last executing test programs: 19m43.649575935s ago: executing program 0 (id=56): mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000002280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) read$FUSE(r0, &(0x7f0000002380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000006580)={0x2020, 0x0, 0x0}, 0x2020) truncate(&(0x7f0000000080)='./file0\x00', 0x5) syz_fuse_handle_req(r0, &(0x7f00000043c0)="02cbda572ec32cf73bdbc52bfa4e157261eb6cbd0d1d50c9d937a19739fcb9f8697bf69c0e2e526012185f1b86989056f9c2d38906e8a47b9b5fde55a777a6357ac40c211de6325f496fd86dac09bb38b62b37d715d06e3c61b172aa4a662cefc7810ba37161c637a9b56a7c7b022426826076f1d2bf3c3b6f92ab6c27d691385c3efc354f1423d01d6a49d534fca3f2bf518cd645cf18b4ac2d2ac4c5c29ba487c9d27bb488a73146d5b9e21427af37dee4a276646eb2519e4f6c76cce2f7bf7e708d5180959f71d3797220101849c5144ef8338a5a2079ecce466000cf290d4df42e82865512fb5fb01fb655613cf1c469682edd86a4bef86aa23240ca6a2ff38b59339f7530e8a8027aee0628e0f81b2f5c661b149d780f20ec54c8d3d42c0c49f83b1c0d4bec94bc9221e6fc7c75ebd3b68081df207721584055baeaf6429616d57cb35d2977d45971d209e4c45dfe3c5c105e0e2b49fc8685b4945f31c9468f3c950fcf70a8f45e5a3be62f73c228a6a34a99b6f584b42c50506a6c14187f44887270011cc98d7e5e258df533411c8d39bfa9e27014912ed9e9696fd4074fbefcd4817a344be5ea348f4a7a34733a5bc5674b1bcd39404d5a458d1e19b6d4bdb4e23403154249b5798dea7b60bbf0c09c25027a4efd49d36cbe65b7450c0bde580d356ad4e3cc7a9a57e6ac0b542592617869e57d9bed28f0590241bdeb51fa775aa8806a55df2c795a61146bdbe38eb7a716180bb9b728696bb0e78ff11f89b17c7e7fe9b14ea976ccd9991f01f5d0c4620053d0b5ce42af76591fd0706494b91a6dfc43560f9a9538ada19825ffe3a7cc7a56b755d46ae1189b1f1ac729d9938ad48a066624c1b28003a9d193b4b34c4ab2609949df96f693389f27dd3e1f42b178eb17079c1448d7e9fac30ddb53ce8e5a157db8296cd3069d332bad0528ae56a6db41ba84699b85f225a78a33879512a5f0b795fc58957ef6766afcf546fe36c8125276eeaac9d647b2459c164aae86a2703e85d4f552a0647cb4bdfaecf6ec3a264a6b6892a9a1ba08a9055e98b49edc4e1f8010f63f601a8251921df70e15011116c471a70a0580b1789bcff471dcc95ad209a44ca2453d58d3ea4c71e0383db68adf332a497a84faada33f18bd3cd79ff9d6809409769b02a66cf524534ab7134e3066eef904d8961195d9cdc396a012bb3bc1b1ccd60317d08cb059174642aa3f60584e58e7417c1736f6863fae9e7103158711167a53d7d5deddacee6958fd4c2e0672b8dd90b41512b1f59fc49099633860dd6902c1df3d5924b1cf81ec848d51129b3eddea619129e961390d65d2243d400a1e30e524eeee1a701da5e21598acf457947bad693892a2989097ecbe9607a33ffb33425ccac5e19ebd1f88bf3acc03331adf9697bed04b33ac9fceaa3bdc9a417b12108e10f9c45b6d36181099056a448689da4ef68beee35f5930ce4a5712cbed98239a674c5883d6a5e0df9c1cbe1eda8dc19d14c4abe896e3b28bb3d4b2a0e9ae31ca07b9819825f3a6ab82c5501becf023a656cbff569dbc3035ae3c585747fb459581629051286b170b679b683a0b2eea6ef3b41a68012e5f4d64f689c2b909cfd06d37c0a802be2d882351bffeddef1373d8cbafa10fefbc28b31a70b6e912fc61257aa76a0f0dc1d3ef72d2f61517a359053c3dcb7d49d8a4da61bcf3b3dafc0528bb037cec0d986b3949fff38a21dab6b8a3a167bacf067c5f7842ebebcc1bd54776b2e54a098303c6331beb16e42d0669a518af2d173405786439d739b813c145c4f9f98a537b1065bf4636c76e38b71943815a6d1227d0a6965dffc37c00444aebd2ec19286b83443902dba1354a69377e97070a79151e64711111bf3e0a755b0fb1a1d5d009fdf61b665b41a3b7dbd0655236360141c52b93bc907b0672743973c30d6c9ece47fa1fe3625cc8acbe305156012ef1c5ea140be70b804887be593f25faa13ee4ea2d9821d23c3e047d74ad4f7de4d95d275ea3e6c87479f1badfcef002ebc7020b581a096abac1a80ef6ff476a01b01f7c0fb1239fcc182f74e5b5965412c0f4170432af15daf457143b1f41422b8a7f9b81c15a156ddef9af95955090d013cd52aa66ebfbc87c8030e7f86b52aadaa2e63c261185eed7c46b5f8d56e8301a9cc1578aff77b42419a5eb2e263207ef259f4da6ca6466ac9326a633b39e005028c07c9aedf17a70e638d7ed84638406e6028be879fd0fe491152e181d5527933950eb67a52cf155d5c845a6425e41a47b44d9905de26e5132c8d594c1bf6d4f12dbcb96d7431a56546800275623679d6c189e0cebd1fb8063140b89d42da60ed06206d329c29841e69c820428bcde53c998bee0380a816d080b36f64574718b84e0ecafbfd2b9981f4886df258dbf1cfdb148b171516500572a7086516fd519bc861878ec2fceb6872229ff1e9782720e590d8ef4691fa9c4c54bfcc843015913a2ed40bf37048151d17b44365f7f8d3b816d1b1cd40dc5dda6ab8f637b5f6bae92580f1c269c9231c9a79d58d43208be7622147db352b1294260eeab12409f5b5ee94d99548640634bc9479a6e6e06cc8838bf85d9bd95452eaf8ad3cf6c070aac36a7d38fe23cebfaba46c74a6c5c98b1b5243edfe405161b8c3ea0cdb1bcb4e1041fc62451a6094b0c56ee2ed29520b87228959bc01a9a9f54d214704bd321b152a0e88d0646e99a92a390dfa6bc2c34d418e5e900a3b641ab34a5fd8de751bfb3253b7aae3948d871892d7b76b351b073a93f3ad82b0c59bc49ed922c8d63f8d12c14ce1912bf877bc7877f619b03d09200836c775675e0614efabfd5665c3bf12e6131a7232639729b79ac1c5e807246d30934b0f63b31a06c4722278299949c7785d796b6d3d4a5f2fa652b7fe8be447cafe93fcb07167f3ef16b94261fc3a9d22a57a7aac56562a231d79dbf3bdc1f436206337ff0f8e019d76b823c5976ee23ba4e553ec62d261bdc7da90fee46d3472cc267a7a74b88112ef765091df03bb59cf303feaa0149b371a7bdd75c0187ce842dd1e4cdaf7fc0f5ef7ffb559c535f19100ba653728cd936987731d5ac99cb9ef772975b17b2aff8b872df0d189c7944d63ed66cfce8ee92e7a1082c2a501007aacbe0011e6c32489bcb888e1c464bec59902d940d81136c543098a60104bcfd0f4e7c27cb114ff42e8d31fe09a4bcc21cae5ef2f8e4890bd8139fff1b1b2a39e29eaf2e5d2fb810ea37a13e6d2105a6c2ccd03fc110c6f9063e2433e1450dc8ebd8ede0445af662cf7ee705003630ab7d9fc6ed30169ed674dda2802d519e3b49016c6f11612ae53230b062281ddf7a678784516c3d177857f8bdbec7910af8c81333e471bd8a973ce858a14756ef6ec85498714fe8e1e6600023804004b968eea42c410bf0f5c5b2471835454f20230a6d342f96f71a2e64f54b838e5cd939d7a651d402fd60a8a2a081de0c536d5b81345d92165e79fa65140b91c23cdb5829db55f1f93b88bb43a355e9304a17355851d52c0d745b611a30eb400044dce6ac742bcce9df9583b827514af8a2ed4a04553817ba6ea22e9beaba65d32189a5c2bf65a09d2c8a8798c0645fb24157a4e71be7889fe65c34869d8852b21661407feed92afb0bfe582693a21c050e5adce1fe97755b0be276c36b81b89700b99d23d315a64f7e115eacdb3ade725cb3cfe36c27a5e2addad60290b022a9fc26132b5ec3b5f1d884399fd992525a3e17e18e7ee6078a64b7efc3bbd116e5c305d8ad935baff18ed94c7a8720e729132e110f986991a3ad21cc637282f55588b12756895e2d10afce85b1a04fc271b217278f156c7ffb1ed9dd52b18fc8b153802fc329dca81b278d715f6e31fbcc77d8ce5c2786573bacac30791aff5771fece44063d1e84abcd6a4ae016858893605eecf253c79e59c2152efbe9fdfee3c441e4bc9cb14fc96a675aa17bf7d2024d665fe3982b61888bbe7129a1ec8fafc3480170c71d05f5d22ef7ff0e2ca598fd02bbd0ad82e6ab0e775388bf3aa421c20b6a2a5e256386abff1103f46a8b5c54c2d54b81c50d8bd98aea724bda55f99d95956e939b85d59abdc50ea4cf1d44afa3e8dffc9d84c6b7d28b78c40d7498670602b97c5e2a6281c7876dabc1d14d156e827873818bc590644d2a1d084d39c84e78127b087bf2cd9353fd13d4ab12350318aedadaca6a2728267e6f5f16547caadf3ac2fade3c86b516c6ab53d61ea1c148835b9a2c91fd0ded7283ef720086dfc7728968924731715f78915045a69122d8b23a6db47cc6fccf402b9913e46c9a36924327ca9bba6bb8cf7cc80952501fc2181a2ec7ae4364cc6eac0cba0edda68f3b398a249d114702147f8b1cd9c7f8a15345f42a7a50334928eb4e2de974e4ae2ffb796bc640922f7ada0933460e0c0fc06276dfd228da9bfbbe5a3eade6f98594b0226339156022aad7aa8c9650417cb1551b3b988fc410f81e1ae01282f244e70051f1b93644f78af3ef6359d106b291568e1ad00ad6ee102964fb7aaaec9732e43a21ea28cda496e4ae367ea738482e777290cca2ef61c8ff10c1b9546b5d395d21c98542f37578d297c13899247a6fdcdf0b8cba6b498875926a19852f97ef60dc1a0c4069fdd4d1fb87a6cd58b8786210687d644a4bad6f8fee0bc5fb94294cffc323e97597be6a5e457a5dd27fe2ebf5c34aef3bb5c43ba0a7d931e7ab02b7c290c5d04a41c01d14d6fc1ba80bfedf71caa0f7e59b135fad73e28d4861d601f79ad32edc6f8d1978d8ecf787f3c9ac71b2404939827b16f3915c8b1445dd1ec012aaeff88789c396665a50df52b244ce5b100d9a29ce52903b8f7f3662c0d0599fd1a7071798b759be02d58e5c6e4626b477653655fb7f5d7bc0ad94dbfe131c9ba5a994c1605c03b9f5173f8205c580bff685e693b23ab4cc7b2e4b21282b14f65684747ad98c0d855a205a6e17b5bb4c2b07097ae32393690e4e07a7f3e25d6bd01c1fb973a67edfa4e1d4a7a96b68570dd9d3bdfbe8a5a69adbd17167533ddbd2a58d70ca1ccea6428770dbcfeb47ddffa99e8b5e69bd34641c1f1a033e86215447fd2927482b12a85f11ae1d8b2054d7f642a9ba526e5a7d8e3d81bd394c264666f4b4dc3ff9c1584f277ff31a29c1358d9a953e0ae2822a3d174a0ce3da386083ae06f02723aea03931a38116a8e4afbc36fb9c094eb340214881a6f838f8d66141e451b9a1bd250363e591bc4ac566123a379272c08c0511e29e1dd1bc06869f3fd151bada9b28a6a71970ae3580d5bb0ab76b38068f504659bc335be1bb2a285329f749303600211d6ef7e151ad861b946d99f36d20074d65426f68a6758270ff946dd387ed3b150199fd81fd2e76a70a2fe2d7a2f8899079068ce48c5380db7e69a1a91f244ed32400e8d9e3097ec2065570dbde88faaee4a938f0b4cc20f31f175df62bf6cd88968ef7e24912dbbf91869eb9b34498d7f6000ef9a62c9441f4177ab5da1428d647b6e3cea1ca8a91b1a1246c2e048654e350cbf3dd4daaaa2558ff9c505ce0fcbcf93601a725289c38724290cffddf87e5345b43a66eb5f9fef718b0df4bcfe82c466017c3d8f0bbfd5544ff2d834a6e653ae789561df44281c8510b4bad838d04ab4a8e84fc4