last executing test programs: 20m32.537568507s ago: executing program 0 (id=1627): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3, 0x0, 0x6, 0x21e, 0x9, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x7bd, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x18}}, @cred={{0x18, 0x1, 0x2, {r1, r3, r4}}}], 0x30, 0x11}}], 0x1, 0x48005) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$FS_IOC_SETFSLABEL(r5, 0x5450, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x811) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r8, 0xffffffffffffffff, 0x0) timer_create(0x1, &(0x7f0000000680)={0x0, 0x21}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 20m29.978001674s ago: executing program 0 (id=1637): r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x400000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) dup2(r2, r1) preadv2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) 20m29.917243831s ago: executing program 0 (id=1638): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0xa, 0x40) r2 = timerfd_create(0x9, 0x80800) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x13, 0x4, 0x70bd2c, 0x25dfdbfc, {0x6}, [@typed={0x8, 0xe7, 0x0, 0x0, @fd=r1}, @typed={0x8, 0xdf, 0x0, 0x0, @fd=r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4000010) r3 = openat$hwrng(0xffffff9c, &(0x7f0000000140), 0x41c240, 0x0) process_madvise(r3, &(0x7f0000001300)=[{&(0x7f0000000180)="769f452b714f1d766e746a9eb0921cab14438aba5167f9f8ba35329cbff13f1e6a7e96e0b0d8fff33ec7e7f0d74276a312292cea70a97d1eee6e7e7683c69aa294a9c8885b893776026d22531cd5b363308b76611ce86571d57907ea69bc55ff5a213636cacbfac5e27e82144b849072b465416f923a4ef1783054bb2c9e51fe30bcdd606e9e972fce0e8cb7ab0f4fdb8e3cd78879b9d0955492ea2e84633b5244781088fab518d421315eabaabdbe6489124883fe180d8a44ef81a8ed52c0df9652a8cf93e2f7e9d230ed7288e0e56afe803d974fa50e154a9a49d11944d59b25", 0xe1}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="689aa58b5b4f41f10d1c45753ea0ac6173c71dadaf7a52e305ad774cbaef10160c445fe97dfef1d8e6e38f5c373f82921c738f6d9caaf1bad2de0c2ad9d28b93696921b3916652a210e1fc", 0x4b}], 0x3, 0x15, 0x0) ioctl$FIONCLEX(r0, 0x5450) preadv(r1, &(0x7f00000029c0)=[{&(0x7f0000001340)=""/172, 0xac}, {&(0x7f0000001400)=""/229, 0xe5}, {&(0x7f0000001500)=""/95, 0x5f}, {&(0x7f0000001580)=""/164, 0xa4}, {&(0x7f0000001640)=""/193, 0xc1}, {&(0x7f0000001740)=""/93, 0x5d}, {&(0x7f00000017c0)=""/207, 0xcf}, {&(0x7f00000018c0)=""/24, 0x18}, {&(0x7f0000001900)=""/150, 0x96}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0xa, 0x7, 0x0) sendmsg(r0, &(0x7f0000004000)={&(0x7f0000002a40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x4, 0x0, 0x1, {0xa, 0x4e20, 0x200, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002ac0)="97ede5946d7a8da03708ff5fd769b1df", 0x10}, {&(0x7f0000002b00)="6bfadd5b8823cdadd4bd5a5acbf8496d6845b57aae4ca1e3ec24dad9ee54c2fe8259f6ae2da45999e1cd76865331ec18d7e818464182b06d52a9674c739c1f052f54061a93a9b8af4dc668d5193ce436ab6c681c7354c8ed5bf444230f38803dc98192088e8a40e80702e48599dfef9cb8ffb72e2f68126c0660a78bb5e457b81f58c6d57c41e6c34f8532b04bf7a653ebddd3968badf9e0c9e8546742ec462791808a9790702f6a2cfc744a7860a88ce26e92553a188a", 0xb7}, {&(0x7f0000002bc0)="73138ba6e09b3ae40e9b3909f5cba88bf39b7dcecb320bb47eb65965af9798cff6155ab51b31c709127e8401970ab5755b82c1ca1f268cbe4c1e020f6fffd38df7ca845515a2c332ccfd172d0cc4106b3bfb88b623e6024159b6f5a84006cdfcbeb13aedbcd86a04f2f6974fb4f4a201741aa4f264b434b31b0e031b7fc8fc780a7442edb833dd9c511f63d8bcc0f35145dc494d21e3eda13f3266046bcc3d8afe2b3aad2c350245bd53a56901b0d8a16e2e9d483bc85a65067a7edc849c281bac4929598dd775036851d4bbc362aef86ec4d12b23f86480cc8df22af06116328ae02797b295", 0xe6}, {&(0x7f0000002cc0)="17f6742bf7d2a2cf38f69f2385a9249cfd26fe0dda5ce7ce5356a23a7a1775d8fc76eea9f13da1f65510de96db118cea938b3d515214b8c6fa92a8f978f38999fb4bb842703be33cb7e6871333589715d196e4332e73fafb5a5b3992070278a267d314de867b80b87a50bb0ac9d04c182ced4c6b30ca1ecaae650af88ec9e9a115505ec584589fc0552d34c7d0cda2f04578c0f55435b0b855bf61b1d894a679524e8aa81ac529001a0c2fd24ca0572af1566cd71b975c02240487048dddcafdc85533b1408a97e5c924841a947bb8c06b9f474deed4b37a5c826047be215114331ed875656a9fa2ff", 0xe9}], 0x4, &(0x7f0000002e00)=[{0x100c, 0x10e, 0x2, "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"}, {0xa0, 0x114, 0x1, "198936a3ed89b2b75a84fef759444c171c831b5a80c71b2d1bf1a40d8de5c045b70775ac90cc05b63643da9c731a7e2f9a21be2cf11ac1c8fc322167756ea5e4703bf8cfeee66412ed5b6473cda5e4df658873ffa0f4289558165fa1a430623fa37a4b5c2089e3d229702835f9c08012127e85e2d8c5dda634e821dcbb33c887b92e41b676df3fe1361cd2d08f5164cda58d"}, {0x44, 0x113, 0x240, "97047ea6cba8416c52cc8cf58cf19b568a06a3fdff115929f0c874bf4b869a8708bbf0281054a4e3d0bc46aebfe172fff8ca199a2171"}, {0x4c, 0x112, 0x40, "318b32e4878c87d7feec4897268dcb4090b2bbc9135bb8ceb1ba4bfceaed59b4c7b74d1e33ce1bfa0d45daa2ad8ad3d8416db9f8157ad5deb1d727437fe52b"}, {0x94, 0x10e, 0x7fff, "1e7e006cb046d9ffff3882707b554dd9f19120086c0bb99e83b6162db4fea4475e0c35717e2d69040a3aaa9dc59278a886dd24161d779a34699c94eb31b72ba9bb3f4767accb859ae09bba6a82649bfed113f17f7d96aaa7d96ffc6b7a7034ba2efb4e258938142fc2df8baa0053a17e96d636653ed96642062b072ca1413e0dac2c40f3807e"}], 0x11d0}, 0x8000) r4 = dup3(r0, r0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0xa, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000004040), r3) getpeername$netlink(r4, &(0x7f0000004080), &(0x7f00000040c0)=0xc) io_uring_register$IORING_REGISTER_RESIZE_RINGS(r3, 0x21, &(0x7f0000004100)={0x0, 0x2e8a, 0x20, 0x1, 0x16a, 0x0, r0}, 0x1) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f0000004180)) r5 = request_key(&(0x7f0000004740)='blacklist\x00', &(0x7f0000004780)={'syz', 0x1}, &(0x7f00000047c0)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000004700)=[{&(0x7f00000041c0)="04864ba21a0869b3360786c648d5237ca04a8122ce6402d27b64ff84d0424bac00bcb61aeda2942d800533a14930b6eaa192d111c390f67c24c3495652c721e1edf870a20b4007c28528192ae14cf3a664bc76c0f67eab8767f9b55fcb558b40918c1993dceeb19ffd20157e546ca6724022a1920d3c80eeabe1d5a7bef03374524273bf6c8e7c9e7b0a72686baba6ec9d5e9790fe6964a8b3d3abef34f2ce03f0253780f25cc8c11ee478e9123cdbf6ec9a70e6eb2ecd44011aaf3752d5932157d5e52c7c55794efa0e4e1fb6d7997c81ad34cc4737c6", 0xd7}, {&(0x7f00000042c0)="9fa937caa29f0cb10a9fe8c256aac6403bab9067fe185accddc04eeb775a6294789c3e5c72ce0b238eef550ffca33c7f2a4bc1e2247780a0", 0x38}, {&(0x7f0000004300)="5a3af4e51a8f124e1fd310c537710eed0ef4b48e44785b3d9ff305f7fda7a373a2694c7a9e3802bd433efcc543405be59cd264351dd9c32b3078f908317755ce99bfffc196041384e9cfac2d823a762da6c48586673137d047abd91a821d399b49fa6b3d80d62cab086b4bb99f2ed7048c6aeaf2b51c7f448483ab1dd91f97d6890616d2e4a707549c62d296589edff7aa35ea42946f6659b7576901c13929006ff37368f75474548cac0fb11b95be0b7466e174c4", 0xb5}, {&(0x7f00000043c0)="532935a0eeac1b92bb2edf90003a554b5719d78a2ed975c0c7b69f8be75b7ff9b5d8ef11affd328088047ef0e7cbbf58459d22a901d6d470bf1c02b73419a8a364e5db71698102bdb4b205b8ae3b88b71e5b6b5b1650ac84b008cb5223008d28f89f937e0e962dc19bd5239710e517e495ae39473043d72ba5f3a91f340dd82edd8f7f18b6a0843dedb7e0d1beb4463dab087d7f54d3925e374cf507485d4de9a8666ff7aea408db2f793fe986eb02791bf3ac95d09c0bdb30767a707122205c62f30cdd8bb0f268fb098fae3b0c6e46666570a48e7c2ad7de4c8c3eec0f895347", 0xe1}, {&(0x7f00000044c0)="0d19945da3319de3f8f33abce5f8e8f61a541617b10ff0937e75a8e1fbfeed3152ada3fb8c6212c3496bb82b14c87c7714ad18aa0f59a9ea0369a500f244b73621bed8de2570697337d69071c8b8c8144830f08f494a226368d1ddfb333b8abc19e7c1023e031e1c666b6c7d37863cb05696fd573602ad1406cdf160509add1890e397e44a508103f2cc3758ca97ac", 0x8f}, {&(0x7f0000004580)="7ff018469c64d3bc767ee3ae080624f092c2a3ff563d97d04b34a0ab9aa2a6a6f6943991f45ffc0a75286222891df99188ec992c3110965aab6cbdb82ba768bd9116d0e4078461e128a16d21eaa93c7410ae457cf019a973e0649b5eb84f1de6958e3a5f3ead87ff389fbf5f6ea11be44bc397de0e2243ff947323f37048c983463b2128b804152fc48267bf126b1453ef5f111d4c716aab21b14c46b88c6029b22f657755c8e0c9b03caebfe656", 0xae}, {&(0x7f0000004640)="a2b0252c8e910bbd4263c4db10d400b683140fb3fde29e3047c832ba894e71306082bcb219b7dd266aa842eca552d8f336692077e216a14cc0a76d262a5c7229b8861693ae4e5c18497928240cf206a35f9aeadc695f71c6ed30b9a95c42bb2e07f49736832f9215bb1c05570adcf96151dea5b78a573f74b01a7c1d0424a963aa463f4a", 0x84}], 0x7, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000004840), r3) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f00000049c0)={&(0x7f0000004800)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000004980)={&(0x7f0000004880)={0xcc, r7, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1fad}, {0x6}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x534f}, {0x6, 0x11, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x6}, {0x6}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x5a26}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40840}, 0x44800) keyctl$setperm(0x5, r5, 0x8081020) getpid() ptrace$setregset(0x4205, 0x0, 0x2, &(0x7f0000004ac0)={&(0x7f0000004a00)="55fcc21df5c3bdab36572d739b210099adf354506f8de4122e61e60f83058a608976687121487c4d3bb995c0e8bc87977388574fd5e0f7a96c58ae8d0c7fd642b5f82c33f671b642688ebd1d14e7375e15397b2d08d7f69e06315ad854fe9adcb0429d7cb02bfda5f4053a53dc7ee92f5bbce5742018b9170160bd915718ce749bc6a5373274eea3e25da8412ad2e1cc0d77a1ad910ceed07610c17f581e85", 0x9f}) getsockopt$inet_mreq(r3, 0x0, 0x4, &(0x7f0000004b00)={@initdev, @local}, &(0x7f0000004b40)=0x8) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000004b80)={"5e3ebf92a2d437c0cf69403347814df9", 0x0, 0x0, {0x7, 0x1}, {0x4}, 0x8000000000000001, [0x1, 0x1, 0x6, 0x7, 0xde, 0x23a9, 0x800000000000, 0xfffffffffffff8a0, 0x10000, 0x6, 0x10, 0x7, 0x401, 0x2, 0x5, 0x1]}) ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, &(0x7f0000004c80)=r8) keyctl$search(0xa, r5, &(0x7f0000004cc0)='keyring\x00', &(0x7f0000004d00)={'syz', 0x3}, r5) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000004e00)={&(0x7f0000004d40)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000004dc0)={&(0x7f0000004d80)={0x20, 0x9, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000000) ioctl$F2FS_IOC_SEC_TRIM_FILE(r6, 0x4018f514, &(0x7f0000004e40)={0x7, 0xfffffffffffffffe, 0x2}) 20m29.639278912s ago: executing program 0 (id=1639): r0 = openat$vcs(0xffffff9c, &(0x7f0000001c80), 0x40040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 20m29.616647775s ago: executing program 0 (id=1640): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000300)='./file0\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x1901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000440)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10a5840, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', r0, &(0x7f0000000240)='./file0/file0\x00', 0x272) (fail_nth: 8) 20m29.516181746s ago: executing program 0 (id=1641): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3, 0x0, 0x6, 0x21e, 0x9, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x7bd, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x18}}, @cred={{0x18, 0x1, 0x2, {r1, r3, r4}}}], 0x30, 0x11}}], 0x1, 0x48005) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$FS_IOC_SETFSLABEL(r5, 0x5450, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x811) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r8, 0xffffffffffffffff, 0x0) timer_create(0x1, &(0x7f0000000680)={0x0, 0x21}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 20m29.168600004s ago: executing program 32 (id=1641): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3, 0x0, 0x6, 0x21e, 0x9, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x7bd, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x18}}, @cred={{0x18, 0x1, 0x2, {r1, r3, r4}}}], 0x30, 0x11}}], 0x1, 0x48005) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$FS_IOC_SETFSLABEL(r5, 0x5450, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x811) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r8, 0xffffffffffffffff, 0x0) timer_create(0x1, &(0x7f0000000680)={0x0, 0x21}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 3m13.329836758s ago: executing program 2 (id=3764): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb904}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) 3m12.876622269s ago: executing program 2 (id=3765): creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000300)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffc}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendto$packet(r1, &(0x7f0000000180)="0b0312002e0064000200475400f6a13bb1000000086086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x8100, r2}, 0x14) 3m12.649632754s ago: executing program 2 (id=3766): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518"], 0x0, 0xfffbfffd, 0x0, 0x0, 0x41100, 0x61, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0xac1414bb}, 0x3804, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}, 0x20000000}, {{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x69, &(0x7f0000000400)=[{&(0x7f0000000240)="b9", 0x26892}], 0xbb}}], 0x2, 0x0) 3m12.196342715s ago: executing program 2 (id=3767): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303, 0x37}, "4755f01100", "bd14060000000000000092f94413582b", "00001000", "4e67cb72f328ac2f"}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 3m10.745652597s ago: executing program 2 (id=3770): r0 = syz_open_dev$loop(&(0x7f0000000240), 0x40, 0x1c0862) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_freeze_timeout', 0x82802, 0xf) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000280)={r1, 0x1000, {0x0, 0x0, 0x0, 0x4, 0x4000000000001001, 0x0, 0x0, 0x1c, 0xc, "faf98317e5a1149989fc8dbe53ea6acc96e3a2503dc3bd3fe37d58128bbad0099cebdc25f5ab60c9e6d680f985881a8a0f3500000000000000000e00", "32d8cc26f7061a74df2cfc06c89f3d9e234b30c50997d3bef409ff2176ff7bfe55cd4a5d83cd4a524bd3ffe70c7f3f800b2f7b6aa54cc50a1fcaed1e831fa79a", "675237601a8ca5b07dcc141802c4dae4162e43ac61b7ad3300", [0xfffffffffffffce8, 0x6]}}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) sendfile(r0, r1, 0x0, 0x200) 3m10.44853885s ago: executing program 2 (id=3771): r0 = socket$igmp(0x2, 0x3, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffe}, 0x18) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000000), 0x4) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x6, 0x4) 2m24.82277829s ago: executing program 33 (id=3771): r0 = socket$igmp(0x2, 0x3, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffe}, 0x18) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000000), 0x4) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x6, 0x4) 2m1.427699476s ago: executing program 1 (id=3828): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1, 0x0, 0x1ff}, 0x18) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) close(r2) 2m1.167046535s ago: executing program 1 (id=3829): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) symlink(0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x4}) io_uring_enter(0xffffffffffffffff, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) rt_sigsuspend(&(0x7f00000002c0)={[0x225c17d03]}, 0x8) 1m58.426780401s ago: executing program 1 (id=3830): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000400), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0xa, 0x200, 0x7, 0x1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2, r2}, 0x38) 1m58.124314075s ago: executing program 1 (id=3831): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8f70000000000ff000044850000000e000000650000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xb}]}) socket$inet_tcp(0x2, 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x100000000000000) 1m55.467221272s ago: executing program 1 (id=3833): setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x31, &(0x7f00000004c0)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2042, 0x0) ioctl$AUTOFS_IOC_FAIL(r1, 0x4c80, 0x7000000) 1m54.836112533s ago: executing program 1 (id=3834): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x40001f9, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000540)='./file7\x00', 0x1c0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x0, 0xffffffff}, 0x10) r4 = socket(0x1e, 0x4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r6, 0x201, 0x400000, 0x0, {{}, {}, {0x8, 0x11, 0x4}}}, 0x24}}, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f0000003240), 0x4000000000000e4, 0xf4) syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') 1m8.979931599s ago: executing program 34 (id=3834): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x40001f9, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000540)='./file7\x00', 0x1c0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x0, 0xffffffff}, 0x10) r4 = socket(0x1e, 0x4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r6, 0x201, 0x400000, 0x0, {{}, {}, {0x8, 0x11, 0x4}}}, 0x24}}, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f0000003240), 0x4000000000000e4, 0xf4) syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') 46.103932156s ago: executing program 4 (id=3905): mount$tmpfs(0x0, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000f80), 0x400, &(0x7f0000000100)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30, 0x2d]}}}}]}) 45.955304593s ago: executing program 4 (id=3924): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="070000000400000000010000"], 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@o_path={&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r0, 0x4000, r0}, 0x18) 45.941200355s ago: executing program 4 (id=3925): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x3, 0x0, 0x0, 0x4, 0x1, 0x1}]}, {0x0, [0x5f, 0x5f, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x28) 45.726591868s ago: executing program 4 (id=3926): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb904}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@dellink={0x20, 0x11, 0x1, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, 0x408}}, 0x20}, 0x1, 0x200000000000000, 0x0, 0x4}, 0x40cc040) 45.479227916s ago: executing program 4 (id=3927): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000100)={0x0}) 45.036538586s ago: executing program 4 (id=3928): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3f, 0x10, &(0x7f0000000000), 0x2ff}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b90703600000f007049e0ff086dd", 0x0, 0x104, 0xa000000, 0x29, 0x0, &(0x7f0000000640)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999", 0x0}, 0x34) 10.623898763s ago: executing program 3 (id=3989): syz_io_uring_setup(0x49a, &(0x7f0000000200)={0x0, 0x79b0, 0x3180, 0x1, 0x116}, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) syz_io_uring_submit(r0, r1, &(0x7f00000002c0)=@IORING_OP_TIMEOUT={0xb, 0x11, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x1, 0x40, 0x1}) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2e9b3d0007e03dd6", 0x8}], 0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000bc3eb444cbaff137000000000000000000207892ea8c324c4e000000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r9 = msgget$private(0x0, 0x3ac) msgsnd(r9, &(0x7f0000000040)=ANY=[@ANYBLOB="02"], 0x8, 0x800) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x101000, 0x0) ioctl$TIOCSTI(r10, 0x5412, &(0x7f00000003c0)=0xf4) r11 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r11, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4e23, 0xfffc, 0x4e23, 0x3, 0xa, 0x80, 0x30}, {0x100000000, 0x2, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x6, 0x8, 0x800000000001}, {0x9, 0xfffffffffffffffe, 0x0, 0x9}, 0xd6, 0x0, 0x1, 0x0, 0x0, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x210000, 0x33}, 0x0, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffffffb}}, 0xe8) sendmmsg(r11, &(0x7f0000000480), 0x2e9, 0xffe0) msgrcv(r9, &(0x7f00000002c0)={0x0, ""/196}, 0xcc, 0x2, 0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000004c0)='mmc_request_done\x00', r8, 0x0, 0xfffffffffffff001}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a310000000028000480080002400000000008000140000000051400030076657468315f6d6163767461700000000900010073797a310000000058000000050a01020000000000000000010020000c00024000000000000000010900010073797a3100000000200004801400030076657468315f6d61637674617000000008000140000000050a000700726f757465"], 0xf4}}, 0x10) 7.935520473s ago: executing program 3 (id=3990): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xb, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='contention_begin\x00', r0}, 0x18) socket$igmp(0x2, 0x3, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() msgrcv(0x0, 0x0, 0x0, 0x2, 0x1000) write$P9_RGETLOCK(r1, &(0x7f0000000640)=ANY=[], 0x200002e6) fcntl$setpipe(r1, 0x407, 0x7000000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) 1.16583404s ago: executing program 3 (id=3991): timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x3938700}}, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) 626.82979ms ago: executing program 3 (id=3992): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000740)='./file1\x00', 0x183042, 0x15) lsetxattr$security_capability(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000080), &(0x7f0000000000)=@v3={0x3000000, [{0x7fffffff, 0xabda}, {0x3, 0x2}], 0xee00}, 0x18, 0x1) 380.426828ms ago: executing program 3 (id=3993): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x10448) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x1}}, 0x20) 58.851353ms ago: executing program 3 (id=3994): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000140)={0x6}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a005f0214f9f407000904001f000000ff02000200000000", 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e0000000400000004ecff000200000000000000", @ANYRES32=0x1], 0x48) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8916, &(0x7f0000000000)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8936, &(0x7f0000000000)={r2}) 0s ago: executing program 35 (id=3928): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3f, 0x10, &(0x7f0000000000), 0x2ff}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b90703600000f007049e0ff086dd", 0x0, 0x104, 0xa000000, 0x29, 0x0, &(0x7f0000000640)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999", 0x0}, 0x34) kernel console output (not intermixed with test programs): sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1468.568118][ T29] audit: type=1326 audit(1468.480:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.2.3344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1468.582519][ T29] audit: type=1326 audit(1468.480:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.2.3344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1468.586638][ T29] audit: type=1326 audit(1468.500:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.2.3344" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1468.588486][ T29] audit: type=1326 audit(1468.500:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.2.3344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1468.590967][ T29] audit: type=1326 audit(1468.500:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.2.3344" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1474.080066][T15841] netlink: 96 bytes leftover after parsing attributes in process `syz.1.3360'. [ 1476.985615][T15847] netlink: 92 bytes leftover after parsing attributes in process `syz.1.3362'. [ 1476.986240][T15847] netlink: 32 bytes leftover after parsing attributes in process `syz.1.3362'. [ 1479.074295][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 1479.074615][ T29] audit: type=1326 audit(1478.990:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15854 comm="syz.1.3365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1479.079619][ T29] audit: type=1326 audit(1478.990:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15854 comm="syz.1.3365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1479.081588][ T29] audit: type=1326 audit(1478.990:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15854 comm="syz.1.3365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1479.082797][ T29] audit: type=1326 audit(1478.990:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15854 comm="syz.1.3365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1479.103631][ T29] audit: type=1326 audit(1479.020:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15854 comm="syz.1.3365" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1479.104977][ T29] audit: type=1326 audit(1479.020:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15854 comm="syz.1.3365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1479.106381][ T29] audit: type=1326 audit(1479.020:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15854 comm="syz.1.3365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1479.163712][ T29] audit: type=1326 audit(1479.080:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15854 comm="syz.1.3365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1479.232450][ T29] audit: type=1326 audit(1479.130:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15854 comm="syz.1.3365" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1479.251288][ T29] audit: type=1326 audit(1479.160:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15854 comm="syz.1.3365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1482.591899][T15869] gtp0: entered promiscuous mode [ 1486.135216][T15881] veth0_vlan: left promiscuous mode [ 1486.136733][T15881] veth0_vlan: entered promiscuous mode [ 1486.735038][T15881] gtp0: left promiscuous mode [ 1495.603757][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 1495.606282][ T29] audit: type=1400 audit(1495.520:449): avc: denied { load_policy } for pid=15933 comm="syz.1.3388" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1496.024173][T15934] SELinux: failed to load policy [ 1504.708713][T15961] SELinux: Context system_u:object is not valid (left unmapped). [ 1504.721991][ T29] audit: type=1400 audit(1504.620:450): avc: denied { relabelto } for pid=15960 comm="syz.1.3393" name="cgroup.procs" dev="cgroup" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object" [ 1504.747418][ T29] audit: type=1400 audit(1504.620:451): avc: denied { associate } for pid=15960 comm="syz.1.3393" name="cgroup.procs" dev="cgroup" ino=82 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object" [ 1506.843905][ T29] audit: type=1326 audit(1506.760:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15969 comm="syz.1.3395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1506.846520][ T29] audit: type=1326 audit(1506.760:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15969 comm="syz.1.3395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1506.871766][ T29] audit: type=1326 audit(1506.770:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15969 comm="syz.1.3395" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1305f8 code=0x7ffc0000 [ 1506.902589][ T29] audit: type=1326 audit(1506.820:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15969 comm="syz.1.3395" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1305f8 code=0x7ffc0000 [ 1506.912447][ T29] audit: type=1326 audit(1506.830:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15969 comm="syz.1.3395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1506.933437][ T29] audit: type=1326 audit(1506.850:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15969 comm="syz.1.3395" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132970 code=0x7ffc0000 [ 1506.935794][ T29] audit: type=1326 audit(1506.850:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15969 comm="syz.1.3395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1506.943230][ T29] audit: type=1326 audit(1506.850:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15969 comm="syz.1.3395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1507.012796][T15971] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1507.013290][T15971] block device autoloading is deprecated and will be removed. [ 1508.781577][T15968] usb 2-1: new high-speed USB device number 21 using dummy_hcd [ 1508.931697][T15968] usb 2-1: device descriptor read/64, error -71 [ 1509.241435][T15968] usb 2-1: new high-speed USB device number 22 using dummy_hcd [ 1509.391411][T15968] usb 2-1: device descriptor read/64, error -71 [ 1509.502010][T15968] usb usb2-port1: attempt power