T31] audit: type=1326 audit(2798.418:2847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17344 comm="syz.6.1383" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2541.484238][ T31] audit: type=1326 audit(2798.418:2848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17344 comm="syz.6.1383" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2541.486327][ T31] audit: type=1326 audit(2798.418:2849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17344 comm="syz.6.1383" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2541.488100][ T31] audit: type=1326 audit(2798.438:2850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17344 comm="syz.6.1383" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2541.490072][ T31] audit: type=1326 audit(2798.438:2851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17344 comm="syz.6.1383" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2541.495981][ T31] audit: type=1326 audit(2798.438:2852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17344 comm="syz.6.1383" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2541.497669][ T31] audit: type=1326 audit(2798.438:2853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17344 comm="syz.6.1383" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2541.578126][ T31] audit: type=1326 audit(2798.498:2854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17344 comm="syz.6.1383" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2541.578711][ T31] audit: type=1326 audit(2798.498:2855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17344 comm="syz.6.1383" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2543.452087][T17370] Illegal XDP return value 1618903762 on prog (id 727) dev syz_tun, expect packet loss! [ 2545.336536][ T6716] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2545.368499][T17397] netlink: 'syz.9.1395': attribute type 3 has an invalid length. [ 2545.462410][ T6716] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2545.597362][ T6716] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2545.719932][ T6716] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2546.474889][ T6716] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2546.522639][ T6716] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2546.535116][ T6716] bond0 (unregistering): Released all slaves [ 2546.760680][ T6716] hsr_slave_0: left promiscuous mode [ 2546.764700][ T6716] hsr_slave_1: left promiscuous mode [ 2546.794957][ T6716] veth1_macvtap: left promiscuous mode [ 2546.796129][ T6716] veth0_macvtap: left promiscuous mode [ 2548.618329][T17440] syzkaller0: entered promiscuous mode [ 2548.618765][T17440] syzkaller0: entered allmulticast mode [ 2550.155791][T17460] vlan0: entered promiscuous mode [ 2551.428309][T17470] vlan0: left promiscuous mode [ 2554.317620][T17454] netlink: 12 bytes leftover after parsing attributes in process `syz.9.1404'. [ 2560.249189][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 2560.250312][ T31] audit: type=1326 audit(2817.198:2862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.9.1424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2560.293892][ T31] audit: type=1326 audit(2817.228:2863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.9.1424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2560.300099][ T31] audit: type=1326 audit(2817.248:2864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.9.1424" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fdb8 code=0x7ffc0000 [ 2560.305681][ T31] audit: type=1326 audit(2817.248:2865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.9.1424" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fdb8 code=0x7ffc0000 [ 2560.307228][ T31] audit: type=1326 audit(2817.248:2866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.9.1424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2560.310433][ T31] audit: type=1326 audit(2817.258:2867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.9.1424" exe="/syz-executor" sig=0 arch=40000028 syscall=329 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2560.337704][ T31] audit: type=1326 audit(2817.268:2868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17548 comm="syz.9.1424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2564.266880][ T31] audit: type=1326 audit(2821.218:2869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17594 comm="syz.6.1434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2564.274508][ T31] audit: type=1326 audit(2821.218:2870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17594 comm="syz.6.1434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2564.340436][ T31] audit: type=1326 audit(2821.288:2871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17594 comm="syz.6.1434" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2565.315442][T17604] pim6reg1: entered promiscuous mode [ 2565.317194][T17604] pim6reg1: entered allmulticast mode [ 2566.716740][T17624] netlink: 52 bytes leftover after parsing attributes in process `syz.9.1440'. [ 2567.434239][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2567.434598][ T31] audit: type=1326 audit(2824.378:2882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17628 comm="syz.6.1443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2567.472833][ T31] audit: type=1326 audit(2824.418:2883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17628 comm="syz.6.1443" exe="/syz-executor" sig=0 arch=40000028 syscall=51 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2567.523495][ T31] audit: type=1326 audit(2824.418:2884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17628 comm="syz.6.1443" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2570.020499][ T31] audit: type=1326 audit(2826.958:2885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17632 comm="syz.9.1444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7fc00000 [ 2574.371221][ T31] audit: type=1326 audit(2831.318:2886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17705 comm="syz.9.1465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2574.438102][ T31] audit: type=1326 audit(2831.338:2887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17705 comm="syz.9.1465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2574.438791][ T31] audit: type=1326 audit(2831.368:2888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17705 comm="syz.9.1465" exe="/syz-executor" sig=0 arch=40000028 syscall=376 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2574.439064][ T31] audit: type=1326 audit(2831.368:2889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17705 comm="syz.9.1465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2574.439303][ T31] audit: type=1326 audit(2831.368:2890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17705 comm="syz.9.1465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2574.439444][ T31] audit: type=1326 audit(2831.368:2891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17705 comm="syz.9.1465" exe="/syz-executor" sig=0 arch=40000028 syscall=218 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2574.439594][ T31] audit: type=1326 audit(2831.388:2892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17705 comm="syz.9.1465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2574.439699][ T31] audit: type=1326 audit(2831.388:2893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17705 comm="syz.9.1465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2575.169745][ T31] audit: type=1326 audit(2832.118:2894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17718 comm="syz.9.1469" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2575.198655][ T31] audit: type=1326 audit(2832.138:2895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17718 comm="syz.9.1469" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2580.996452][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 2580.996887][ T31] audit: type=1326 audit(2837.948:2920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17767 comm="syz.9.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2581.060164][ T31] audit: type=1326 audit(2838.008:2921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17767 comm="syz.9.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2581.109743][ T31] audit: type=1326 audit(2838.058:2922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17767 comm="syz.9.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2581.111195][ T31] audit: type=1326 audit(2838.058:2923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17767 comm="syz.9.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2581.111296][ T31] audit: type=1326 audit(2838.058:2924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17767 comm="syz.9.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2581.184139][ T31] audit: type=1326 audit(2838.118:2925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17767 comm="syz.9.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2581.190631][ T31] audit: type=1326 audit(2838.138:2926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17767 comm="syz.9.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2581.191078][ T31] audit: type=1326 audit(2838.138:2927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17767 comm="syz.9.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2581.219722][ T31] audit: type=1326 audit(2838.148:2928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17767 comm="syz.9.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2581.304276][ T31] audit: type=1326 audit(2838.258:2929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17767 comm="syz.9.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2584.649533][T17815] netlink: 3 bytes leftover after parsing attributes in process `syz.6.1491'. [ 2585.910530][T17828] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1494'. [ 2585.914468][T17828] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1494'. [ 2587.544292][T17844] netlink: 24 bytes leftover after parsing attributes in process `syz.9.1499'. [ 2588.689506][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 2588.689783][ T31] audit: type=1326 audit(2845.638:2949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17862 comm="syz.9.1505" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2588.691577][ T31] audit: type=1326 audit(2845.638:2950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17862 comm="syz.9.1505" exe="/syz-executor" sig=0 arch=40000028 syscall=301 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2588.692576][ T31] audit: type=1326 audit(2845.638:2951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17862 comm="syz.9.1505" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2588.695421][ T31] audit: type=1326 audit(2845.648:2952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17862 comm="syz.9.1505" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2588.696764][ T31] audit: type=1326 audit(2845.648:2953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17862 comm="syz.9.1505" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2588.697504][ T31] audit: type=1326 audit(2845.648:2954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17862 comm="syz.9.1505" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2589.407082][T17872] netlink: 404 bytes leftover after parsing attributes in process `syz.6.1507'. [ 2598.987117][ T31] audit: type=1326 audit(2855.928:2955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17916 comm="syz.6.1516" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2598.989438][ T31] audit: type=1326 audit(2855.938:2956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17916 comm="syz.6.1516" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2599.091442][ T31] audit: type=1326 audit(2856.038:2957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17916 comm="syz.6.1516" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2599.099738][ T31] audit: type=1326 audit(2856.038:2958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17916 comm="syz.6.1516" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2599.104035][ T31] audit: type=1326 audit(2856.048:2959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17916 comm="syz.6.1516" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2599.109573][ T31] audit: type=1326 audit(2856.048:2960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17916 comm="syz.6.1516" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2599.195521][ T31] audit: type=1326 audit(2856.048:2961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17916 comm="syz.6.1516" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2599.196077][ T31] audit: type=1326 audit(2856.108:2962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17916 comm="syz.6.1516" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2599.196219][ T31] audit: type=1326 audit(2856.118:2963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17916 comm="syz.6.1516" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2599.196329][ T31] audit: type=1326 audit(2856.118:2964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17916 comm="syz.6.1516" exe="/syz-executor" sig=0 arch=40000028 syscall=287 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2602.042253][T17936] netlink: 48 bytes leftover after parsing attributes in process `syz.6.1523'. [ 2604.077200][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 2604.077744][ T31] audit: type=1400 audit(2861.028:2980): avc: denied { create } for pid=17947 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2604.084950][ T31] audit: type=1400 audit(2861.038:2981): avc: denied { write } for pid=17947 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2604.087913][ T31] audit: type=1400 audit(2861.038:2982): avc: denied { read } for pid=17947 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2604.142289][ T31] audit: type=1400 audit(2861.088:2983): avc: denied { read } for pid=17947 comm="+}[@" dev="nsfs" ino=4026532957 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2604.145398][ T31] audit: type=1400 audit(2861.088:2984): avc: denied { open } for pid=17947 comm="+}[@" path="net:[4026532957]" dev="nsfs" ino=4026532957 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2604.178042][ T31] audit: type=1400 audit(2861.128:2985): avc: denied { write } for pid=17947 comm="+}[@" name="virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2604.178608][ T31] audit: type=1400 audit(2861.128:2986): avc: denied { open } for pid=17947 comm="+}[@" path="/dev/virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2604.249303][ T31] audit: type=1400 audit(2861.198:2987): avc: denied { ioctl } for pid=17947 comm="+}[@" path="/dev/virtual_nci" dev="devtmpfs" ino=658 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2604.300017][T17948] netlink: '+}[@': attribute type 17 has an invalid length. [ 2604.311194][ T31] audit: type=1400 audit(2861.258:2988): avc: denied { execmem } for pid=17947 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2605.134091][ T31] audit: type=1400 audit(2862.068:2989): avc: denied { write } for pid=17957 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2607.637662][T17970] skbuff: bad partial csum: csum=65506/2 headroom=82 headlen=65526 [ 2609.381934][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 2609.382521][ T31] audit: type=1400 audit(2866.328:3012): avc: denied { create } for pid=17980 comm="syz.6.1530" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2609.382992][ T31] audit: type=1400 audit(2866.328:3013): avc: denied { write } for pid=17980 comm="syz.6.1530" name="file0" dev="tmpfs" ino=1177 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2609.383662][ T31] audit: type=1400 audit(2866.328:3014): avc: denied { open } for pid=17980 comm="syz.6.1530" path="/229/file0" dev="tmpfs" ino=1177 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2609.422836][ T31] audit: type=1400 audit(2866.358:3015): avc: denied { unlink } for pid=15005 comm="syz-executor" name="file0" dev="tmpfs" ino=1177 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2613.632523][ T31] audit: type=1400 audit(2870.578:3016): avc: denied { write } for pid=17995 comm="syz.9.1535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2614.188056][T18003] netlink: 340 bytes leftover after parsing attributes in process `syz.6.1539'. [ 2614.188816][T18003] netlink: 48 bytes leftover after parsing attributes in process `syz.6.1539'. [ 2614.342865][ T31] audit: type=1400 audit(2871.288:3017): avc: denied { create } for pid=18001 comm="syz.9.1538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2614.352558][ T31] audit: type=1400 audit(2871.298:3018): avc: denied { setopt } for pid=18001 comm="syz.9.1538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2614.507740][T18006] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18006 comm=syz.6.1540 [ 2614.511104][ T31] audit: type=1400 audit(2871.458:3019): avc: denied { nlmsg_write } for pid=18005 comm="syz.6.1540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2616.161022][ T31] audit: type=1400 audit(2873.108:3020): avc: denied { create } for pid=18033 comm="syz.6.1550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2616.168424][T18036] netlink: 'syz.6.1550': attribute type 3 has an invalid length. [ 2616.371117][ T31] audit: type=1400 audit(2873.318:3021): avc: denied { create } for pid=18037 comm="syz.6.1551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2616.401648][ T31] audit: type=1400 audit(2873.348:3022): avc: denied { write } for pid=18037 comm="syz.6.1551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2616.668532][T18042] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 2617.781801][ T31] audit: type=1400 audit(2874.718:3023): avc: denied { name_bind } for pid=18054 comm="syz.6.1557" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2617.782624][ T31] audit: type=1400 audit(2874.728:3024): avc: denied { node_bind } for pid=18054 comm="syz.6.1557" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2619.064915][ T31] audit: type=1400 audit(2876.008:3025): avc: denied { allowed } for pid=18067 comm="syz.6.1562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2619.082673][ T31] audit: type=1400 audit(2876.028:3026): avc: denied { create } for pid=18067 comm="syz.6.1562" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2619.092517][ T31] audit: type=1400 audit(2876.028:3027): avc: denied { map } for pid=18067 comm="syz.6.1562" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=25902 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2619.101375][ T31] audit: type=1400 audit(2876.028:3028): avc: denied { read write } for pid=18067 comm="syz.6.1562" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=25902 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2619.338865][T18070] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1563'. [ 2619.339759][T18070] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1563'. [ 2619.351604][T18070] wireguard0: entered promiscuous mode [ 2619.352191][T18070] wireguard0: entered allmulticast mode [ 2620.871988][ T31] audit: type=1326 audit(2877.818:3029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18091 comm="syz.6.1570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2620.872743][ T31] audit: type=1326 audit(2877.818:3030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18091 comm="syz.6.1570" exe="/syz-executor" sig=0 arch=40000028 syscall=448 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2620.872864][ T31] audit: type=1326 audit(2877.818:3031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18091 comm="syz.6.1570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2620.872963][ T31] audit: type=1326 audit(2877.818:3032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18091 comm="syz.6.1570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2621.884464][ T31] audit: type=1400 audit(2878.828:3033): avc: denied { watch watch_reads } for pid=18110 comm="syz.6.1575" path="/266" dev="tmpfs" ino=1361 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2622.553930][ T31] audit: type=1400 audit(2879.498:3034): avc: denied { create } for pid=18117 comm="syz.6.1577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2623.239029][T18125] netlink: 'syz.6.1579': attribute type 1 has an invalid length. [ 2626.348391][ T31] audit: type=1326 audit(2883.298:3035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.6.1582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2626.354905][ T31] audit: type=1326 audit(2883.298:3036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.6.1582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2626.359063][ T31] audit: type=1326 audit(2883.308:3037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.6.1582" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2626.368611][ T31] audit: type=1326 audit(2883.318:3038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.6.1582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2626.372975][ T31] audit: type=1326 audit(2883.318:3039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.6.1582" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2626.396916][ T31] audit: type=1326 audit(2883.338:3040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.6.1582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2626.400155][ T31] audit: type=1326 audit(2883.348:3041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.6.1582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2626.441822][ T31] audit: type=1326 audit(2883.388:3042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.6.1582" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2626.453763][ T31] audit: type=1326 audit(2883.388:3043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.6.1582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2626.473931][ T31] audit: type=1326 audit(2883.408:3044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18134 comm="syz.6.1582" exe="/syz-executor" sig=0 arch=40000028 syscall=377 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2628.531412][T18155] netlink: 3 bytes leftover after parsing attributes in process `syz.6.1587'. [ 2628.534557][T18155] 0ªX¹¦À: renamed from veth0 (while UP) [ 2628.574335][T18155] 0ªX¹¦À: entered allmulticast mode [ 2628.578797][T18155] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 2636.177409][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 2636.177789][ T31] audit: type=1326 audit(2893.128:3054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18186 comm="syz.6.1595" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2636.183785][ T31] audit: type=1326 audit(2893.128:3055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18186 comm="syz.6.1595" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2636.185560][ T31] audit: type=1326 audit(2893.128:3056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18186 comm="syz.6.1595" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2636.189163][ T31] audit: type=1326 audit(2893.138:3057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18186 comm="syz.6.1595" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x13467c code=0x7ffc0000 [ 2636.190272][ T31] audit: type=1326 audit(2893.138:3058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18186 comm="syz.6.1595" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x134458 code=0x7ffc0000 [ 2636.194908][ T31] audit: type=1326 audit(2893.138:3059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18186 comm="syz.6.1595" exe="/syz-executor" sig=0 arch=40000028 syscall=291 compat=0 ip=0x134378 code=0x7ffc0000 [ 2636.196009][ T31] audit: type=1326 audit(2893.138:3060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18186 comm="syz.6.1595" exe="/syz-executor" sig=0 arch=40000028 syscall=291 compat=0 ip=0x134378 code=0x7ffc0000 [ 2636.197043][ T31] audit: type=1326 audit(2893.138:3061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18186 comm="syz.6.1595" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x1304dc code=0x7ffc0000 [ 2636.199198][ T31] audit: type=1326 audit(2893.148:3062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18186 comm="syz.6.1595" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2636.201371][ T31] audit: type=1326 audit(2893.148:3063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18186 comm="syz.6.1595" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2641.427174][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 