fc022bbe8454b36273cec843731c1df6fce42947a029f61e030990c0002b6f2c9c552227c8785c0b53683de3e518123b270f595aad389951d1edbb9c6fb14cb4e479acff1ffac191da3d80a696b8be5919710c9137ecc0ca383d8666e30a356759a5299f44c2bfcd03a8df33de0e27d6038a9551cfc5ff43de0d42a6d033bf15f3a44d52f8a71554d1a2efb78042c1c9957256d7ea06b7751b40668feefff205c74f0f947ae0920aa746f17027bbef312708bf72fb23c12d0dcf6493584c1bdd0b5780017c038bc23fb6c25c560bb6da3775cf03502c07b987e64f8a2b84a870b5dd90c6aea7fad3d0a3ee46fda953dc085d272ee5855104b8bab8ed8bfd3338e75eb9ad8118f25c7e580fec613e30cf3eb7059e06d9be015709ba6c9de9dc9b6df8228b13f0439fa8d530aa9a4dc1d44abc3191c159a8816e7368fc5c6a0e57eb881d734c7a5459ba3be1b8a17b5ee6777ee42e962aee199f35ee2c2d4a39275e1dd6a8546daadc7ceab2c90667ad48c75bc7008ec2d7daa57562260d6d4509e67850e988b640569c050d3bedbd6c2de9b4f466e2d0c6f83c3c2392a5adcce1523e89f730a84f8cad28f84d1a0991f44aa4714f93088ec2a2836766d73569c7b0c1f70a067a3f0dff1d01661937aecb39e3d0f8e0ea282cffebbfdac63196eb13c4e53f144fc66a82cc0590f1d6d249c333420c24db92177c89cf0869346c34147dab6c3b94c325ef635d0e6d75c23906e71a7940e13364aef81b97108a4b209d372558d3bb0424ecb6a9a9ee28f7d1585c8af6f1256c812eb48515feda309a08f1a2954039ff0a60a2ab75717d2eb93024586837e552942eb63e0d6735d01258eb4dac6209370c109c1a1763dd742f3551276768648919f9093fd4e0cedff9442ac404e463eaea0ffe58a5085c987c093fd30e121218123457916ced3a7250a796a40451a4729125bce2ba5b6406e6626ecfb1d3f16287ba238feb575f60eba96443c60252d5927b81b73574ff1b7d424623b6cff5ce0d1b31b3d199c85da27f8736d990063f09dfef93402d880b2c5d7a9cdf45cbb4d1baf95be490f3dc9998c2c7ccfcc6e6395e7e09e6c44865834cd3e0968ffcc1d0f54406b55a8952cd8096e8968cdca3632b71546192c76472a66c4a8584eb748c1b3c30d52e8699adbef91329aefbf94d251d0b82bf42a648f73020881a914ea7c529802772b4b60617e9c1d9712a31d0ec3e92af4b97f50ec96e794486101a9e15daf8b7f13078d22767dc3b57bc0431ef39b3ca12b2932aa585bc856e8cf5496d78eaa50f06b483f416b31f78767bd25e260042e84c10e9cf9bb53a3f4fce11d703e90004949b55044907242f8eddef627cfc9642f4a828476074c298ea2d7b07ddb7b4a2b9f8f1e5a32fac7d105c5a12186da19ef5f6475763ee19aa670e7b45f37248fdfa796d6ae761dd77955851faa33675ee22e8174e0a126ac58b9998ccb5e4d12c3e00165533ddf710bf0ab0edf6ba1fecf9548ca1618fd980a4f9a35eeb5c1aa329a288378b9b5ed54b56075810cd22abf0c06ce0f1054805410375d6e41564b71b86cab6929c5c1cedb72e0b1237fdad44edbcfd326312caa49ed0c8f7c5a33986c89245fec75d0f9a34f744bf74d6e0f901c12ea25edd60c43d22f6644fa294534cac1c581b0cbf5d9765fc18fe6c223dcff4a85c7eeaf4cb1a9a889c236778b85e69d50d482743664bdeade11b4ced78c3d0b62ba07f98a898c6e89241ed6522fdfc430b75593673d43d695082b0114b25f231c8a141be953290b1a3855adc0146adee0b784fce2cf8243838bdcdbcf4e0dbcc2a9945deea1d02858a9e9dc54f0e818b81d024bd9b2e052a73fb59d037ab526c78faadfcdecc15f2a1d843e84aabc403e84b2fefbfbec982f22b89a2be560002d45ae12a8a2d00f0a3f55e26789a593fb8bdf20efb8a51e3d0dad9ad2caec39ea7392c58eebebc7201c78276f0127e43d5c8efe0200000022d69586a9e096efe80844c38841640238584936d8a96c0ba41dc0dc96a11623ff1e70ef54a9c43ec3cd0359dfdf55c8f8c306110d833d7de7a35f015369bf6d92b3b6f0f7dc717c84e51ce475df451b9a6a91c8d564aeb389267082b9cea77f09c6c6490084da3820f80d3e62bbd41a6540591c6c5cf2a18e4e829b82a6780b6b1f66d96fcfb1639a335a78f8c3ecf381148b2625859e514d35eb8c4acc98f7f8220e1827d7745f1f054691eeb1625e2d238ae03c93991058c1567be4938de2e60537749ee81f327f1f1e586ee3af4ccf53b29741c1bb0e774a1d27672ec27b43719d3710e9fd8634213738d98844717c8b1f707bd42f4077c9e59eb539f9cb32c11b47bcb7cb3efd3bf4994e90166a5ae380c821d2640fa99df59978e9b7e50f0b830943de787b1bf99e14edcdfe8565556ae2a8c0552d67898fd13551c007eb779edb60e85210a418cf0a4a41764fe9ece74f5d8000d168fab61588c5549113e8d8a059f17699d976fc7dc68cfd0ec404ef0c7eca459fbad1c40317d81b95a94b037cf96ba677697cfdce4c2c4e02cea296f25e556c02381ca891ddb6adcb0535e262b26290000c542e7616d63b211c16f86048079ca5167598aece3288f86658249e939cb6b59b6cdd3fce0e9ea81a3bb3f88908c600ea031b0028f12632d7ac2f81e54f7e7eb70ba70bc937571b242c4ef228f801b6a4376d11eabadaebb1322823eb30faf6cf21a8b38a769824e8b7009ff278f80ac2af39f0943a29458d127eabae81d2915557b09e3c49f8c22564edea93e8717306fb198dcc92eb3c9212f03dac94fa3fa1fa4e1dbd2119e024639f0ddc87cd906d3317c6ebc6e698257f73912ff46fe8d9adbd3f57ecc78cea5c1eb04ac5fd1bb79a53921fddaffd2d34f444b54208096cbd2aa3e26ca01359b05c10ff36e98e1ac97d51380c99e1b685928eced0d2f1e754001e7023d2473596feb7c7601619277dd7e844bd5544e7e360f8e4223fbd9e24b3fb69a34ced39bf7590fb853e44031d075fe647190ac7811522c73a6c6033457c14c415e4a84663d2540784a1cbb4a398f1d8612f4f3d334576c99d5721bbeac95cc34d18080e3b1365b6844152b8259c8d4618597f291f2b9e8812ab7729e108a8d44487f8993faabf6c6a8f49db727f17cdfec43b34c39cfdd3916fa6953e34f316100368c7b2836c11dcd4710986980356b7ec4ba23fab5cc5a8c6cacb61cc65570231407ca647946393031986cf4736280ed2d7976d66618fc240191455ae405f1d62145297179c040a707093fb8f60f5a3738b8bf78bbdf952478da7e9d3c892af5b83cd9dd4f00fcfa13beb9e6988e3c4b4e5300e3757a93efaef9023fb9d7442cb1a49d7efdec32ac1f98e6227cad38538f6383c3b6efca2fda7c101ec548c3549e7ac5e737478343ca47cdcd65acb71e0eade28c684b69785ae1fe31aaec713834b6635938d7d66426e965498978e4b467f6132daa6026c39dcbf95656b9be5c074badc18b5a74e12967b45e23099fa765ea5c8c18f0feae94755827e494f251ae96882b5c5f6d54713de02501faef1fcb59bf0d66f9d0cd3a493b139237aefdbd402a3df9dd5beb2887a055261a08047be52fa51f61636255870366e837f20d0f83b8557fa4a003647152ee27bd34b5af52743d4c431ff4a116ae1184c810e8397ef2a056845c6e3b5c0beafbf8f78488102412e04e47fb87be9a9ddc075ab519f424ebf821da659b18ae3b61a7b243ff94e3d1ba420cb342db7b8060937749892a7954d3ba5e63017703f5224602616ff6d3fec42444b2524f97dfa467d9db91681dce08de5ccb1ac2bf6cb5e6c1d586b2fc62e78b0bc23e1924a4f023adb39803fd6c3d52c40b13df9c6f54bb2b4ef88f5d0ffdfef13ae46dbf75aa6457da3bdc1781dc814b0b69debee7456aa7f75571caef87f624ef703fea75f136cc7f90af0ae558cf3de5e8cc92f3e803bd46e05f42e4167af8136db6982ad26a52778e1fefcbabe61a57f00cbf04e3c82445c04bbd8832b8bb9a7cb854a22f98cd7b422a7abafe6a00571539802e56f036d5a26d79a86cb100b90ae168d2406c2c0b9c5274ad69298e7983f4b30e006cf4882e90ca8af4e445dc06d0639231638dd39929065d920af913cc7284619fcacab0023893352468eec73d7014407e5d4bca9e49d412ffb12e68610c26206de0b3282e925b83389cbdfbc41cf279440a13838a1431ea4f1a371b6b143b914238773d171bc7b44c07729e8723fe51b8180fc9c9be6694477132cb82b22b2512518266781e687fcd460995ed581059d3c692ecbdc8daf3c76e5a5bc8e57973fed5fb3465a3dcb5557f92dba1e212f9bda66fc4829e10ce3e8b6c117b1214cb246211c861eaabf8ccaa94aedd58349399e619c2dc587719d7901d2cd85ced669d0ea898c4f127d1a4cf274aa0405d225605edf425dc9b7375c8ac2940bb369eec586097f0cc07940ecc8bd400976b9b36027a040be6e64a2fa4f7ba5d59ce9b4f76192d260d665290b20faa3a6a941939a0b3042ef4d8f9b980c71a13496b104965e1c3dab25cb46147bca6b70baa0237c8a5cd1c437e43a50302490462585410f65e03186df5fc2c5bcd89f6d6a4ac34ca6a84159b2910a7ba797fb09dbd3ab88c23951b1a91df8cfc2d13de85dc715e2a111458acc4d640a59c199faa2bb28ec3309864fd8a6997ac89833853101a08198aa6ab3e5167b4e8e55843efae1ecd3fc6507f3a97bf2f8c4c4da4896c788a17a5fe8d8c3f79fe41dd7f4497380f1ffc8f8d6cc2c2dead697e4947cfe680a0e2b5100743444536134cde4378b0b1fe6ddc09dfe8d618f93edffeb7d097a37a19248be0bf9c4f536a484a5fc96f18f2eb4f6462b20bee241ce16b4790c854bca10914e3ba98eb0970765571a8ad45baba39d20b8c1bbb7c65717e265f5fc5edefb130aada09aa7f2c50c45de6de7327faef192977f499b7aed9e73c2ecb97f7256f89fc8b4834670f798438fac5a5045d61a7f429eba77de37517b984b0acfbd6f494a1414b0fc040244bb62a19150e0c15e5315b2618d05429263dd1847accc5de9baca08edc921ed9a0af00175c118ab801da9980098fc4a2bf16ba73e580000b49129a5fba00a1f2c45c0d0939be83ad93569dd61330913e8b381f9aff6d6a584862d636c1a4989dd3fd14853bf033be56f21a3cf1eb95d7df7c6436ff3d5a8f472bf4a3fa8b0b0741d953d9644e0ec801d4154336357d2d1492c6d336b9101827c1401898ecdca5a66c6f727d23d3ebb95530ecfee0f7649c221d2c131e56d37a8d422b0803ed0d623a2de36e9279c3c1c806654fbce9305cbb44210e282fa53c72f813440fd0cbfff492716c4a06cf99f4809481d51a03a88911f48f25db6784e16f3a251d5fb75fca164911e4a88d1b904b5372d8660d309f347dce2000552a4789af371f3e67418433cdb0d69a4fc562514cb396141f31312fab85f68c1ecd9d03ba37b40934535cc3e53c71a3a51663a479eca63dc5c15a387e5753cfa806402b6426b8dcaace2553d219b2ae02bd45fd4fde6e3e1bd6370d3e8d558aea69854381f1dad0fe2bbf1a73043f03aafe81c3a3d386c758abcb45cc537bf40d459e138f418802ec61abcad5e333389d74ea941eb5f26b25ed7642e0135fd8e3e2fc998613023dd5b804e2cf1a80ea60b353535b1446e3ebb542c1c15d87c6f5a4716455c8a9f52380161a5d23e9678417fe7ed64760e14c1390bcf73e1d531bb3548d7b9df25b6f85512667af396fad73110d1ab69a8ecdddaf29dc3701a5d927e599f5c2af293a6b276da7a5c917298ea24c2366d5e91593605fcbc4d646200", 0x2000, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x78, 0x0, 0x3fd, {0x1, 0x1, 0x0, {0x6, 0x7, 0x8, 0x0, 0x7, 0x9, 0x1004, 0x0, 0x7ffc, 0x2000, 0x8, r1, 0xee01, 0xb099, 0x10}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f0000006500)={0x50, 0x0, r2, {0x7, 0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}}, 0x50) 19m40.927640139s ago: executing program 0 (id=57): mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000009, 0x32, 0xffffffffffffffff, 0x9467f000) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x100}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000000000/0x400000)=nil, 0x400000}, 0x1}) syz_open_dev$evdev(&(0x7f0000002f80), 0x3, 0x484000) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000000000/0x800000)=nil, 0x800000}) 19m40.821651933s ago: executing program 0 (id=58): socket$unix(0x1, 0x5, 0x0) fsopen(&(0x7f00000001c0)='ramfs\x00', 0x1) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) fspick(r0, &(0x7f0000000000)='.