cycle [ 1509.885666][T15968] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 1509.972150][T15968] usb 2-1: device descriptor read/8, error -71 [ 1510.232804][T15968] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 1510.292501][T15968] usb 2-1: device descriptor read/8, error -71 [ 1510.412143][T15968] usb usb2-port1: unable to enumerate USB device [ 1518.036745][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1518.054751][ T29] audit: type=1326 audit(1517.950:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15985 comm="syz.2.3398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1518.056580][ T29] audit: type=1326 audit(1517.970:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15985 comm="syz.2.3398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1518.060163][ T29] audit: type=1326 audit(1517.970:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15985 comm="syz.2.3398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1518.061514][ T29] audit: type=1326 audit(1517.970:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15985 comm="syz.2.3398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1518.071566][ T29] audit: type=1326 audit(1517.980:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15985 comm="syz.2.3398" exe="/syz-executor" sig=0 arch=40000028 syscall=387 compat=0 ip=0x132970 code=0x7ffc0000 [ 1518.073787][ T29] audit: type=1326 audit(1517.990:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15985 comm="syz.2.3398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1518.075461][ T29] audit: type=1326 audit(1517.990:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15985 comm="syz.2.3398" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132970 code=0x7ffc0000 [ 1518.076425][ T29] audit: type=1326 audit(1517.990:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15985 comm="syz.2.3398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1518.079206][ T29] audit: type=1326 audit(1517.990:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15985 comm="syz.2.3398" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132970 code=0x7ffc0000 [ 1518.993900][ T29] audit: type=1326 audit(1518.910:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15996 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1519.432256][T16003] Driver unsupported XDP return value 0 on prog (id 75) dev N/A, expect packet loss! [ 1522.752509][T16048] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1524.737991][T16065] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3423'. [ 1524.776520][T16065] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3423'. [ 1524.780815][T16065] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3423'. [ 1524.799696][T16065] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3423'. [ 1531.599444][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 1531.623194][ T29] audit: type=1326 audit(1531.510:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16109 comm="syz.1.3438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1531.623829][ T29] audit: type=1326 audit(1531.510:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16109 comm="syz.1.3438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1531.628274][ T29] audit: type=1326 audit(1531.540:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16109 comm="syz.1.3438" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 1531.632475][ T29] audit: type=1326 audit(1531.540:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16109 comm="syz.1.3438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1531.651461][ T29] audit: type=1326 audit(1531.540:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16109 comm="syz.1.3438" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 1531.651902][ T29] audit: type=1326 audit(1531.540:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16109 comm="syz.1.3438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1531.652160][ T29] audit: type=1326 audit(1531.540:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16109 comm="syz.1.3438" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132970 code=0x7ffc0000 [ 1531.652384][ T29] audit: type=1326 audit(1531.540:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16109 comm="syz.1.3438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1531.672166][ T29] audit: type=1326 audit(1531.590:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16109 comm="syz.1.3438" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x132970 code=0x7ffc0000 [ 1531.680376][ T29] audit: type=1326 audit(1531.590:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16109 comm="syz.1.3438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1536.972108][ T29] kauditd_printk_skb: 335 callbacks suppressed [ 1536.973716][ T29] audit: type=1326 audit(1536.840:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16126 comm="syz.1.3441" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1536.981146][ T29] audit: type=1326 audit(1536.890:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16126 comm="syz.1.3441" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1537.015690][ T29] audit: type=1326 audit(1536.930:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16126 comm="syz.1.3441" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1537.037176][ T29] audit: type=1326 audit(1536.950:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16126 comm="syz.1.3441" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1537.039398][ T29] audit: type=1326 audit(1536.950:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16126 comm="syz.1.3441" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1537.125225][ T29] audit: type=1326 audit(1536.960:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16126 comm="syz.1.3441" exe="/syz-executor" sig=0 arch=40000028 syscall=259 compat=0 ip=0x132970 code=0x7ffc0000 [ 1537.191243][ T29] audit: type=1326 audit(1537.100:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16126 comm="syz.1.3441" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1537.251636][ T29] audit: type=1326 audit(1537.100:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16126 comm="syz.1.3441" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1539.174958][T16137] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3444'. [ 1539.232747][T16137] netlink: 32 bytes leftover after parsing attributes in process `syz.1.3444'. [ 1539.926235][T16139] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3445'. [ 1541.426266][T16144] macvlan1: entered promiscuous mode [ 1541.463086][T16144] ipvlan0: entered promiscuous mode [ 1541.465813][T16144] ipvlan0: left promiscuous mode [ 1541.481882][T16144] macvlan1: left promiscuous mode [ 1545.518130][T16170] geneve2: entered promiscuous mode [ 1545.621262][T16170] geneve2: entered allmulticast mode [ 1547.172947][ T29] audit: type=1400 audit(1547.090:868): avc: denied { mounton } for pid=16179 comm="syz.1.3454" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=61 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1547.175473][T16180] tmpfs: Unsupported parameter 'mpol' [ 1548.171164][ T29] audit: type=1400 audit(1548.080:869): avc: denied { read write } for pid=12506 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.261060][ T29] audit: type=1400 audit(1548.170:870): avc: denied { open } for pid=12506 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.261580][ T29] audit: type=1400 audit(1548.170:871): avc: denied { ioctl } for pid=12506 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.575744][ T29] audit: type=1400 audit(1548.490:872): avc: denied { read } for pid=16184 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1548.663643][ T29] audit: type=1400 audit(1548.580:873): avc: denied { prog_load } for pid=16184 comm="syz.1.3456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1548.666276][ T29] audit: type=1400 audit(1548.580:874): avc: denied { bpf } for pid=16184 comm="syz.1.3456" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1548.671740][ T29] audit: type=1400 audit(1548.590:875): avc: denied { perfmon } for pid=16184 comm="syz.1.3456" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1548.686176][ T29] audit: type=1400 audit(1548.600:876): avc: denied { prog_run } for pid=16184 comm="syz.1.3456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1549.384542][ T29] audit: type=1400 audit(1549.300:877): avc: denied { create } for pid=16186 comm="syz.1.3457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1552.623084][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 1552.624815][ T29] audit: type=1400 audit(1552.540:882): avc: denied { create } for pid=16194 comm="syz.2.3460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1552.681902][ T29] audit: type=1400 audit(1552.580:883): avc: denied { create } for pid=16194 comm="syz.2.3460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1552.698499][ T29] audit: type=1400 audit(1552.610:884): avc: denied { execmem } for pid=16194 comm="syz.2.3460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1553.298898][ T29] audit: type=1400 audit(1553.210:885): avc: denied { map_create } for pid=16196 comm="syz.1.3461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1553.299347][ T29] audit: type=1400 audit(1553.210:886): avc: denied { map_read } for pid=16196 comm="syz.1.3461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1554.271108][ T29] audit: type=1400 audit(1554.180:887): avc: denied { name_bind } for pid=16201 comm="syz.1.3463" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1554.271560][ T29] audit: type=1400 audit(1554.180:888): avc: denied { node_bind } for pid=16201 comm="syz.1.3463" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1554.813647][ T29] audit: type=1400 audit(1554.720:889): avc: denied { map_write } for pid=16203 comm="syz.1.3464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1555.765576][ T29] audit: type=1400 audit(1555.680:890): avc: denied { create } for pid=16206 comm="syz.1.3465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1555.811166][ T29] audit: type=1400 audit(1555.710:891): avc: denied { connect } for pid=16206 comm="syz.1.3465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1558.370942][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 1558.371374][ T29] audit: type=1400 audit(1558.280:900): avc: denied { create } for pid=16217 comm="syz.1.3468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1558.457889][ T29] audit: type=1400 audit(1558.370:901): avc: denied { bind } for pid=16217 comm="syz.1.3468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1558.497102][ T29] audit: type=1400 audit(1558.410:902): avc: denied { write } for pid=16217 comm="syz.1.3468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1559.542279][ T29] audit: type=1400 audit(1559.450:903): avc: denied { setopt } for pid=16217 comm="syz.1.3468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1562.565406][ T29] audit: type=1400 audit(1562.480:904): avc: denied { create } for pid=16225 comm="syz.1.3470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1562.783254][ T29] audit: type=1400 audit(1562.700:905): avc: denied { write } for pid=16225 comm="syz.1.3470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1562.791361][T16226] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3470'. [ 1563.705450][T16229] veth2: entered promiscuous mode [ 1563.724229][T16229] veth2: entered allmulticast mode [ 1564.017532][ T29] audit: type=1326 audit(1563.920:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16227 comm="syz.1.3471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1564.022222][ T29] audit: type=1326 audit(1563.920:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16227 comm="syz.1.3471" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1564.027672][ T29] audit: type=1326 audit(1563.920:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16227 comm="syz.1.3471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1564.033798][ T29] audit: type=1326 audit(1563.930:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16227 comm="syz.1.3471" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132970 code=0x7ffc0000 [ 1564.166438][ T29] audit: type=1326 audit(1564.080:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16243 comm="syz.1.3471" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x160424 code=0x7ffc0000 [ 1565.731488][ T29] audit: type=1326 audit(1565.630:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16243 comm="syz.1.3471" exe="/syz-executor" sig=0 arch=40000028 syscall=0 compat=0 ip=0x132970 code=0x7ffc0000 [ 1567.654638][ T29] audit: type=1400 audit(1567.570:912): avc: denied { create } for pid=16245 comm="syz.1.3472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1570.044989][ T29] audit: type=1326 audit(1569.960:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16250 comm="syz.1.3473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1570.047202][ T29] audit: type=1326 audit(1569.960:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16250 comm="syz.1.3473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1570.115208][ T29] audit: type=1326 audit(1570.030:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16250 comm="syz.1.3473" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1570.119398][ T29] audit: type=1326 audit(1570.030:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16250 comm="syz.1.3473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1570.131979][ T29] audit: type=1326 audit(1570.050:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16250 comm="syz.1.3473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1570.155668][ T29] audit: type=1326 audit(1570.070:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16250 comm="syz.1.3473" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1570.172385][ T29] audit: type=1326 audit(1570.090:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16250 comm="syz.1.3473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1570.174548][ T29] audit: type=1326 audit(1570.090:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16250 comm="syz.1.3473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1570.182130][ T29] audit: type=1326 audit(1570.100:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16250 comm="syz.1.3473" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1570.183891][ T29] audit: type=1326 audit(1570.100:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16250 comm="syz.1.3473" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1575.825022][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 1575.826288][ T29] audit: type=1400 audit(1575.740:929): avc: denied { write } for pid=16265 comm="syz.1.3477" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1575.879089][ T29] audit: type=1400 audit(1575.790:930): avc: denied { ioctl } for pid=16265 comm="syz.1.3477" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1576.093390][ T29] audit: type=1400 audit(1576.010:931): avc: denied { ioctl } for pid=16265 comm="syz.1.3477" path="socket:[39505]" dev="sockfs" ino=39505 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1580.025844][ T29] audit: type=1400 audit(1579.940:932): avc: denied { create } for pid=16286 comm="syz.2.3485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1581.762735][ T29] audit: type=1400 audit(1581.660:933): avc: denied { read } for pid=16308 comm="syz.1.3491" dev="nsfs" ino=4026532653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1581.786261][ T29] audit: type=1400 audit(1581.660:934): avc: denied { open } for pid=16308 comm="syz.1.3491" path="net:[4026532653]" dev="nsfs" ino=4026532653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1581.818252][ T29] audit: type=1400 audit(1581.660:935): avc: denied { create } for pid=16308 comm="syz.1.3491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1584.183991][T16320] netlink: 48 bytes leftover after parsing attributes in process `syz.1.3494'. [ 1585.521563][ T29] audit: type=1400 audit(1585.430:936): avc: denied { create } for pid=16329 comm="syz.2.3498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1585.525619][ T29] audit: type=1400 audit(1585.440:937): avc: denied { setopt } for pid=16329 comm="syz.2.3498" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1585.994470][ T29] audit: type=1400 audit(1585.910:938): avc: denied { execute } for pid=16336 comm="syz.2.3500" name="file1" dev="tmpfs" ino=2085 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1585.997630][T16337] process 'syz.2.3500' launched './file1' with NULL argv: empty string added [ 1586.004398][ T29] audit: type=1400 audit(1585.920:939): avc: denied { execute_no_trans } for pid=16336 comm="syz.2.3500" path="/408/file1" dev="tmpfs" ino=2085 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1587.633141][ T29] audit: type=1400 audit(1587.540:940): avc: denied { setopt } for pid=16361 comm="syz.2.3504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1587.983577][T16364] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1587.995123][T16364] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1591.973657][ T29] audit: type=1326 audit(1591.880:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16374 comm="syz.2.3508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1591.984370][ T29] audit: type=1326 audit(1591.900:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16374 comm="syz.2.3508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1591.987535][ T29] audit: type=1326 audit(1591.900:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16374 comm="syz.2.3508" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1591.995835][ T29] audit: type=1326 audit(1591.910:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16374 comm="syz.2.3508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1592.002854][ T29] audit: type=1326 audit(1591.920:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16374 comm="syz.2.3508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1592.033846][ T29] audit: type=1326 audit(1591.940:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16374 comm="syz.2.3508" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1592.034256][ T29] audit: type=1326 audit(1591.950:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16374 comm="syz.2.3508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1592.044258][ T29] audit: type=1326 audit(1591.960:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16374 comm="syz.2.3508" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1592.056823][ T29] audit: type=1326 audit(1591.970:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16374 comm="syz.2.3508" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1592.553407][T16378] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 1592.553868][T16378] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 1592.592185][T16378] netdevsim netdevsim1: Falling back to sysfs fallback for: . [ 1593.832391][T16395] binfmt_misc: register: failed to install interpreter file ./file2 [ 1593.961587][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 1593.963587][ T29] audit: type=1400 audit(1593.880:955): avc: denied { mount } for pid=16396 comm="syz.2.3515" name="/" dev="ramfs" ino=40121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1594.172616][ T29] audit: type=1400 audit(1594.090:956): avc: denied { create } for pid=16399 comm="syz.2.3516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1594.184296][ T29] audit: type=1400 audit(1594.090:957): avc: denied { write } for pid=16399 comm="syz.2.3516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1594.999597][ T29] audit: type=1400 audit(1594.900:958): avc: denied { create } for pid=16406 comm="syz.2.3518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1595.404673][ T29] audit: type=1326 audit(1595.320:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16409 comm="syz.1.3519" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1595.429335][ T29] audit: type=1326 audit(1595.340:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16409 comm="syz.1.3519" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1595.437243][ T29] audit: type=1326 audit(1595.350:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16409 comm="syz.1.3519" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1595.642895][ T29] audit: type=1326 audit(1595.550:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16409 comm="syz.1.3519" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1595.643184][ T29] audit: type=1326 audit(1595.550:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16409 comm="syz.1.3519" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1595.643441][ T29] audit: type=1326 audit(1595.560:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16409 comm="syz.1.3519" exe="/syz-executor" sig=0 arch=40000028 syscall=330 compat=0 ip=0x132970 code=0x7ffc0000 [ 1599.943060][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1599.946605][ T29] audit: type=1400 audit(1599.860:967): avc: denied { allowed } for pid=16435 comm="syz.2.3526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1599.984400][ T29] audit: type=1400 audit(1599.900:968): avc: denied { create } for pid=16435 comm="syz.2.3526" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1599.988229][ T29] audit: type=1400 audit(1599.900:969): avc: denied { map } for pid=16435 comm="syz.2.3526" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=40205 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1600.021073][ T29] audit: type=1400 audit(1599.920:970): avc: denied { read write } for pid=16435 comm="syz.2.3526" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=40205 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1601.793122][ T29] audit: type=1326 audit(1601.710:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.1.3528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1601.793654][ T29] audit: type=1326 audit(1601.710:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.1.3528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1601.838528][ T29] audit: type=1326 audit(1601.750:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.1.3528" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1601.879640][ T29] audit: type=1326 audit(1601.750:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.1.3528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1601.903614][ T29] audit: type=1326 audit(1601.820:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.1.3528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1601.921267][ T29] audit: type=1326 audit(1601.830:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.1.3528" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1608.102468][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1608.111031][ T29] audit: type=1326 audit(1608.020:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16456 comm="syz.1.3533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1608.181890][ T29] audit: type=1326 audit(1608.020:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16456 comm="syz.1.3533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1608.206683][ T29] audit: type=1326 audit(1608.040:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16456 comm="syz.1.3533" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 1608.257860][ T29] audit: type=1326 audit(1608.040:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16456 comm="syz.1.3533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1608.258262][ T29] audit: type=1326 audit(1608.060:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16456 comm="syz.1.3533" exe="/syz-executor" sig=0 arch=40000028 syscall=377 compat=0 ip=0x132970 code=0x7ffc0000 [ 1608.258521][ T29] audit: type=1326 audit(1608.060:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16456 comm="syz.1.3533" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1609.106063][ T29] audit: type=1400 audit(1609.020:994): avc: denied { write } for pid=16460 comm="syz.1.3534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1609.106477][ T29] audit: type=1400 audit(1609.020:995): avc: denied { nlmsg_write } for pid=16460 comm="syz.1.3534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1609.207170][T16462] netlink: 64 bytes leftover after parsing attributes in process `syz.1.3534'. [ 1610.553973][ T29] audit: type=1326 audit(1610.470:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16463 comm="syz.1.3535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1610.564208][ T29] audit: type=1326 audit(1610.480:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16463 comm="syz.1.3535" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1616.514572][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1616.515247][ T29] audit: type=1326 audit(1616.420:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16482 comm="syz.1.3541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1616.535578][ T29] audit: type=1326 audit(1616.450:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16482 comm="syz.1.3541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1616.564549][ T29] audit: type=1326 audit(1616.480:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16482 comm="syz.1.3541" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1616.569006][ T29] audit: type=1326 audit(1616.480:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16482 comm="syz.1.3541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1616.572990][ T29] audit: type=1326 audit(1616.480:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16482 comm="syz.1.3541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1616.745916][ T29] audit: type=1326 audit(1616.660:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16482 comm="syz.1.3541" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1616.861416][ T29] audit: type=1326 audit(1616.720:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16482 comm="syz.1.3541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1616.861967][ T29] audit: type=1326 audit(1616.770:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16482 comm="syz.1.3541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1616.881139][ T29] audit: type=1326 audit(1616.790:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16482 comm="syz.1.3541" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1616.885523][ T29] audit: type=1326 audit(1616.790:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16482 comm="syz.1.3541" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1622.644327][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 1622.644792][ T29] audit: type=1400 audit(1622.560:1079): avc: denied { create } for pid=16500 comm="syz.1.3546" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1622.783270][ T29] audit: type=1400 audit(1622.700:1080): avc: denied { write } for pid=16500 comm="syz.1.3546" name="file0" dev="tmpfs" ino=2654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1622.834122][ T29] audit: type=1400 audit(1622.750:1081): avc: denied { open } for pid=16500 comm="syz.1.3546" path="/515/file0" dev="tmpfs" ino=2654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1623.189563][ T29] audit: type=1400 audit(1623.100:1082): avc: denied { unlink } for pid=12506 comm="syz-executor" name="file0" dev="tmpfs" ino=2654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1626.111901][T16529] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3548'. [ 1628.092822][T16537] bond0: (slave bond_slave_0): Releasing backup interface [ 1628.213499][T16537] bond0: (slave bond_slave_1): Releasing backup interface [ 1628.511105][T16537] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1628.632316][T16537] netlink: 'syz.1.3550': attribute type 10 has an invalid length. [ 1628.634692][T16537] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3550'. [ 1628.753856][T16537] A link change request failed with some changes committed already. Interface macvlan0 may have been left with an inconsistent configuration, please check. [ 1647.916420][ T29] audit: type=1400 audit(1647.830:1083): avc: denied { setopt } for