2641.429112][ T31] audit: type=1326 audit(2898.378:3071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18222 comm="syz.6.1605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2641.437366][ T31] audit: type=1326 audit(2898.388:3072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18222 comm="syz.6.1605" exe="/syz-executor" sig=0 arch=40000028 syscall=144 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2641.439810][ T31] audit: type=1326 audit(2898.388:3073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18222 comm="syz.6.1605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2641.456253][ T31] audit: type=1326 audit(2898.408:3074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18222 comm="syz.6.1605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 2641.678797][T18226] netlink: 16 bytes leftover after parsing attributes in process `syz.6.1606'. [ 2646.931239][ T32] INFO: task kworker/1:29:5674 blocked for more than 430 seconds. [ 2646.932177][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2646.932442][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2646.932808][ T32] task:kworker/1:29 state:D stack:0 pid:5674 tgid:5674 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2646.940864][ T32] Workqueue: events bpf_prog_free_deferred [ 2646.941649][ T32] Call trace: [ 2646.964009][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2646.964795][ T32] r10:82918438 r9:e04c1d84 r8:00000002 r7:60000113 r6:e04c1d8c r5:85dfc800 [ 2646.965040][ T32] r4:85dfc800 [ 2646.965347][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2646.965599][ T32] r5:85dfc800 r4:82918434 [ 2646.965784][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2646.966012][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2646.966263][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08 [ 2646.966464][ T32] r4:00000000 [ 2646.966650][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2646.966876][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2646.967106][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2646.967353][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86d8d9c0 [ 2646.967535][ T32] r4:00000000 [ 2646.967711][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2646.967952][ T32] r9:83018205 r8:85dfc800 r7:00000000 r6:83018200 r5:00001000 r4:7f2c4000 [ 2646.968129][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2646.968373][ T32] r5:00001000 r4:dfd61000 [ 2646.968547][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2646.968775][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2646.969009][ T32] r5:858ce78c r4:858bb300 [ 2646.969207][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2646.969457][ T32] r7:ddde2d40 r6:83018200 r5:858ce78c r4:858bb300 [ 2646.969632][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2646.969873][ T32] r10:61c88647 r9:85dfc800 r8:858bb32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2646.970051][ T32] r4:858bb300 [ 2646.970225][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2646.986184][ T31] audit: type=1400 audit(2903.908:3075): avc: denied { write } for pid=3094 comm="syz-executor" path="pipe:[1463]" dev="pipefs" ino=1463 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2647.011663][ T32] r10:00000000 r9:858bb300 r8:8027ecf4 r7:dfd11e60 r6:85b1fa80 r5:85dfc800 [ 2647.012029][ T32] r4:00000001 [ 2647.012219][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.012572][ T32] Exception stack(0xe04c1fb0 to 0xe04c1ff8) [ 2647.012932][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2647.018741][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.019770][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.020692][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.021837][ T32] r4:85f43540 [ 2647.023474][ T32] INFO: task kworker/1:29:5674 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2647.024655][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.026640][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.027782][ T32] Call trace: [ 2647.028695][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2647.029739][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2647.030726][ T32] r4:00000000 [ 2647.031359][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2647.032311][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2647.035144][ T32] dd20: a35d0000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2647.036289][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2647.037409][ T32] dd60: 80000113 ffffffff [ 2647.038133][ T32] r5:80000113 r4:80239bd0 [ 2647.038874][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2647.045241][ T32] r4:82abf064 [ 2647.046102][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2647.052666][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2647.057653][ T32] r4:e051ddc0 [ 2647.058367][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.058710][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2647.058903][ T32] r4:00000000 [ 2647.059083][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.059347][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2647.059529][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.059775][ T32] r5:00001000 r4:dfcf3000 [ 2647.059954][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.060183][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.060433][ T32] r5:86b22f8c r4:85d49100 [ 2647.060615][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.060863][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2647.061047][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.061381][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2647.061568][ T32] r4:85d49100 [ 2647.061745][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.061990][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2647.062173][ T32] r4:00000001 [ 2647.062362][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.062590][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2647.062780][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2647.083867][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.084431][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.084674][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.084880][ T32] r4:85b32900 [ 2647.088274][ T32] INFO: task kworker/0:12:6525 blocked for more than 430 seconds. [ 2647.207132][ T32] Not tainted 6.16.0-rc7-syzkaller #0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2647.274900][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2647.275304][ T32] task:kworker/0:12 state:D stack:0 pid:6525 tgid:6525 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.275727][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.276102][ T32] Call trace: [ 2647.276413][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2647.276671][ T32] r10:82918438 r9:dff31d84 r8:00000002 r7:60000013 r6:dff31d8c r5:83a9e000 [ 2647.276905][ T32] r4:83a9e000 [ 2647.277106][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2647.277343][ T32] r5:83a9e000 r4:82918434 [ 2647.277513][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2647.277740][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2647.277971][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff31e08 [ 2647.278144][ T32] r4:00000000 [ 2647.278315][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2647.278534][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2647.278770][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.279003][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8606ee80 [ 2647.279177][ T32] r4:00000000 [ 2647.279346][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.279590][ T32] r9:83018005 r8:83a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2d2000 [ 2647.279763][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.279991][ T32] r5:00001000 r4:dff33000 [ 2647.280157][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.280377][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.280613][ T32] r5:85a73f8c r4:86082800 [ 2647.280782][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.281016][ T32] r7:dddced40 r6:83018000 r5:85a73f8c r4:86082800 [ 2647.281219][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.281477][ T32] r10:61c88647 r9:83a9e000 r8:8608282c r7:82804d40 r6:dddced40 r5:dddced60 [ 2647.281647][ T32] r4:86082800 [ 2647.281807][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.282044][ T32] r10:00000000 r9:86082800 r8:8027ecf4 r7:dfa79e60 r6:85618900 r5:83a9e000 [ 2647.282216][ T32] r4:00000001 [ 2647.282385][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.282612][ T32] Exception stack(0xdff31fb0 to 0xdff31ff8) [ 2647.282805][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2647.283001][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.303753][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.304225][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.304485][ T32] r4:85f43ac0 [ 2647.304947][ T32] INFO: task kworker/0:12:6525 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2647.305198][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.305730][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.306105][ T32] Call trace: [ 2647.306416][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2647.306674][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2647.306849][ T32] r4:00000000 [ 2647.307022][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2647.307243][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2647.307439][ T32] dd20: a775a000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2647.307642][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2647.307825][ T32] dd60: 80000113 ffffffff [ 2647.308028][ T32] r5:80000113 r4:80239bd0 [ 2647.308203][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2647.308484][ T32] r4:82abf064 [ 2647.308740][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2647.308993][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2647.309275][ T32] r4:e051ddc0 [ 2647.309453][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.309728][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2647.309906][ T32] r4:00000000 [ 2647.310076][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.310322][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2647.310490][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.310715][ T32] r5:00001000 r4:dfcf3000 [ 2647.310879][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.311107][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.311339][ T32] r5:86b22f8c r4:85d49100 [ 2647.311510][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.311757][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2647.311938][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.312177][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2647.312363][ T32] r4:85d49100 [ 2647.312532][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.312779][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2647.312952][ T32] r4:00000001 [ 2647.346634][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.347825][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2647.348749][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2647.349876][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.350816][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.357213][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.359669][ T32] r4:85b32900 [ 2647.361326][ T32] INFO: task kworker/0:14:6530 blocked for more than 430 seconds. [ 2647.366967][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2647.367764][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2647.373966][ T32] task:kworker/0:14 state:D stack:0 pid:6530 tgid:6530 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.375656][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.377378][ T32] Call trace: [ 2647.378495][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2647.379490][ T32] r10:82918438 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:86041800 [ 2647.380358][ T32] r4:86041800 [ 2647.381198][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2647.382235][ T32] r5:86041800 r4:82918434 [ 2647.394216][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2647.395351][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2647.395672][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 [ 2647.395857][ T32] r4:00000000 [ 2647.396027][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2647.396462][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2647.397017][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.397417][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86318cc0 [ 2647.397633][ T32] r4:00000000 [ 2647.397825][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.398082][ T32] r9:83018005 r8:86041800 r7:00000000 r6:83018000 r5:00001000 r4:7f348000 [ 2647.398256][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.398500][ T32] r5:00001000 r4:e051f000 [ 2647.398681][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.398904][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.399136][ T32] r5:85ec378c r4:8628a000 [ 2647.399311][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.399542][ T32] r7:dddced40 r6:83018000 r5:85ec378c r4:8628a000 [ 2647.399771][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.400015][ T32] r10:61c88647 r9:86041800 r8:8628a02c r7:82804d40 r6:dddced40 r5:dddced60 [ 2647.400193][ T32] r4:8628a000 [ 2647.400404][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.400643][ T32] r10:00000000 r9:8628a000 r8:8027ecf4 r7:dfa79e60 r6:8628a080 r5:86041800 [ 2647.400817][ T32] r4:00000001 [ 2647.401004][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.401300][ T32] Exception stack(0xdfb15fb0 to 0xdfb15ff8) [ 2647.401593][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2647.401842][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.402100][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.402305][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.402487][ T32] r4:85de4400 [ 2647.402987][ T32] INFO: task kworker/0:14:6530 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2647.418335][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.420311][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.421868][ T32] Call trace: [ 2647.422863][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2647.424239][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2647.425251][ T32] r4:00000000 [ 2647.425936][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2647.426934][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2647.427800][ T32] dd20: a810b000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2647.434055][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2647.435210][ T32] dd60: 80000113 ffffffff [ 2647.435982][ T32] r5:80000113 r4:80239bd0 [ 2647.436680][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2647.437834][ T32] r4:82abf064 [ 2647.438480][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2647.439711][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2647.440819][ T32] r4:e051ddc0 [ 2647.441509][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.442501][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2647.448623][ T32] r4:00000000 [ 2647.449531][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.450529][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2647.451453][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.452530][ T32] r5:00001000 r4:dfcf3000 [ 2647.456230][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.457329][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.458370][ T32] r5:86b22f8c r4:85d49100 [ 2647.463527][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.463845][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2647.464037][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.464310][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2647.464499][ T32] r4:85d49100 [ 2647.464680][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.464921][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2647.465164][ T32] r4:00000001 [ 2647.465352][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.465601][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2647.465802][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2647.466001][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.466189][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.466393][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.466591][ T32] r4:85b32900 [ 2647.476458][ T32] INFO: task kworker/0:17:6592 blocked for more than 430 seconds. [ 2647.477438][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2647.478187][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2647.479424][ T32] task:kworker/0:17 state:D stack:0 pid:6592 tgid:6592 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.481179][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.485484][ T32] Call trace: [ 2647.486476][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2647.487595][ T32] r10:82918438 r9:dfa31d84 r8:00000002 r7:60000013 r6:dfa31d8c r5:86043000 [ 2647.488657][ T32] r4:86043000 [ 2647.489302][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2647.490210][ T32] r5:86043000 r4:82918434 [ 2647.493641][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2647.494814][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2647.496062][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 [ 2647.497055][ T32] r4:00000000 [ 2647.497235][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2647.497373][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2647.497463][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.497590][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d26600 [ 2647.497710][ T32] r4:00000000 [ 2647.497788][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.497894][ T32] r9:83018005 r8:86043000 r7:00000000 r6:83018000 r5:00001000 r4:7f35c000 [ 2647.497943][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.498035][ T32] r5:00001000 r4:e47ae000 [ 2647.498079][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.498157][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.498247][ T32] r5:85d6478c r4:85e08f80 [ 2647.498290][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.498388][ T32] r7:dddced40 r6:83018000 r5:85d6478c r4:85e08f80 [ 2647.498437][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.498534][ T32] r10:61c88647 r9:86043000 r8:85e08fac r7:82804d40 r6:dddced40 r5:dddced60 [ 2647.498592][ T32] r4:85e08f80 [ 2647.498636][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.498725][ T32] r10:00000000 r9:85e08f80 r8:8027ecf4 r7:dfa79e60 r6:85e08a80 r5:86043000 [ 2647.498773][ T32] r4:00000001 [ 2647.498816][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.498887][ T32] Exception stack(0xdfa31fb0 to 0xdfa31ff8) [ 2647.498952][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2647.499640][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.499706][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.499872][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.499993][ T32] r4:85f395c0 [ 2647.500299][ T32] INFO: task kworker/0:17:6592 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2647.500368][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.500873][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.501001][ T32] Call trace: [ 2647.501144][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2647.501264][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2647.501498][ T32] r4:00000000 [ 2647.501549][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2647.501634][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2647.501728][ T32] dd20: a84b1000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2647.501794][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2647.502025][ T32] dd60: 80000113 ffffffff [ 2647.502146][ T32] r5:80000113 r4:80239bd0 [ 2647.502463][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2647.502555][ T32] r4:82abf064 [ 2647.502613][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2647.502714][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2647.502805][ T32] r4:e051ddc0 [ 2647.502852][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.502945][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2647.502996][ T32] r4:00000000 [ 2647.510448][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.510735][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2647.510795][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.510886][ T32] r5:00001000 r4:dfcf3000 [ 2647.510932][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.511010][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.511445][ T32] r5:86b22f8c r4:85d49100 [ 2647.511500][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.511603][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2647.511647][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.511802][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2647.511856][ T32] r4:85d49100 [ 2647.511899][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.511986][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2647.512043][ T32] r4:00000001 [ 2647.512088][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.512161][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2647.512222][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2647.512286][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.512346][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.512404][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.512448][ T32] r4:85b32900 [ 2647.512523][ T32] INFO: task kworker/0:0:8767 blocked for more than 430 seconds. [ 2647.512597][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2647.512649][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2647.512694][ T32] task:kworker/0:0 state:D stack:0 pid:8767 tgid:8767 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.512812][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.512985][ T32] Call trace: [ 2647.532917][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2647.720477][ T32] r10:82918438 r9:dfc55d84 r8:00000002 r7:60080113 r6:dfc55d8c r5:85dfbc00 [ 2647.720751][ T32] r4:85dfbc00 [ 2647.720975][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2647.721175][ T32] r5:85dfbc00 r4:82918434 [ 2647.721275][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2647.721378][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2647.721477][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 [ 2647.721530][ T32] r4:00000000 [ 2647.721575][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2647.721656][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2647.721780][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.721886][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84856740 [ 2647.721963][ T32] r4:00000000 [ 2647.722017][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.722146][ T32] r9:83018005 r8:85dfbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f35a000 [ 2647.722206][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.722300][ T32] r5:00001000 r4:e47a8000 [ 2647.722357][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.722438][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.722530][ T32] r5:85d65b8c r4:85c63800 [ 2647.722640][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.722752][ T32] r7:dddced40 r6:83018000 r5:85d65b8c r4:85c63800 [ 2647.722832][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.723109][ T32] r10:61c88647 r9:85dfbc00 r8:85c6382c r7:82804d40 r6:dddced40 r5:dddced60 [ 2647.730819][ T32] r4:85c63800 [ 2647.730897][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.731019][ T32] r10:00000000 r9:85c63800 r8:8027ecf4 r7:dfa31e60 r6:85af9200 r5:85dfbc00 [ 2647.731071][ T32] r4:00000001 [ 2647.731117][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.731196][ T32] Exception stack(0xdfc55fb0 to 0xdfc55ff8) [ 2647.731261][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2647.731366][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.731449][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.731552][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.731612][ T32] r4:85c8ccc0 [ 2647.731950][ T32] INFO: task kworker/0:0:8767 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2647.732029][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.732216][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.732331][ T32] Call trace: [ 2647.732463][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2647.732570][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2647.732629][ T32] r4:00000000 [ 2647.732675][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2647.732758][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2647.732822][ T32] dd20: abfde000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2647.732901][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2647.732966][ T32] dd60: 80000113 ffffffff [ 2647.733080][ T32] r5:80000113 r4:80239bd0 [ 2647.741401][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2647.741540][ T32] r4:82abf064 [ 2647.741592][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2647.741693][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2647.741746][ T32] r4:e051ddc0 [ 2647.741824][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.741930][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2647.741981][ T32] r4:00000000 [ 2647.742027][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.742155][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2647.742213][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.742307][ T32] r5:00001000 r4:dfcf3000 [ 2647.742364][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.742447][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.742559][ T32] r5:86b22f8c r4:85d49100 [ 2647.742646][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.742749][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2647.742799][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.742924][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2647.742983][ T32] r4:85d49100 [ 2647.743130][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.750676][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2647.750746][ T32] r4:00000001 [ 2647.750793][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.750917][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2647.750988][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2647.751056][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.751111][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.751179][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.751237][ T32] r4:85b32900 [ 2647.751826][ T32] INFO: task kworker/0:2:9339 blocked for more than 430 seconds. [ 2647.751922][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2647.751982][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2647.752103][ T32] task:kworker/0:2 state:D stack:0 pid:9339 tgid:9339 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.752297][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.752482][ T32] Call trace: [ 2647.752565][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2647.752675][ T32] r10:82918438 r9:dff85d84 r8:00000002 r7:60000113 r6:dff85d8c r5:83aa6000 [ 2647.752729][ T32] r4:83aa6000 [ 2647.752802][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2647.752898][ T32] r5:83aa6000 r4:82918434 [ 2647.752979][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2647.973678][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2647.975140][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff85e08 [ 2647.975890][ T32] r4:00000000 [ 2647.976360][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2647.977054][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2647.977810][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.983441][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dbbd00 [ 2647.983583][ T32] r4:00000000 [ 2647.983726][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.983867][ T32] r9:83018005 r8:83aa6000 r7:00000000 r6:83018000 r5:00001000 r4:7f2c6000 [ 2647.983960][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.984082][ T32] r5:00001000 r4:dfe2d000 [ 2647.984171][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.984294][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.984418][ T32] r5:86b22b8c r4:858b5400 [ 2647.984506][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.984633][ T32] r7:dddced40 r6:83018000 r5:86b22b8c r4:858b5400 [ 2647.984721][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.984870][ T32] r10:61c88647 r9:83aa6000 r8:858b542c r7:82804d40 r6:dddced40 r5:dddced60 [ 2647.984962][ T32] r4:858b5400 [ 2647.985047][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.985220][ T32] r10:00000000 r9:858b5400 r8:8027ecf4 r7:dff31e60 r6:861ad780 r5:83aa6000 [ 2647.985325][ T32] r4:00000001 [ 2647.985411][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.985520][ T32] Exception stack(0xdff85fb0 to 0xdff85ff8) [ 2647.985618][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2647.985715][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.985809][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.987145][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.987325][ T32] r4:861d5fc0 [ 2647.987640][ T32] INFO: task kworker/0:2:9339 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2647.987727][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.987911][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.988072][ T32] Call trace: [ 2647.988145][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2647.988241][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2647.988319][ T32] r4:00000000 [ 2647.988365][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2647.988445][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2647.988543][ T32] dd20: b0282000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2647.988610][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2647.988665][ T32] dd60: 80000113 ffffffff [ 2647.988714][ T32] r5:80000113 r4:80239bd0 [ 2647.988760][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2647.988847][ T32] r4:82abf064 [ 2647.988892][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2647.988985][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2647.989032][ T32] r4:e051ddc0 [ 2647.989099][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.989201][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2647.989249][ T32] r4:00000000 [ 2647.989318][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.989421][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2647.989471][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2647.989623][ T32] r5:00001000 r4:dfcf3000 [ 2647.989676][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2647.989763][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2647.989872][ T32] r5:86b22f8c r4:85d49100 [ 2647.989939][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2647.990051][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2647.990096][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2647.990188][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2647.990243][ T32] r4:85d49100 [ 2647.990288][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2647.990394][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2647.990442][ T32] r4:00000001 [ 2647.990482][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2647.990554][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2647.990612][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2647.990671][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2647.990723][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2647.990786][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2647.990852][ T32] r4:85b32900 [ 2647.991449][ T32] INFO: task kworker/1:20:9529 blocked for more than 431 seconds. [ 2647.991541][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2647.991620][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2647.991670][ T32] task:kworker/1:20 state:D stack:0 pid:9529 tgid:9529 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2647.991768][ T32] Workqueue: events bpf_prog_free_deferred [ 2647.991904][ T32] Call trace: [ 2647.991975][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2647.992072][ T32] r10:82918438 r9:dffddd84 r8:00000002 r7:60000113 r6:dffddd8c r5:8324b000 [ 2647.992126][ T32] r4:8324b000 [ 2647.992170][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2647.992254][ T32] r5:8324b000 r4:82918434 [ 2647.992301][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2647.992391][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2647.992486][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08 [ 2647.992538][ T32] r4:00000000 [ 2647.992580][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2647.992654][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2647.992741][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2647.992832][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5a280 [ 2647.992883][ T32] r4:00000000 [ 2647.992928][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2647.993160][ T32] r9:83018205 r8:8324b000 r7:00000000 r6:83018200 r5:00001000 r4:7f34c000 [ 2648.002433][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.002573][ T32] r5:00001000 r4:e0609000 [ 2648.002621][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.002705][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.002790][ T32] r5:855c078c r4:86c07d00 [ 2648.002833][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.002926][ T32] r7:ddde2d40 r6:83018200 r5:855c078c r4:86c07d00 [ 2648.002973][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.012576][ T32] r10:61c88647 r9:8324b000 r8:86c07d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.012727][ T32] r4:86c07d00 [ 2648.012778][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.012907][ T32] r10:00000000 r9:86c07d00 r8:8027ecf4 r7:dfa79e60 r6:86c07d80 r5:8324b000 [ 2648.013030][ T32] r4:00000001 [ 2648.276855][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.277204][ T32] Exception stack(0xdffddfb0 to 0xdffddff8) [ 2648.277426][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.277545][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.277701][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.277815][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.277900][ T32] r4:862db6c0 [ 2648.278204][ T32] INFO: task kworker/1:20:9529 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.278283][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.278433][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.278548][ T32] Call trace: [ 2648.278724][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.278846][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.278900][ T32] r4:00000000 [ 2648.278946][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.279029][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.279097][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.279162][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.279219][ T32] dd60: 80000113 ffffffff [ 2648.279276][ T32] r5:80000113 r4:80239bd0 [ 2648.279337][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.279498][ T32] r4:82abf064 [ 2648.279556][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.279658][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.279709][ T32] r4:e051ddc0 [ 2648.279755][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.279924][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.279982][ T32] r4:00000000 [ 2648.280028][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.280140][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.280194][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.280451][ T32] r5:00001000 r4:dfcf3000 [ 2648.280517][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.280614][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.280708][ T32] r5:86b22f8c r4:85d49100 [ 2648.280758][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.280855][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.280903][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.280997][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.281047][ T32] r4:85d49100 [ 2648.281122][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.281218][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.281297][ T32] r4:00000001 [ 2648.281357][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.281436][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.281493][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.281556][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.281619][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.281681][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.281729][ T32] r4:85b32900 [ 2648.281903][ T32] INFO: task kworker/1:23:9536 blocked for more than 431 seconds. [ 2648.281985][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.282042][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.282090][ T32] task:kworker/1:23 state:D stack:0 pid:9536 tgid:9536 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.282186][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.282296][ T32] Call trace: [ 2648.282379][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.282476][ T32] r10:82918438 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:83aa8c00 [ 2648.282546][ T32] r4:83aa8c00 [ 2648.282613][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.282704][ T32] r5:83aa8c00 r4:82918434 [ 2648.282750][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.282830][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.282926][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 [ 2648.282977][ T32] r4:00000000 [ 2648.291132][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.291282][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.291389][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.291484][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8626f100 [ 2648.291538][ T32] r4:00000000 [ 2648.291584][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.291682][ T32] r9:83018205 r8:83aa8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f300000 [ 2648.291731][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.291820][ T32] r5:00001000 r4:dffe3000 [ 2648.291866][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.291945][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.292123][ T32] r5:85ec1f8c r4:86c07000 [ 2648.292179][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.292281][ T32] r7:ddde2d40 r6:83018200 r5:85ec1f8c r4:86c07000 [ 2648.292360][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.292506][ T32] r10:61c88647 r9:83aa8c00 r8:86c0702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.292593][ T32] r4:86c07000 [ 2648.292671][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.292830][ T32] r10:00000000 r9:86c07000 r8:8027ecf4 r7:dfa79e60 r6:86c07e80 r5:83aa8c00 [ 2648.292923][ T32] r4:00000001 [ 2648.292994][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.300832][ T32] Exception stack(0xdfa59fb0 to 0xdfa59ff8) [ 2648.300928][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2648.300991][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.301051][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.301187][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.301270][ T32] r4:85b32040 [ 2648.301597][ T32] INFO: task kworker/1:23:9536 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.301675][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.301918][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.302042][ T32] Call trace: [ 2648.302120][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.302225][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.302275][ T32] r4:00000000 [ 2648.302326][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.302405][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.302469][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.302547][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.302611][ T32] dd60: 80000113 ffffffff [ 2648.302707][ T32] r5:80000113 r4:80239bd0 [ 2648.302756][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.302851][ T32] r4:82abf064 [ 2648.302896][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.302990][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.314789][ T32] r4:e051ddc0 [ 2648.314989][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.315146][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.315205][ T32] r4:00000000 [ 2648.315245][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.315349][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.315421][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.315514][ T32] r5:00001000 r4:dfcf3000 [ 2648.315555][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.315630][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.315708][ T32] r5:86b22f8c r4:85d49100 [ 2648.315749][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.315837][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.315886][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.315972][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.316017][ T32] r4:85d49100 [ 2648.316053][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.316141][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.316199][ T32] r4:00000001 [ 2648.316243][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.316333][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.316404][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.316483][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.316552][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.316654][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.316726][ T32] r4:85b32900 [ 2648.316797][ T32] INFO: task kworker/0:4:10396 blocked for more than 431 seconds. [ 2648.317016][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.317097][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.317141][ T32] task:kworker/0:4 state:D stack:0 pid:10396 tgid:10396 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.317254][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.317567][ T32] Call trace: [ 2648.317621][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.317715][ T32] r10:82918438 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:832e4800 [ 2648.317766][ T32] r4:832e4800 [ 2648.317810][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.317888][ T32] r5:832e4800 r4:82918434 [ 2648.317999][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.318075][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.318159][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 [ 2648.318333][ T32] r4:00000000 [ 2648.318379][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.318455][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.318525][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.318611][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85844100 [ 2648.318804][ T32] r4:00000000 [ 2648.318852][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.318974][ T32] r9:83018005 r8:832e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f34a000 [ 2648.319044][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.319121][ T32] r5:00001000 r4:e05c5000 [ 2648.319168][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.319247][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.319336][ T32] r5:855c338c r4:86083a00 [ 2648.319382][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.319470][ T32] r7:dddced40 r6:83018000 r5:855c338c r4:86083a00 [ 2648.319513][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.319611][ T32] r10:61c88647 r9:832e4800 r8:86083a2c r7:82804d40 r6:dddced40 r5:dddced60 [ 2648.319661][ T32] r4:86083a00 [ 2648.319705][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.319831][ T32] r10:00000000 r9:86083a00 r8:8027ecf4 r7:dff31e60 r6:86083580 r5:832e4800 [ 2648.319944][ T32] r4:00000001 [ 2648.320004][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.320104][ T32] Exception stack(0xdfb61fb0 to 0xdfb61ff8) [ 2648.320189][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2648.320303][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.320370][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.320420][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.320471][ T32] r4:8630ff80 [ 2648.320891][ T32] INFO: task kworker/0:4:10396 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.320958][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.321123][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.321257][ T32] Call trace: [ 2648.321329][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.321416][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.321468][ T32] r4:00000000 [ 2648.321505][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.321680][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.321745][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.321803][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.321859][ T32] dd60: 80000113 ffffffff [ 2648.321909][ T32] r5:80000113 r4:80239bd0 [ 2648.321947][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.322033][ T32] r4:82abf064 [ 2648.322080][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.322426][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.322618][ T32] r4:e051ddc0 [ 2648.322676][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.322760][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.322810][ T32] r4:00000000 [ 2648.322850][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.323122][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.323831][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.323954][ T32] r5:00001000 r4:dfcf3000 [ 2648.323997][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.324060][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.324104][ T32] r5:86b22f8c r4:85d49100 [ 2648.324124][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.324173][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.324195][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.324242][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.324265][ T32] r4:85d49100 [ 2648.324284][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.324339][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.324360][ T32] r4:00000001 [ 2648.324379][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.324415][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.324444][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.324478][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.324538][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.324578][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.324601][ T32] r4:85b32900 [ 2648.324640][ T32] INFO: task kworker/0:7:10442 blocked for more than 431 seconds. [ 2648.324680][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.324707][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.324730][ T32] task:kworker/0:7 state:D stack:0 pid:10442 tgid:10442 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.324787][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.324834][ T32] Call trace: [ 2648.324866][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.324916][ T32] r10:82918438 r9:dfe59d84 r8:00000002 r7:60000113 r6:dfe59d8c r5:833a8000 [ 2648.324938][ T32] r4:833a8000 [ 2648.324957][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.324997][ T32] r5:833a8000 r4:82918434 [ 2648.325018][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.325057][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.325145][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe59e08 [ 2648.325172][ T32] r4:00000000 [ 2648.325191][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.325226][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.325267][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.325320][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86264340 [ 2648.325342][ T32] r4:00000000 [ 2648.325360][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.325406][ T32] r9:83018005 r8:833a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f352000 [ 2648.325426][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.325465][ T32] r5:00001000 r4:e0699000 [ 2648.325484][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.325523][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.325569][ T32] r5:85ec238c r4:86083300 [ 2648.325590][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.325637][ T32] r7:dddced40 r6:83018000 r5:85ec238c r4:86083300 [ 2648.325658][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.325704][ T32] r10:61c88647 r9:833a8000 r8:8608332c r7:82804d40 r6:dddced40 r5:dddced60 [ 2648.325725][ T32] r4:86083300 [ 