\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100)=r1, 0x4) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001300), 0x2, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) 19m40.750035382s ago: executing program 0 (id=59): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f00000000c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet(0x2, 0x3, 0x8d) setsockopt$inet_msfilter(r3, 0x0, 0x8, &(0x7f0000000340)=ANY=[], 0x1) 19m37.870004576s ago: executing program 0 (id=61): syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000440)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r4, 0xc0884123, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000e40)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c0, 0x300, 0x18c, 0x203, 0x300, 0x19030000, 0x3f0, 0x2e0, 0x2e0, 0x3f0, 0x2e0, 0x7fffffe, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x300, 0x0, {0x1000000}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {0x20}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xe}, {}, {0x0, 0x0, 0x3}, {0x2}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {0x16}, {}, {}, {0x7}, {}, {0x0, 0x0, 0x0, 0x101}, {}, {}, {}, {}, {}, {}, {0xfffe}, {}, {}, {}, {0x0, 0xfd}, {}, {0x7a04}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {0xb84, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}]}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x4}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz1\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x20) r5 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x103902, 0x0) close_range(r5, r5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x400000000008d}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r6 = getpid() sched_setscheduler(r6, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r7, 0x4b48, &(0x7f0000000240)={0x73, "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"}) 19m29.630072619s ago: executing program 0 (id=67): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000380)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbee7, 0x8031, 0xffffffffffffffff, 0x4af8a000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x2d, 0x0) recvmmsg(r4, 0x0, 0x0, 0x45833af92e4b39ff, 0x0) 18m44.151260652s ago: executing program 32 (id=67): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000380)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbee7, 0x8031, 0xffffffffffffffff, 0x4af8a000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x2d, 0x0) recvmmsg(r4, 0x0, 0x0, 0x45833af92e4b39ff, 0x0) 16m11.808423357s ago: executing program 1 (id=182): socket$packet(0x11, 0x2, 0x300) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000080)=ANY=[@ANYBLOB="050000000208"], 0x80}, 0x1, 0x0, 0x0, 0x40084}, 0x4004010) sendmsg$can_bcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="05"], 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x4004844) close(0x4) 16m11.749132034s ago: executing program 1 (id=183): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)={0x24, r1, 0x401, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004040}, 0x10) 16m11.648627677s ago: executing program 1 (id=184): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x4000) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 16m11.568078437s ago: executing program 1 (id=185): timer_create(0x8, &(0x7f00000002c0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x1401, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000240)={0x2000, 0x1000000}) 16m11.449557002s ago: executing program 1 (id=186): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = socket$can_j1939(0x1d, 0x2, 0x7) connect$can_j1939(r4, &(0x7f0000000040)={0x1d, 0x0, 0x3, {0x0, 0x0, 0x2}, 0xfe}, 0x18) openat$procfs(0xffffffffffffff9c, &(0x7f0000000780)='/proc/asound/seq/clients\x00', 0x0, 0x0) 16m2.169956106s ago: executing program 1 (id=192): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) write$cgroup_pressure(r0, &(0x7f0000000140)={'full'}, 0xfffffdef) 15m16.797504896s ago: executing program 33 (id=192): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) write$cgroup_pressure(r0, &(0x7f0000000140)={'full'}, 0xfffffdef) 6m33.340135362s ago: executing program 3 (id=818): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) 6m33.263452582s ago: executing program 3 (id=820): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x4, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000010000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) rename(0x0, 0x0) 6m32.970382588s ago: executing program 3 (id=821): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x9f80f000) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r2) syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$EVIOCRMFF(r2, 0x40095505, 0x0) 6m28.791618871s ago: executing program 3 (id=828): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYRES32=0x0], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 6m10.210916137s ago: executing program 3 (id=840): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 6m9.838992844s ago: executing program 3 (id=842): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x4, 0x7ffc0002}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='kmem_cache_free\x00', r0}, 0x18) unshare(0x6020400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) flistxattr(r2, 0x0, 0x0) 5m24.520739098s ago: executing program 34 (id=842): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x4, 0x7ffc0002}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='kmem_cache_free\x00', r0}, 0x18) unshare(0x6020400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) flistxattr(r2, 0x0, 0x0) 5m21.190350995s ago: executing program 2 (id=939): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$packet(0x11, 0xa, 0x300) socket$kcm(0x2, 0xa, 0x73) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) setresuid(0x0, 0xee00, 0xffffffffffffffff) r0 = io_uring_setup(0xaae, &(0x7f00000003c0)={0x0, 0xffffeffa, 0x800, 0x7, 0x2}) setrlimit(0x40000000000008, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 5m20.070444835s ago: executing program 2 (id=940): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 5m19.71347978s ago: executing program 2 (id=941): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000800)={'filter\x00', 0x104, 0x4, 0x3c8, 0x110, 0x110, 0x110, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@empty, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac}, {@empty, {[0x0, 0x0, 0x0, 0xff]}}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 'dvmrp0\x00', 'netdevsim0\x00', {}, {}, 0x0, 0xff03}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @dev={0xac, 0x14, 0x14, 0x41}, @rand_addr=0x64010101, 0x8, 0x1}}}, {{@arp={@loopback, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'veth0\x00', {}, {}, 0x0, 0x20}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x80ca, 0x8}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) 5m19.609358523s ago: executing program 2 (id=942): r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) write$selinux_validatetrans(r0, &(0x7f0000001cc0)=ANY=[@ANYBLOB='system_h:object_r:semanage_t system_u:object_r:fixed_disk_device_t:s0 00000000000w'], 0x79) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x308}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) r6 = mq_open(&(0x7f0000000080)='$@\x00', 0x40, 0xb4, 0x0) fcntl$setlease(r6, 0x400, 0x0) mq_open(&(0x7f0000000140)='$@\x00', 0x1, 0x0, 0x0) 5m16.962717814s ago: executing program 2 (id=943): r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) write$selinux_access(r0, &(0x7f0000001a80)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a7570647077645f657865635f742073797374656d5f753a73797374656d5f723afaffffffffffffff3a73302030"], 0x56) 5m16.721905534s ago: executing program 2 (id=944): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x54}, 0x1, 0x0, 0x0, 0x40044}, 0x20008000) 4m31.196481581s ago: executing program 35 (id=944): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x54}, 0x1, 0x0, 0x0, 0x40044}, 0x20008000) 13.521048938s ago: executing program 5 (id=1337): r0 = syz_clone(0xa8200780, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) wait4(r0, 0x0, 0x80000000, 0x0) 11.759773638s ago: executing program 5 (id=1338): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) symlink(&(0x7f0000001640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', &(0x7f0000000e40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00') 11.410168812s ago: executing program 5 (id=1339): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x11e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1}, 0x0) 11.052903716s ago: executing program 5 (id=1341): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000800000000000070000000900010073797a30000000007c000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d38001280140001800c000100636f756e7465720004000280200001800e000100636f6e6e6c696d69740000000c00028008000140000000080800034000000110"], 0xc4}}, 0x20050890) 10.848583612s ago: executing program 5 (id=1342): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)='%pS \x00'}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r3, 0x0, 0xffffffffffffffff}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698dfa871c51852e4451b57d037ad3c045942824251d7d17b5191584cdd4fbe40a27424d", "bcfd56f1373669caaa2f19935e6996c7096ffe4f3a4745a8f762b964", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x140, 0x82) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r4, &(0x7f00000057c0)=[{{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0x0, &(0x7f0000002cc0)=[{0x0}, {&(0x7f00000017c0)=""/130, 0x94}], 0x2}, 0xa1}], 0x2, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x3000004, 0x3032, 0xffffffffffffffff, 0x0) 10.582854175s ago: executing program 4 (id=1343): socket$netlink(0x10, 0x3, 0x14) bpf$PROG_LOAD(0x5, 0x0, 0x0) symlink(&(0x7f0000000040)='.\x00', &(0x7f0000000100)='./file0\x00') listxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000004080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x18}}], 0x1, 0x0) sendmmsg$unix(r1, &(0x7f0000001980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x18}}], 0x1, 0x0) 9.419313471s ago: executing program 4 (id=1344): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0xd, 0xfff2}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_MAX_RATE={0x8, 0x7, 0x800}]}}]}, 0x38}}, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000340)='kmem_cache_free\x00', r4}, 0x18) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x0, 0xfc, 0x0, 0x1, 0xffffffff}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40080c0}, 0x0) 7.817567031s ago: executing program 4 (id=1345): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x11e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1}, 0x0) 7.816999271s ago: executing program 5 (id=1346): bpf$MAP_CREATE(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) madvise(&(0x7f0000000000/0x800000)=nil, 0x800002, 0xe) setreuid(0xee00, 0x0) keyctl$join(0x1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, 0x0, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000002100050125bd7000000000000200000000", @ANYRES32=0x0, @ANYBLOB="b7836f1c1b5be1"], 0x28}}, 0x0) r5 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000540)={0x1, {{0xa, 0x0, 0x0, @mcast1, 0x6}}, {{0xa, 0xfffe, 0x3fe00, @initdev={0xfe, 0x88, '\x00', 0xde, 0x0}, 0x3}}}, 0x108) close(r5) 3.430219561s ago: executing program 4 (id=1347): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x20) 2.308800111s ago: executing program 4 (id=1348): socket$inet_udp(0x2, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$unix(0x1, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000080000003249000008"], 0x48) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) fcntl$dupfd(r0, 0x0, r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x106, 0x8}}, 0x20) r2 = socket$unix(0x1, 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r2, 0x4236}], 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xfffb, 0x2, @empty, 0xa098}, {0xa, 0x4e21, 0x8000009, @mcast1}, r3, 0x4040099d}}, 0x48) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) 0s ago: executing program 4 (id=1349): timerfd_create(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d9"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000340)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) open(&(0x7f0000000080)='./bus\x00', 0x147842, 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') kernel console output (not intermixed with test programs): _r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 217.156892][ T29] audit: type=1400 audit(217.090:154): avc: denied { write } for pid=4501 comm="syz.2.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 217.182702][ T641] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 217.256870][ T641] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 217.324609][ T641] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 217.353185][ T29] audit: type=1400 audit(217.290:155): avc: denied { ioctl } for pid=4501 comm="syz.2.91" path="socket:[4133]" dev="sockfs" ino=4133 ioctlcmd=0x6628 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 217.808829][ T641] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 217.816230][ T641] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 217.845732][ T641] bond0 (unregistering): Released all slaves [ 217.880534][ T4522] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 217.882422][ T4522] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 217.999776][ T641] hsr_slave_0: left promiscuous mode [ 218.003606][ T1802] usb 2-1: USB disconnect, device number 2 [ 218.004574][ T641] hsr_slave_1: left promiscuous mode [ 218.050501][ T641] veth1_macvtap: left promiscuous mode [ 218.051060][ T641] veth0_macvtap: left promiscuous mode [ 218.051291][ T641] veth1_vlan: left promiscuous mode [ 218.051418][ T641] veth0_vlan: left promiscuous mode [ 218.205073][ T4533] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 218.223020][ T4533] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 218.490614][ T29] audit: type=1400 audit(218.420:156): avc: denied { read } for pid=4538 comm="syz.1.95" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 218.494242][ T29] audit: type=1400 audit(218.430:157): avc: denied { open } for pid=4538 comm="syz.1.95" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 218.522790][ T29] audit: type=1400 audit(218.460:158): avc: denied { ioctl } for pid=4538 comm="syz.1.95" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 218.529938][ T4539] binder: 4538:4539 ioctl c0306201 200001c0 returned -14 [ 221.490605][ T4561] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 221.493197][ T4561] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 227.348437][ T4587] random: crng reseeded on system resumption [ 227.424857][ T3786] hid-generic 0000:0002:0005.0001: item fetching failed at offset 3/4 [ 227.427091][ T3786] hid-generic 0000:0002:0005.0001: probe with driver hid-generic failed with error -22 [ 230.232718][ T29] audit: type=1400 audit(230.170:159): avc: denied { setopt } for pid=4590 comm="syz.2.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 231.531672][ T29] audit: type=1400 audit(231.470:160): avc: denied { bind } for pid=4599 comm="syz.2.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 251.325889][ T29] audit: type=1400 audit(251.260:161): avc: denied { create } for pid=4651 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 252.242411][ T29] audit: type=1400 audit(252.170:162): avc: denied { ioctl } for pid=4660 comm="syz.1.110" path="socket:[3771]" dev="sockfs" ino=3771 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 253.026921][ T4667] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 253.040045][ T4667] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 254.273711][ T29] audit: type=1400 audit(254.210:163): avc: denied { create } for pid=4677 comm="syz.2.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 254.285342][ T29] audit: type=1400 audit(254.220:164): avc: denied { setopt } for pid=4677 comm="syz.2.