pid=16570 comm="syz.2.3561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1647.937855][ T29] audit: type=1326 audit(1647.850:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.2.3561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1647.944057][ T29] audit: type=1326 audit(1647.860:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.2.3561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1647.952611][ T29] audit: type=1326 audit(1647.860:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.2.3561" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132970 code=0x7ffc0000 [ 1647.958878][ T29] audit: type=1326 audit(1647.870:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.2.3561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1647.964030][ T29] audit: type=1326 audit(1647.880:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.2.3561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1647.970365][ T29] audit: type=1326 audit(1647.880:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.2.3561" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 1648.032216][ T29] audit: type=1326 audit(1647.950:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.2.3561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1648.041514][ T29] audit: type=1326 audit(1647.950:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.2.3561" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1648.043498][ T29] audit: type=1326 audit(1647.950:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.2.3561" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1648.979120][T16598] netlink: '+}[@': attribute type 6 has an invalid length. [ 1653.143740][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 1653.151594][ T29] audit: type=1400 audit(1653.060:1136): avc: denied { create } for pid=16608 comm="syz.2.3566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1657.355398][ T29] audit: type=1400 audit(1657.270:1137): avc: denied { connect } for pid=16619 comm="syz.2.3569" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1657.408197][ T29] audit: type=1400 audit(1657.310:1138): avc: denied { write } for pid=16619 comm="syz.2.3569" laddr=fe80::13 lport=60 faddr=fe80::d fport=3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1658.236513][ T29] audit: type=1400 audit(1658.150:1139): avc: denied { read } for pid=16626 comm="syz.2.3572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1658.469763][ T29] audit: type=1400 audit(1658.380:1140): avc: denied { getopt } for pid=16628 comm="syz.2.3573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1658.746966][T16631] netlink: 172 bytes leftover after parsing attributes in process `syz.2.3574'. [ 1659.702051][ T29] audit: type=1400 audit(1659.560:1141): avc: denied { setcurrent } for pid=16637 comm="syz.2.3577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1659.702507][ T29] audit: type=1401 audit(1659.560:1142): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 1660.092952][T16644] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3579'. [ 1660.479195][ T29] audit: type=1326 audit(1660.390:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.2.3580" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1660.494663][ T29] audit: type=1326 audit(1660.410:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.2.3580" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x13502c code=0x7ffc0000 [ 1660.504262][ T29] audit: type=1326 audit(1660.420:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.2.3580" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x134e08 code=0x7ffc0000 [ 1661.767486][ T29] audit: type=1326 audit(1661.680:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.2.3580" exe="/syz-executor" sig=0 arch=40000028 syscall=291 compat=0 ip=0x134d28 code=0x7ffc0000 [ 1661.767886][ T29] audit: type=1326 audit(1661.680:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.2.3580" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x130e84 code=0x7ffc0000 [ 1661.770111][ T29] audit: type=1326 audit(1661.680:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.2.3580" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1664.012492][T16680] netlink: 'syz.2.3590': attribute type 13 has an invalid length. [ 1664.956822][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 1664.957231][ T29] audit: type=1400 audit(1664.870:1164): avc: denied { setopt } for pid=16686 comm="syz.2.3592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1665.165111][ T29] audit: type=1400 audit(1665.070:1165): avc: denied { create } for pid=16678 comm="syz.1.3589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1665.375321][ T29] audit: type=1400 audit(1665.290:1166): avc: denied { write } for pid=16686 comm="syz.2.3592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1666.560796][ T29] audit: type=1326 audit(1666.470:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16697 comm="syz.2.3594" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1666.571721][ T29] audit: type=1326 audit(1666.470:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16697 comm="syz.2.3594" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1666.581593][ T29] audit: type=1326 audit(1666.470:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16697 comm="syz.2.3594" exe="/syz-executor" sig=0 arch=40000028 syscall=369 compat=0 ip=0x132970 code=0x7ffc0000 [ 1666.581946][ T29] audit: type=1326 audit(1666.470:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16697 comm="syz.2.3594" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1666.582257][ T29] audit: type=1326 audit(1666.470:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16697 comm="syz.2.3594" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1667.032772][T16703] netlink: 96 bytes leftover after parsing attributes in process `syz.2.3596'. [ 1669.124109][ T29] audit: type=1400 audit(1669.040:1172): avc: denied { append } for pid=16723 comm="syz.2.3600" name="001" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1669.753308][T16730] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3602'. [ 1673.763042][ T29] audit: type=1400 audit(1673.680:1173): avc: denied { write } for pid=16743 comm="syz.2.3605" name="tcp" dev="proc" ino=4026532818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1676.862347][T16749] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3606'. [ 1677.416694][ T29] audit: type=1400 audit(1677.330:1174): avc: denied { watch watch_reads } for pid=16754 comm="syz.2.3608" path="/473" dev="tmpfs" ino=2408 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1678.592020][T16766] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3612'. [ 1680.575807][ T29] audit: type=1400 audit(1680.490:1175): avc: denied { write } for pid=16788 comm="syz.1.3618" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1683.568152][T16808] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3622'. [ 1683.568622][T16808] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3622'. [ 1685.032631][T16813] netlink: 'syz.2.3624': attribute type 16 has an invalid length. [ 1685.033188][T16813] netlink: 'syz.2.3624': attribute type 17 has an invalid length. [ 1685.916515][ T29] audit: type=1326 audit(1685.830:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16819 comm="syz.2.3626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1685.918808][ T29] audit: type=1326 audit(1685.830:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16819 comm="syz.2.3626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1685.926414][ T29] audit: type=1326 audit(1685.840:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16819 comm="syz.2.3626" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1685.931303][ T29] audit: type=1326 audit(1685.840:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16819 comm="syz.2.3626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1685.934944][ T29] audit: type=1326 audit(1685.840:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16819 comm="syz.2.3626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1685.942920][ T29] audit: type=1326 audit(1685.860:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16819 comm="syz.2.3626" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1686.040326][ T29] audit: type=1326 audit(1685.900:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16819 comm="syz.2.3626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1686.041274][ T29] audit: type=1326 audit(1685.950:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16819 comm="syz.2.3626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1686.041615][ T29] audit: type=1326 audit(1685.950:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16819 comm="syz.2.3626" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1686.041836][ T29] audit: type=1326 audit(1685.950:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16819 comm="syz.2.3626" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1686.951840][T16827] netlink: 20 bytes leftover after parsing attributes in process `syz.1.3628'. [ 1686.987021][T16827] sch_tbf: burst 6 is lower than device ip6gre0 mtu (1448) ! [ 1689.922348][T16860] netlink: 64 bytes leftover after parsing attributes in process `syz.1.3631'. [ 1690.508309][T16868] sch_tbf: burst 274 is lower than device lo mtu (65550) ! [ 1690.795149][T16871] netlink: 48 bytes leftover after parsing attributes in process `syz.2.3636'. [ 1690.969361][T16874] netlink: 'syz.2.3638': attribute type 12 has an invalid length. [ 1691.178691][T16877] veth0_to_team: entered promiscuous mode [ 1691.383600][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 1691.386413][ T29] audit: type=1400 audit(1691.300:1214): avc: denied { ioctl } for pid=16872 comm="syz.1.3637" path="socket:[41094]" dev="sockfs" ino=41094 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1691.997007][ T29] audit: type=1326 audit(1691.910:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16884 comm="syz.2.3642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1692.009046][ T29] audit: type=1326 audit(1691.910:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16884 comm="syz.2.3642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1692.021522][ T29] audit: type=1326 audit(1691.910:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16884 comm="syz.2.3642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1692.021866][ T29] audit: type=1326 audit(1691.910:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16884 comm="syz.2.3642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1692.023367][ T29] audit: type=1326 audit(1691.910:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16884 comm="syz.2.3642" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x132970 code=0x7ffc0000 [ 1692.028375][ T29] audit: type=1326 audit(1691.910:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16884 comm="syz.2.3642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1692.029127][ T29] audit: type=1326 audit(1691.910:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16884 comm="syz.2.3642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1692.052807][ T29] audit: type=1326 audit(1691.950:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16884 comm="syz.2.3642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1692.053197][ T29] audit: type=1326 audit(1691.950:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16884 comm="syz.2.3642" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1692.658113][T16890] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3644'. [ 1697.065373][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 1697.065838][ T29] audit: type=1400 audit(1696.980:1275): avc: denied { validate_trans } for pid=16940 comm="syz.2.3659" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1702.683653][T16962] smc: net device bond0 applied user defined pnetid SYZ0 [ 1702.693600][T16962] smc: net device bond0 erased user defined pnetid SYZ0 [ 1705.452858][T16971] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3667'. [ 1706.104178][T16968] netlink: 68 bytes leftover after parsing attributes in process `syz.2.3666'. [ 1706.516629][T16976] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1706.599077][T16976] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1706.961518][T16980] capability: warning: `syz.2.3670' uses deprecated v2 capabilities in a way that may be insecure [ 1710.031878][T17004] netlink: 'syz.2.3679': attribute type 12 has an invalid length. [ 1711.952399][T17014] IPv6: NLM_F_CREATE should be specified when creating new route [ 1714.292528][ T29] audit: type=1326 audit(1714.210:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17028 comm="syz.2.3687" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1714.313611][ T29] audit: type=1326 audit(1714.230:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17028 comm="syz.2.3687" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1714.315407][ T29] audit: type=1326 audit(1714.230:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17028 comm="syz.2.3687" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1714.321012][ T29] audit: type=1326 audit(1714.230:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17028 comm="syz.2.3687" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1714.321218][ T29] audit: type=1326 audit(1714.230:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17028 comm="syz.2.3687" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1714.323016][ T29] audit: type=1326 audit(1714.240:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17028 comm="syz.2.3687" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1714.325081][ T29] audit: type=1326 audit(1714.240:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17028 comm="syz.2.3687" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1714.325284][ T29] audit: type=1326 audit(1714.240:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17028 comm="syz.2.3687" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1714.327799][ T29] audit: type=1326 audit(1714.240:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17028 comm="syz.2.3687" exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x132970 code=0x7ffc0000 [ 1714.327936][ T29] audit: type=1326 audit(1714.240:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17028 comm="syz.2.3687" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1715.208918][T17038] netlink: 44 bytes leftover after parsing attributes in process `syz.2.3690'. [ 1720.876220][T17064] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3698'. [ 1721.452048][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1721.452439][ T29] audit: type=1400 audit(1721.360:1289): avc: denied { ioctl } for pid=17063 comm="syz.2.3698" path="socket:[41307]" dev="sockfs" ino=41307 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1722.101405][ T29] audit: type=1326 audit(1722.010:1290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17069 comm="syz.1.3700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1722.126558][ T29] audit: type=1326 audit(1722.040:1291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17069 comm="syz.1.3700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1722.128442][ T29] audit: type=1326 audit(1722.040:1292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17069 comm="syz.1.3700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1722.130075][ T29] audit: type=1326 audit(1722.040:1293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17069 comm="syz.1.3700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1722.176419][ T29] audit: type=1326 audit(1722.090:1294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17069 comm="syz.1.3700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1722.180367][ T29] audit: type=1326 audit(1722.090:1295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17069 comm="syz.1.3700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1722.343232][ T29] audit: type=1326 audit(1722.260:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17069 comm="syz.1.3700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1722.463251][ T29] audit: type=1326 audit(1722.380:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17069 comm="syz.1.3700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1722.466967][ T29] audit: type=1326 audit(1722.380:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17069 comm="syz.1.3700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1726.859101][T17098] IPv6: Can't replace route, no match found [ 1730.125059][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 1730.125548][ T29] audit: type=1400 audit(1730.040:1314): avc: denied { block_suspend } for pid=17122 comm="syz.2.3715" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1730.559131][T17131] netdevsim netdevsim2: Direct firmware load for  failed with error -2 [ 1730.581474][T17131] netdevsim netdevsim2: Falling back to sysfs fallback for:  [ 1733.837843][T17153] SELinux: Context system_u:object_r:hald_keymap_exec_t:s0 is not valid (left unmapped). [ 1733.838851][ T29] audit: type=1400 audit(1733.750:1315): avc: denied { relabelfrom } for pid=17152 comm="syz.2.3721" name="" dev="pipefs" ino=41407 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1733.851057][ T29] audit: type=1400 audit(1733.760:1316): avc: denied { relabelto } for pid=17152 comm="syz.2.3721" name="" dev="pipefs" ino=41407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:hald_keymap_exec_t:s0" [ 1734.841755][ T29] audit: type=1326 audit(1734.750:1317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.858631][ T29] audit: type=1326 audit(1734.770:1318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.863800][ T29] audit: type=1326 audit(1734.780:1319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.901222][ T29] audit: type=1326 audit(1734.810:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.913875][ T29] audit: type=1326 audit(1734.820:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.916310][ T29] audit: type=1326 audit(1734.830:1322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1734.918198][ T29] audit: type=1326 audit(1734.830:1323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1735.361506][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 1735.361768][ T29] audit: type=1326 audit(1735.260:1341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1735.361955][ T29] audit: type=1326 audit(1735.260:1342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1735.362079][ T29] audit: type=1326 audit(1735.260:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1735.362204][ T29] audit: type=1326 audit(1735.260:1344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1735.362315][ T29] audit: type=1326 audit(1735.260:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17167 comm="syz.2.3727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1735.863693][T17178] IPv6: NLM_F_CREATE should be specified when creating new route [ 1735.866640][T17178] IPv6: Can't replace route, no match found [ 1736.260241][ T29] audit: type=1326 audit(1736.170:1346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17179 comm="syz.2.3731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1736.263738][ T29] audit: type=1326 audit(1736.180:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17179 comm="syz.2.3731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1736.266103][ T29] audit: type=1326 audit(1736.180:1348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17179 comm="syz.2.3731" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1736.268506][ T29] audit: type=1326 audit(1736.180:1349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17179 comm="syz.2.3731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1736.270363][ T29] audit: type=1326 audit(1736.180:1350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17179 comm="syz.2.3731" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1736.641584][T17185] SELinux: Context system_u:object_r:cpu_online_t:s0 is not valid (left unmapped). [ 1736.904994][T17187] netlink: 80 bytes leftover after parsing attributes in process `syz.2.3733'. [ 1736.905805][T17187] netlink: 'syz.2.3733': attribute type 1 has an invalid length. [ 1738.097889][T17197] netlink: 'syz.1.3736': attribute type 11 has an invalid length. [ 1738.098288][T17197] netlink: 44 bytes leftover after parsing attributes in process `syz.1.3736'. [ 1740.659403][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 1740.659913][ T29] audit: type=1400 audit(1740.570:1363): avc: denied { bind } for pid=17209 comm="syz.2.3740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1741.504974][T17224] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3743'. [ 1749.447657][ T29] audit: type=1400 audit(1749.360:1364): avc: denied { create } for pid=17268 comm="syz.1.3755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1749.475812][ T29] audit: type=1400 audit(1749.390:1365): avc: denied { write } for pid=17268 comm="syz.1.3755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1750.375825][ T29] audit: type=1326 audit(1750.280:1366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17272 comm="syz.1.3756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1750.455940][ T29] audit: type=1326 audit(1750.370:1367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17272 comm="syz.1.3756" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=0 ip=0x132970 code=0x7ffc0000 [ 1752.457456][ T29] audit: type=1400 audit(1752.370:1368): avc: denied { name_bind } for pid=17276 comm="syz.2.3757" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1756.276360][ T29] audit: type=1326 audit(1756.190:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17294 comm="syz.1.3762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1756.384437][ T29] audit: type=1326 audit(1756.300:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17294 comm="syz.1.3762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1756.386749][ T29] audit: type=1326 audit(1756.300:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17294 comm="syz.1.3762" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1756.387098][ T29] audit: type=1326 audit(1756.300:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17294 comm="syz.1.3762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1756.387234][ T29] audit: type=1326 audit(1756.300:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17294 comm="syz.1.3762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1756.394413][ T29] audit: type=1326 audit(1756.310:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17294 comm="syz.1.3762" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1756.430327][ T29] audit: type=1326 audit(1756.340:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17294 comm="syz.1.3762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1756.431258][ T29] audit: type=1326 audit(1756.340:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17294 comm="syz.1.3762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1756.431388][ T29] audit: type=1326 audit(1756.340:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17294 comm="syz.1.3762" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1756.431453][ T29] audit: type=1326 audit(1756.340:1378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17294 comm="syz.1.3762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1759.383549][T17323] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3768'. [ 1761.612004][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 1761.612470][ T29] audit: type=1400 audit(1761.530:1427): avc: denied { write } for pid=17327 comm="syz.1.3769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1763.811374][T17341] netlink: 20 bytes leftover after parsing attributes in process `syz.1.3773'. [ 1764.382311][ T29] audit: type=1326 audit(1764.290:1428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17342 comm="syz.1.3774" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1764.553620][ T29] audit: type=1326 audit(1764.310:1429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17342 comm="syz.1.3774" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1764.584930][ T29] audit: type=1326 audit(1764.310:1430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17342 comm="syz.1.3774" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1764.585424][ T29] audit: type=1326 audit(1764.310:1431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17342 comm="syz.1.3774" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1764.585515][ T29] audit: type=1326 audit(1764.330:1432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17342 comm="syz.1.3774" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1764.585598][ T29] audit: type=1326 audit(1764.340:1433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17342 comm="syz.1.3774" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1764.613761][ T29] audit: type=1326 audit(1764.340:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17342 comm="syz.1.3774" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1764.711133][ T29] audit: type=1326 audit(1764.340:1435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17342 comm="syz.1.3774" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1764.772880][ T29] audit: type=1326 audit(1764.340:1436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17342 comm="syz.1.3774" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1768.139356][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1768.143455][ T29] audit: type=1400 audit(1768.050:1439): avc: denied { execute } for pid=17354 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1768.185489][ T29] audit: type=1400 audit(1768.100:1440): avc: denied { execute_no_trans } for pid=17354 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1768.259232][ T29] audit: type=1400 audit(1768.170:1441): avc: denied { mounton } for pid=17360 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1775.628365][T17360] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1775.643850][T17360] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1776.337460][T17360] hsr_slave_0: entered promiscuous mode [ 1776.343999][T17360] hsr_slave_1: entered promiscuous mode [ 1776.345526][T17360] debugfs: 'hsr0' already exists in 'hsr' [ 1776.347952][T17360] Cannot create hsr debugfs directory [ 1776.567630][T17360] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1776.647451][T17360] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1776.708434][T17360] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1776.768121][T17360] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1776.893194][T17360] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1776.918836][T17360] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1776.927383][T17360] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1776.937542][T17360] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1777.470010][T17360] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1781.554128][T17360] veth0_vlan: entered promiscuous mode [ 1781.566421][T17360] veth1_vlan: entered promiscuous mode [ 1781.608073][T17360] veth0_macvtap: entered promiscuous mode [ 1781.615652][T17360] veth1_macvtap: entered promiscuous mode [ 1781.654739][T16837] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1781.655052][T16837] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1781.655283][T16837] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1781.655428][T16837] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1781.942410][ T29] audit: type=1400 audit(1781.850:1442): avc: denied { mounton } for pid=17360 comm="syz-executor" path="/syzkaller.Gm779U/syz-tmp" dev="vda" ino=821 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1781.993190][ T29] audit: type=1400 audit(1781.850:1443): avc: denied { mount } for pid=17360 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1782.015412][ T29] audit: type=1400 audit(1781.890:1444): avc: denied { mounton } for pid=17360 comm="syz-executor" path="/syzkaller.Gm779U/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1782.015794][ T29] audit: type=1400 audit(1781.890:1445): avc: denied { mounton } for pid=17360 comm="syz-executor" path="/syzkaller.Gm779U/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=42408 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1782.016006][ T29] audit: type=1400 audit(1781.910:1446): avc: denied { unmount } for pid=17360 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1782.016203][ T29] audit: type=1400 audit(1781.920:1447): avc: denied { mounton } for pid=17360 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1782.016381][ T29] audit: type=1400 audit(1781.920:1448): avc: denied { mount } for pid=17360 comm="syz-executor" name="/" dev="gadgetfs" ino=1010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1782.016543][ T29] audit: type=1400 audit(1781.920:1449): avc: denied { mount } for pid=17360 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1782.016703][ T29] audit: type=1400 audit(1781.920:1450): avc: denied { mounton } for pid=17360 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1782.016862][ T29] audit: type=1400 audit(1781.920:1451): avc: denied { mount } for pid=17360 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1784.657373][T17732] netlink: 224 bytes leftover after parsing attributes in process `syz.1.3782'. [ 1789.833447][T17770] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3792'. [ 1789.834134][T17770] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3792'. [ 1790.044491][T17772] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 1790.364012][T17776] SELinux: security_context_str_to_sid (--^$-) failed with errno=-22 [ 1791.446629][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 1791.451031][ T29] audit: type=1400 audit(1791.360:1461): avc: denied { connect } for pid=17781 comm="syz.1.3797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1794.055731][T17790] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3800'. [ 1794.056850][T17790] netlink: 128 bytes leftover after parsing attributes in process `syz.1.3800'. [ 1794.192095][T17792] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3801'. [ 1794.192580][T17792] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3801'. [ 1810.479398][T17829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1810.513269][T17829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1812.754953][T17829] hsr_slave_0: entered promiscuous mode [ 1812.757065][T17829] hsr_slave_1: entered promiscuous mode [ 1812.758510][T17829] debugfs: 'hsr0' already exists in 'hsr' [ 1812.758795][T17829] Cannot create hsr debugfs directory [ 1813.283351][T18104] netdevsim netdevsim1: Direct firmware load for þ failed with error -2 [ 1813.284677][T18104] netdevsim netdevsim1: Falling back to sysfs fallback for: þ [ 1813.758361][T17829] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1813.813450][T17829] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1813.887356][T17829] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1813.910219][T17829] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1815.862025][T17829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1816.549868][ T29] audit: type=1400 audit(1816.460:1462): avc: denied { ioctl } for pid=18156 comm="syz.1.3808" path="socket:[43572]" dev="sockfs" ino=43572 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1816.565153][T18158] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3808'. [ 1818.623454][T18176] sch_tbf: burst 21990 is lower than device lo mtu (65550) ! [ 1820.996358][ T29] audit: type=1326 audit(1820.910:1463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18184 comm="syz.1.3815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1821.001573][ T29] audit: type=1326 audit(1820.920:1464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18184 comm="syz.1.3815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1821.003880][ T29] audit: type=1326 audit(1820.920:1465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18184 comm="syz.1.3815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1821.007928][ T29] audit: type=1326 audit(1820.920:1466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18184 comm="syz.1.3815" exe="/syz-executor" sig=0 arch=40000028 syscall=356 compat=0 ip=0x132970 code=0x7ffc0000 [ 1821.024439][ T29] audit: type=1326 audit(1820.940:1467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18184 comm="syz.1.3815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1821.024785][ T29] audit: type=1326 audit(1820.940:1468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18184 comm="syz.1.3815" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132970 code=0x7ffc0000 [ 1821.024981][ T29] audit: type=1326 audit(1820.940:1469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18184 comm="syz.1.3815" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132970 code=0x7ffc0000 [ 1821.824347][ T29] audit: type=1400 audit(1821.740:1470): avc: denied { sys_module } for pid=17829 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1821.861800][ T29] audit: type=1400 audit(1821.780:1471): avc: denied { module_request } for pid=17829 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1822.147046][ T29] audit: type=1400 audit(1822.030:1472): avc: denied { read } for pid=18193 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1822.462600][ T29] audit: type=1400 audit(1822.380:1473): avc: denied { prog_load } for pid=18197 comm="syz.1.3819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1822.465235][ T29] audit: type=1400 audit(1822.380:1474): avc: denied { bpf } for pid=18197 comm="syz.1.3819" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1822.470315][ T29] audit: type=1400 audit(1822.380:1475): avc: denied { perfmon } for pid=18197 comm="syz.1.3819" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1822.489681][ T29] audit: type=1400 audit(1822.400:1476): avc: denied { prog_run } for pid=18197 comm="syz.1.3819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1822.921273][ T29] audit: type=1400 audit(1822.830:1477): avc: denied { map_create } for pid=18200 comm="syz.1.3820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1822.931046][ T29] audit: type=1400 audit(1822.830:1478): avc: denied { map_read map_write } for pid=18200 comm="syz.1.3820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1824.946458][ T29] audit: type=1326 audit(1824.860:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18206 comm="syz.1.3822" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1826.984772][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 1826.988122][ T29] audit: type=1400 audit(1826.900:1496): avc: denied { watch } for pid=18213 comm="syz.1.3824" path="/46/control" dev="tmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1827.741655][ T29] audit: type=1400 audit(1827.650:1497): avc: denied { load_policy } for pid=18229 comm="syz.1.3825" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1827.897967][T18230] SELinux: failed to load policy [ 1829.437705][ T29] audit: type=1400 audit(1829.350:1498): avc: denied { create } for pid=18241 comm="syz.1.3829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1829.455478][ T29] audit: type=1326 audit(1829.370:1499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18241 comm="syz.1.3829" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1829.457738][ T29] audit: type=1326 audit(1829.370:1500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18241 comm="syz.1.3829" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1829.461880][ T29] audit: type=1326 audit(1829.370:1501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18241 comm="syz.1.3829" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1829.464851][ T29] audit: type=1326 audit(1829.370:1502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18241 comm="syz.1.3829" exe="/syz-executor" sig=0 arch=40000028 syscall=426 compat=0 ip=0x132970 code=0x7ffc0000 [ 1829.468895][ T29] audit: type=1326 audit(1829.370:1503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18241 comm="syz.1.3829" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1829.476298][ T29] audit: type=1326 audit(1829.380:1504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18241 comm="syz.1.3829" exe="/syz-executor" sig=0 arch=40000028 syscall=179 compat=0 ip=0x132970 code=0x7ffc0000 [ 1830.134857][T17829] veth0_vlan: entered promiscuous mode [ 1830.214656][T17829] veth1_vlan: entered promiscuous mode [ 1830.492137][T17829] veth0_macvtap: entered promiscuous mode [ 1830.575145][T17829] veth1_macvtap: entered promiscuous mode [ 1830.936635][T16837] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1830.981379][ T139] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1830.982865][T16837] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1830.983187][T16837] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1831.311479][ T29] audit: type=1400 audit(1831.220:1505): avc: denied { mounton } for pid=17829 comm="syz-executor" path="/syzkaller.E1y7CK/syz-tmp" dev="vda" ino=822 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1832.471386][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1832.471568][ T29] audit: type=1326 audit(1832.390:1517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18249 comm="syz.1.3831" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x0 [ 1832.494531][ T29] audit: type=1400 audit(1832.410:1518): avc: denied { mount } for pid=18250 comm="syz.3.3804" name="/" dev="ramfs" ino=42953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1832.728670][ T29] audit: type=1400 audit(1832.640:1519): avc: denied { create } for pid=18253 comm="syz.3.3832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1832.748308][T18254] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3832'. [ 1832.751734][ T29] audit: type=1400 audit(1832.660:1520): avc: denied { write } for pid=18253 comm="syz.3.3832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1833.115915][ T29] audit: type=1400 audit(1833.030:1521): avc: denied { create } for pid=18253 comm="syz.3.3832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1833.299013][ T29] audit: type=1400 audit(1833.210:1522): avc: denied { setopt } for pid=18253 comm="syz.3.3832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1837.079728][ T29] audit: type=1400 audit(1836.980:1523): avc: denied { create } for pid=18262 comm="syz.1.3834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1837.738376][ T29] audit: type=1400 audit(1837.650:1524): avc: denied { create } for pid=18262 comm="syz.1.3834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1837.771218][ T29] audit: type=1400 audit(1837.680:1525): avc: denied { write } for pid=18262 comm="syz.1.3834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1837.974903][ T29] audit: type=1400 audit(1837.890:1526): avc: denied { read } for pid=18262 comm="syz.1.3834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1837.987830][ T29] audit: type=1400 audit(1837.900:1527): avc: denied { write } for pid=18262 comm="syz.1.3834" name="rt_cache" dev="proc" ino=4026532880 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1840.378405][ T29] audit: type=1400 audit(1840.290:1528): avc: denied { create } for pid=18269 comm="syz.3.3835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1840.383962][ T29] audit: type=1400 audit(1840.300:1529): avc: denied { connect } for pid=18269 comm="syz.3.3835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1841.367312][ T29] audit: type=1400 audit(1841.280:1530): avc: denied { bind } for pid=18276 comm="syz.3.3838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1843.778825][T18287] netlink: 'wÞ£ÿ': attribute type 27 has an invalid length. [ 1844.225496][ T7368] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1844.225706][ T7368] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1844.225899][ T7368] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1844.226015][ T7368] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1844.415709][ T29] audit: type=1326 audit(1844.330:1531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18290 comm="syz.3.3843" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1844.424123][ T29] audit: type=1326 audit(1844.340:1532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18290 comm="syz.3.3843" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1844.426954][ T29] audit: type=1326 audit(1844.340:1533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18290 comm="syz.3.3843" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1844.429592][ T29] audit: type=1326 audit(1844.340:1534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18290 comm="syz.3.3843" exe="/syz-executor" sig=0 arch=40000028 syscall=23 compat=0 ip=0x132970 code=0x7ffc0000 [ 1844.469605][ T29] audit: type=1326 audit(1844.380:1535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18290 comm="syz.3.3843" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1844.474496][ T29] audit: type=1326 audit(1844.380:1536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18290 comm="syz.3.3843" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1844.482037][ T29] audit: type=1326 audit(1844.380:1537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18290 comm="syz.3.3843" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1844.487571][ T29] audit: type=1326 audit(1844.380:1538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18290 comm="syz.3.3843" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1844.493614][ T29] audit: type=1326 audit(1844.380:1539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18290 comm="syz.3.3843" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1844.634039][ T29] audit: type=1326 audit(1844.420:1540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18290 comm="syz.3.3843" exe="/syz-executor" sig=0 arch=40000028 syscall=295 compat=0 ip=0x132970 code=0x7ffc0000 [ 1849.640715][ T29] kauditd_printk_skb: 109 callbacks suppressed [ 1849.640973][ T29] audit: type=1400 audit(1849.550:1650): avc: denied { map } for pid=18325 comm="syz.3.3853" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=43887 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1849.655148][ T29] audit: type=1400 audit(1849.570:1651): avc: denied { read write } for pid=18325 comm="syz.3.3853" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=43887 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1850.066488][ T29] audit: type=1400 audit(1849.980:1652): avc: denied { read } for pid=18327 comm="syz.3.3854" dev="nsfs" ino=4026533115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1850.070752][ T29] audit: type=1400 audit(1849.980:1653): avc: denied { open } for pid=18327 comm="syz.3.3854" path="ipc:[4026533115]" dev="nsfs" ino=4026533115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1853.735120][T18343] IPv6: NLM_F_CREATE should be specified when creating new route [ 1854.715508][T18345] netlink: 'syz.3.3860': attribute type 1 has an invalid length. [ 1855.091733][ T29] audit: type=1326 audit(1854.980:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18348 comm="syz.3.3861" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1855.094239][ T29] audit: type=1326 audit(1855.010:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18348 comm="syz.3.3861" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1855.099066][ T29] audit: type=1326 audit(1855.010:1656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18348 comm="syz.3.3861" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1855.114885][ T29] audit: type=1326 audit(1855.010:1657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18348 comm="syz.3.3861" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1855.115570][ T29] audit: type=1326 audit(1855.030:1658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18348 comm="syz.3.3861" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1855.121444][ T29] audit: type=1326 audit(1855.030:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18348 comm="syz.3.3861" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1855.127006][ T29] audit: type=1326 audit(1855.040:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18348 comm="syz.3.3861" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132970 code=0x7ffc0000 [ 1855.155768][ T29] audit: type=1326 audit(1855.070:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18348 comm="syz.3.3861" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1855.157515][ T29] audit: type=1326 audit(1855.070:1662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18348 comm="syz.3.3861" exe="/syz-executor" sig=0 arch=40000028 syscall=114 compat=0 ip=0x132970 code=0x7ffc0000 [ 1855.198791][ T29] audit: type=1326 audit(1855.110:1663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18350 comm="syz.3.3861" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x160424 code=0x7ffc0000 [ 1862.394821][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 1862.398362][ T29] audit: type=1400 audit(1862.310:1684): avc: denied { create } for pid=18368 comm="syz.3.3868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1862.418375][ T29] audit: type=1400 audit(1862.330:1685): avc: denied { bind } for pid=18368 comm="syz.3.3868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1862.583138][ T29] audit: type=1400 audit(1862.490:1686): avc: denied { write } for pid=18368 comm="syz.3.3868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1862.836557][ T29] audit: type=1326 audit(1862.750:1687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18370 comm="syz.3.3869" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1862.838628][ T29] audit: type=1326 audit(1862.750:1688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18370 comm="syz.3.3869" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1862.841677][ T29] audit: type=1326 audit(1862.750:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18370 comm="syz.3.3869" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1862.853973][ T29] audit: type=1326 audit(1862.770:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18370 comm="syz.3.3869" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1862.856035][ T29] audit: type=1326 audit(1862.770:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18370 comm="syz.3.3869" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1862.859379][ T29] audit: type=1326 audit(1862.770:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18370 comm="syz.3.3869" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1862.863105][ T29] audit: type=1326 audit(1862.770:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18370 comm="syz.3.3869" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1864.072071][T18378] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3872'. [ 1869.748605][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 1869.752974][ T29] audit: type=1400 audit(1869.660:1740): avc: denied { create } for pid=18412 comm="syz.3.3884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1869.908708][ T29] audit: type=1400 audit(1869.820:1741): avc: denied { write } for pid=18412 comm="syz.3.3884" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1870.613724][ T29] audit: type=1326 audit(1870.530:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18416 comm="syz.3.3886" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1870.614114][ T29] audit: type=1326 audit(1870.530:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18416 comm="syz.3.3886" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1870.625406][ T29] audit: type=1326 audit(1870.540:1744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18416 comm="syz.3.3886" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1870.625724][ T29] audit: type=1326 audit(1870.540:1745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18416 comm="syz.3.3886" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1870.636818][ T29] audit: type=1326 audit(1870.550:1746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18416 comm="syz.3.3886" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1870.645801][ T29] audit: type=1326 audit(1870.560:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18416 comm="syz.3.3886" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1870.651917][ T29] audit: type=1326 audit(1870.570:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18416 comm="syz.3.3886" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1870.653816][ T29] audit: type=1326 audit(1870.570:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18416 comm="syz.3.3886" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1875.271239][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 1875.271685][ T29] audit: type=1326 audit(1875.180:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18461 comm="syz.3.3895" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1875.290258][ T29] audit: type=1326 audit(1875.190:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18461 comm="syz.3.3895" exe="/syz-executor" sig=0 arch=40000028 syscall=71 compat=0 ip=0x132970 code=0x7ffc0000 [ 1875.306047][ T29] audit: type=1326 audit(1875.210:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18461 comm="syz.3.3895" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1875.306456][ T29] audit: type=1326 audit(1875.210:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18461 comm="syz.3.3895" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1876.345738][T18467] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 1876.348067][T18467] SELinux: failed to load policy [ 1880.610992][ T29] audit: type=1326 audit(1880.510:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18489 comm="syz.3.3904" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1880.611311][ T29] audit: type=1326 audit(1880.510:1761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18489 comm="syz.3.3904" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 1880.611577][ T29] audit: type=1326 audit(1880.510:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18489 comm="syz.3.3904" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1880.611733][ T29] audit: type=1326 audit(1880.520:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18489 comm="syz.3.3904" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1880.611883][ T29] audit: type=1326 audit(1880.520:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18489 comm="syz.3.3904" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1880.612070][ T29] audit: type=1326 audit(1880.520:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18489 comm="syz.3.3904" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1880.612248][ T29] audit: type=1326 audit(1880.520:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18489 comm="syz.3.3904" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1880.612409][ T29] audit: type=1326 audit(1880.520:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18489 comm="syz.3.3904" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1880.612546][ T29] audit: type=1326 audit(1880.520:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18489 comm="syz.3.3904" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1880.612721][ T29] audit: type=1326 audit(1880.520:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18489 comm="syz.3.3904" exe="/syz-executor" sig=0 arch=40000028 syscall=337 compat=0 ip=0x132970 code=0x7ffc0000 [ 1882.786982][T18534] IPv6: NLM_F_CREATE should be specified when creating new route [ 1883.206637][T18540] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 1885.756696][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 1885.757074][ T29] audit: type=1400 audit(1885.670:1810): avc: denied { read } for pid=18633 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1885.798253][ T29] audit: type=1400 audit(1885.710:1811): avc: denied { prog_load } for pid=18633 comm="syz.3.3922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1885.804430][ T29] audit: type=1400 audit(1885.720:1812): avc: denied { bpf } for pid=18633 comm="syz.3.3922" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1886.076348][ T29] audit: type=1400 audit(1885.990:1813): avc: denied { create } for pid=18640 comm="syz.3.3923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1886.121758][ T29] audit: type=1400 audit(1886.030:1814): avc: denied { execmem } for pid=18640 comm="syz.3.3923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1886.818829][ T29] audit: type=1400 audit(1886.730:1815): avc: denied { sys_module } for pid=18520 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1887.658595][T18520] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1887.687989][T18520] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1890.270282][T18520] hsr_slave_0: entered promiscuous mode [ 1890.276265][T18520] hsr_slave_1: entered promiscuous mode [ 1890.277481][T18520] debugfs: 'hsr0' already exists in 'hsr' [ 1890.277561][T18520] Cannot create hsr debugfs directory [ 1890.485439][ T29] audit: type=1400 audit(1890.400:1816): avc: denied { mount } for pid=18640 comm="syz.3.3923" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1891.982565][ T29] audit: type=1400 audit(1891.880:1817): avc: denied { create } for pid=18520 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1891.998715][T18520] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1891.999909][ T29] audit: type=1400 audit(1891.910:1818): avc: denied { write } for pid=18520 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1892.000220][ T29] audit: type=1400 audit(1891.910:1819): avc: denied { read } for pid=18520 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1892.053382][T18520] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1892.064512][T18520] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1892.093515][T18520] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1892.942449][T18454] bond0 (unregistering): Released all slaves [ 1893.093325][T18454] hsr_slave_0: left promiscuous mode [ 1893.094999][T18454] hsr_slave_1: left promiscuous mode [ 1893.099516][T18454] veth1_macvtap: left promiscuous mode [ 1893.100171][T18454] veth0_macvtap: left promiscuous mode [ 1893.101225][T18454] veth1_vlan: left promiscuous mode [ 1893.101968][T18454] veth0_vlan: left promiscuous mode [ 1895.494223][T18520] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1903.664302][T18520] veth0_vlan: entered promiscuous mode [ 1903.709836][T18520] veth1_vlan: entered promiscuous mode [ 1903.853141][T18520] veth0_macvtap: entered promiscuous mode [ 1903.867745][T18520] veth1_macvtap: entered promiscuous mode [ 1904.027819][T18454] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1904.028344][T18454] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1904.028445][T18454] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1904.030471][T18454] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1904.196981][ T29] audit: type=1400 audit(1904.110:1820): avc: denied { mounton } for pid=18520 comm="syz-executor" path="/syzkaller.OSnPaK/syz-tmp" dev="vda" ino=823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1904.199207][ T29] audit: type=1400 audit(1904.110:1821): avc: denied { mount } for pid=18520 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1904.221441][ T29] audit: type=1400 audit(1904.130:1822): avc: denied { mounton } for pid=18520 comm="syz-executor" path="/syzkaller.OSnPaK/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1904.234289][ T29] audit: type=1400 audit(1904.150:1823): avc: denied { mounton } for pid=18520 comm="syz-executor" path="/syzkaller.OSnPaK/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1904.237151][ T29] audit: type=1400 audit(1904.150:1824): avc: denied { mounton } for pid=18520 comm="syz-executor" path="/syzkaller.OSnPaK/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=45545 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1904.254912][ T29] audit: type=1400 audit(1904.170:1825): avc: denied { unmount } for pid=18520 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1904.259359][ T29] audit: type=1400 audit(1904.170:1826): avc: denied { mounton } for pid=18520 