2648.325743][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.325788][ T32] r10:00000000 r9:86083300 r8:8027ecf4 r7:dfe49e60 r6:86083380 r5:833a8000 [ 2648.325808][ T32] r4:00000001 [ 2648.325827][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.325862][ T32] Exception stack(0xdfe59fb0 to 0xdfe59ff8) [ 2648.325889][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2648.325916][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.325942][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.325969][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.325991][ T32] r4:86d2f180 [ 2648.326168][ T32] INFO: task kworker/0:7:10442 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.326198][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.326270][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.326355][ T32] Call trace: [ 2648.326387][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.326434][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.326458][ T32] r4:00000000 [ 2648.326476][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.326514][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.326542][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.326574][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.326597][ T32] dd60: 80000113 ffffffff [ 2648.326619][ T32] r5:80000113 r4:80239bd0 [ 2648.326637][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.326712][ T32] r4:82abf064 [ 2648.326736][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.326783][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.326806][ T32] r4:e051ddc0 [ 2648.326823][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.326867][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.326890][ T32] r4:00000000 [ 2648.326907][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.326950][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.326971][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.327012][ T32] r5:00001000 r4:dfcf3000 [ 2648.327030][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.327067][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.327108][ T32] r5:86b22f8c r4:85d49100 [ 2648.327126][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.327172][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.327193][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.327236][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.327257][ T32] r4:85d49100 [ 2648.327275][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.327326][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.327347][ T32] r4:00000001 [ 2648.327365][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.327401][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.327426][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.327452][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.327478][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.327505][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.327526][ T32] r4:85b32900 [ 2648.327598][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.327680][ T32] INFO: task kworker/0:8:10722 blocked for more than 431 seconds. [ 2648.327721][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.327746][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.327765][ T32] task:kworker/0:8 state:D stack:0 pid:10722 tgid:10722 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.327811][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.327854][ T32] Call trace: [ 2648.327885][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.327930][ T32] r10:82918438 r9:dfd69d84 r8:00000002 r7:60000113 r6:dfd69d8c r5:86e73c00 [ 2648.327954][ T32] r4:86e73c00 [ 2648.327973][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.328013][ T32] r5:86e73c00 r4:82918434 [ 2648.328032][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.328068][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.328141][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd69e08 [ 2648.328172][ T32] r4:00000000 [ 2648.328205][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.328271][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.328338][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.328427][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86a16c40 [ 2648.328456][ T32] r4:00000000 [ 2648.328484][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.328671][ T32] r9:83018005 r8:86e73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2d0000 [ 2648.328711][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.328904][ T32] r5:00001000 r4:dff21000 [ 2648.329222][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.329306][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.329391][ T32] r5:868adb8c r4:869fbb80 [ 2648.329471][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.329605][ T32] r7:dddced40 r6:83018000 r5:868adb8c r4:869fbb80 [ 2648.329659][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.329744][ T32] r10:61c88647 r9:86e73c00 r8:869fbbac r7:82804d40 r6:dddced40 r5:dddced60 [ 2648.329986][ T32] r4:869fbb80 [ 2648.330097][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.330204][ T32] r10:00000000 r9:869fbb80 r8:8027ecf4 r7:dff31e60 r6:869fbb00 r5:86e73c00 [ 2648.330249][ T32] r4:00000001 [ 2648.330287][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.330594][ T32] Exception stack(0xdfd69fb0 to 0xdfd69ff8) [ 2648.330711][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2648.330770][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.330932][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.331037][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.331088][ T32] r4:862692c0 [ 2648.331287][ T32] INFO: task kworker/0:8:10722 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.331360][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.331582][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.331818][ T32] Call trace: [ 2648.332052][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.332143][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.332196][ T32] r4:00000000 [ 2648.332243][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.332417][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.332480][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.332680][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.332799][ T32] dd60: 80000113 ffffffff [ 2648.332915][ T32] r5:80000113 r4:80239bd0 [ 2648.333083][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.336932][ T32] r4:82abf064 [ 2648.336998][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.337148][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.337266][ T32] r4:e051ddc0 [ 2648.337430][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.337603][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.337730][ T32] r4:00000000 [ 2648.337825][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.337916][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.338060][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.338193][ T32] r5:00001000 r4:dfcf3000 [ 2648.338259][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.338472][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.338590][ T32] r5:86b22f8c r4:85d49100 [ 2648.338697][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.338793][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.338837][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.339022][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.339146][ T32] r4:85d49100 [ 2648.339253][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.339345][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.339484][ T32] r4:00000001 [ 2648.339594][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.339667][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.339729][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.339810][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.339864][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.339935][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.339982][ T32] r4:85b32900 [ 2648.340050][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.340160][ T32] INFO: task kworker/0:9:10723 blocked for more than 431 seconds. [ 2648.340231][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.340283][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.340408][ T32] task:kworker/0:9 state:D stack:0 pid:10723 tgid:10723 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.340578][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.340761][ T32] Call trace: [ 2648.340931][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.341091][ T32] r10:82918438 r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:86e71800 [ 2648.341214][ T32] r4:86e71800 [ 2648.341278][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.341366][ T32] r5:86e71800 r4:82918434 [ 2648.341477][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.341556][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.341646][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 [ 2648.341799][ T32] r4:00000000 [ 2648.341847][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.341921][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.342036][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.342123][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86256bc0 [ 2648.342356][ T32] r4:00000000 [ 2648.342404][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.342495][ T32] r9:83018005 r8:86e71800 r7:00000000 r6:83018000 r5:00001000 r4:7f2c8000 [ 2648.342538][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.342621][ T32] r5:00001000 r4:dfe37000 [ 2648.342664][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.342899][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.343119][ T32] r5:86b2278c r4:869fbc80 [ 2648.351579][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.351834][ T32] r7:dddced40 r6:83018000 r5:86b2278c r4:869fbc80 [ 2648.351909][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.352014][ T32] r10:61c88647 r9:86e71800 r8:869fbcac r7:82804d40 r6:dddced40 r5:dddced60 [ 2648.352060][ T32] r4:869fbc80 [ 2648.352175][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.352265][ T32] r10:00000000 r9:869fbc80 r8:8027ecf4 r7:dfd69e60 r6:869fbc00 r5:86e71800 [ 2648.352324][ T32] r4:00000001 [ 2648.352366][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.352437][ T32] Exception stack(0xdfc85fb0 to 0xdfc85ff8) [ 2648.352503][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2648.352559][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.352612][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.352670][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.352714][ T32] r4:86269800 [ 2648.360767][ T32] INFO: task kworker/0:9:10723 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.361033][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.361347][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.361498][ T32] Call trace: [ 2648.361577][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.361717][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.361780][ T32] r4:00000000 [ 2648.361823][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.361910][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.362026][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.362101][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.362151][ T32] dd60: 80000113 ffffffff [ 2648.362427][ T32] r5:80000113 r4:80239bd0 [ 2648.362483][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.362582][ T32] r4:82abf064 [ 2648.362627][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.362719][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.362811][ T32] r4:e051ddc0 [ 2648.362860][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.362968][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.363017][ T32] r4:00000000 [ 2648.369608][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.370016][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.370144][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.370239][ T32] r5:00001000 r4:dfcf3000 [ 2648.370285][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.370375][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.370509][ T32] r5:86b22f8c r4:85d49100 [ 2648.370561][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.370654][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.370700][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.370789][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.370831][ T32] r4:85d49100 [ 2648.370875][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.370964][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.371010][ T32] r4:00000001 [ 2648.371055][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.371130][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.371357][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.371422][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.371480][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.371576][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.371631][ T32] r4:85b32900 [ 2648.371685][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.371758][ T32] INFO: task kworker/1:26:11114 blocked for more than 431 seconds. [ 2648.371831][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.371887][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.372052][ T32] task:kworker/1:26 state:D stack:0 pid:11114 tgid:11114 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.372262][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.372472][ T32] Call trace: [ 2648.372550][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.372816][ T32] r10:82918438 r9:e0555d84 r8:00000002 r7:60000113 r6:e0555d8c r5:83a9bc00 [ 2648.372893][ T32] r4:83a9bc00 [ 2648.372943][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.381824][ T32] r5:83a9bc00 r4:82918434 [ 2648.381979][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.382116][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.382239][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0555e08 [ 2648.382303][ T32] r4:00000000 [ 2648.382353][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.382433][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.382667][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.382786][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86e2d6c0 [ 2648.382838][ T32] r4:00000000 [ 2648.382879][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.382972][ T32] r9:83018205 r8:83a9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f304000 [ 2648.383018][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.391848][ T32] r5:00001000 r4:e0037000 [ 2648.392034][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.392273][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.392397][ T32] r5:85a8638c r4:86934300 [ 2648.392461][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.392560][ T32] r7:ddde2d40 r6:83018200 r5:85a8638c r4:86934300 [ 2648.392762][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.392862][ T32] r10:61c88647 r9:83a9bc00 r8:8693432c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.393215][ T32] r4:86934300 [ 2648.402243][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.402461][ T32] r10:00000000 r9:86934300 r8:8027ecf4 r7:dfb85e60 r6:86a17f00 r5:83a9bc00 [ 2648.402533][ T32] r4:00000001 [ 2648.402583][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.402661][ T32] Exception stack(0xe0555fb0 to 0xe0555ff8) [ 2648.402725][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2648.402855][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.402966][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.411072][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.411247][ T32] r4:86cd6280 [ 2648.411606][ T32] INFO: task kworker/1:26:11114 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.411695][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.411884][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.412015][ T32] Call trace: [ 2648.412111][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.412202][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.412259][ T32] r4:00000000 [ 2648.412311][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.412395][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.412451][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.412517][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.412591][ T32] dd60: 80000113 ffffffff [ 2648.412649][ T32] r5:80000113 r4:80239bd0 [ 2648.412697][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.412866][ T32] r4:82abf064 [ 2648.412919][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.413089][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.418469][ T32] r4:e051ddc0 [ 2648.418506][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.418574][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.418599][ T32] r4:00000000 [ 2648.418619][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.418665][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.418763][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.418814][ T32] r5:00001000 r4:dfcf3000 [ 2648.418849][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.418891][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.418936][ T32] r5:86b22f8c r4:85d49100 [ 2648.419034][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.419141][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.419167][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.419214][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.419236][ T32] r4:85d49100 [ 2648.419254][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.419306][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.419330][ T32] r4:00000001 [ 2648.419427][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.419469][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.419536][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.419568][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.419639][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.419672][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.419695][ T32] r4:85b32900 [ 2648.419719][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.421448][ T32] INFO: task kworker/1:28:11128 blocked for more than 431 seconds. [ 2648.421593][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.421631][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.421669][ T32] task:kworker/1:28 state:D stack:0 pid:11128 tgid:11128 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.422323][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.422423][ T32] Call trace: [ 2648.422467][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.422547][ T32] r10:82918438 r9:e048dd84 r8:00000002 r7:60000113 r6:e048dd8c r5:83a9b000 [ 2648.422582][ T32] r4:83a9b000 [ 2648.422609][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.422666][ T32] r5:83a9b000 r4:82918434 [ 2648.422692][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.422779][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.422875][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e048de08 [ 2648.423065][ T32] r4:00000000 [ 2648.429825][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.429961][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.430017][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.430067][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8698c9c0 [ 2648.430090][ T32] r4:00000000 [ 2648.430110][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.430155][ T32] r9:83018205 r8:83a9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f302000 [ 2648.430178][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.430220][ T32] r5:00001000 r4:e0031000 [ 2648.430240][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.430277][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.430323][ T32] r5:85ec338c r4:86934b80 [ 2648.430377][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.430429][ T32] r7:ddde2d40 r6:83018200 r5:85ec338c r4:86934b80 [ 2648.430451][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.430495][ T32] r10:61c88647 r9:83a9b000 r8:86934bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.430539][ T32] r4:86934b80 [ 2648.430565][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.430610][ T32] r10:00000000 r9:86934b80 r8:8027ecf4 r7:e0555e60 r6:86a17580 r5:83a9b000 [ 2648.430702][ T32] r4:00000001 [ 2648.430726][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.430763][ T32] Exception stack(0xe048dfb0 to 0xe048dff8) [ 2648.430793][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.430820][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.430904][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.430937][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.430961][ T32] r4:86cd69c0 [ 2648.431147][ T32] INFO: task kworker/1:28:11128 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.431181][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.431365][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.431475][ T32] Call trace: [ 2648.431510][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.431566][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.431590][ T32] r4:00000000 [ 2648.431615][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.431655][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.431686][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.431715][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.431738][ T32] dd60: 80000113 ffffffff [ 2648.431761][ T32] r5:80000113 r4:80239bd0 [ 2648.431780][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.431932][ T32] r4:82abf064 [ 2648.431957][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.432006][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.432028][ T32] r4:e051ddc0 [ 2648.432046][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.432105][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.432131][ T32] r4:00000000 [ 2648.432151][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.432196][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.432216][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.432256][ T32] r5:00001000 r4:dfcf3000 [ 2648.432275][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.432312][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.432384][ T32] r5:86b22f8c r4:85d49100 [ 2648.432562][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.432648][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.432673][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.432720][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.432741][ T32] r4:85d49100 [ 2648.432760][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.432804][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.432826][ T32] r4:00000001 [ 2648.432844][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.432879][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.432904][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.432932][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.432957][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.433012][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.433215][ T32] r4:85b32900 [ 2648.438631][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.438676][ T32] INFO: task kworker/1:30:11142 blocked for more than 431 seconds. [ 2648.438713][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.438739][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.438761][ T32] task:kworker/1:30 state:D stack:0 pid:11142 tgid:11142 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.438821][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.438878][ T32] Call trace: [ 2648.438911][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.438998][ T32] r10:82918438 r9:dfcfdd84 r8:00000002 r7:60000113 r6:dfcfdd8c r5:868d8c00 [ 2648.439029][ T32] r4:868d8c00 [ 2648.439049][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.439089][ T32] r5:868d8c00 r4:82918434 [ 2648.439108][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.439144][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.439187][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 [ 2648.439272][ T32] r4:00000000 [ 2648.439307][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.439343][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.439383][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.439462][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8606ec80 [ 2648.439568][ T32] r4:00000000 [ 2648.439591][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.439691][ T32] r9:83018205 r8:868d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f288000 [ 2648.439718][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.439806][ T32] r5:00001000 r4:dff4b000 [ 2648.439857][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.439900][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.440007][ T32] r5:85a7178c r4:86f92480 [ 2648.440030][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.440077][ T32] r7:ddde2d40 r6:83018200 r5:85a7178c r4:86f92480 [ 2648.440098][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.440141][ T32] r10:61c88647 r9:868d8c00 r8:86f924ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.440184][ T32] r4:86f92480 [ 2648.440207][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.440273][ T32] r10:00000000 r9:86f92480 r8:8027ecf4 r7:e0555e60 r6:86a17880 r5:868d8c00 [ 2648.440303][ T32] r4:00000001 [ 2648.440322][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.440358][ T32] Exception stack(0xdfcfdfb0 to 0xdfcfdff8) [ 2648.440385][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.440433][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.440521][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.440555][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.440577][ T32] r4:85b49900 [ 2648.440772][ T32] INFO: task kworker/1:30:11142 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.440808][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.440866][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.440911][ T32] Call trace: [ 2648.440941][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.440988][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.441031][ T32] r4:00000000 [ 2648.441055][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.441142][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.441173][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.441202][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.441350][ T32] dd60: 80000113 ffffffff [ 2648.441381][ T32] r5:80000113 r4:80239bd0 [ 2648.441403][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.441446][ T32] r4:82abf064 [ 2648.441466][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.441510][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.441535][ T32] r4:e051ddc0 [ 2648.441557][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.441601][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.441622][ T32] r4:00000000 [ 2648.441640][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.441681][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.441702][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.441766][ T32] r5:00001000 r4:dfcf3000 [ 2648.441789][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.441886][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.441989][ T32] r5:86b22f8c r4:85d49100 [ 2648.442296][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.442348][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.442406][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.442493][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.442544][ T32] r4:85d49100 [ 2648.442566][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.442612][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.442634][ T32] r4:00000001 [ 2648.442657][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.442691][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.442716][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.442743][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.442906][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.443098][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.449126][ T32] r4:85b32900 [ 2648.449211][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.449256][ T32] INFO: task kworker/0:11:11780 blocked for more than 431 seconds. [ 2648.449336][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.449409][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.449461][ T32] task:kworker/0:11 state:D stack:0 pid:11780 tgid:11780 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.449607][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.449740][ T32] Call trace: [ 2648.449814][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.449917][ T32] r10:82918438 r9:dfd29d84 r8:00000002 r7:60000113 r6:dfd29d8c r5:86903000 [ 2648.449964][ T32] r4:86903000 [ 2648.450007][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.450091][ T32] r5:86903000 r4:82918434 [ 2648.450138][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.450214][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.450293][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 [ 2648.450335][ T32] r4:00000000 [ 2648.450356][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.450409][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.450467][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.450515][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86ce12c0 [ 2648.450539][ T32] r4:00000000 [ 2648.450611][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.450675][ T32] r9:83018005 r8:86903000 r7:00000000 r6:83018000 r5:00001000 r4:7f2ce000 [ 2648.450699][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.450744][ T32] r5:00001000 r4:dfeef000 [ 2648.450801][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.450847][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.450903][ T32] r5:85d9ab8c r4:85b29280 [ 2648.450927][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.450984][ T32] r7:dddced40 r6:83018000 r5:85d9ab8c r4:85b29280 [ 2648.451008][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.451056][ T32] r10:61c88647 r9:86903000 r8:85b292ac r7:82804d40 r6:dddced40 r5:dddced60 [ 2648.451078][ T32] r4:85b29280 [ 2648.451124][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.451173][ T32] r10:00000000 r9:85b29280 r8:8027ecf4 r7:dfa91e60 r6:861a7180 r5:86903000 [ 2648.451196][ T32] r4:00000001 [ 2648.451216][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.451252][ T32] Exception stack(0xdfd29fb0 to 0xdfd29ff8) [ 2648.451281][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2648.451316][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.451344][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.451374][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.451469][ T32] r4:85cb5080 [ 2648.451668][ T32] INFO: task kworker/0:11:11780 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.451703][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.452022][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.452088][ T32] Call trace: [ 2648.452128][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.452394][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.452448][ T32] r4:00000000 [ 2648.452491][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.452536][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.452570][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.452615][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.452642][ T32] dd60: 80000113 ffffffff [ 2648.452666][ T32] r5:80000113 r4:80239bd0 [ 2648.452688][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.452730][ T32] r4:82abf064 [ 2648.452783][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.452833][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.452870][ T32] r4:e051ddc0 [ 2648.452909][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.452959][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.452982][ T32] r4:00000000 [ 2648.453000][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.461226][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.461319][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.461463][ T32] r5:00001000 r4:dfcf3000 [ 2648.461492][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.461535][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.461583][ T32] r5:86b22f8c r4:85d49100 [ 2648.461617][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.461694][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.461737][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.461800][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.461829][ T32] r4:85d49100 [ 2648.461849][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.461894][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.461969][ T32] r4:00000001 [ 2648.461994][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.462033][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.462193][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.462225][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.462252][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.462280][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.462302][ T32] r4:85b32900 [ 2648.462333][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.462494][ T32] INFO: task kworker/0:21:13591 blocked for more than 431 seconds. [ 2648.462572][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.462618][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.462674][ T32] task:kworker/0:21 state:D stack:0 pid:13591 tgid:13591 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.462795][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.462893][ T32] Call trace: [ 2648.462989][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.468255][ T32] r10:82918438 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:85f98000 [ 2648.468754][ T32] r4:85f98000 [ 2648.468818][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.468894][ T32] r5:85f98000 r4:82918434 [ 2648.468994][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.469111][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.469167][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 [ 2648.469191][ T32] r4:00000000 [ 2648.469213][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.469251][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.469357][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.469438][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:864ee4c0 [ 2648.469488][ T32] r4:00000000 [ 2648.469662][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.469715][ T32] r9:83018005 r8:85f98000 r7:00000000 r6:83018000 r5:00001000 r4:7f35e000 [ 2648.470102][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.470177][ T32] r5:00001000 r4:e47cd000 [ 2648.470201][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.470242][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.470283][ T32] r5:86147b8c r4:86d0c800 [ 2648.470319][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.470372][ T32] r7:dddced40 r6:83018000 r5:86147b8c r4:86d0c800 [ 2648.470393][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.470438][ T32] r10:61c88647 r9:85f98000 r8:86d0c82c r7:82804d40 r6:dddced40 r5:dddced60 [ 2648.470460][ T32] r4:86d0c800 [ 2648.470479][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.470523][ T32] r10:00000000 r9:86d0c800 r8:8027ecf4 r7:dfbf9e60 r6:86d14100 r5:85f98000 [ 2648.470551][ T32] r4:00000001 [ 2648.470597][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.470750][ T32] Exception stack(0xdfb11fb0 to 0xdfb11ff8) [ 2648.470899][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2648.471046][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.471082][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.471208][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.471259][ T32] r4:86c016c0 [ 2648.471549][ T32] INFO: task kworker/0:21:13591 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.471604][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.471718][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.471873][ T32] Call trace: [ 2648.471936][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.471986][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.472011][ T32] r4:00000000 [ 2648.472076][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.472129][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.472201][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.472412][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.472490][ T32] dd60: 80000113 ffffffff [ 2648.472545][ T32] r5:80000113 r4:80239bd0 [ 2648.472585][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.472640][ T32] r4:82abf064 [ 2648.472669][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.472716][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.472781][ T32] r4:e051ddc0 [ 2648.472821][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.472908][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.472939][ T32] r4:00000000 [ 2648.472959][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.473107][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.479790][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.479994][ T32] r5:00001000 r4:dfcf3000 [ 2648.480023][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.480173][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.480223][ T32] r5:86b22f8c r4:85d49100 [ 2648.480244][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.480290][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.480311][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.480355][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.480378][ T32] r4:85d49100 [ 2648.480397][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.480440][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.480461][ T32] r4:00000001 [ 2648.480480][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.480515][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.480665][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.480799][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.480852][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.480885][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.480908][ T32] r4:85b32900 [ 2648.480933][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.481085][ T32] INFO: task kworker/0:22:13592 blocked for more than 431 seconds. [ 2648.481148][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.481433][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.481476][ T32] task:kworker/0:22 state:D stack:0 pid:13592 tgid:13592 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.481555][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.481716][ T32] Call trace: [ 2648.481818][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.481874][ T32] r10:82918438 r9:dfba5d84 r8:00000002 r7:60000013 r6:dfba5d8c r5:86e7bc00 [ 2648.481908][ T32] r4:86e7bc00 [ 2648.481950][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.482024][ T32] r5:86e7bc00 r4:82918434 [ 2648.482069][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.482147][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.482200][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 [ 2648.482249][ T32] r4:00000000 [ 2648.482331][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.482552][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.482672][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.482767][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cd11c0 [ 2648.482811][ T32] r4:00000000 [ 2648.482884][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.482938][ T32] r9:83018005 r8:86e7bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f25a000 [ 2648.483063][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.489627][ T32] r5:00001000 r4:dfe73000 [ 2648.489681][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.489773][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.489831][ T32] r5:862b178c r4:86d0cd00 [ 2648.489857][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.489905][ T32] r7:dddced40 r6:83018000 r5:862b178c r4:86d0cd00 [ 2648.489963][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.490023][ T32] r10:61c88647 r9:86e7bc00 r8:86d0cd2c r7:82804d40 r6:dddced40 r5:dddced60 [ 2648.490090][ T32] r4:86d0cd00 [ 2648.490120][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.490171][ T32] r10:00000000 r9:86d0cd00 r8:8027ecf4 r7:dfb11e60 r6:86d14980 r5:86e7bc00 [ 2648.490196][ T32] r4:00000001 [ 2648.490216][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.490261][ T32] Exception stack(0xdfba5fb0 to 0xdfba5ff8) [ 2648.490296][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2648.490410][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.490448][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.490479][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.490501][ T32] r4:86c014c0 [ 2648.490733][ T32] INFO: task kworker/0:22:13592 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.490772][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.490849][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.490900][ T32] Call trace: [ 2648.491037][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.491124][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.491171][ T32] r4:00000000 [ 2648.491194][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.491238][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.491270][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.491299][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.491382][ T32] dd60: 80000113 ffffffff [ 2648.491414][ T32] r5:80000113 r4:80239bd0 [ 2648.491434][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.491484][ T32] r4:82abf064 [ 2648.491506][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.491574][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.491602][ T32] r4:e051ddc0 [ 2648.491627][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.491675][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.491698][ T32] r4:00000000 [ 2648.491718][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.491764][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.491785][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.491824][ T32] r5:00001000 r4:dfcf3000 [ 2648.491844][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.491882][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.491925][ T32] r5:86b22f8c r4:85d49100 [ 2648.492036][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.492088][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.492316][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.492367][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.492389][ T32] r4:85d49100 [ 2648.492408][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.492581][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.492608][ T32] r4:00000001 [ 2648.492629][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.492665][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.492691][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.492720][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.492747][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.492775][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.492831][ T32] r4:85b32900 [ 2648.492859][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.492898][ T32] INFO: task kworker/1:5:13648 blocked for more than 431 seconds. [ 2648.492937][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.492969][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.498719][ T32] task:kworker/1:5 state:D stack:0 pid:13648 tgid:13648 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.498823][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.498887][ T32] Call trace: [ 2648.498923][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.498977][ T32] r10:82918438 r9:dfc41d84 r8:00000002 r7:60000013 r6:dfc41d8c r5:868dbc00 [ 2648.499000][ T32] r4:868dbc00 [ 2648.499020][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.499059][ T32] r5:868dbc00 r4:82918434 [ 2648.499079][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.499116][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.499160][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 [ 2648.499366][ T32] r4:00000000 [ 2648.499390][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.499427][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.499469][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.499513][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cdda00 [ 2648.499535][ T32] r4:00000000 [ 2648.499554][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.499609][ T32] r9:83018205 r8:868dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f306000 [ 2648.499632][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.499672][ T32] r5:00001000 r4:e0081000 [ 2648.499691][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.499728][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.499769][ T32] r5:85ec2f8c r4:86d14580 [ 2648.499788][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.499833][ T32] r7:ddde2d40 r6:83018200 r5:85ec2f8c r4:86d14580 [ 2648.499853][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.499897][ T32] r10:61c88647 r9:868dbc00 r8:86d145ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.499920][ T32] r4:86d14580 [ 2648.499939][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.499982][ T32] r10:00000000 r9:86d14580 r8:8027ecf4 r7:e0639e60 r6:86d14200 r5:868dbc00 [ 2648.500003][ T32] r4:00000001 [ 2648.500022][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.500057][ T32] Exception stack(0xdfc41fb0 to 0xdfc41ff8) [ 2648.500084][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2648.500111][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.500137][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.500165][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.500229][ T32] r4:861c4540 [ 2648.500502][ T32] INFO: task kworker/1:5:13648 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.500538][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.500729][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.500781][ T32] Call trace: [ 2648.501081][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.501174][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.501208][ T32] r4:00000000 [ 2648.501230][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.501295][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.501334][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.501366][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.501392][ T32] dd60: 80000113 ffffffff [ 2648.501416][ T32] r5:80000113 r4:80239bd0 [ 2648.501438][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.501488][ T32] r4:82abf064 [ 2648.501512][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.501629][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.501660][ T32] r4:e051ddc0 [ 2648.501708][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.501807][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.501835][ T32] r4:00000000 [ 2648.501856][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.501901][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.501972][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.502018][ T32] r5:00001000 r4:dfcf3000 [ 2648.502039][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.502085][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.502183][ T32] r5:86b22f8c r4:85d49100 [ 2648.502305][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.502362][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.502419][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.502477][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.502506][ T32] r4:85d49100 [ 2648.502527][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.502587][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.502612][ T32] r4:00000001 [ 2648.502632][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.502746][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.502875][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.502910][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.502940][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.503022][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.508663][ T32] r4:85b32900 [ 2648.508745][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.508831][ T32] INFO: task kworker/1:12:13664 blocked for more than 431 seconds. [ 2648.508876][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.508931][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.508990][ T32] task:kworker/1:12 state:D stack:0 pid:13664 tgid:13664 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.509140][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.509262][ T32] Call trace: [ 2648.509356][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.509420][ T32] r10:82918438 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:86045400 [ 2648.509473][ T32] r4:86045400 [ 2648.509531][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.509608][ T32] r5:86045400 r4:82918434 [ 2648.509664][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.509711][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.509761][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 [ 2648.509813][ T32] r4:00000000 [ 2648.509836][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.509888][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.509936][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.509982][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f9e80 [ 2648.510006][ T32] r4:00000000 [ 2648.510025][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.510072][ T32] r9:83018205 r8:86045400 r7:00000000 r6:83018200 r5:00001000 r4:7f344000 [ 2648.510124][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.510169][ T32] r5:00001000 r4:e0427000 [ 2648.510189][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.510258][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.510322][ T32] r5:857b838c r4:86d14080 [ 2648.510382][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.510436][ T32] r7:ddde2d40 r6:83018200 r5:857b838c r4:86d14080 [ 2648.510500][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.510550][ T32] r10:61c88647 r9:86045400 r8:86d140ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.510573][ T32] r4:86d14080 [ 2648.510596][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.510641][ T32] r10:00000000 r9:86d14080 r8:8027ecf4 r7:dfa95e60 r6:86d0c300 r5:86045400 [ 2648.510668][ T32] r4:00000001 [ 2648.510722][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.510796][ T32] Exception stack(0xdfc69fb0 to 0xdfc69ff8) [ 2648.510831][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2648.510890][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.510934][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.510967][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.510989][ T32] r4:863e1780 [ 2648.511222][ T32] INFO: task kworker/1:12:13664 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.511258][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.511389][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.511502][ T32] Call trace: [ 2648.511534][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.511580][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.511603][ T32] r4:00000000 [ 2648.511621][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.511687][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.511750][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.511782][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.511835][ T32] dd60: 80000113 ffffffff [ 2648.511861][ T32] r5:80000113 r4:80239bd0 [ 2648.511910][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.511985][ T32] r4:82abf064 [ 2648.512040][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.512124][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.512149][ T32] r4:e051ddc0 [ 2648.512204][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.512253][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.512276][ T32] r4:00000000 [ 2648.512323][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.512376][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.512399][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.512469][ T32] r5:00001000 r4:dfcf3000 [ 2648.512492][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.512532][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.512574][ T32] r5:86b22f8c r4:85d49100 [ 2648.512625][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.512675][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.512729][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.512780][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.512836][ T32] r4:85d49100 [ 2648.512858][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.512902][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.512946][ T32] r4:00000001 [ 2648.513099][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.518857][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.518933][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.519000][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.519030][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.519064][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.519087][ T32] r4:85b32900 [ 2648.519110][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.519171][ T32] INFO: task kworker/1:14:13665 blocked for more than 431 seconds. [ 2648.519209][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.519403][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.519434][ T32] task:kworker/1:14 state:D stack:0 pid:13665 tgid:13665 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.519521][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.519582][ T32] Call trace: [ 2648.519643][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.519718][ T32] r10:82918438 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:86040000 [ 2648.519774][ T32] r4:86040000 [ 2648.519798][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.519851][ T32] r5:86040000 r4:82918434 [ 2648.519873][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.519942][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.519991][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 [ 2648.520014][ T32] r4:00000000 [ 2648.520065][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.520124][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.520198][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.520277][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86003a40 [ 2648.520314][ T32] r4:00000000 [ 2648.520346][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.520396][ T32] r9:83018205 r8:86040000 r7:00000000 r6:83018200 r5:00001000 r4:7f342000 [ 2648.520447][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.520492][ T32] r5:00001000 r4:e040b000 [ 2648.520513][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.520552][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.520623][ T32] r5:85ec278c r4:86d14880 [ 2648.520646][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.520694][ T32] r7:ddde2d40 r6:83018200 r5:85ec278c r4:86d14880 [ 2648.520715][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.520761][ T32] r10:61c88647 r9:86040000 r8:86d148ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.520783][ T32] r4:86d14880 [ 2648.520804][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.520848][ T32] r10:00000000 r9:86d14880 r8:8027ecf4 r7:dfc69e60 r6:86d0cb80 r5:86040000 [ 2648.520870][ T32] r4:00000001 [ 2648.520919][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.520990][ T32] Exception stack(0xdfc01fb0 to 0xdfc01ff8) [ 2648.521021][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2648.521050][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.521152][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.521210][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.521251][ T32] r4:863e1b40 [ 2648.521429][ T32] INFO: task kworker/1:14:13665 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.521489][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.521615][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.521665][ T32] Call trace: [ 2648.521694][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.521771][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.521830][ T32] r4:00000000 [ 2648.521867][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.521920][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.521953][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.521983][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.522006][ T32] dd60: 80000113 ffffffff [ 2648.522045][ T32] r5:80000113 r4:80239bd0 [ 2648.522072][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.522116][ T32] r4:82abf064 [ 2648.522137][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.522215][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.522240][ T32] r4:e051ddc0 [ 2648.522274][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.522351][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.522377][ T32] r4:00000000 [ 2648.522397][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.522462][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.522498][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.522569][ T32] r5:00001000 r4:dfcf3000 [ 2648.522598][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.522638][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.522680][ T32] r5:86b22f8c r4:85d49100 [ 2648.522715][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.522768][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.522790][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.522837][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.522860][ T32] r4:85d49100 [ 2648.522911][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.522965][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.528086][ T32] r4:00000001 [ 2648.528152][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.528219][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.528256][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.528284][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.528309][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.528344][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.528366][ T32] r4:85b32900 [ 2648.528388][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.529332][ T32] INFO: task kworker/1:15:13673 blocked for more than 431 seconds. [ 2648.529384][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.529410][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.529432][ T32] task:kworker/1:15 state:D stack:0 pid:13673 tgid:13673 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.529486][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.529536][ T32] Call trace: [ 2648.529568][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.529653][ T32] r10:82918438 r9:dfc9dd84 r8:00000002 r7:60000113 r6:dfc9dd8c r5:86044800 [ 2648.529681][ T32] r4:86044800 [ 2648.529702][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.529742][ T32] r5:86044800 r4:82918434 [ 2648.529761][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.529796][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.530348][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc9de08 [ 2648.530426][ T32] r4:00000000 [ 2648.530468][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.530546][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.530620][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.530676][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86003180 [ 2648.530701][ T32] r4:00000000 [ 2648.530720][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.530765][ T32] r9:83018205 r8:86044800 r7:00000000 r6:83018200 r5:00001000 r4:7f340000 [ 2648.530797][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.530843][ T32] r5:00001000 r4:e0405000 [ 2648.530863][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.530900][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.530941][ T32] r5:85ec2b8c r4:85877000 [ 2648.530960][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.531006][ T32] r7:ddde2d40 r6:83018200 r5:85ec2b8c r4:85877000 [ 2648.531026][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.531115][ T32] r10:61c88647 r9:86044800 r8:8587702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.531151][ T32] r4:85877000 [ 2648.531202][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.531253][ T32] r10:00000000 r9:85877000 r8:8027ecf4 r7:dfc41e60 r6:86d0c500 r5:86044800 [ 2648.531275][ T32] r4:00000001 [ 2648.531294][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.531354][ T32] Exception stack(0xdfc9dfb0 to 0xdfc9dff8) [ 2648.531391][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.531455][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.531486][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.531515][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.531536][ T32] r4:860840c0 [ 2648.531704][ T32] INFO: task kworker/1:15:13673 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.531736][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.531877][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.531927][ T32] Call trace: [ 2648.531959][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.532004][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.532027][ T32] r4:00000000 [ 2648.532060][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.532101][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.532131][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.532184][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.532210][ T32] dd60: 80000113 ffffffff [ 2648.532234][ T32] r5:80000113 r4:80239bd0 [ 2648.532254][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.532294][ T32] r4:82abf064 [ 2648.532313][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.532398][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.532453][ T32] r4:e051ddc0 [ 2648.532487][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.532568][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.532593][ T32] r4:00000000 [ 2648.532613][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.532678][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.532702][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.532763][ T32] r5:00001000 r4:dfcf3000 [ 2648.532786][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.532824][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.532863][ T32] r5:86b22f8c r4:85d49100 [ 2648.532906][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.532999][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.533058][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.538770][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.538815][ T32] r4:85d49100 [ 2648.538837][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.538900][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.538923][ T32] r4:00000001 [ 2648.538956][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.539028][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.539065][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.539095][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.539121][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.539183][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.539209][ T32] r4:85b32900 [ 2648.539232][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.539292][ T32] INFO: task kworker/1:16:14300 blocked for more than 431 seconds. [ 2648.539358][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.539418][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.539477][ T32] task:kworker/1:16 state:D stack:0 pid:14300 tgid:14300 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.539591][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.539645][ T32] Call trace: [ 2648.539718][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.539766][ T32] r10:82918438 r9:e0481d84 r8:00000002 r7:60000113 r6:e0481d8c r5:86e7a400 [ 2648.539789][ T32] r4:86e7a400 [ 2648.539837][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.539879][ T32] r5:86e7a400 r4:82918434 [ 2648.539932][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.539972][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.540051][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08 [ 2648.540087][ T32] r4:00000000 [ 2648.540141][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.540210][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.540286][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.540337][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86003140 [ 2648.540400][ T32] r4:00000000 [ 2648.540422][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.540495][ T32] r9:83018205 r8:86e7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f346000 [ 2648.540520][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.540561][ T32] r5:00001000 r4:e0441000 [ 2648.540601][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.540641][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.540681][ T32] r5:85ec1b8c r4:86f28280 [ 2648.540700][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.540773][ T32] r7:ddde2d40 r6:83018200 r5:85ec1b8c r4:86f28280 [ 2648.540826][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.540906][ T32] r10:61c88647 r9:86e7a400 r8:86f282ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.540933][ T32] r4:86f28280 [ 2648.540953][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.540996][ T32] r10:00000000 r9:86f28280 r8:8027ecf4 r7:dfa55e60 r6:861e5f80 r5:86e7a400 [ 2648.541053][ T32] r4:00000001 [ 2648.541150][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.541195][ T32] Exception stack(0xe0481fb0 to 0xe0481ff8) [ 2648.541222][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2648.541274][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.541337][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.541406][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.541433][ T32] r4:869fa600 [ 2648.541636][ T32] INFO: task kworker/1:16:14300 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.541702][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.541809][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.541889][ T32] Call trace: [ 2648.541950][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.542000][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.542056][ T32] r4:00000000 [ 2648.542077][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.542151][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.542185][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.542213][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.542237][ T32] dd60: 80000113 ffffffff [ 2648.542295][ T32] r5:80000113 r4:80239bd0 [ 2648.542318][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.542366][ T32] r4:82abf064 [ 2648.542418][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.542491][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.542536][ T32] r4:e051ddc0 [ 2648.542558][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.542639][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.542684][ T32] r4:00000000 [ 2648.542734][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.542781][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.542834][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.542879][ T32] r5:00001000 r4:dfcf3000 [ 2648.542931][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.543081][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.562517][ T32] r5:86b22f8c r4:85d49100 [ 2648.562563][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.562637][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.562658][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.562703][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.562725][ T32] r4:85d49100 [ 2648.562744][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.562786][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.562808][ T32] r4:00000001 [ 2648.562881][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.562947][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.572519][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.572634][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.572669][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.572731][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.572759][ T32] r4:85b32900 [ 2648.572783][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.572843][ T32] INFO: task kworker/1:17:14307 blocked for more than 431 seconds. [ 2648.572881][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.572938][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.572976][ T32] task:kworker/1:17 state:D stack:0 pid:14307 tgid:14307 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.578393][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.578467][ T32] Call trace: [ 2648.578561][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.578661][ T32] r10:82918438 r9:dfa75d84 r8:00000002 r7:60010013 r6:dfa75d8c r5:86e73000 [ 2648.578690][ T32] r4:86e73000 [ 2648.578722][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.578786][ T32] r5:86e73000 r4:82918434 [ 2648.578808][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.578845][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.578918][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 [ 2648.578964][ T32] r4:00000000 [ 2648.578986][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.579064][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.579110][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.579184][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85850fc0 [ 2648.579211][ T32] r4:00000000 [ 2648.579260][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.579309][ T32] r9:83018205 r8:86e73000 r7:00000000 r6:83018200 r5:00001000 r4:7f356000 [ 2648.579364][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.579443][ T32] r5:00001000 r4:e0711000 [ 2648.579488][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.579580][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.579689][ T32] r5:85d64b8c r4:85ddae80 [ 2648.579714][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.579761][ T32] r7:ddde2d40 r6:83018200 r5:85d64b8c r4:85ddae80 [ 2648.579782][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.579826][ T32] r10:61c88647 r9:86e73000 r8:85ddaeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.579848][ T32] r4:85ddae80 [ 2648.579867][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.579909][ T32] r10:00000000 r9:85ddae80 r8:8027ecf4 r7:dfa55e60 r6:861e5480 r5:86e73000 [ 2648.579931][ T32] r4:00000001 [ 2648.579949][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.579983][ T32] Exception stack(0xdfa75fb0 to 0xdfa75ff8) [ 2648.580039][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2648.580071][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.580097][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.580153][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.580179][ T32] r4:862d5f80 [ 2648.580376][ T32] INFO: task kworker/1:17:14307 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.580416][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.580510][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.580554][ T32] Call trace: [ 2648.580587][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.580682][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.580733][ T32] r4:00000000 [ 2648.580860][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.580945][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.581003][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.581078][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.581140][ T32] dd60: 80000113 ffffffff [ 2648.581190][ T32] r5:80000113 r4:80239bd0 [ 2648.581232][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.581341][ T32] r4:82abf064 [ 2648.581393][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.581584][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.581642][ T32] r4:e051ddc0 [ 2648.581681][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.581827][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.581880][ T32] r4:00000000 [ 2648.581948][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.582040][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.582507][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.582598][ T32] r5:00001000 r4:dfcf3000 [ 2648.582639][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.582717][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.582803][ T32] r5:86b22f8c r4:85d49100 [ 2648.582842][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.582980][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.592691][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.592850][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.592904][ T32] r4:85d49100 [ 2648.592944][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.599084][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.599159][ T32] r4:00000001 [ 