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 257.495266][ T9] Process accounting resumed [ 257.522889][ T4685] Process accounting resumed [ 257.920918][ T4688] netlink: 980 bytes leftover after parsing attributes in process `syz.2.118'. [ 257.925740][ T4688] gre0: entered promiscuous mode [ 258.043607][ T4690] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 258.046649][ T4690] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 267.910764][ T29] audit: type=1400 audit(267.850:165): avc: denied { bind } for pid=4701 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 267.927531][ T29] audit: type=1400 audit(267.860:166): avc: denied { write } for pid=4701 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 267.975981][ T4702] netlink: 4 bytes leftover after parsing attributes in process `syz.1.122'. [ 268.989718][ T29] audit: type=1400 audit(268.920:167): avc: denied { bind } for pid=4714 comm="syz.1.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 271.851046][ T29] audit: type=1400 audit(271.790:168): avc: denied { create } for pid=4716 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 271.872018][ T29] audit: type=1400 audit(271.810:169): avc: denied { write } for pid=4716 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 273.219486][ T4719] netlink: 4 bytes leftover after parsing attributes in process `syz.1.128'. [ 273.436807][ T4726] input: syz0 as /devices/virtual/input/input3 [ 275.090198][ T4760] netlink: 20 bytes leftover after parsing attributes in process `syz.1.132'. [ 276.379586][ T23] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 276.559804][ T23] usb 2-1: Using ep0 maxpacket: 16 [ 276.675998][ T23] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xF3, changing to 0x83 [ 276.676508][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 276.755514][ T23] usb 2-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 276.755890][ T23] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 276.755983][ T23] usb 2-1: Product: syz [ 276.756020][ T23] usb 2-1: Manufacturer: syz [ 276.756053][ T23] usb 2-1: SerialNumber: syz [ 276.828568][ T23] usb 2-1: config 0 descriptor?? [ 283.642641][ T29] audit: type=1400 audit(283.580:170): avc: denied { write } for pid=4778 comm="syz.2.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 287.114489][ T23] usb 2-1: USB disconnect, device number 3 [ 287.314761][ T29] audit: type=1400 audit(287.250:171): avc: denied { create } for pid=4797 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 287.324295][ T29] audit: type=1400 audit(287.260:172): avc: denied { write } for pid=4797 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 287.330964][ T29] audit: type=1400 audit(287.270:173): avc: denied { nlmsg_write } for pid=4797 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 287.341600][ T4798] netlink: 104 bytes leftover after parsing attributes in process `syz.1.138'. [ 287.669541][ T23] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 287.833136][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 287.833496][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 287.833926][ T23] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 287.834071][ T23] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 287.834118][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 287.849339][ T23] usb 2-1: config 0 descriptor?? [ 288.314671][ T23] usbhid 2-1:0.0: can't add hid device: -71 [ 288.315228][ T23] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 288.331904][ T23] usb 2-1: USB disconnect, device number 4 [ 288.839927][ T23] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 289.005263][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 252, changing to 11 [ 289.005660][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 289.006044][ T23] usb 2-1: New USB device found, idVendor=06cb, idProduct=73f4, bcdDevice= 0.00 [ 289.006115][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 289.015920][ T23] usb 2-1: config 0 descriptor?? [ 289.474062][ T23] hid (null): bogus close delimiter [ 289.481616][ T23] itetech 0003:06CB:73F4.0002: bogus close delimiter [ 289.481945][ T23] itetech 0003:06CB:73F4.0002: item 0 0 2 10 parsing failed [ 289.485209][ T23] itetech 0003:06CB:73F4.0002: probe with driver itetech failed with error -22 [ 289.681045][ T23] usb 2-1: USB disconnect, device number 5 [ 290.557539][ T4846] wireguard0: entered promiscuous mode [ 290.558114][ T4846] wireguard0: entered allmulticast mode [ 292.989997][ T29] audit: type=1400 audit(292.920:174): avc: denied { create } for pid=4855 comm="syz.2.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 305.194157][ T29] audit: type=1400 audit(305.130:175): avc: denied { module_load } for pid=4871 comm="syz.1.151" path=2F2173656C696E7578776B311FD06DC37F39C99E2A0D5493FDE291EFAA16236A978FBCDE590FCCC56D56CB15766D2870C92D515A23D27B84BF06 dev="mqueue" ino=4841 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 305.196844][ T4872] kernel read not supported for file /!selinuxwk1ÐmÃ9Éž*T“ýâ‘ïª#j—¼ÞYÌÅmVËvm(pÉ-QZ#Ò{„¿ (pid: 4872 comm: syz.1.151) [ 305.390508][ T4880] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 305.463551][ T29] audit: type=1400 audit(305.400:176): avc: denied { map } for pid=4886 comm="syz.1.157" path="/dev/usbmon0" dev="devtmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 305.555161][ T29] audit: type=1400 audit(305.490:177): avc: denied { connect } for pid=4893 comm="syz.2.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 305.710090][ T2883] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 305.782316][ T29] audit: type=1400 audit(305.720:178): avc: denied { ioctl } for pid=4897 comm="syz.2.160" path="socket:[4880]" dev="sockfs" ino=4880 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 305.869828][ T2883] usb 2-1: Using ep0 maxpacket: 8 [ 305.880900][ T2883] usb 2-1: config 179 has an invalid interface number: 65 but max is 0 [ 305.881232][ T2883] usb 2-1: config 179 has no interface number 0 [ 305.881312][ T2883] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 305.881443][ T2883] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 305.881714][ T2883] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 305.881770][ T2883] usb 2-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 305.881859][ T2883] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 305.881906][ T2883] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 305.903086][ T4888] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 306.125515][ T9] usb 2-1: USB disconnect, device number 6 [ 306.125871][ C1] xpad 2-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 306.126106][ C1] xpad 2-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 310.424538][ T29] audit: type=1400 audit(310.360:179): avc: denied { create } for pid=4916 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 310.434326][ T29] audit: type=1400 audit(310.370:180): avc: denied { write } for pid=4916 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 310.446451][ T4917] netlink: 24 bytes leftover after parsing attributes in process `syz.1.162'. [ 310.571300][ T4917] Zero length message leads to an empty skb [ 310.573744][ T4917] netlink: 4 bytes leftover after parsing attributes in process `syz.1.162'. [ 311.033271][ T4935] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 323.398007][ T4951] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 323.405414][ T4951] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 326.152303][ T4961] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 326.227962][ T4961] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 326.303235][ T4961] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 326.365494][ T4961] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 326.458116][ T38] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.477458][ T38] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.492798][ T1700] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.506658][ T38] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.606143][ C1] vcan0: j1939_tp_rxtimer: 0x8588be00: rx timeout, send abort [ 329.608131][ C1] vcan0: j1939_tp_rxtimer: 0x8588b500: rx timeout, send abort [ 329.609624][ C1] vcan0: j1939_xtp_rx_abort_one: 0x8588be00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 329.611194][ C1] vcan0: j1939_xtp_rx_abort_one: 0x8588b500: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 329.617874][ T29] audit: type=1400 audit(329.550:181): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 329.622241][ T29] audit: type=1400 audit(329.550:182): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 329.627145][ T29] audit: type=1400 audit(329.550:183): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 329.631097][ T29] audit: type=1400 audit(329.550:184): avc: denied { add_name } for pid=2904 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 329.635683][ T29] audit: type=1400 audit(329.550:185): avc: denied { create } for pid=2904 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 329.639773][ T29] audit: type=1400 audit(329.550:186): avc: denied { append open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 329.643695][ T29] audit: type=1400 audit(329.570:187): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 329.737386][ T4999] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 329.738606][ T4999] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 329.952680][ T5005] netlink: 12 bytes leftover after parsing attributes in process `syz.2.178'. [ 330.060590][ T5005] netlink: 4 bytes leftover after parsing attributes in process `syz.2.178'. [ 330.151299][ T5008] netlink: 16 bytes leftover after parsing attributes in process `syz.2.179'. [ 331.237157][ T5013] netlink: 20 bytes leftover after parsing attributes in process `syz.1.171'. [ 331.695946][ T29] audit: type=1400 audit(331.630:188): avc: denied { shutdown } for pid=5010 comm="syz.2.180" lport=9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 339.917112][ T29] audit: type=1400 audit(339.850:189): avc: denied { connect } for pid=5015 comm="syz.2.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 340.433588][ T29] audit: type=1400 audit(340.370:190): avc: denied { listen } for pid=5015 comm="syz.2.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 342.292447][ T29] audit: type=1400 audit(342.230:191): avc: denied { wake_alarm } for pid=5024 comm="syz.1.185" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 342.311024][ T29] audit: type=1400 audit(342.250:192): avc: denied { append } for pid=5024 comm="syz.1.185" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 351.538626][ T5039] capability: warning: `syz.2.190' uses deprecated v2 capabilities in a way that may be insecure [ 351.717399][ T29] audit: type=1400 audit(351.650:193): avc: denied { create } for pid=5042 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 363.598360][ T5050] netlink: 4 bytes leftover after parsing attributes in process `syz.2.194'. [ 363.791222][ T29] audit: type=1400 audit(363.730:194): avc: denied { create } for pid=5055 comm="syz.2.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 364.244372][ T29] audit: type=1400 audit(364.180:195): avc: denied { bind } for pid=5060 comm="syz.2.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 364.268459][ T29] audit: type=1400 audit(364.200:196): avc: denied { setopt } for pid=5060 comm="syz.2.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 379.701671][ T5074] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 379.705030][ T5074] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 400.702592][ T5085] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 400.714027][ T5085] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 403.033232][ T5085] hsr_slave_0: entered promiscuous mode [ 403.035208][ T5085] hsr_slave_1: entered promiscuous mode [ 403.381284][ T5348] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 403.383075][ T5348] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 403.586674][ T29] audit: type=1400 audit(403.520:197): avc: denied { mount } for pid=5368 comm="syz.2.211" name="/" dev="configfs" ino=1071 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 403.601926][ T29] audit: type=1400 audit(403.540:198): avc: denied { search } for pid=5368 comm="syz.2.211" name="/" dev="configfs" ino=1071 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 403.604220][ T29] audit: type=1400 audit(403.540:199): avc: denied { search } for pid=5368 comm="syz.2.211" name="/" dev="configfs" ino=1071 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 403.604724][ T29] audit: type=1400 audit(403.540:200): avc: denied { search } for pid=5368 comm="syz.2.211" name="/" dev="configfs" ino=1071 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 403.853075][ T5085] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 403.866081][ T5085] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 403.892113][ T5085] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 403.906168][ T5085] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 405.856230][ T5085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 408.329588][ T5449] netlink: 4 bytes leftover after parsing attributes in process `syz.2.219'. [ 408.443769][ T5449] netlink: 8 bytes leftover after parsing attributes in process `syz.2.219'. [ 411.694105][ T5468] RDS: rds_bind could not find a transport for fec0:ffff::1, load rds_tcp or rds_rdma? [ 411.695066][ T29] audit: type=1400 audit(411.630:201): avc: denied { bind } for pid=5467 comm="syz.2.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 413.514284][ T29] audit: type=1400 audit(413.450:202): avc: denied { block_suspend } for pid=5477 comm="syz.2.224" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 413.554956][ T5085] veth0_vlan: entered promiscuous mode [ 413.598260][ T5085] veth1_vlan: entered promiscuous mode [ 413.728324][ T5085] veth0_macvtap: entered promiscuous mode [ 413.761196][ T5085] veth1_macvtap: entered promiscuous mode [ 413.995534][ T5445] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 413.995968][ T5445] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 413.996337][ T5445] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 413.996422][ T5445] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 442.807480][ T29] audit: type=1400 audit(442.740:203): avc: denied { cmd } for pid=5509 comm="syz.2.231" path="socket:[5744]" dev="sockfs" ino=5744 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 443.113456][ T5512] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 443.120467][ T5512] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 443.150670][ T5512] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 443.152076][ T5512] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 443.405884][ T29] audit: type=1400 audit(443.330:204): avc: denied { getopt } for pid=5517 comm="syz.2.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 454.653966][ T29] audit: type=1400 audit(454.590:205): avc: denied { mounton } for pid=5551 comm="syz.2.244" path="/107/file0" dev="tmpfs" ino=563 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 455.111195][ T641] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 455.117612][ T641] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 455.122774][ T641] bond0 (unregistering): Released all slaves [ 455.210452][ T641] hsr_slave_0: left promiscuous mode [ 455.213569][ T641] hsr_slave_1: left promiscuous mode [ 457.790158][ T5597] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 457.791063][ T5597] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 477.962169][ T29] audit: type=1400 audit(477.900:206): avc: denied { setopt } for pid=5652 comm="syz.3.