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1904.263140][ T29] audit: type=1400 audit(1904.170:1827): avc: denied { mount } for pid=18520 comm="syz-executor" name="/" dev="gadgetfs" ino=1010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1904.276156][ T29] audit: type=1400 audit(1904.190:1828): avc: denied { mount } for pid=18520 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1904.276620][ T29] audit: type=1400 audit(1904.190:1829): avc: denied { mounton } for pid=18520 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1904.432891][T18922] tmpfs: Unsupported parameter 'mpol' [ 1904.885189][T18928] netlink: 'syz.4.3926': attribute type 1 has an invalid length. [ 1910.692405][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1910.698414][ T29] audit: type=1400 audit(1910.610:1841): avc: denied { allowed } for pid=18944 comm="syz.3.3931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1910.725181][ T29] audit: type=1400 audit(1910.620:1842): avc: denied { create } for pid=18944 comm="syz.3.3931" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1910.741647][ T29] audit: type=1400 audit(1910.620:1843): avc: denied { map } for pid=18944 comm="syz.3.3931" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=45557 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1910.784580][ T29] audit: type=1400 audit(1910.620:1844): avc: denied { read write } for pid=18944 comm="syz.3.3931" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=45557 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1911.171368][ T29] audit: type=1400 audit(1911.050:1845): avc: denied { write } for pid=18946 comm=77DEA305FF07 name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1914.833415][T18953] netlink: 32 bytes leftover after parsing attributes in process `syz.3.3934'. [ 1916.754296][ T29] audit: type=1400 audit(1916.670:1846): avc: denied { create } for pid=18964 comm="syz.3.3939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1916.764985][ T29] audit: type=1400 audit(1916.680:1847): avc: denied { write } for pid=18964 comm="syz.3.3939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1918.415188][ T29] audit: type=1400 audit(1918.330:1848): avc: denied { name_bind } for pid=18979 comm="syz.3.3946" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1918.421012][ T29] audit: type=1400 audit(1918.330:1849): avc: denied { node_bind } for pid=18979 comm="syz.3.3946" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1921.083286][ T29] audit: type=1400 audit(1920.980:1850): avc: denied { associate } for pid=18983 comm="syz.3.3947" name="file1" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1921.204704][ T29] audit: type=1400 audit(1921.120:1851): avc: denied { create } for pid=18985 comm="syz.3.3948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1921.225442][ T29] audit: type=1400 audit(1921.140:1852): avc: denied { write } for pid=18985 comm="syz.3.3948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1921.458275][T18989] netem: incorrect ge model size [ 1921.459055][T18989] netem: change failed [ 1922.245853][T18997] smc: net device bond0 applied user defined pnetid SYZ2 [ 1923.020999][ T29] audit: type=1400 audit(1922.930:1853): avc: denied { create } for pid=19000 comm="syz.3.3954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1923.034864][ T29] audit: type=1400 audit(1922.950:1854): avc: denied { bind } for pid=19000 comm="syz.3.3954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1923.056515][ T29] audit: type=1400 audit(1922.970:1855): avc: denied { write } for pid=19000 comm="syz.3.3954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1923.078665][ T29] audit: type=1400 audit(1922.990:1856): avc: denied { setopt } for pid=19000 comm="syz.3.3954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1930.498039][ T29] audit: type=1326 audit(1930.410:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19028 comm="syz.3.3964" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1930.519961][ T29] audit: type=1326 audit(1930.430:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19028 comm="syz.3.3964" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1930.524575][ T29] audit: type=1326 audit(1930.440:1859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19028 comm="syz.3.3964" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1930.532286][ T29] audit: type=1326 audit(1930.450:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19028 comm="syz.3.3964" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1930.537405][ T29] audit: type=1326 audit(1930.450:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19028 comm="syz.3.3964" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1930.553069][ T29] audit: type=1326 audit(1930.460:1862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19028 comm="syz.3.3964" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1930.554660][ T29] audit: type=1326 audit(1930.470:1863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19028 comm="syz.3.3964" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1930.558739][ T29] audit: type=1326 audit(1930.470:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19028 comm="syz.3.3964" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1930.563219][ T29] audit: type=1326 audit(1930.480:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19028 comm="syz.3.3964" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132970 code=0x7ffc0000 [ 1930.575517][ T29] audit: type=1326 audit(1930.490:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19028 comm="syz.3.3964" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1934.773456][T19111] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3979'. [ 1934.774189][T19111] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3979'. [ 1939.417980][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 1939.420825][ T29] audit: type=1326 audit(1939.330:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19132 comm="syz.3.3987" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1939.491498][ T29] audit: type=1326 audit(1939.360:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19132 comm="syz.3.3987" exe="/syz-executor" sig=0 arch=40000028 syscall=108 compat=0 ip=0x132970 code=0x7ffc0000 [ 1939.511508][ T29] audit: type=1326 audit(1939.360:1892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19132 comm="syz.3.3987" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1939.520464][ T29] audit: type=1326 audit(1939.360:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19132 comm="syz.3.3987" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1940.024924][T19139] vlan2: entered allmulticast mode [ 1940.026650][T19139] bridge_slave_0: entered allmulticast mode [ 1940.171241][ T29] audit: type=1400 audit(1940.070:1894): avc: denied { create } for pid=19138 comm="syz.3.3989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1940.201261][ T29] audit: type=1400 audit(1940.070:1895): avc: denied { connect } for pid=19138 comm="syz.3.3989" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1940.209509][ T29] audit: type=1400 audit(1940.070:1896): avc: denied { setopt } for pid=19138 comm="syz.3.3989" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1950.506164][ T29] audit: type=1400 audit(1950.420:1897): avc: denied { execute } for pid=19159 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1950.508835][ T29] audit: type=1400 audit(1950.420:1898): avc: denied { execute_no_trans } for pid=19159 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1950.581132][ T29] audit: type=1400 audit(1950.480:1899): avc: denied { read } for pid=19161 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1950.601316][ T29] audit: type=1400 audit(1950.510:1900): avc: denied { open } for pid=19161 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1950.601711][ T29] audit: type=1400 audit(1950.510:1901): avc: denied { mounton } for pid=19161 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1950.643617][ T30] INFO: task kworker/1:1:70 blocked for more than 430 seconds. [ 1950.644018][ T30] Not tainted syzkaller #0 [ 1950.644099][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1950.644299][ T30] task:kworker/1:1 state:D stack:0 pid:70 tgid:70 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.644768][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.645157][ T30] Call trace: [ 1950.645377][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1950.645486][ T30] r10:df97dd84 r9:00000002 r8:60000013 r7:829171a0 r6:df97dd8c r5:83311800 [ 1950.645522][ T30] r4:83311800 [ 1950.645705][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1950.645837][ T30] r5:83311800 r4:8291719c [ 1950.645873][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1950.645944][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1950.646073][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df97de08 [ 1950.646103][ T30] r4:00000000 [ 1950.647113][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1950.647377][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1950.681329][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.681738][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662fc0 [ 1950.681883][ T30] r4:00000000 [ 1950.681922][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.682017][ T30] r9:83018605 r8:83311800 r7:00000000 r6:83018600 r5:00001000 r4:7f05d000 [ 1950.682038][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.682107][ T30] r5:00001000 r4:dfa9a000 [ 1950.682136][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.682197][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.682264][ T30] r5:85cf038c r4:833fb080 [ 1950.682282][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.682373][ T30] r7:ddde3d80 r6:83018600 r5:85cf038c r4:833fb080 [ 1950.682394][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.682476][ T30] r10:61c88647 r9:83311800 r8:833fb0ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1950.682498][ T30] r4:833fb080 [ 1950.682514][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.682589][ T30] r10:00000000 r9:833fb080 r8:80278fec r7:df879e60 r6:833fb100 r5:83311800 [ 1950.682653][ T30] r4:00000001 [ 1950.682677][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.682738][ T30] Exception stack(0xdf97dfb0 to 0xdf97dff8) [ 1950.682800][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1950.682844][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.683002][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.683068][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.683093][ T30] r4:833fa080 [ 1950.683825][ T30] INFO: task kworker/1:1:70 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1950.683940][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.684188][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.684251][ T30] Call trace: [ 1950.684298][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1950.684380][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1950.684402][ T30] r4:00000000 [ 1950.684416][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1950.684462][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1950.684499][ T30] 1d20: a0a0b000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1950.684531][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1950.684586][ T30] 1d60: 80000113 ffffffff [ 1950.684649][ T30] r5:80000113 r4:80239c10 [ 1950.684668][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1950.684767][ T30] r4:82acb1e4 [ 1950.684798][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1950.684865][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1950.684945][ T30] r4:dfa01dc0 [ 1950.684974][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.685069][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1950.685106][ T30] r4:00000000 [ 1950.685161][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.685261][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1950.685287][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.685355][ T30] r5:00001000 r4:df957000 [ 1950.685394][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.685458][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.685527][ T30] r5:859c478c r4:830ba380 [ 1950.685545][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.685654][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1950.685678][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.685866][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.685907][ T30] r4:830ba380 [ 1950.685928][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.686043][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1950.686072][ T30] r4:00000001 [ 1950.686128][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.686200][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1950.686234][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1950.686271][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.686332][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.686378][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.686401][ T30] r4:8578a1c0 [ 1950.686692][ T30] INFO: task kworker/0:0:14767 blocked for more than 430 seconds. [ 1950.686745][ T30] Not tainted syzkaller #0 [ 1950.686795][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1950.686964][ T30] task:kworker/0:0 state:D stack:0 pid:14767 tgid:14767 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.687047][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.687124][ T30] Call trace: [ 1950.687195][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1950.687287][ T30] r10:ed875d84 r9:00000002 r8:60000113 r7:829171a0 r6:ed875d8c r5:857fd400 [ 1950.687310][ T30] r4:857fd400 [ 1950.687442][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1950.687560][ T30] r5:857fd400 r4:8291719c [ 1950.687615][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1950.687743][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1950.687833][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed875e08 [ 1950.687893][ T30] r4:00000000 [ 1950.687917][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1950.687979][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1950.688037][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.688109][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f22c00 [ 1950.688138][ T30] r4:00000000 [ 1950.688153][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.688245][ T30] r9:83018405 r8:857fd400 r7:00000000 r6:83018400 r5:00001000 r4:7f04d000 [ 1950.688267][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.688331][ T30] r5:00001000 r4:dfa8b000 [ 1950.688347][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.688406][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.688473][ T30] r5:85aa4f8c r4:8572d600 [ 1950.688528][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.688607][ T30] r7:dddcfd80 r6:83018400 r5:85aa4f8c r4:8572d600 [ 1950.688625][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.688705][ T30] r10:61c88647 r9:857fd400 r8:8572d62c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.688728][ T30] r4:8572d600 [ 1950.688744][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.688818][ T30] r10:00000000 r9:8572d600 r8:80278fec r7:df841e60 r6:8572d780 r5:857fd400 [ 1950.688842][ T30] r4:00000001 [ 1950.688860][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.688913][ T30] Exception stack(0xed875fb0 to 0xed875ff8) [ 1950.688946][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1950.688986][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.689089][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.689149][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.689184][ T30] r4:85e86f80 [ 1950.689474][ T30] INFO: task kworker/0:0:14767 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1950.689589][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.689707][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.689763][ T30] Call trace: [ 1950.689815][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1950.689904][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1950.689931][ T30] r4:00000000 [ 1950.690056][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1950.690128][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1950.690171][ T30] 1d20: a0a0b000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1950.690212][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1950.690239][ T30] 1d60: 80000113 ffffffff [ 1950.690266][ T30] r5:80000113 r4:80239c10 [ 1950.690282][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1950.690417][ T30] r4:82acb1e4 [ 1950.731459][ T29] audit: type=1400 audit(1950.590:1902): avc: denied { write } for pid=3094 comm="syz-executor" path="pipe:[1821]" dev="pipefs" ino=1821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1950.770916][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1950.771527][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1950.771555][ T30] r4:dfa01dc0 [ 1950.771563][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.771613][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1950.771623][ T30] r4:00000000 [ 1950.771630][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.771671][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1950.771681][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.771732][ T30] r5:00001000 r4:df957000 [ 1950.771746][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.771777][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.771810][ T30] r5:859c478c r4:830ba380 [ 1950.771818][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.771855][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1950.771863][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.771913][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.771925][ T30] r4:830ba380 [ 1950.772035][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.772075][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1950.772103][ T30] r4:00000001 [ 1950.772162][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.772192][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1950.772212][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1950.772231][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.772248][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.772269][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.772279][ T30] r4:8578a1c0 [ 1950.772580][ T30] INFO: task kworker/1:7:15730 blocked for more than 430 seconds. [ 1950.772627][ T30] Not tainted syzkaller #0 [ 1950.772642][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1950.772651][ T30] task:kworker/1:7 state:D stack:0 pid:15730 tgid:15730 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.772696][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.772727][ T30] Call trace: [ 1950.772741][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1950.772785][ T30] r10:ec28dd84 r9:00000002 r8:60070013 r7:829171a0 r6:ec28dd8c r5:841e6c00 [ 1950.772795][ T30] r4:841e6c00 [ 1950.772803][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1950.772834][ T30] r5:841e6c00 r4:8291719c [ 1950.772841][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1950.772908][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1950.772951][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec28de08 [ 1950.772961][ T30] r4:00000000 [ 1950.772969][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1950.773030][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1950.773061][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.773098][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098080 [ 1950.773109][ T30] r4:00000000 [ 1950.773123][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.773162][ T30] r9:83018605 r8:841e6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f047000 [ 1950.773179][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.773240][ T30] r5:00001000 r4:df8df000 [ 1950.773257][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.773312][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.773376][ T30] r5:85cf4f8c r4:8572d400 [ 1950.773390][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.773461][ T30] r7:ddde3d80 r6:83018600 r5:85cf4f8c r4:8572d400 [ 1950.773479][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.773555][ T30] r10:61c88647 r9:841e6c00 r8:8572d42c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1950.773574][ T30] r4:8572d400 [ 1950.773591][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.773709][ T30] r10:00000000 r9:8572d400 r8:80278fec r7:ec701e60 r6:8572dc80 r5:841e6c00 [ 1950.773753][ T30] r4:00000001 [ 1950.773803][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.773862][ T30] Exception stack(0xec28dfb0 to 0xec28dff8) [ 1950.773890][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1950.773999][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.774069][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.774109][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.774138][ T30] r4:85eb0280 [ 1950.833606][ T30] INFO: task kworker/1:7:15730 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1950.833890][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.834156][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.834330][ T30] Call trace: [ 1950.834461][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1950.834587][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1950.834689][ T30] r4:00000000 [ 1950.834757][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1950.834913][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1950.835006][ T30] 1d20: a131f000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1950.835089][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1950.835172][ T30] 1d60: 80000113 ffffffff [ 1950.835247][ T30] r5:80000113 r4:80239c10 [ 1950.835312][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1950.835415][ T30] r4:82acb1e4 [ 1950.835478][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1950.835585][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1950.835653][ T30] r4:dfa01dc0 [ 1950.835717][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.835848][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1950.835920][ T30] r4:00000000 [ 1950.835983][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.836090][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1950.836161][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.836268][ T30] r5:00001000 r4:df957000 [ 1950.836331][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.836428][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.836529][ T30] r5:859c478c r4:830ba380 [ 1950.836592][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.836698][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1950.836762][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.836874][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.836941][ T30] r4:830ba380 [ 1950.837030][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.837147][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1950.837245][ T30] r4:00000001 [ 1950.837309][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.837400][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1950.837480][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1950.837558][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.837633][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.837736][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.837804][ T30] r4:8578a1c0 [ 1950.837956][ T30] INFO: task kworker/0:27:15949 blocked for more than 430 seconds. [ 1950.838072][ T30] Not tainted syzkaller #0 [ 1950.838149][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1950.838214][ T30] task:kworker/0:27 state:D stack:0 pid:15949 tgid:15949 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.838362][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.838533][ T30] Call trace: [ 1950.838659][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1950.838782][ T30] r10:e004dd84 r9:00000002 r8:60000113 r7:829171a0 r6:e004dd8c r5:85d00c00 [ 1950.838900][ T30] r4:85d00c00 [ 1950.838982][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1950.839091][ T30] r5:85d00c00 r4:8291719c [ 1950.839162][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1950.839261][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1950.839371][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e004de08 [ 1950.839439][ T30] r4:00000000 [ 1950.839503][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1950.839598][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1950.839693][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.839796][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b89000 [ 1950.839864][ T30] r4:00000000 [ 1950.839976][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.840084][ T30] r9:83018405 r8:85d00c00 r7:00000000 r6:83018400 r5:00001000 r4:7f049000 [ 1950.840154][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.840257][ T30] r5:00001000 r4:df96b000 [ 1950.840320][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.840417][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.870004][ T30] r5:848eab8c r4:85b47980 [ 1950.870093][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.870232][ T30] r7:dddcfd80 r6:83018400 r5:848eab8c r4:85b47980 [ 1950.870298][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.870410][ T30] r10:61c88647 r9:85d00c00 r8:85b479ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.870745][ T30] r4:85b47980 [ 1950.870835][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.870952][ T30] r10:00000000 r9:85b47980 r8:80278fec r7:dfa01e60 r6:85b47700 r5:85d00c00 [ 1950.871045][ T30] r4:00000001 [ 1950.871152][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.871247][ T30] Exception stack(0xe004dfb0 to 0xe004dff8) [ 1950.871332][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1950.871411][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.871486][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.871567][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.871634][ T30] r4:8614a880 [ 1950.877390][ T30] INFO: task kworker/0:27:15949 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1950.877494][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.877719][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.877870][ T30] Call trace: [ 1950.877996][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1950.878168][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1950.878243][ T30] r4:00000000 [ 1950.878310][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1950.878406][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1950.878492][ T30] 1d20: a131f000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1950.878570][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1950.878642][ T30] 1d60: 80000113 ffffffff [ 1950.878714][ T30] r5:80000113 r4:80239c10 [ 1950.878791][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1950.878899][ T30] r4:82acb1e4 [ 1950.878963][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1950.879069][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1950.879144][ T30] r4:dfa01dc0 [ 1950.879208][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.879314][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1950.879382][ T30] r4:00000000 [ 1950.879445][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.879550][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1950.879637][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.879742][ T30] r5:00001000 r4:df957000 [ 1950.879805][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.879901][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.880002][ T30] r5:859c478c r4:830ba380 [ 1950.880065][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.880178][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1950.880241][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.880361][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.880429][ T30] r4:830ba380 [ 1950.911015][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.911142][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1950.911155][ T30] r4:00000001 [ 