2648.599198][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.599251][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.599281][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.599309][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.599340][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.599372][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.599394][ T32] r4:85b32900 [ 2648.599417][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.599446][ T32] INFO: task kworker/1:31:14308 blocked for more than 431 seconds. [ 2648.599480][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.599505][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.599526][ T32] task:kworker/1:31 state:D stack:0 pid:14308 tgid:14308 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.599584][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.599631][ T32] Call trace: [ 2648.599661][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.599707][ T32] r10:82918438 r9:e0089d84 r8:00000002 r7:60000113 r6:e0089d8c r5:86e74800 [ 2648.599729][ T32] r4:86e74800 [ 2648.599748][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.599784][ T32] r5:86e74800 r4:82918434 [ 2648.599803][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.599838][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.599879][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0089e08 [ 2648.599901][ T32] r4:00000000 [ 2648.599919][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.599954][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.599994][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.600036][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86c433c0 [ 2648.600057][ T32] r4:00000000 [ 2648.600076][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.600119][ T32] r9:83018205 r8:86e74800 r7:00000000 r6:83018200 r5:00001000 r4:7f360000 [ 2648.600139][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.600177][ T32] r5:00001000 r4:e880d000 [ 2648.600196][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.600232][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.600272][ T32] r5:85d6778c r4:85ddab00 [ 2648.600291][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.600339][ T32] r7:ddde2d40 r6:83018200 r5:85d6778c r4:85ddab00 [ 2648.600359][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.600403][ T32] r10:61c88647 r9:86e74800 r8:85ddab2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.600424][ T32] r4:85ddab00 [ 2648.600442][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.600483][ T32] r10:00000000 r9:85ddab00 r8:8027ecf4 r7:dfa75e60 r6:861e5380 r5:86e74800 [ 2648.600503][ T32] r4:00000001 [ 2648.600521][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.600555][ T32] Exception stack(0xe0089fb0 to 0xe0089ff8) [ 2648.600584][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2648.600612][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.600638][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.600665][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.600686][ T32] r4:85d4c540 [ 2648.600850][ T32] INFO: task kworker/1:31:14308 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.600880][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.600934][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.601010][ T32] Call trace: [ 2648.601082][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.601187][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.601216][ T32] r4:00000000 [ 2648.601256][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.601296][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.601354][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.601387][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.601441][ T32] dd60: 80000113 ffffffff [ 2648.601468][ T32] r5:80000113 r4:80239bd0 [ 2648.601488][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.601529][ T32] r4:82abf064 [ 2648.601548][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.601634][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.601660][ T32] r4:e051ddc0 [ 2648.601679][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.601756][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.601783][ T32] r4:00000000 [ 2648.601802][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.601845][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.601865][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.601932][ T32] r5:00001000 r4:dfcf3000 [ 2648.601988][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.602029][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.602070][ T32] r5:86b22f8c r4:85d49100 [ 2648.602088][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.602146][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.602213][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.602265][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.602287][ T32] r4:85d49100 [ 2648.602316][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.602367][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.602405][ T32] r4:00000001 [ 2648.602480][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.602556][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.602588][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.602616][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.602675][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.602707][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.602730][ T32] r4:85b32900 [ 2648.602749][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.602802][ T32] INFO: task kworker/1:33:14309 blocked for more than 431 seconds. [ 2648.602861][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.602888][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.602908][ T32] task:kworker/1:33 state:D stack:0 pid:14309 tgid:14309 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.602978][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.605886][ T32] Call trace: [ 2648.606329][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.606460][ T32] r10:82918438 r9:e0491d84 r8:00000002 r7:60000113 r6:e0491d8c r5:86e78000 [ 2648.606531][ T32] r4:86e78000 [ 2648.606738][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.606831][ T32] r5:86e78000 r4:82918434 [ 2648.606936][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.607026][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.607121][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0491e08 [ 2648.607170][ T32] r4:00000000 [ 2648.607212][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.607318][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.607410][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.607520][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8606e340 [ 2648.607574][ T32] r4:00000000 [ 2648.607642][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.607746][ T32] r9:83018205 r8:86e78000 r7:00000000 r6:83018200 r5:00001000 r4:7f358000 [ 2648.607793][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.607878][ T32] r5:00001000 r4:e073d000 [ 2648.607922][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.608001][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.608084][ T32] r5:85ffe78c r4:85dda600 [ 2648.608125][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.608242][ T32] r7:ddde2d40 r6:83018200 r5:85ffe78c r4:85dda600 [ 2648.608293][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.608390][ T32] r10:61c88647 r9:86e78000 r8:85dda62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.608438][ T32] r4:85dda600 [ 2648.608478][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.608598][ T32] r10:00000000 r9:85dda600 r8:8027ecf4 r7:e0089e60 r6:861e5000 r5:86e78000 [ 2648.608697][ T32] r4:00000001 [ 2648.608804][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.608949][ T32] Exception stack(0xe0491fb0 to 0xe0491ff8) [ 2648.609013][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2648.609092][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.609153][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.609249][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.609303][ T32] r4:85d4c3c0 [ 2648.609596][ T32] INFO: task kworker/1:33:14309 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.609660][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.609886][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.610088][ T32] Call trace: [ 2648.610156][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.610246][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.610298][ T32] r4:00000000 [ 2648.610342][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.610416][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.610524][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.610616][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.610743][ T32] dd60: 80000113 ffffffff [ 2648.610799][ T32] r5:80000113 r4:80239bd0 [ 2648.610844][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.610957][ T32] r4:82abf064 [ 2648.611007][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.611103][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.611152][ T32] r4:e051ddc0 [ 2648.611193][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.611283][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.611330][ T32] r4:00000000 [ 2648.611414][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.611509][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.611555][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.612140][ T32] r5:00001000 r4:dfcf3000 [ 2648.612206][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.612292][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.612380][ T32] r5:86b22f8c r4:85d49100 [ 2648.612425][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.612516][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.612576][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.612676][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.612972][ T32] r4:85d49100 [ 2648.613715][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.613958][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.614018][ T32] r4:00000001 [ 2648.614061][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.614135][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.614191][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.614251][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.614310][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.614369][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.614611][ T32] r4:85b32900 [ 2648.614667][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.614724][ T32] INFO: task kworker/1:34:14310 blocked for more than 431 seconds. [ 2648.614786][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.614838][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.614882][ T32] task:kworker/1:34 state:D stack:0 pid:14310 tgid:14310 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.615198][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.615306][ T32] Call trace: [ 2648.615380][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.615478][ T32] r10:82918438 r9:e057dd84 r8:00000002 r7:60000113 r6:e057dd8c r5:8325a400 [ 2648.615592][ T32] r4:8325a400 [ 2648.615739][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.615827][ T32] r5:8325a400 r4:82918434 [ 2648.615873][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.615952][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.616039][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e057de08 [ 2648.616086][ T32] r4:00000000 [ 2648.616127][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.616207][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.616416][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.616516][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86264e80 [ 2648.616564][ T32] r4:00000000 [ 2648.616616][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.616705][ T32] r9:83018205 r8:8325a400 r7:00000000 r6:83018200 r5:00001000 r4:7f354000 [ 2648.616763][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.616849][ T32] r5:00001000 r4:e06af000 [ 2648.616892][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.616972][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.617081][ T32] r5:85ec078c r4:85dda080 [ 2648.617171][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.617269][ T32] r7:ddde2d40 r6:83018200 r5:85ec078c r4:85dda080 [ 2648.617314][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.617408][ T32] r10:61c88647 r9:8325a400 r8:85dda0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.617458][ T32] r4:85dda080 [ 2648.617499][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.617623][ T32] r10:00000000 r9:85dda080 r8:8027ecf4 r7:e0491e60 r6:861e5300 r5:8325a400 [ 2648.617676][ T32] r4:00000001 [ 2648.617717][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.618159][ T32] Exception stack(0xe057dfb0 to 0xe057dff8) [ 2648.618266][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.618501][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.618566][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.619332][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.619390][ T32] r4:85d4cd00 [ 2648.619703][ T32] INFO: task kworker/1:34:14310 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.619842][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.620120][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.620209][ T32] Call trace: [ 2648.620270][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.620423][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.620481][ T32] r4:00000000 [ 2648.620525][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.620613][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.620677][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.620750][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.620805][ T32] dd60: 80000113 ffffffff [ 2648.620877][ T32] r5:80000113 r4:80239bd0 [ 2648.620927][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.621012][ T32] r4:82abf064 [ 2648.621095][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.621196][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.621259][ T32] r4:e051ddc0 [ 2648.621302][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.621394][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.621500][ T32] r4:00000000 [ 2648.621583][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.621691][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.621797][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.621915][ T32] r5:00001000 r4:dfcf3000 [ 2648.621962][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.622089][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.622193][ T32] r5:86b22f8c r4:85d49100 [ 2648.622240][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.622496][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.622612][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.622724][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.622773][ T32] r4:85d49100 [ 2648.622818][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.622908][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.622957][ T32] r4:00000001 [ 2648.624306][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.624459][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.624521][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.624591][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.624695][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.624767][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.624818][ T32] r4:85b32900 [ 2648.624865][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.624922][ T32] INFO: task kworker/1:35:14311 blocked for more than 431 seconds. [ 2648.624984][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.625080][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.625138][ T32] task:kworker/1:35 state:D stack:0 pid:14311 tgid:14311 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.625297][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.625661][ T32] Call trace: [ 2648.625730][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.625828][ T32] r10:82918438 r9:e0581d84 r8:00000002 r7:60000113 r6:e0581d8c r5:86e5ec00 [ 2648.625879][ T32] r4:86e5ec00 [ 2648.625922][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.626011][ T32] r5:86e5ec00 r4:82918434 [ 2648.626059][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.626138][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.626232][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 [ 2648.626280][ T32] r4:00000000 [ 2648.626323][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.626400][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.626488][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.626587][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86d5bb40 [ 2648.626671][ T32] r4:00000000 [ 2648.626799][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.626901][ T32] r9:83018205 r8:86e5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f34e000 [ 2648.626949][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.627032][ T32] r5:00001000 r4:e062f000 [ 2648.627079][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.627162][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.627245][ T32] r5:8685bf8c r4:85dda180 [ 2648.627287][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.627380][ T32] r7:ddde2d40 r6:83018200 r5:8685bf8c r4:85dda180 [ 2648.627426][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.627524][ T32] r10:61c88647 r9:86e5ec00 r8:85dda1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.627573][ T32] r4:85dda180 [ 2648.627623][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.627713][ T32] r10:00000000 r9:85dda180 r8:8027ecf4 r7:e057de60 r6:861e5100 r5:86e5ec00 [ 2648.627762][ T32] r4:00000001 [ 2648.627804][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.627877][ T32] Exception stack(0xe0581fb0 to 0xe0581ff8) [ 2648.627934][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2648.628000][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.628061][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.628122][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.628169][ T32] r4:85d4c800 [ 2648.628454][ T32] INFO: task kworker/1:35:14311 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.628534][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.628696][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.628785][ T32] Call trace: [ 2648.628849][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.628939][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.628991][ T32] r4:00000000 [ 2648.629059][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.629160][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.629228][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.629297][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.629352][ T32] dd60: 80000113 ffffffff [ 2648.629405][ T32] r5:80000113 r4:80239bd0 [ 2648.629471][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.629564][ T32] r4:82abf064 [ 2648.629618][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.629715][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.629853][ T32] r4:e051ddc0 [ 2648.629903][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.630306][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.630364][ T32] r4:00000000 [ 2648.630409][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.630510][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.630558][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.630646][ T32] r5:00001000 r4:dfcf3000 [ 2648.630689][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.630765][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.630921][ T32] r5:86b22f8c r4:85d49100 [ 2648.630973][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.631069][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.631167][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.631267][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.631317][ T32] r4:85d49100 [ 2648.631362][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.631453][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.631545][ T32] r4:00000001 [ 2648.631611][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.631688][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.631846][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.631913][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.632023][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.632092][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.632143][ T32] r4:85b32900 [ 2648.632189][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.632238][ T32] INFO: task kworker/1:36:14312 blocked for more than 431 seconds. [ 2648.632300][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.632354][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.632437][ T32] task:kworker/1:36 state:D stack:0 pid:14312 tgid:14312 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.632539][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.632651][ T32] Call trace: [ 2648.632718][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.632811][ T32] r10:82918438 r9:e0585d84 r8:00000002 r7:60010113 r6:e0585d8c r5:86e5bc00 [ 2648.632859][ T32] r4:86e5bc00 [ 2648.632901][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.632986][ T32] r5:86e5bc00 r4:82918434 [ 2648.641677][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.641835][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.641935][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08 [ 2648.642087][ T32] r4:00000000 [ 2648.642139][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.642216][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.642304][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.642397][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:864e5880 [ 2648.642448][ T32] r4:00000000 [ 2648.642490][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.642631][ T32] r9:83018205 r8:86e5bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f350000 [ 2648.642688][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.642781][ T32] r5:00001000 r4:e0657000 [ 2648.642827][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.642906][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.643059][ T32] r5:858cff8c r4:85dda200 [ 2648.652068][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.652223][ T32] r7:ddde2d40 r6:83018200 r5:858cff8c r4:85dda200 [ 2648.652282][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.652378][ T32] r10:61c88647 r9:86e5bc00 r8:85dda22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.652449][ T32] r4:85dda200 [ 2648.652533][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.652638][ T32] r10:00000000 r9:85dda200 r8:8027ecf4 r7:e0581e60 r6:861e5080 r5:86e5bc00 [ 2648.652686][ T32] r4:00000001 [ 2648.652837][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.652920][ T32] Exception stack(0xe0585fb0 to 0xe0585ff8) [ 2648.652977][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2648.653137][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.661397][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.661479][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.661534][ T32] r4:85d4cb00 [ 2648.661852][ T32] INFO: task kworker/1:36:14312 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.661927][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.662397][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.662559][ T32] Call trace: [ 2648.662861][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.662965][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.692731][ T32] r4:00000000 [ 2648.692868][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.692993][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.700962][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.701110][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.701168][ T32] dd60: 80000113 ffffffff [ 2648.701228][ T32] r5:80000113 r4:80239bd0 [ 2648.701301][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.701419][ T32] r4:82abf064 [ 2648.701466][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.701559][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.701613][ T32] r4:e051ddc0 [ 2648.701669][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.701763][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.701813][ T32] r4:00000000 [ 2648.701879][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.701981][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.702126][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.702223][ T32] r5:00001000 r4:dfcf3000 [ 2648.702270][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.702363][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.702510][ T32] r5:86b22f8c r4:85d49100 [ 2648.702563][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.702724][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.702779][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.702874][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.702924][ T32] r4:85d49100 [ 2648.702968][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.703156][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.711702][ T32] r4:00000001 [ 2648.711769][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.711872][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.711935][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.711997][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.712055][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.712120][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.712169][ T32] r4:85b32900 [ 2648.712222][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.721695][ T32] INFO: task kworker/1:37:14364 blocked for more than 431 seconds. [ 2648.722819][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.722940][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.723004][ T32] task:kworker/1:37 state:D stack:0 pid:14364 tgid:14364 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.731841][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.732012][ T32] Call trace: [ 2648.732176][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.732295][ T32] r10:82918438 r9:e881dd84 r8:00000002 r7:60000113 r6:e881dd8c r5:8571c800 [ 2648.732355][ T32] r4:8571c800 [ 2648.732404][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.732545][ T32] r5:8571c800 r4:82918434 [ 2648.732664][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.732807][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.732965][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e881de08 [ 2648.733046][ T32] r4:00000000 [ 2648.733199][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.741665][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.741810][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.741912][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86f86400 [ 2648.741965][ T32] r4:00000000 [ 2648.742289][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.742406][ T32] r9:83018205 r8:8571c800 r7:00000000 r6:83018200 r5:00001000 r4:7f362000 [ 2648.742513][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.742615][ T32] r5:00001000 r4:e8835000 [ 2648.742663][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.742747][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.742836][ T32] r5:8614638c r4:85dda780 [ 2648.742883][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.742983][ T32] r7:ddde2d40 r6:83018200 r5:8614638c r4:85dda780 [ 2648.743149][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.751592][ T32] r10:61c88647 r9:8571c800 r8:85dda7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.751685][ T32] r4:85dda780 [ 2648.751741][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.751864][ T32] r10:00000000 r9:85dda780 r8:8027ecf4 r7:dfa55e60 r6:85c78f80 r5:8571c800 [ 2648.751916][ T32] r4:00000001 [ 2648.751963][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.752041][ T32] Exception stack(0xe881dfb0 to 0xe881dff8) [ 2648.752120][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.752201][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.752260][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.752365][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.752433][ T32] r4:86f86540 [ 2648.752756][ T32] INFO: task kworker/1:37:14364 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.752827][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.753007][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.762346][ T32] Call trace: [ 2648.762499][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.762630][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.762688][ T32] r4:00000000 [ 2648.762737][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.762822][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.762893][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.762956][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.763009][ T32] dd60: 80000113 ffffffff [ 2648.771435][ T32] r5:80000113 r4:80239bd0 [ 2648.771579][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.771705][ T32] r4:82abf064 [ 2648.771752][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.771866][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.771925][ T32] r4:e051ddc0 [ 2648.771972][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.772069][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.772134][ T32] r4:00000000 [ 2648.772202][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.772306][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.772365][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.772456][ T32] r5:00001000 r4:dfcf3000 [ 2648.772502][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.772582][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.772671][ T32] r5:86b22f8c r4:85d49100 [ 2648.772718][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.772832][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.772901][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.773006][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.780746][ T32] r4:85d49100 [ 2648.780882][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.781007][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.781089][ T32] r4:00000001 [ 2648.781162][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.781271][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.781343][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.781405][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.781551][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.781624][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.781675][ T32] r4:85b32900 [ 2648.781729][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.781791][ T32] INFO: task kworker/1:38:14368 blocked for more than 431 seconds. [ 2648.781862][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.781916][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.781983][ T32] task:kworker/1:38 state:D stack:0 pid:14368 tgid:14368 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.782322][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.782514][ T32] Call trace: [ 2648.782645][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.782746][ T32] r10:82918438 r9:e8859d84 r8:00000002 r7:60000113 r6:e8859d8c r5:8571ec00 [ 2648.782799][ T32] r4:8571ec00 [ 2648.782846][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.782931][ T32] r5:8571ec00 r4:82918434 [ 2648.783042][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.819256][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.819380][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8859e08 [ 2648.819569][ T32] r4:00000000 [ 2648.819603][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.819645][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.819689][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.819735][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86f86f80 [ 2648.819758][ T32] r4:00000000 [ 2648.819777][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.819853][ T32] r9:83018205 r8:8571ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f364000 [ 2648.819880][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.819947][ T32] r5:00001000 r4:e8855000 [ 2648.820098][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.820141][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.820182][ T32] r5:86144f8c r4:85ddae00 [ 2648.820433][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.820487][ T32] r7:ddde2d40 r6:83018200 r5:86144f8c r4:85ddae00 [ 2648.820508][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.820665][ T32] r10:61c88647 r9:8571ec00 r8:85ddae2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.820692][ T32] r4:85ddae00 [ 2648.820713][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.820759][ T32] r10:00000000 r9:85ddae00 r8:8027ecf4 r7:dfa55e60 r6:85c78a00 r5:8571ec00 [ 2648.820972][ T32] r4:00000001 [ 2648.820996][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.821097][ T32] Exception stack(0xe8859fb0 to 0xe8859ff8) [ 2648.821156][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2648.821188][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.821299][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.821341][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.821377][ T32] r4:86f863c0 [ 2648.821601][ T32] INFO: task kworker/1:38:14368 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.821719][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.822227][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.822419][ T32] Call trace: [ 2648.822525][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.822576][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.822599][ T32] r4:00000000 [ 2648.822697][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.822963][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.828470][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.828602][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.828634][ T32] dd60: 80000113 ffffffff [ 2648.828663][ T32] r5:80000113 r4:80239bd0 [ 2648.828707][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.828786][ T32] r4:82abf064 [ 2648.828809][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.828884][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.828914][ T32] r4:e051ddc0 [ 2648.828934][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.828982][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.829006][ T32] r4:00000000 [ 2648.829027][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.829121][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.829164][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.829210][ T32] r5:00001000 r4:dfcf3000 [ 2648.829230][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.829306][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.829398][ T32] r5:86b22f8c r4:85d49100 [ 2648.829423][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.829497][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.829523][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.829596][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.829623][ T32] r4:85d49100 [ 2648.829656][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.829704][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.829726][ T32] r4:00000001 [ 2648.829745][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.829810][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.829849][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.829878][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.829933][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.829966][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.830042][ T32] r4:85b32900 [ 2648.830072][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.831344][ T32] INFO: task kworker/1:39:14371 blocked for more than 431 seconds. [ 2648.831416][ T32] Not tainted 6.16.0-rc7-syzkaller #0 [ 2648.831443][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2648.831465][ T32] task:kworker/1:39 state:D stack:0 pid:14371 tgid:14371 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.832170][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.832239][ T32] Call trace: [ 2648.832274][ T32] [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130) [ 2648.832327][ T32] r10:82918438 r9:ea885d84 r8:00000002 r7:60000113 r6:ea885d8c r5:8571d400 [ 2648.832361][ T32] r4:8571d400 [ 2648.832382][ T32] [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24) [ 2648.832422][ T32] r5:8571d400 r4:82918434 [ 2648.832463][ T32] [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2648.832524][ T32] [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18) [ 2648.832618][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea885e08 [ 2648.832737][ T32] r4:00000000 [ 2648.832834][ T32] [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40) [ 2648.832888][ T32] [<81a2b5bc>] (mutex_lock) from [<804dda18>] (_vm_unmap_aliases+0x68/0x240) [ 2648.832938][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.838889][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8630c5c0 [ 2648.839013][ T32] r4:00000000 [ 2648.839040][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.839119][ T32] r9:83018205 r8:8571d400 r7:00000000 r6:83018200 r5:00001000 r4:7f366000 [ 2648.839141][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.839186][ T32] r5:00001000 r4:e8863000 [ 2648.839205][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.839240][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.839281][ T32] r5:86145b8c r4:85dda900 [ 2648.839301][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.839363][ T32] r7:ddde2d40 r6:83018200 r5:86145b8c r4:85dda900 [ 2648.839386][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.839433][ T32] r10:61c88647 r9:8571d400 r8:85dda92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.839454][ T32] r4:85dda900 [ 2648.839473][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.839516][ T32] r10:00000000 r9:85dda900 r8:8027ecf4 r7:dfa55e60 r6:85c78400 r5:8571d400 [ 2648.839537][ T32] r4:00000001 [ 2648.839555][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.839590][ T32] Exception stack(0xea885fb0 to 0xea885ff8) [ 2648.839621][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 2648.839649][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.839674][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.839704][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.839725][ T32] r4:864e1c40 [ 2648.839924][ T32] INFO: task kworker/1:39:14371 is blocked on a mutex likely owned by task kworker/1:6:5187. [ 2648.839958][ T32] task:kworker/1:6 state:R running task stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2648.840033][ T32] Workqueue: events bpf_prog_free_deferred [ 2648.840082][ T32] Call trace: [ 2648.840113][ T32] [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8) [ 2648.840161][ T32] r10:8280c9b4 r9:8571bc00 r8:80200be4 r7:e051dd54 r6:ffffffff r5:8571bc00 [ 2648.840184][ T32] r4:00000000 [ 2648.840202][ T32] [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 2648.840238][ T32] Exception stack(0xe051dd20 to 0xe051dd68) [ 2648.840266][ T32] dd20: b9833000 ecb61000 00000001 80239bb8 7f033000 00000001 82abf044 82abe420 [ 2648.840295][ T32] dd40: 7f033000 ecb61000 8280c9b4 e051dd9c e051dda0 e051dd70 80230af0 80239bd0 [ 2648.840317][ T32] dd60: 80000113 ffffffff [ 2648.840348][ T32] r5:80000113 r4:80239bd0 [ 2648.840368][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804dd7dc>] (__purge_vmap_area_lazy+0x284/0x458) [ 2648.840410][ T32] r4:82abf064 [ 2648.840429][ T32] [<804dd558>] (__purge_vmap_area_lazy) from [<804ddb94>] (_vm_unmap_aliases+0x1e4/0x240) [ 2648.840472][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e051ddc0 r5:e051de08 [ 2648.840494][ T32] r4:e051ddc0 [ 2648.840512][ T32] [<804dd9b0>] (_vm_unmap_aliases) from [<804e1908>] (vfree+0x16c/0x210) [ 2648.840555][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f3f140 [ 2648.840577][ T32] r4:00000000 [ 2648.840595][ T32] [<804e179c>] (vfree) from [<805474b4>] (execmem_free+0x30/0x50) [ 2648.840640][ T32] r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c2000 [ 2648.840661][ T32] [<80547484>] (execmem_free) from [<803c5c48>] (bpf_jit_free_exec+0x10/0x14) [ 2648.840701][ T32] r5:00001000 r4:dfcf3000 [ 2648.840721][ T32] [<803c5c38>] (bpf_jit_free_exec) from [<803c6028>] (bpf_jit_free+0x68/0xe4) [ 2648.840783][ T32] [<803c5fc0>] (bpf_jit_free) from [<803c70a4>] (bpf_prog_free_deferred+0x138/0x150) [ 2648.840863][ T32] r5:86b22f8c r4:85d49100 [ 2648.840981][ T32] [<803c6f6c>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4) [ 2648.841051][ T32] r7:ddde2d40 r6:83018200 r5:86b22f8c r4:85d49100 [ 2648.841114][ T32] [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8) [ 2648.841172][ T32] r10:61c88647 r9:8571bc00 r8:85d4912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 2648.841197][ T32] r4:85d49100 [ 2648.841220][ T32] [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.841287][ T32] r10:00000000 r9:85d49100 r8:8027ecf4 r7:dfdc5e60 r6:85d49080 r5:8571bc00 [ 2648.841312][ T32] r4:00000001 [ 2648.841384][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.841427][ T32] Exception stack(0xe051dfb0 to 0xe051dff8) [ 2648.841468][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 2648.841704][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.841757][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.841790][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.841817][ T32] r4:85b32900 [ 2648.841838][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 2648.856881][ T32] NMI backtrace for cpu 0 [ 2648.857371][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 2648.857541][ T32] Hardware name: ARM-Versatile Express [ 2648.857677][ T32] Call trace: [ 2648.857742][ T32] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 2648.857843][ T32] r7:00000000 r6:00000113 r5:60000193 r4:8225b4e0 [ 2648.857860][ T32] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 2648.857903][ T32] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 2648.857948][ T32] r5:00000000 r4:00000001 [ 2648.857961][ T32] [<8021fe1c>] (dump_stack) from [<81a115b8>] (nmi_cpu_backtrace+0x160/0x17c) [ 2648.858105][ T32] [<81a11458>] (nmi_cpu_backtrace) from [<81a11704>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 2648.858167][ T32] r7:00000000 r6:8280c690 r5:8281af40 r4:ffffffff [ 2648.858189][ T32] [<81a115d4>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 2648.858262][ T32] r9:8280c80c r8:82ab3564 r7:8281bb28 r6:00007ccc r5:8281b508 r4:8675660c [ 2648.858281][ T32] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fdc0>] (watchdog+0x4a8/0x74c) [ 2648.858329][ T32] [<8037f918>] (watchdog) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.858435][ T32] r10:00000000 r9:00000000 r8:8037f918 r7:83349780 r6:83349780 r5:83259800 [ 2648.858481][ T32] r4:00000001 [ 2648.858506][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.858576][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 2648.858618][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2648.858646][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.858692][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.858724][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.858742][ T32] r4:8334c580 [ 2648.858988][ T32] Sending NMI from CPU 0 to CPUs 1: [ 2648.859967][ C1] NMI backtrace for cpu 1 [ 2648.860085][ C1] CPU: 1 UID: 0 PID: 2820 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 2648.860114][ C1] Hardware name: ARM-Versatile Express [ 2648.860141][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 2648.860182][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 2648.860213][ C1] pc : [<81a30b94>] lr : [<80a6aa04>] psr: 600f0013 [ 2648.860232][ C1] sp : eb9c5eb0 ip : eb9c5ec0 fp : eb9c5ebc [ 2648.860249][ C1] r10: 8295a34c r9 : 00000001 r8 : 00000000 [ 2648.860270][ C1] r7 : 00000117 r6 : 8295a2b0 r5 : 00000000 r4 : 00000001 [ 2648.860289][ C1] r3 : 0000179d r2 : 00000000 r1 : 600f0013 r0 : 84a8ac40 [ 2648.860365][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 2648.860512][ C1] Control: 30c5387d Table: 8540b0c0 DAC: 00000000 [ 2648.860555][ C1] Call trace: [ 2648.860574][ C1] [<81a30b6c>] (_raw_spin_unlock_irqrestore) from [<80a6aa04>] (pl011_console_device_unlock+0x20/0x24) [ 2648.860607][ C1] [<80a6a9e4>] (pl011_console_device_unlock) from [<802e7e0c>] (nbcon_emit_one+0x80/0xf8) [ 2648.860636][ C1] [<802e7d8c>] (nbcon_emit_one) from [<802e802c>] (nbcon_kthread_func+0x1a8/0x2a4) [ 2648.860664][ C1] r6:8280c690 r5:84b4a400 r4:8295a2b0 [ 2648.860671][ C1] [<802e7e84>] (nbcon_kthread_func) from [<80285f1c>] (kthread+0x12c/0x280) [ 2648.860703][ C1] r10:00000000 r9:8295a2b0 r8:802e7e84 r7:847d1080 r6:847d1080 r5:84b4a400 [ 2648.860712][ C1] r4:00000001 [ 2648.860719][ C1] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2648.860740][ C1] Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) [ 2648.860756][ C1] 5fa0: 00000000 00000000 00000000 00000000 [ 2648.860770][ C1] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2648.860784][ C1] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2648.860800][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2648.860808][ C1] r4:832a1a00 [ 2648.862359][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 2649.138071][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 2649.142353][ T32] Hardware name: ARM-Versatile Express [ 2649.143577][ T32] Call trace: [ 2649.143973][ T32] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 2649.144249][ T32] r7:00000000 r6:8282083c r5:00000000 r4:8225b4e0 [ 2649.144444][ T32] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 2649.144706][ T32] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 2649.144947][ T32] r5:00000000 r4:82a6dd18 [ 2649.145089][ T32] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 2649.145333][ T32] [<802024f4>] (panic) from [<8037fc30>] (watchdog+0x318/0x74c) [ 2649.145540][ T32] r3:00000001 r2:00000000 r1:00000001 r0:8225c12c [ 2649.145750][ T32] r7:8281bb28 [ 2649.145855][ T32] [<8037f918>] (watchdog) from [<80285f1c>] (kthread+0x12c/0x280) [ 2649.146124][ T32] r10:00000000 r9:00000000 r8:8037f918 r7:83349780 r6:83349780 r5:83259800 [ 2649.147135][ T32] r4:00000001 [ 2649.149001][ T32] [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2649.151384][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 2649.153375][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2649.153653][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2649.154053][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2649.156164][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [ 2649.162308][ T32] r4:8334c580 [ 2649.166083][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:34:13 Registers: info registers vcpu 0 CPU#0 R00=856b6720 R01=00000000 R02=c5ac4000 R03=00000001 R04=00000064 R05=2af31dc4 R06=00000000 R07=00000000 R08=00044b82 R09=002af31d R10=00000000 R11=df801e2c R12=00008000 R13=df801dc8 R14=816363cc R15=816365bc PSR=00000113 ---- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=822447e4 R01=85dfc800 R02=04208060 R03=00000000 R04=85dfc800 R05=822447e4 R06=00007f60 R07=85dfce28 R08=829f1c27 R09=000394c1 R10=82804d40 R11=df8e1ee4 R12=00000000 R13=df8e1e80 R14=80295500 R15=80280948 PSR=20000113 --C- A S svc32 s00=18000000 s01=00000000 d00=0000000018000000 s02=38000000 s03=fff53d17 d01=fff53d1738000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=01d0c9c3 s09=ffdb0971 d04=ffdb097101d0c9c3 s10=00000000 s11=ffffffff d05=ffffffff00000000 s12=00dd5c87 s13=ffff65fd d06=ffff65fd00dd5c87 s14=00000000 s15=ffffffff d07=ffffffff00000000 s16=fe000000 s17=ee7a69ba d08=ee7a69bafe000000 s18=36000000 s19=0002a2d7 d09=0002a2d736000000 s20=ff81c9f1 s21=ffff65fd d10=ffff65fdff81c9f1 s22=ffffffff s23=ffffffff d11=ffffffffffffffff s24=1bd0c9c3 s25=00000000 d12=000000001bd0c9c3 s26=38000000 s27=fff53d17 d13=fff53d1738000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=0131bc76 s33=ffd1bd64 d16=ffd1bd640131bc76 s34=00000000 s35=ffffffff d17=ffffffff00000000 s36=ffc214e5 s37=005722c8 d18=005722c8ffc214e5 s38=ffffffff s39=00000000 d19=00000000ffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=03f442d1 s43=00000000 d21=0000000003f442d1 s44=00000006 s45=00000000 d22=0000000000000006 s46=01516b9b s47=00000000 d23=0000000001516b9b s48=fe21c888 s49=ee7a69ba d24=ee7a69bafe21c888 s50=190afc81 s51=00000000 d25=00000000190afc81 s52=0068ffcc s53=016cce28 d26=016cce280068ffcc s54=fe7acf30 s55=feb25ff0 d27=feb25ff0fe7acf30 s56=fe708daa s57=ff7977cc d28=ff7977ccfe708daa s58=ffbcbbe6 s59=fe7acf30 d29=fe7acf30ffbcbbe6 s60=3d3161da s61=fff53d17 d30=fff53d173d3161da s62=20c5cd42 s63=ffdbc896 d31=ffdbc89620c5cd42 FPSCR: 00000000