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 480.959336][ T29] audit: type=1400 audit(480.880:207): avc: denied { name_bind } for pid=5671 comm="syz.3.258" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 485.009418][ T29] audit: type=1400 audit(484.930:208): avc: denied { create } for pid=5684 comm="syz.3.261" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 485.020131][ T29] audit: type=1400 audit(484.960:209): avc: denied { mounton } for pid=5684 comm="syz.3.261" path="/20/file0" dev="tmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 493.455860][ T5706] process 'syz.2.263' launched '/dev/fd/4' with NULL argv: empty string added [ 493.458481][ T29] audit: type=1400 audit(493.390:210): avc: denied { execute_no_trans } for pid=5705 comm="syz.2.263" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1044 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 495.454423][ T29] audit: type=1400 audit(495.390:211): avc: denied { unlink } for pid=5085 comm="syz-executor" name="file0" dev="tmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 495.634815][ T5720] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 495.639489][ T5720] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 495.645158][ T5720] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 495.648730][ T5720] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 496.379397][ T5736] netlink: 56 bytes leftover after parsing attributes in process `syz.2.272'. [ 513.719881][ T29] audit: type=1400 audit(513.640:212): avc: denied { sqpoll } for pid=5751 comm="syz.2.277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 513.881382][ T29] audit: type=1400 audit(513.820:213): avc: denied { unmount } for pid=5757 comm="syz.2.279" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 517.558598][ T5767] erspan0: entered promiscuous mode [ 517.569929][ T5767] erspan0: entered allmulticast mode [ 519.123903][ T29] audit: type=1400 audit(519.060:214): avc: denied { watch watch_reads } for pid=5772 comm="syz.3.285" path="/32" dev="tmpfs" ino=175 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 520.370268][ T29] audit: type=1400 audit(520.300:215): avc: denied { bind } for pid=5775 comm="syz.3.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 541.244451][ T5812] Driver unsupported XDP return value 0 on prog (id 35) dev N/A, expect packet loss! [ 544.423436][ T29] audit: type=1400 audit(544.360:216): avc: denied { mount } for pid=5818 comm="syz.3.301" name="/" dev="ramfs" ino=6025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 546.291788][ T29] audit: type=1400 audit(546.230:217): avc: denied { create } for pid=5830 comm="syz.3.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 546.330469][ T29] audit: type=1400 audit(546.270:218): avc: denied { ioctl } for pid=5830 comm="syz.3.306" path="socket:[6853]" dev="sockfs" ino=6853 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 547.319717][ T29] audit: type=1400 audit(547.250:219): avc: denied { mount } for pid=5832 comm="syz.3.307" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 547.447623][ T29] audit: type=1400 audit(547.380:220): avc: denied { unmount } for pid=5085 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 553.648478][ T5878] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 553.665135][ T5878] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 555.346055][ T29] audit: type=1326 audit(555.280:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.3.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 555.367509][ T29] audit: type=1326 audit(555.300:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.3.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 555.381685][ T29] audit: type=1326 audit(555.320:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.3.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 555.384510][ T29] audit: type=1326 audit(555.320:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.3.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 555.392580][ T29] audit: type=1326 audit(555.330:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.3.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 555.405831][ T29] audit: type=1326 audit(555.340:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.3.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 555.406300][ T29] audit: type=1326 audit(555.340:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.3.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 555.406378][ T29] audit: type=1326 audit(555.340:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.3.321" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x13502c code=0x7ffc0000 [ 555.406465][ T29] audit: type=1326 audit(555.340:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.3.321" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x134e08 code=0x7ffc0000 [ 555.406517][ T29] audit: type=1326 audit(555.340:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5892 comm="syz.3.321" exe="/syz-executor" sig=0 arch=40000028 syscall=291 compat=0 ip=0x134d28 code=0x7ffc0000 [ 555.425604][ T5893] smc: net device bond0 applied user defined pnetid SYZ0 [ 580.577831][ T5946] pimreg: entered allmulticast mode [ 581.720226][ T5958] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 581.722156][ T5958] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 584.449868][ T5968] serio: Serial port ptm0 [ 584.610701][ T5972] netlink: 'syz.2.349': attribute type 10 has an invalid length. [ 584.611216][ T5972] netlink: 55 bytes leftover after parsing attributes in process `syz.2.349'. [ 586.680002][ T5987] mmap: syz.2.352 (5987) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 599.706627][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 599.707241][ T29] audit: type=1326 audit(599.640:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5991 comm="syz.3.354" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 599.711965][ T29] audit: type=1326 audit(599.650:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5991 comm="syz.3.354" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 599.712915][ T29] audit: type=1326 audit(599.650:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5991 comm="syz.3.354" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 599.713687][ T29] audit: type=1326 audit(599.650:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5991 comm="syz.3.354" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 599.714792][ T29] audit: type=1326 audit(599.650:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5991 comm="syz.3.354" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 599.716243][ T29] audit: type=1326 audit(599.650:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5991 comm="syz.3.354" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 599.717048][ T29] audit: type=1326 audit(599.650:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5991 comm="syz.3.354" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 599.718005][ T29] audit: type=1326 audit(599.650:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5991 comm="syz.3.354" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 599.718742][ T29] audit: type=1326 audit(599.650:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5991 comm="syz.3.354" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 599.731509][ T29] audit: type=1326 audit(599.670:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5991 comm="syz.3.354" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 599.922903][ T5994] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 599.925552][ T5994] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 614.480931][ T6019] ip6_tunnel: non-ECT from 2001:0000:0000:0000:0000:0000:0000:0001 with DS=0x91 [ 620.711917][ T6048] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 620.712857][ T6048] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 620.801565][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 620.802788][ T29] audit: type=1400 audit(620.740:280): avc: denied { read } for pid=6051 comm="syz.3.375" path="socket:[7368]" dev="sockfs" ino=7368 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 628.777354][ T29] audit: type=1400 audit(628.710:281): avc: denied { write } for pid=6060 comm="syz.2.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 635.676213][ T6075] netlink: 52 bytes leftover after parsing attributes in process `syz.3.380'. [ 635.712255][ T6074] netlink: 24 bytes leftover after parsing attributes in process `syz.2.383'. [ 647.658294][ T29] audit: type=1400 audit(647.590:282): avc: denied { audit_write } for pid=6087 comm="syz.2.388" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 647.962979][ T6093] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 647.964833][ T6093] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 650.675765][ T6115] netlink: 75 bytes leftover after parsing attributes in process `syz.2.397'. [ 667.791391][ T29] audit: type=1400 audit(667.730:283): avc: denied { associate } for pid=6163 comm="syz.2.407" name="core" scontext=root:object_r:etc_runtime_t tcontext=system_u:object_r:root_t tclass=filesystem permissive=1 [ 674.437480][ T29] audit: type=1400 audit(674.360:284): avc: denied { setopt } for pid=6187 comm="syz.2.