1950.911163][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.911193][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1950.911214][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1950.911238][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.911258][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.911284][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.911296][ T30] r4:8578a1c0 [ 1950.911454][ T30] INFO: task kworker/1:31:15954 blocked for more than 430 seconds. [ 1950.911483][ T30] Not tainted syzkaller #0 [ 1950.911498][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1950.911508][ T30] task:kworker/1:31 state:D stack:0 pid:15954 tgid:15954 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.911555][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.911591][ T30] Call trace: [ 1950.911608][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1950.911663][ T30] r10:e007dd84 r9:00000002 r8:60000113 r7:829171a0 r6:e007dd8c r5:83b0e000 [ 1950.911675][ T30] r4:83b0e000 [ 1950.911684][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1950.911723][ T30] r5:83b0e000 r4:8291719c [ 1950.911732][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1950.911768][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1950.911818][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e007de08 [ 1950.911830][ T30] r4:00000000 [ 1950.911838][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1950.911873][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1950.911911][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.911954][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e17140 [ 1950.911966][ T30] r4:00000000 [ 1950.911975][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.912020][ T30] r9:83018605 r8:83b0e000 r7:00000000 r6:83018600 r5:00001000 r4:7f053000 [ 1950.912030][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.912068][ T30] r5:00001000 r4:df9d9000 [ 1950.912077][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.912114][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.912162][ T30] r5:85cf138c r4:85a76e80 [ 1950.912171][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.912218][ T30] r7:ddde3d80 r6:83018600 r5:85cf138c r4:85a76e80 [ 1950.912227][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.912275][ T30] r10:61c88647 r9:83b0e000 r8:85a76eac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1950.912287][ T30] r4:85a76e80 [ 1950.912297][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.912339][ T30] r10:00000000 r9:85a76e80 r8:80278fec r7:e00e5e60 r6:85688e00 r5:83b0e000 [ 1950.912350][ T30] r4:00000001 [ 1950.912358][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.912385][ T30] Exception stack(0xe007dfb0 to 0xe007dff8) [ 1950.912474][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1950.912497][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.912516][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.912538][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.912581][ T30] r4:86098740 [ 1950.912797][ T30] INFO: task kworker/1:31:15954 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1950.912815][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.912852][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.912878][ T30] Call trace: [ 1950.912988][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1950.913035][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1950.913086][ T30] r4:00000000 [ 1950.913095][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1950.913130][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1950.913153][ T30] 1d20: a1824000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1950.913194][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1950.913210][ T30] 1d60: 80000113 ffffffff [ 1950.913225][ T30] r5:80000113 r4:80239c10 [ 1950.913233][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1950.913266][ T30] r4:82acb1e4 [ 1950.913274][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1950.913313][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1950.913373][ T30] r4:dfa01dc0 [ 1950.913382][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.913419][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1950.913429][ T30] r4:00000000 [ 1950.913437][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.913480][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1950.913489][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.913520][ T30] r5:00001000 r4:df957000 [ 1950.913527][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.913649][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.913687][ T30] r5:859c478c r4:830ba380 [ 1950.913694][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.913737][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1950.913746][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.913912][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.913936][ T30] r4:830ba380 [ 1950.913944][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.913983][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1950.914017][ T30] r4:00000001 [ 1950.914125][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.914154][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1950.914170][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1950.914245][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.914264][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.914285][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.914344][ T30] r4:8578a1c0 [ 1950.914450][ T30] INFO: task kworker/1:32:15957 blocked for more than 430 seconds. [ 1950.914558][ T30] Not tainted syzkaller #0 [ 1950.914656][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1950.914774][ T30] task:kworker/1:32 state:D stack:0 pid:15957 tgid:15957 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.914837][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.914940][ T30] Call trace: [ 1950.915107][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1950.915154][ T30] r10:df9f5d84 r9:00000002 r8:60000113 r7:829171a0 r6:df9f5d8c r5:8320e000 [ 1950.915186][ T30] r4:8320e000 [ 1950.915194][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1950.915407][ T30] r5:8320e000 r4:8291719c [ 1950.915416][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1950.915446][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1950.915486][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 [ 1950.915598][ T30] r4:00000000 [ 1950.915607][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1950.915636][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1950.915663][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.915698][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86169fc0 [ 1950.915708][ T30] r4:00000000 [ 1950.915716][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.915752][ T30] r9:83018605 r8:8320e000 r7:00000000 r6:83018600 r5:00001000 r4:7f059000 [ 1950.915761][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.915895][ T30] r5:00001000 r4:dfa61000 [ 1950.915904][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.915935][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.915969][ T30] r5:85cf738c r4:85517b80 [ 1950.915977][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.916015][ T30] r7:ddde3d80 r6:83018600 r5:85cf738c r4:85517b80 [ 1950.916023][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.916093][ T30] r10:61c88647 r9:8320e000 r8:85517bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1950.916382][ T30] r4:85517b80 [ 1950.916391][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.916431][ T30] r10:00000000 r9:85517b80 r8:80278fec r7:e007de60 r6:85517680 r5:8320e000 [ 1950.916441][ T30] r4:00000001 [ 1950.916448][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.916473][ T30] Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) [ 1950.916489][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1950.916508][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.916526][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.916567][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.916662][ T30] r4:86098680 [ 1950.916755][ T30] INFO: task kworker/1:32:15957 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1950.916860][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.916937][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.917064][ T30] Call trace: [ 1950.917160][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1950.917343][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1950.917355][ T30] r4:00000000 [ 1950.917367][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1950.917396][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1950.917417][ T30] 1d20: a1824000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1950.917451][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1950.917465][ T30] 1d60: 80000113 ffffffff [ 1950.917478][ T30] r5:80000113 r4:80239c10 [ 1950.917486][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1950.917516][ T30] r4:82acb1e4 [ 1950.917523][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1950.917560][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1950.917630][ T30] r4:dfa01dc0 [ 1950.917639][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.917676][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1950.917685][ T30] r4:00000000 [ 1950.917692][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.917915][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1950.918106][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.918143][ T30] r5:00001000 r4:df957000 [ 1950.918150][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.918182][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.918215][ T30] r5:859c478c r4:830ba380 [ 1950.918223][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.918600][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1950.918609][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.918665][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.918707][ T30] r4:830ba380 [ 1950.918716][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.918820][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1950.918853][ T30] r4:00000001 [ 1950.918865][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.918931][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1950.919143][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1950.919173][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.919213][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.919237][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.919314][ T30] r4:8578a1c0 [ 1950.919328][ T30] INFO: task kworker/0:28:15962 blocked for more than 430 seconds. [ 1950.919349][ T30] Not tainted syzkaller #0 [ 1950.919361][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1950.919369][ T30] task:kworker/0:28 state:D stack:0 pid:15962 tgid:15962 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.919413][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.919525][ T30] Call trace: [ 1950.919627][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1950.919671][ T30] r10:dfad1d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfad1d8c r5:86138000 [ 1950.919682][ T30] r4:86138000 [ 1950.919690][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1950.919741][ T30] r5:86138000 r4:8291719c [ 1950.919756][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1950.919809][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1950.919877][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 [ 1950.919920][ T30] r4:00000000 [ 1950.919938][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1950.919997][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1950.920064][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.920143][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f22880 [ 1950.920234][ T30] r4:00000000 [ 1950.920276][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.920380][ T30] r9:83018405 r8:86138000 r7:00000000 r6:83018400 r5:00001000 r4:7f059000 [ 1950.920400][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.920457][ T30] r5:00001000 r4:dfb99000 [ 1950.920471][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.920539][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.920666][ T30] r5:85aa678c r4:85c23800 [ 1950.971647][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.971831][ T30] r7:dddcfd80 r6:83018400 r5:85aa678c r4:85c23800 [ 1950.971851][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.971927][ T30] r10:61c88647 r9:86138000 r8:85c2382c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.971947][ T30] r4:85c23800 [ 1950.971960][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.972027][ T30] r10:00000000 r9:85c23800 r8:80278fec r7:e004de60 r6:85e93900 r5:86138000 [ 1950.972046][ T30] r4:00000001 [ 1950.972060][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.972128][ T30] Exception stack(0xdfad1fb0 to 0xdfad1ff8) [ 1950.972168][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1950.972240][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.972281][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.972318][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.972338][ T30] r4:85b91000 [ 1950.972733][ T30] INFO: task kworker/0:28:15962 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1950.972774][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.972864][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.972918][ T30] Call trace: [ 1950.972967][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1950.973044][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1950.973063][ T30] r4:00000000 [ 1950.973194][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1950.973264][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1950.973302][ T30] 1d20: a1b61000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1950.973339][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1950.973379][ T30] 1d60: 80000113 ffffffff [ 1950.973406][ T30] r5:80000113 r4:80239c10 [ 1950.973420][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1950.973477][ T30] r4:82acb1e4 [ 1950.973508][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1950.973575][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1950.973593][ T30] r4:dfa01dc0 [ 1950.973607][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.973669][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1950.973721][ T30] r4:00000000 [ 1950.973740][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.973808][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1950.973841][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.973911][ T30] r5:00001000 r4:df957000 [ 1950.973927][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.973978][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.974065][ T30] r5:859c478c r4:830ba380 [ 1950.974098][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.974175][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1950.974190][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.974255][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.974274][ T30] r4:830ba380 [ 1950.974287][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.974352][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1950.974373][ T30] r4:00000001 [ 1950.974402][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.974494][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1950.974546][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1950.974604][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.974639][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.974675][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.974692][ T30] r4:8578a1c0 [ 1950.974720][ T30] INFO: task kworker/0:29:15968 blocked for more than 430 seconds. [ 1950.974757][ T30] Not tainted syzkaller #0 [ 1950.974820][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1950.974837][ T30] task:kworker/0:29 state:D stack:0 pid:15968 tgid:15968 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.974937][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.974985][ T30] Call trace: [ 1950.975012][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1950.975080][ T30] r10:dfa09d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfa09d8c r5:8613bc00 [ 1950.975101][ T30] r4:8613bc00 [ 1950.975114][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1950.975175][ T30] r5:8613bc00 r4:8291719c [ 1950.975189][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1950.975261][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1950.975348][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 [ 1950.975390][ T30] r4:00000000 [ 1950.975408][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1950.975458][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1950.975505][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.975566][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f228c0 [ 1950.975585][ T30] r4:00000000 [ 1950.975598][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.975661][ T30] r9:83018405 r8:8613bc00 r7:00000000 r6:83018400 r5:00001000 r4:7f262000 [ 1950.975681][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.975738][ T30] r5:00001000 r4:dfbcd000 [ 1950.975753][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.975806][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.975868][ T30] r5:85cf3b8c r4:85c23f80 [ 1950.975885][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.975953][ T30] r7:dddcfd80 r6:83018400 r5:85cf3b8c r4:85c23f80 [ 1950.975968][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.976054][ T30] r10:61c88647 r9:8613bc00 r8:85c23fac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.976107][ T30] r4:85c23f80 [ 1950.976134][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.976222][ T30] r10:00000000 r9:85c23f80 r8:80278fec r7:e004de60 r6:85e93980 r5:8613bc00 [ 1950.976275][ T30] r4:00000001 [ 1950.976292][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.976350][ T30] Exception stack(0xdfa09fb0 to 0xdfa09ff8) [ 1950.976383][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1950.976434][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.976483][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.976523][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.976543][ T30] r4:85bfe6c0 [ 1950.976702][ T30] INFO: task kworker/0:29:15968 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1950.976749][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.976840][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.976867][ T30] Call trace: [ 1950.976879][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1950.976917][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1950.976957][ T30] r4:00000000 [ 1950.976967][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1950.976992][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1950.977011][ T30] 1d20: a1b61000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1950.977029][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1950.977040][ T30] 1d60: 80000113 ffffffff [ 1950.977052][ T30] r5:80000113 r4:80239c10 [ 1950.977058][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1950.977084][ T30] r4:82acb1e4 [ 1950.977090][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1950.977190][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1950.977202][ T30] r4:dfa01dc0 [ 1950.977232][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.977271][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1950.977280][ T30] r4:00000000 [ 1950.977287][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.977342][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1950.977375][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.977415][ T30] r5:00001000 r4:df957000 [ 1950.977423][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.977455][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.977486][ T30] r5:859c478c r4:830ba380 [ 1950.977525][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.977570][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1950.977579][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.977614][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.977623][ T30] r4:830ba380 [ 1950.977629][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.977667][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1950.977677][ T30] r4:00000001 [ 1950.977683][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.977750][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1950.977766][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1950.977795][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.977812][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.977830][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.977839][ T30] r4:8578a1c0 [ 1950.977850][ T30] INFO: task kworker/1:33:15970 blocked for more than 430 seconds. [ 1950.977925][ T30] Not tainted syzkaller #0 [ 1950.977950][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1950.977978][ T30] task:kworker/1:33 state:D stack:0 pid:15970 tgid:15970 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.978043][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.978066][ T30] Call trace: [ 1950.978084][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1950.978127][ T30] r10:df9ddd84 r9:00000002 r8:60000013 r7:829171a0 r6:df9ddd8c r5:86139800 [ 1950.978136][ T30] r4:86139800 [ 1950.978185][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1950.978241][ T30] r5:86139800 r4:8291719c [ 1950.978250][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1950.978278][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1950.978313][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 [ 1950.978323][ T30] r4:00000000 [ 1950.978329][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1950.978354][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1950.978378][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.978408][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a74780 [ 1950.978441][ T30] r4:00000000 [ 1950.978454][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.978487][ T30] r9:83018605 r8:86139800 r7:00000000 r6:83018600 r5:00001000 r4:7f057000 [ 1950.978509][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.978538][ T30] r5:00001000 r4:dfa37000 [ 1950.978545][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.978570][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.978623][ T30] r5:85cf178c r4:85e93200 [ 1950.978632][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.978708][ T30] r7:ddde3d80 r6:83018600 r5:85cf178c r4:85e93200 [ 1950.978717][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.978752][ T30] r10:61c88647 r9:86139800 r8:85e9322c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1950.978783][ T30] r4:85e93200 [ 1950.978798][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.978840][ T30] r10:00000000 r9:85e93200 r8:80278fec r7:df9f5e60 r6:838ffb80 r5:86139800 [ 1950.978850][ T30] r4:00000001 [ 1950.978856][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.978904][ T30] Exception stack(0xdf9ddfb0 to 0xdf9ddff8) [ 1950.978921][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1950.978938][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.978954][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.978971][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.978980][ T30] r4:85e222c0 [ 1950.979065][ T30] INFO: task kworker/1:33:15970 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1950.979080][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.979144][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.979192][ T30] Call trace: [ 1950.979205][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1950.979243][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1950.979253][ T30] r4:00000000 [ 1950.979260][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1950.979283][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1950.979301][ T30] 1d20: a1b61000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1950.979318][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1950.979329][ T30] 1d60: 80000113 ffffffff [ 1950.979340][ T30] r5:80000113 r4:80239c10 [ 1950.979347][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1950.979371][ T30] r4:82acb1e4 [ 1950.979378][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1950.979410][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1950.979418][ T30] r4:dfa01dc0 [ 1950.979425][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1950.979479][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1950.979490][ T30] r4:00000000 [ 1950.979501][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1950.979534][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1950.979542][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1950.979569][ T30] r5:00001000 r4:df957000 [ 1950.979575][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1950.979602][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1950.979655][ T30] r5:859c478c r4:830ba380 [ 1950.979663][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1950.979697][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1950.979704][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1950.979737][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1950.979746][ T30] r4:830ba380 [ 1950.979752][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1950.979785][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1950.979793][ T30] r4:00000001 [ 1950.979799][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1950.979869][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1950.979909][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1950.979974][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1950.979991][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1950.980031][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1950.980042][ T30] r4:8578a1c0 [ 1950.980066][ T30] INFO: task kworker/1:34:15974 blocked for more than 430 seconds. [ 1950.980082][ T30] Not tainted syzkaller #0 [ 1950.980092][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1950.980099][ T30] task:kworker/1:34 state:D stack:0 pid:15974 tgid:15974 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1950.980135][ T30] Workqueue: events bpf_prog_free_deferred [ 1950.980157][ T30] Call trace: [ 1950.980182][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1950.980247][ T30] r10:dfa41d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfa41d8c r5:8613c800 [ 1950.980328][ T30] r4:8613c800 [ 1950.980336][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1950.980366][ T30] r5:8613c800 r4:8291719c [ 1950.980382][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1950.980411][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1951.031430][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 [ 1951.031523][ T30] r4:00000000 [ 1951.031543][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1951.031645][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1951.031707][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.031822][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c9cc40 [ 1951.031869][ T30] r4:00000000 [ 1951.031888][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.031965][ T30] r9:83018605 r8:8613c800 r7:00000000 r6:83018600 r5:00001000 r4:7f055000 [ 1951.031984][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.032055][ T30] r5:00001000 r4:dfa31000 [ 1951.032107][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.032229][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.032302][ T30] r5:85cf1f8c r4:841aa200 [ 1951.032319][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.032394][ T30] r7:ddde3d80 r6:83018600 r5:85cf1f8c r4:841aa200 [ 1951.032411][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.032503][ T30] r10:61c88647 r9:8613c800 r8:841aa22c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1951.032524][ T30] r4:841aa200 [ 1951.032540][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.032615][ T30] r10:00000000 r9:841aa200 r8:80278fec r7:df9f5e60 r6:85b4fa00 r5:8613c800 [ 1951.032688][ T30] r4:00000001 [ 1951.032709][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.032795][ T30] Exception stack(0xdfa41fb0 to 0xdfa41ff8) [ 1951.032838][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.033259][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.033317][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.033360][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.033380][ T30] r4:85c19300 [ 1951.033796][ T30] INFO: task kworker/1:34:15974 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1951.033864][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.033992][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.034097][ T30] Call trace: [ 1951.034190][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1951.034316][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1951.034524][ T30] r4:00000000 [ 1951.034555][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1951.034613][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1951.034655][ T30] 1d20: a20be000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1951.034716][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1951.035066][ T30] 1d60: 80000113 ffffffff [ 1951.035112][ T30] r5:80000113 r4:80239c10 [ 1951.035135][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1951.035198][ T30] r4:82acb1e4 [ 1951.035213][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1951.035279][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1951.035299][ T30] r4:dfa01dc0 [ 1951.035442][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.035554][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1951.035581][ T30] r4:00000000 [ 1951.035598][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.035743][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1951.036114][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.036189][ T30] r5:00001000 r4:df957000 [ 1951.036204][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.036261][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.036409][ T30] r5:859c478c r4:830ba380 [ 1951.036428][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.036522][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1951.036543][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.036617][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.036636][ T30] r4:830ba380 [ 1951.036713][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.036791][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1951.036812][ T30] r4:00000001 [ 1951.036825][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.036871][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1951.036902][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.036937][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.037006][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.037048][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.037069][ T30] r4:8578a1c0 [ 1951.037142][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1951.037256][ T30] INFO: task kworker/1:35:15975 blocked for more than 430 seconds. [ 1951.037300][ T30] Not tainted syzkaller #0 [ 1951.037324][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1951.037339][ T30] task:kworker/1:35 state:D stack:0 pid:15975 tgid:15975 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.037393][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.037505][ T30] Call trace: [ 1951.037535][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1951.037611][ T30] r10:df9e1d84 r9:00000002 r8:60000113 r7:829171a0 r6:df9e1d8c r5:8613d400 [ 1951.037629][ T30] r4:8613d400 [ 1951.037646][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1951.037707][ T30] r5:8613d400 r4:8291719c [ 1951.037722][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1951.037777][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1951.037849][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 [ 1951.037869][ T30] r4:00000000 [ 1951.038957][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1951.039185][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1951.039250][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.039320][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578a900 [ 1951.039342][ T30] r4:00000000 [ 1951.039397][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.039470][ T30] r9:83018605 r8:8613d400 r7:00000000 r6:83018600 r5:00001000 r4:7f04f000 [ 1951.039486][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.039633][ T30] r5:00001000 r4:dfa8d000 [ 1951.039653][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.039709][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.039774][ T30] r5:85cf238c r4:85bfbb80 [ 1951.039828][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.039905][ T30] r7:ddde3d80 r6:83018600 r5:85cf238c r4:85bfbb80 [ 1951.039923][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.040005][ T30] r10:61c88647 r9:8613d400 r8:85bfbbac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1951.040027][ T30] r4:85bfbb80 [ 1951.040043][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.040113][ T30] r10:00000000 r9:85bfbb80 r8:80278fec r7:df9f5e60 r6:85923380 r5:8613d400 [ 1951.040245][ T30] r4:00000001 [ 1951.040322][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.040377][ T30] Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) [ 1951.040452][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.092053][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.092140][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.092187][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.092246][ T30] r4:85c19300 [ 1951.092618][ T30] INFO: task kworker/1:35:15975 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1951.092736][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.092929][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.093043][ T30] Call trace: [ 1951.093077][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1951.093157][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1951.093175][ T30] r4:00000000 [ 1951.093191][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1951.093240][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1951.093277][ T30] 1d20: a20be000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1951.093309][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1951.093449][ T30] 1d60: 80000113 ffffffff [ 1951.093480][ T30] r5:80000113 r4:80239c10 [ 1951.093497][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1951.093555][ T30] r4:82acb1e4 [ 1951.093645][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1951.093720][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1951.093740][ T30] r4:dfa01dc0 [ 1951.093754][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.093821][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1951.093840][ T30] r4:00000000 [ 1951.093854][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.093922][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1951.093965][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.094102][ T30] r5:00001000 r4:df957000 [ 1951.094124][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.094182][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.094320][ T30] r5:859c478c r4:830ba380 [ 1951.094350][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.094450][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1951.094474][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.094641][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.094676][ T30] r4:830ba380 [ 1951.094691][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.094759][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1951.094928][ T30] r4:00000001 [ 1951.094971][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.095025][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1951.095056][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.095089][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.095119][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.095153][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.095176][ T30] r4:8578a1c0 [ 1951.095314][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1951.095362][ T30] INFO: task kworker/1:36:15979 blocked for more than 430 seconds. [ 1951.095417][ T30] Not tainted syzkaller #0 [ 1951.095443][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1951.095514][ T30] task:kworker/1:36 state:D stack:0 pid:15979 tgid:15979 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.095576][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.095744][ T30] Call trace: [ 1951.095771][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1951.095917][ T30] r10:dfa6dd84 r9:00000002 r8:60000113 r7:829171a0 r6:dfa6dd8c r5:8613e000 [ 1951.095953][ T30] r4:8613e000 [ 1951.096026][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1951.096094][ T30] r5:8613e000 r4:8291719c [ 1951.096191][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1951.096256][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1951.096326][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 [ 1951.096402][ T30] r4:00000000 [ 1951.096424][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1951.096479][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1951.096531][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.096690][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098380 [ 1951.096892][ T30] r4:00000000 [ 1951.097008][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.097082][ T30] r9:83018605 r8:8613e000 r7:00000000 r6:83018600 r5:00001000 r4:7f045000 [ 1951.097099][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.097195][ T30] r5:00001000 r4:df849000 [ 1951.097213][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.097327][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.097393][ T30] r5:85cf638c r4:85923f80 [ 1951.097407][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.097470][ T30] r7:ddde3d80 r6:83018600 r5:85cf638c r4:85923f80 [ 1951.097485][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.097645][ T30] r10:61c88647 r9:8613e000 r8:85923fac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1951.097675][ T30] r4:85923f80 [ 1951.097747][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.097822][ T30] r10:00000000 r9:85923f80 r8:80278fec r7:df9e1e60 r6:85923480 r5:8613e000 [ 1951.097899][ T30] r4:00000001 [ 1951.097953][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.098041][ T30] Exception stack(0xdfa6dfb0 to 0xdfa6dff8) [ 1951.098076][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1951.098116][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.098153][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.098192][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.098276][ T30] r4:85552f40 [ 1951.098531][ T30] INFO: task kworker/1:36:15979 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1951.098570][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.098671][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.098758][ T30] Call trace: [ 1951.098815][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1951.098948][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1951.099011][ T30] r4:00000000 [ 1951.099093][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1951.099188][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1951.099240][ T30] 1d20: a20be000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1951.099289][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1951.099350][ T30] 1d60: 80000113 ffffffff [ 1951.099414][ T30] r5:80000113 r4:80239c10 [ 1951.099431][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1951.099495][ T30] r4:82acb1e4 [ 1951.099509][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1951.099572][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1951.099591][ T30] r4:dfa01dc0 [ 1951.099603][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.099666][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1951.099683][ T30] r4:00000000 [ 1951.099939][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.100055][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1951.100085][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.100146][ T30] r5:00001000 r4:df957000 [ 1951.100160][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.100255][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.100322][ T30] r5:859c478c r4:830ba380 [ 1951.100481][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.179955][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1951.180033][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.180253][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.180284][ T30] r4:830ba380 [ 1951.180339][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.180510][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1951.181004][ T30] r4:00000001 [ 1951.181045][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.181121][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1951.181158][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.181191][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.181224][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.181300][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.181326][ T30] r4:8578a1c0 [ 1951.181349][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1951.182043][ T30] INFO: task kworker/1:37:15989 blocked for more than 430 seconds. [ 1951.182144][ T30] Not tainted syzkaller #0 [ 1951.182172][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1951.182190][ T30] task:kworker/1:37 state:D stack:0 pid:15989 tgid:15989 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.182273][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.182333][ T30] Call trace: [ 1951.182359][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1951.182436][ T30] r10:df999d84 r9:00000002 r8:60000113 r7:829171a0 r6:df999d8c r5:8613b000 [ 1951.182532][ T30] r4:8613b000 [ 1951.182553][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1951.182613][ T30] r5:8613b000 r4:8291719c [ 1951.182627][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1951.182683][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1951.182757][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df999e08 [ 1951.182814][ T30] r4:00000000 [ 1951.182831][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1951.182885][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1951.182956][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.183026][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e17ec0 [ 1951.183065][ T30] r4:00000000 [ 1951.183086][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.183161][ T30] r9:83018605 r8:8613b000 r7:00000000 r6:83018600 r5:00001000 r4:7f04b000 [ 1951.183180][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.183246][ T30] r5:00001000 r4:dfa52000 [ 1951.183294][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.183355][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.183414][ T30] r5:8599cf8c r4:840d0a00 [ 1951.183429][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.183495][ T30] r7:ddde3d80 r6:83018600 r5:8599cf8c r4:840d0a00 [ 1951.183510][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.183611][ T30] r10:61c88647 r9:8613b000 r8:840d0a2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1951.183708][ T30] r4:840d0a00 [ 1951.183730][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.183799][ T30] r10:00000000 r9:840d0a00 r8:80278fec r7:df9e1e60 r6:85c23b00 r5:8613b000 [ 1951.183819][ T30] r4:00000001 [ 1951.183893][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.183958][ T30] Exception stack(0xdf999fb0 to 0xdf999ff8) [ 1951.184137][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1951.184182][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.184212][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.184249][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.184268][ T30] r4:85b89c00 [ 1951.184615][ T30] INFO: task kworker/1:37:15989 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1951.184747][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.184948][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.185090][ T30] Call trace: [ 1951.185188][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1951.185273][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1951.185293][ T30] r4:00000000 [ 1951.185306][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1951.185356][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1951.185393][ T30] 1d20: a20be000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1951.185464][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1951.185495][ T30] 1d60: 80000113 ffffffff [ 1951.185523][ T30] r5:80000113 r4:80239c10 [ 1951.185634][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1951.185748][ T30] r4:82acb1e4 [ 1951.185802][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1951.185902][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1951.185928][ T30] r4:dfa01dc0 [ 1951.185950][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.186089][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1951.186115][ T30] r4:00000000 [ 1951.186132][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.186348][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1951.186374][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.186441][ T30] r5:00001000 r4:df957000 [ 1951.186458][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.186516][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.186583][ T30] r5:859c478c r4:830ba380 [ 1951.186599][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.186735][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1951.186757][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.186865][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.186885][ T30] r4:830ba380 [ 1951.186900][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.186976][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1951.187063][ T30] r4:00000001 [ 1951.187083][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.187132][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1951.187162][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.187196][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.187225][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.187259][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.187279][ T30] r4:8578a1c0 [ 1951.187296][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1951.187324][ T30] INFO: task kworker/1:38:15993 blocked for more than 430 seconds. [ 1951.187357][ T30] Not tainted syzkaller #0 [ 1951.187410][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1951.187466][ T30] task:kworker/1:38 state:D stack:0 pid:15993 tgid:15993 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.187568][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.187649][ T30] Call trace: [ 1951.188072][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1951.188151][ T30] r10:df9f1d84 r9:00000002 r8:60000113 r7:829171a0 r6:df9f1d8c r5:8613a400 [ 1951.188412][ T30] r4:8613a400 [ 1951.188451][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1951.188515][ T30] r5:8613a400 r4:8291719c [ 1951.188532][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1951.188590][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1951.188658][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 [ 1951.188745][ T30] r4:00000000 [ 1951.188771][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1951.188865][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1951.188944][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.189017][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098e80 [ 1951.189065][ T30] r4:00000000 [ 1951.189083][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.189209][ T30] r9:83018605 r8:8613a400 r7:00000000 r6:83018600 r5:00001000 r4:7f05b000 [ 1951.189232][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.189295][ T30] r5:00001000 r4:dfa94000 [ 1951.189315][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.189368][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.189449][ T30] r5:85cf678c r4:85c23400 [ 1951.189468][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.189562][ T30] r7:ddde3d80 r6:83018600 r5:85cf678c r4:85c23400 [ 1951.189618][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.189696][ T30] r10:61c88647 r9:8613a400 r8:85c2342c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1951.189718][ T30] r4:85c23400 [ 1951.189735][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.189803][ T30] r10:00000000 r9:85c23400 r8:80278fec r7:df999e60 r6:8559a900 r5:8613a400 [ 1951.189822][ T30] r4:00000001 [ 1951.189838][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.189913][ T30] Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) [ 1951.189955][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.190009][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.190055][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.190093][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.190160][ T30] r4:8614aac0 [ 1951.190394][ T30] INFO: task kworker/1:38:15993 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1951.190495][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.285044][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.285232][ T30] Call trace: [ 1951.285324][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1951.285448][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1951.285475][ T30] r4:00000000 [ 1951.285495][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1951.285552][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1951.285594][ T30] 1d20: a20be000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1951.285631][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1951.285654][ T30] 1d60: 80000113 ffffffff [ 1951.285678][ T30] r5:80000113 r4:80239c10 [ 1951.285694][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1951.285754][ T30] r4:82acb1e4 [ 1951.285770][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1951.285833][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1951.285854][ T30] r4:dfa01dc0 [ 1951.285906][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.286078][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1951.286121][ T30] r4:00000000 [ 1951.286142][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.286233][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1951.286256][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.286315][ T30] r5:00001000 r4:df957000 [ 1951.286385][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.286445][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.286501][ T30] r5:859c478c r4:830ba380 [ 1951.286518][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.286586][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1951.286680][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.286757][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.286818][ T30] r4:830ba380 [ 1951.286833][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.286943][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1951.287172][ T30] r4:00000001 [ 1951.287209][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.287263][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1951.287415][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.287504][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.287547][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.287587][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.287608][ T30] r4:8578a1c0 [ 1951.287709][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1951.287827][ T30] INFO: task kworker/1:39:15994 blocked for more than 430 seconds. [ 1951.287885][ T30] Not tainted syzkaller #0 [ 1951.287912][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1951.287993][ T30] task:kworker/1:39 state:D stack:0 pid:15994 tgid:15994 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.288068][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.288201][ T30] Call trace: [ 1951.288433][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1951.288569][ T30] r10:dfa3dd84 r9:00000002 r8:60000113 r7:829171a0 r6:dfa3dd8c r5:86298000 [ 1951.288595][ T30] r4:86298000 [ 1951.288635][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1951.288695][ T30] r5:86298000 r4:8291719c [ 1951.288713][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1951.288805][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1951.288884][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 [ 1951.288906][ T30] r4:00000000 [ 1951.289081][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1951.289217][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1951.289280][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.289491][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f22a00 [ 1951.289605][ T30] r4:00000000 [ 1951.289666][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.289744][ T30] r9:83018605 r8:86298000 r7:00000000 r6:83018600 r5:00001000 r4:7f260000 [ 1951.289846][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.289914][ T30] r5:00001000 r4:dfb9f000 [ 1951.289954][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.290021][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.290086][ T30] r5:85cf378c r4:85c23b80 [ 1951.290250][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.290339][ T30] r7:ddde3d80 r6:83018600 r5:85cf378c r4:85c23b80 [ 1951.290436][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.351402][ T30] r10:61c88647 r9:86298000 r8:85c23bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1951.351482][ T30] r4:85c23b80 [ 1951.351504][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.351613][ T30] r10:00000000 r9:85c23b80 r8:80278fec r7:df999e60 r6:8576a380 r5:86298000 [ 1951.351635][ T30] r4:00000001 [ 1951.351649][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.351699][ T30] Exception stack(0xdfa3dfb0 to 0xdfa3dff8) [ 1951.351736][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1951.351794][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.351831][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.351868][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.351890][ T30] r4:8614aac0 [ 1951.352290][ T30] INFO: task kworker/1:39:15994 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1951.352333][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.352541][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.352601][ T30] Call trace: [ 1951.352700][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1951.352789][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1951.352811][ T30] r4:00000000 [ 1951.352866][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1951.352922][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1951.352972][ T30] 1d20: a20be000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1951.353006][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1951.353030][ T30] 1d60: 80000113 ffffffff [ 1951.353056][ T30] r5:80000113 r4:80239c10 [ 1951.353070][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1951.353129][ T30] r4:82acb1e4 [ 1951.353145][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1951.353206][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1951.353226][ T30] r4:dfa01dc0 [ 1951.353239][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.353300][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1951.353318][ T30] r4:00000000 [ 1951.353333][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.353433][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1951.353458][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.353516][ T30] r5:00001000 r4:df957000 [ 1951.353534][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.353587][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.353683][ T30] r5:859c478c r4:830ba380 [ 1951.353705][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.353773][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1951.353789][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.353858][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.353877][ T30] r4:830ba380 [ 1951.353892][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.353970][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1951.354080][ T30] r4:00000001 [ 1951.354114][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.354167][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1951.354232][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.354367][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.354406][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.354446][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.354508][ T30] r4:8578a1c0 [ 1951.354534][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1951.368251][ T30] INFO: task kworker/1:40:16005 blocked for more than 430 seconds. [ 1951.368383][ T30] Not tainted syzkaller #0 [ 1951.368409][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1951.368428][ T30] task:kworker/1:40 state:D stack:0 pid:16005 tgid:16005 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.368558][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.368701][ T30] Call trace: [ 1951.368738][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1951.368825][ T30] r10:dffd9d84 r9:00000002 r8:60000013 r7:829171a0 r6:dffd9d8c r5:8629b000 [ 1951.368846][ T30] r4:8629b000 [ 1951.368932][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1951.369005][ T30] r5:8629b000 r4:8291719c [ 1951.369036][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1951.369094][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1951.369163][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08 [ 1951.369182][ T30] r4:00000000 [ 1951.369215][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1951.369270][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1951.369323][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.369425][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c19f40 [ 1951.369449][ T30] r4:00000000 [ 1951.369465][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.369531][ T30] r9:83018605 r8:8629b000 r7:00000000 r6:83018600 r5:00001000 r4:7f053000 [ 1951.369627][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.369688][ T30] r5:00001000 r4:dfb01000 [ 1951.369704][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.369756][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.369813][ T30] r5:8599db8c r4:84925700 [ 1951.369864][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.369944][ T30] r7:ddde3d80 r6:83018600 r5:8599db8c r4:84925700 [ 1951.370006][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.370087][ T30] r10:61c88647 r9:8629b000 r8:8492572c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1951.370107][ T30] r4:84925700 [ 1951.370122][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.370189][ T30] r10:00000000 r9:84925700 r8:80278fec r7:dfa3de60 r6:84925000 r5:8629b000 [ 1951.370210][ T30] r4:00000001 [ 1951.370224][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.370272][ T30] Exception stack(0xdffd9fb0 to 0xdffd9ff8) [ 1951.370303][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1951.370337][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.370368][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.370441][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.370554][ T30] r4:8568e680 [ 1951.421690][ T30] INFO: task kworker/1:40:16005 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1951.421805][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.421940][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.422074][ T30] Call trace: [ 1951.422162][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1951.422255][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1951.422276][ T30] r4:00000000 [ 1951.422400][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1951.422483][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1951.422527][ T30] 1d20: a20be000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1951.422561][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1951.422637][ T30] 1d60: 80000113 ffffffff [ 1951.422756][ T30] r5:80000113 r4:80239c10 [ 1951.422807][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1951.422868][ T30] r4:82acb1e4 [ 1951.423038][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1951.423112][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1951.423131][ T30] r4:dfa01dc0 [ 1951.423147][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.423211][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1951.423229][ T30] r4:00000000 [ 1951.423289][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.423358][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1951.423377][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.423434][ T30] r5:00001000 r4:df957000 [ 1951.423490][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.423552][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.423611][ T30] r5:859c478c r4:830ba380 [ 1951.423798][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.423919][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1951.423950][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.424027][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.424047][ T30] r4:830ba380 [ 1951.424131][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.424243][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1951.424269][ T30] r4:00000001 [ 1951.424286][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.424337][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1951.424410][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.424448][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.424482][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.424517][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.424543][ T30] r4:8578a1c0 [ 1951.424564][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1951.424598][ T30] INFO: task kworker/1:41:16006 blocked for more than 430 seconds. [ 1951.424636][ T30] Not tainted syzkaller #0 [ 1951.424748][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1951.424768][ T30] task:kworker/1:41 state:D stack:0 pid:16006 tgid:16006 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.424826][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.424914][ T30] Call trace: [ 1951.425138][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1951.425216][ T30] r10:df9e9d84 r9:00000002 r8:60000113 r7:829171a0 r6:df9e9d8c r5:8629bc00 [ 1951.425235][ T30] r4:8629bc00 [ 1951.425251][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1951.425306][ T30] r5:8629bc00 r4:8291719c [ 1951.425320][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1951.425375][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1951.425445][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 [ 1951.425466][ T30] r4:00000000 [ 1951.425480][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1951.425529][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1951.425578][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.425642][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86057200 [ 1951.425661][ T30] r4:00000000 [ 1951.425675][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.425738][ T30] r9:83018605 r8:8629bc00 r7:00000000 r6:83018600 r5:00001000 r4:7f051000 [ 1951.425757][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.425810][ T30] r5:00001000 r4:dfaf5000 [ 1951.425824][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.425877][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.425942][ T30] r5:85cf1b8c r4:840d0b80 [ 1951.425957][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.426021][ T30] r7:ddde3d80 r6:83018600 r5:85cf1b8c r4:840d0b80 [ 1951.426099][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.426177][ T30] r10:61c88647 r9:8629bc00 r8:840d0bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1951.426197][ T30] r4:840d0b80 [ 1951.426277][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.426351][ T30] r10:00000000 r9:840d0b80 r8:80278fec r7:dfa3de60 r6:84925600 r5:8629bc00 [ 1951.426371][ T30] r4:00000001 [ 1951.426385][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.426431][ T30] Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) [ 1951.426461][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1951.426495][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.426526][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.426663][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.426691][ T30] r4:85e99d40 [ 1951.426904][ T30] INFO: task kworker/1:41:16006 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1951.426950][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.427145][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.427198][ T30] Call trace: [ 1951.427304][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1951.427385][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1951.427404][ T30] r4:00000000 [ 1951.427418][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1951.427466][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1951.427504][ T30] 1d20: a20be000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1951.427542][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1951.427567][ T30] 1d60: 80000113 ffffffff [ 1951.427591][ T30] r5:80000113 r4:80239c10 [ 1951.427608][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1951.427745][ T30] r4:82acb1e4 [ 1951.427768][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1951.427846][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1951.427865][ T30] r4:dfa01dc0 [ 1951.427957][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.428033][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1951.428055][ T30] r4:00000000 [ 1951.428070][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.428179][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1951.428276][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.428389][ T30] r5:00001000 r4:df957000 [ 1951.428435][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.428498][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.428555][ T30] r5:859c478c r4:830ba380 [ 1951.428571][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.428637][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1951.428723][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.428798][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.428857][ T30] r4:830ba380 [ 1951.428894][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.429134][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1951.429165][ T30] r4:00000001 [ 1951.429221][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.429334][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1951.429375][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.429410][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.429441][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.429478][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.429499][ T30] r4:8578a1c0 [ 1951.429565][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1951.429639][ T30] INFO: task kworker/1:42:16008 blocked for more than 430 seconds. [ 1951.429738][ T30] Not tainted syzkaller #0 [ 1951.429834][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1951.429878][ T30] task:kworker/1:42 state:D stack:0 pid:16008 tgid:16008 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.429999][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.430049][ T30] Call trace: [ 1951.430109][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1951.430192][ T30] r10:dfb31d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfb31d8c r5:8629c800 [ 1951.430253][ T30] r4:8629c800 [ 1951.430313][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1951.430379][ T30] r5:8629c800 r4:8291719c [ 1951.430396][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1951.492173][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1951.492370][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 [ 1951.492404][ T30] r4:00000000 [ 1951.492419][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1951.492475][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1951.492535][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.492602][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85eb05c0 [ 1951.492623][ T30] r4:00000000 [ 1951.492664][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.492739][ T30] r9:83018605 r8:8629c800 r7:00000000 r6:83018600 r5:00001000 r4:7f057000 [ 1951.492758][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.492833][ T30] r5:00001000 r4:dfb37000 [ 1951.492855][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.492912][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.492993][ T30] r5:8574378c r4:84925680 [ 1951.493013][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.493086][ T30] r7:ddde3d80 r6:83018600 r5:8574378c r4:84925680 [ 1951.493106][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.493198][ T30] r10:61c88647 r9:8629c800 r8:849256ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1951.493221][ T30] r4:84925680 [ 1951.493236][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.493303][ T30] r10:00000000 r9:84925680 r8:80278fec r7:dfa3de60 r6:84925100 r5:8629c800 [ 1951.493322][ T30] r4:00000001 [ 1951.493354][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.493408][ T30] Exception stack(0xdfb31fb0 to 0xdfb31ff8) [ 1951.493447][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.493479][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.493507][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.493545][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.493580][ T30] r4:86169c00 [ 1951.493929][ T30] INFO: task kworker/1:42:16008 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1951.493979][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.494107][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.494163][ T30] Call trace: [ 1951.494220][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1951.494300][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1951.494324][ T30] r4:00000000 [ 1951.494360][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1951.494431][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1951.494479][ T30] 1d20: a20be000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1951.494539][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1951.494571][ T30] 1d60: 80000113 ffffffff [ 1951.494623][ T30] r5:80000113 r4:80239c10 [ 1951.494647][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1951.494710][ T30] r4:82acb1e4 [ 1951.494730][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1951.494830][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1951.494870][ T30] r4:dfa01dc0 [ 1951.494901][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.494998][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1951.495023][ T30] r4:00000000 [ 1951.495040][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.495117][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1951.495141][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.495202][ T30] r5:00001000 r4:df957000 [ 1951.495219][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.495296][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.495366][ T30] r5:859c478c r4:830ba380 [ 1951.495398][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.495476][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1951.495521][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.495601][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.495623][ T30] r4:830ba380 [ 1951.495641][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.495708][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1951.495726][ T30] r4:00000001 [ 1951.495740][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.495786][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1951.495839][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.495878][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.495915][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.495978][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.496002][ T30] r4:8578a1c0 [ 1951.496048][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1951.500358][ T30] INFO: task kworker/0:31:16016 blocked for more than 430 seconds. [ 1951.507289][ T30] Not tainted syzkaller #0 [ 1951.507388][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1951.507417][ T30] task:kworker/0:31 state:D stack:0 pid:16016 tgid:16016 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.507514][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.507598][ T30] Call trace: [ 1951.507626][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 1951.507713][ T30] r10:dfbe5d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfbe5d8c r5:8629e000 [ 1951.507734][ T30] r4:8629e000 [ 1951.507751][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 1951.507810][ T30] r5:8629e000 r4:8291719c [ 1951.507851][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1951.507933][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 1951.508017][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 [ 1951.508040][ T30] r4:00000000 [ 1951.508057][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 1951.508109][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 1951.508163][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.508227][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f22080 [ 1951.508249][ T30] r4:00000000 [ 1951.508264][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.508330][ T30] r9:83018405 r8:8629e000 r7:00000000 r6:83018400 r5:00001000 r4:7f264000 [ 1951.508347][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.508402][ T30] r5:00001000 r4:dfbd3000 [ 1951.508419][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.508470][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.508529][ T30] r5:85b0a78c r4:85795700 [ 1951.508546][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.508607][ T30] r7:dddcfd80 r6:83018400 r5:85b0a78c r4:85795700 [ 1951.508623][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.508686][ T30] r10:61c88647 r9:8629e000 r8:8579572c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.508707][ T30] r4:85795700 [ 1951.508722][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.508790][ T30] r10:00000000 r9:85795700 r8:80278fec r7:e0075e60 r6:8484d600 r5:8629e000 [ 1951.508810][ T30] r4:00000001 [ 1951.508825][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.508872][ T30] Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) [ 1951.508905][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1951.508949][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.508981][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.509019][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.509040][ T30] r4:85f229c0 [ 1951.509382][ T30] INFO: task kworker/0:31:16016 is blocked on a mutex likely owned by task kworker/0:19:15894. [ 1951.509420][ T30] task:kworker/0:19 state:R running task stack:0 pid:15894 tgid:15894 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1951.509489][ T30] Workqueue: events bpf_prog_free_deferred [ 1951.509543][ T30] Call trace: [ 1951.509571][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 1951.509655][ T30] r10:8280c9b4 r9:83b6a400 r8:80200c04 r7:dfa01d54 r6:ffffffff r5:83b6a400 [ 1951.509677][ T30] r4:00000000 [ 1951.509692][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1951.509747][ T30] Exception stack(0xdfa01d20 to 0xdfa01d68) [ 1951.509790][ T30] 1d20: a20be000 eb82f000 00000001 80239bf8 7f049000 00000001 82acb1c4 82aca5a0 [ 1951.509832][ T30] 1d40: 7f049000 eb82f000 8280c9b4 dfa01d9c dfa01da0 dfa01d70 80230af0 80239c10 [ 1951.509859][ T30] 1d60: 80000113 ffffffff [ 1951.509885][ T30] r5:80000113 r4:80239c10 [ 1951.509915][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 1951.509995][ T30] r4:82acb1e4 [ 1951.510014][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 1951.510085][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfa01dc0 r5:dfa01e08 [ 1951.510131][ T30] r4:dfa01dc0 [ 1951.510168][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 1951.510249][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86098740 [ 1951.510272][ T30] r4:00000000 [ 1951.510288][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 1951.510357][ T30] r9:83018405 r8:83b6a400 r7:00000000 r6:83018400 r5:00001000 r4:7f051000 [ 1951.510378][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 1951.547374][ T30] r5:00001000 r4:df957000 [ 1951.547455][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 1951.547670][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 1951.547779][ T30] r5:859c478c r4:830ba380 [ 1951.547802][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1951.547879][ T30] r7:dddcfd80 r6:83018400 r5:859c478c r4:830ba380 [ 1951.548037][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1951.548131][ T30] r10:61c88647 r9:83b6a400 r8:830ba3ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1951.548157][ T30] r4:830ba380 [ 1951.548173][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.548245][ T30] r10:00000000 r9:830ba380 r8:80278fec r7:e8221e60 r6:830ba700 r5:83b6a400 [ 1951.548265][ T30] r4:00000001 [ 1951.548280][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.548329][ T30] Exception stack(0xdfa01fb0 to 0xdfa01ff8) [ 1951.548365][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1951.548397][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.548429][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.548464][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.548483][ T30] r4:8578a1c0 [ 1951.548506][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1951.567296][ T30] NMI backtrace for cpu 1 [ 1951.567500][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 1951.567568][ T30] Hardware name: ARM-Versatile Express [ 1951.567593][ T30] Call trace: [ 1951.567644][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1951.567755][ T30] r7:00000000 r6:000f0013 r5:600f0093 r4:82252424 [ 1951.567777][ T30] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 1951.567847][ T30] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 1951.567928][ T30] r5:00000001 r4:00000001 [ 1951.567956][ T30] [<8021f8bc>] (dump_stack) from [<81a4d02c>] (nmi_cpu_backtrace+0x160/0x17c) [ 1951.568016][ T30] [<81a4cecc>] (nmi_cpu_backtrace) from [<81a4d178>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 1951.568091][ T30] r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [ 1951.568138][ T30] [<81a4d048>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 1951.568223][ T30] r9:8281ba28 r8:8280c810 r7:00028515 r6:00007d38 r5:82abf7d4 r4:8334480c [ 1951.568256][ T30] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fb08>] (watchdog+0x5d0/0x850) [ 1951.568322][ T30] [<8037f538>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.568393][ T30] r10:00000000 r9:00000000 r8:8037f538 r7:830cfd80 r6:830cfd80 r5:8321c800 [ 1951.568414][ T30] r4:00000001 [ 1951.568429][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.568475][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 1951.568510][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1951.568545][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.568593][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.568634][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.568654][ T30] r4:833cb7c0 [ 1951.568800][ T30] Sending NMI from CPU 1 to CPUs 0: [ 1951.569551][ C0] NMI backtrace for cpu 0 [ 1951.569669][ C0] CPU: 0 UID: 0 PID: 2820 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 1951.569701][ C0] Hardware name: ARM-Versatile Express [ 1951.569728][ C0] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 1951.569779][ C0] LR is at pl011_console_device_unlock+0x20/0x24 [ 1951.569810][ C0] pc : [<81a6d27c>] lr : [<80a8ee08>] psr: 60000113 [ 1951.569830][ C0] sp : ead9deb0 ip : ead9dec0 fp : ead9debc [ 1951.569849][ C0] r10: 82959554 r9 : 00000000 r8 : 00000000 [ 1951.569871][ C0] r7 : 00000117 r6 : 829594b8 r5 : 00000000 r4 : 00000001 [ 1951.569895][ C0] r3 : 0000298c r2 : 00000000 r1 : 60000113 r0 : 84251c40 [ 1951.569971][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 1951.570010][ C0] Control: 30c5387d Table: 854ecb00 DAC: fffffffd [ 1951.570045][ C0] Call trace: [ 1951.570067][ C0] [<81a6d254>] (_raw_spin_unlock_irqrestore) from [<80a8ee08>] (pl011_console_device_unlock+0x20/0x24) [ 1951.570104][ C0] [<80a8ede8>] (pl011_console_device_unlock) from [<802e3768>] (nbcon_emit_one+0x88/0x100) [ 1951.570141][ C0] [<802e36e0>] (nbcon_emit_one) from [<802e3988>] (nbcon_kthread_func+0x1a8/0x2a4) [ 1951.570176][ C0] r6:8280c690 r5:83b4c800 r4:829594b8 [ 1951.570185][ C0] [<802e37e0>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.570224][ C0] r10:00000000 r9:829594b8 r8:802e37e0 r7:84beb100 r6:84beb100 r5:83b4c800 [ 1951.570234][ C0] r4:00000001 [ 1951.570242][ C0] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.570267][ C0] Exception stack(0xead9dfb0 to 0xead9dff8) [ 1951.570286][ C0] dfa0: 00000000 00000000 00000000 00000000 [ 1951.570306][ C0] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.570323][ C0] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.570343][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.570352][ C0] r4:84291d00 [ 1951.646267][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 1951.648372][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 1951.649242][ T30] Hardware name: ARM-Versatile Express [ 1951.649869][ T30] Call trace: [ 1951.650433][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1951.651287][ T30] r7:82253148 r6:8321c800 r5:00000000 r4:82252424 [ 1951.652075][ T30] [<80201b08>] (show_stack) from [<8021f894>] (dump_stack_lvl+0x54/0x7c) [ 1951.653188][ T30] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 1951.654111][ T30] r5:00000000 r4:82a78d18 [ 1951.654852][ T30] [<8021f8bc>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 1951.656070][ T30] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 1951.657062][ T30] r7:00028515 [ 1951.657536][ T30] [<80202800>] (panic) from [<8037f948>] (watchdog+0x410/0x850) [ 1951.658805][ T30] r3:00000001 r2:00000000 r1:00000000 r0:82253148 [ 1951.659793][ T30] [<8037f538>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 1951.660715][ T30] r10:00000000 r9:00000000 r8:8037f538 r7:830cfd80 r6:830cfd80 r5:8321c800 [ 1951.662014][ T30] r4:00000001 [ 1951.662512][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1951.663598][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 1951.664429][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1951.666695][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1951.668187][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1951.669847][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1951.671182][ T30] r4:833cb7c0 [ 1951.674119][ T30] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:09:08 Registers: info registers vcpu 0 CPU#0 R00=84039a18 R01=00000000 R02=84039a00 R03=df80a000 R04=84039a18 R05=0000004a R06=81d0ef64 R07=df801da8 R08=00000000 R09=8321c800 R10=00000000 R11=df801da4 R12=df801da8 R13=df801d90 R14=802ecce4 R15=80993078 PSR=20000193 --C- A S svc32 s00=616c6374 s01=643d7373 d00=643d7373616c6374 s02=76223d76 s03=20226164 d01=2022616476223d76 s04=3d6f6e69 s05=63732032 d02=637320323d6f6e69 s06=65746e6f s07=723d7478 d03=723d747865746e6f s08=3a746f6f s09=61737973 d04=617379733a746f6f s10=725f6d64 s11=7379733a d05=7379733a725f6d64 s12=5f6d6461 s13=63742074 d06=637420745f6d6461 s14=65746e6f s15=733d7478 d07=733d747865746e6f s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84251c40 R01=0000003a R02=ead8b000 R03=00000000 R04=841a4043 R05=84251c40 R06=80a8ed44 R07=841a4043 R08=80a8ed44 R09=00000087 R10=00001ba6 R11=ead9de24 R12=00000002 R13=ead9de18 R14=82959484 R15=80a8ed9c PSR=80010193 N--- A S svc32 s00=69737369 s01=313d6576 d00=313d657669737369 s02=74737973 s03=755f6d65 d01=755f6d6574737973 s04=3a746f6f s05=656a626f d02=656a626f3a746f6f s06=725f7463 s07=6374653a d03=6374653a725f7463 s08=6e75725f s09=656d6974 d04=656d69746e75725f s10=7420745f s11=73616c63 d05=73616c637420745f s12=69663d73 s13=7020656c d06=7020656c69663d73 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000