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 680.037744][ T29] audit: type=1400 audit(679.970:285): avc: denied { mounton } for pid=6209 comm="syz.2.425" path="/file0" dev="ramfs" ino=8336 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 682.219368][ T6227] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 682.221431][ T6227] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 683.135614][ T6240] netlink: 72 bytes leftover after parsing attributes in process `syz.2.436'. [ 683.588384][ T29] audit: type=1400 audit(683.520:286): avc: denied { create } for pid=6238 comm="syz.3.437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 699.211506][ T29] audit: type=1326 audit(699.150:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6276 comm="syz.2.449" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 699.214784][ T29] audit: type=1326 audit(699.150:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6276 comm="syz.2.449" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 699.221050][ T29] audit: type=1326 audit(699.160:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6276 comm="syz.2.449" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 699.225992][ T29] audit: type=1326 audit(699.160:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6276 comm="syz.2.449" exe="/syz-executor" sig=0 arch=40000028 syscall=132 compat=0 ip=0x132970 code=0x7ffc0000 [ 699.229398][ T29] audit: type=1326 audit(699.160:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6276 comm="syz.2.449" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 699.232971][ T29] audit: type=1326 audit(699.170:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6276 comm="syz.2.449" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 707.649744][ T29] audit: type=1400 audit(707.580:293): avc: denied { write } for pid=6290 comm="syz.3.455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 708.181202][ T6297] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 708.186956][ T6297] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 708.461720][ T6297] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 708.462435][ T6297] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 708.980522][ T6303] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 708.982557][ T6303] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 709.403708][ T29] audit: type=1400 audit(709.340:294): avc: denied { name_bind } for pid=6310 comm="syz.3.461" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 711.830872][ T6331] veth3: entered promiscuous mode [ 712.133974][ T29] audit: type=1400 audit(712.070:295): avc: denied { write } for pid=6359 comm="syz.3.471" name="mcfilter" dev="proc" ino=4026532772 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 725.738418][ T6391] netlink: 36 bytes leftover after parsing attributes in process `syz.2.485'. [ 731.752174][ T6402] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 731.754639][ T6402] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 747.240285][ C1] vcan0: j1939_tp_rxtimer: 0x89b53800: rx timeout, send abort [ 747.740783][ C1] vcan0: j1939_tp_rxtimer: 0x89b53800: abort rx timeout. Force session deactivation [ 789.952204][ T6504] netlink: 'syz.3.524': attribute type 15 has an invalid length. [ 797.376775][ T29] audit: type=1400 audit(797.310:296): avc: denied { ioctl } for pid=6512 comm="syz.2.528" path="socket:[7994]" dev="sockfs" ino=7994 ioctlcmd=0x8b37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 799.224944][ T29] audit: type=1400 audit(799.160:297): avc: denied { create } for pid=6538 comm="syz.2.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 799.234026][ T29] audit: type=1400 audit(799.170:298): avc: denied { ioctl } for pid=6538 comm="syz.2.539" path="socket:[8044]" dev="sockfs" ino=8044 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 801.147439][ T6545] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 801.148503][ T6545] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 801.282404][ T6549] netlink: 16 bytes leftover after parsing attributes in process `syz.3.543'. [ 819.647745][ T29] audit: type=1400 audit(819.580:299): avc: denied { set_context_mgr } for pid=6576 comm="syz.3.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 819.664570][ T6577] binder: 6576:6577 ioctl c0306201 20000080 returned -14 [ 819.744310][ T29] audit: type=1400 audit(819.680:300): avc: denied { create } for pid=6578 comm="syz.2.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 819.755449][ T29] audit: type=1400 audit(819.690:301): avc: denied { setopt } for pid=6578 comm="syz.2.554" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 819.765739][ T6580] syz_tun: entered allmulticast mode [ 819.780350][ T6581] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 819.780890][ T6581] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 819.799277][ T6580] dvmrp6: entered allmulticast mode [ 819.806428][ T6578] syz_tun: left allmulticast mode [ 819.934617][ T6591] ./file0: Can't lookup blockdev [ 820.057373][ T29] audit: type=1400 audit(819.990:302): avc: denied { create } for pid=6596 comm="syz.2.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 820.066593][ T29] audit: type=1400 audit(820.000:303): avc: denied { bind } for pid=6596 comm="syz.2.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 820.187652][ T6603] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 820.188499][ T6603] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 820.228563][ T29] audit: type=1400 audit(820.160:304): avc: denied { setopt } for pid=6596 comm="syz.2.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 820.336684][ T29] audit: type=1400 audit(820.270:305): avc: denied { bind } for pid=6610 comm="syz.2.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 827.346650][ T29] audit: type=1400 audit(827.280:306): avc: denied { connect } for pid=6620 comm="syz.2.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 827.354145][ T29] audit: type=1400 audit(827.290:307): avc: denied { write } for pid=6620 comm="syz.2.568" path="socket:[8190]" dev="sockfs" ino=8190 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 827.362443][ T29] audit: type=1400 audit(827.300:308): avc: denied { read } for pid=6620 comm="syz.2.568" path="socket:[8190]" dev="sockfs" ino=8190 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 828.323259][ T6623] netlink: 96 bytes leftover after parsing attributes in process `syz.3.569'. [ 829.900799][ T29] audit: type=1400 audit(829.800:309): avc: denied { ioctl } for pid=6630 comm="syz.3.573" path="socket:[8872]" dev="sockfs" ino=8872 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 831.065932][ T6631] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6631 comm=syz.3.573 [ 831.067179][ T6631] netlink: 76 bytes leftover after parsing attributes in process `syz.3.573'. [ 835.787767][ T6650] binder: 6644:6650 ioctl c0306201 20000640 returned -22 [ 846.246108][ T29] audit: type=1400 audit(846.180:310): avc: denied { create } for pid=6672 comm="syz.2.588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 846.971086][ T6676] netlink: 76 bytes leftover after parsing attributes in process `syz.2.589'. [ 846.974747][ T29] audit: type=1400 audit(846.910:311): avc: denied { nlmsg_read } for pid=6675 comm="syz.2.589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 847.679655][ T29] audit: type=1326 audit(847.610:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6681 comm="syz.2.592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 847.681737][ T29] audit: type=1326 audit(847.620:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6681 comm="syz.2.592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 847.685354][ T29] audit: type=1326 audit(847.620:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6681 comm="syz.2.592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 847.685680][ T29] audit: type=1326 audit(847.620:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6681 comm="syz.2.592" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 847.690550][ T29] audit: type=1326 audit(847.620:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6681 comm="syz.2.592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 847.692774][ T29] audit: type=1326 audit(847.620:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6681 comm="syz.2.592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 847.699404][ T29] audit: type=1326 audit(847.620:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6681 comm="syz.2.592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 847.702011][ T29] audit: type=1326 audit(847.630:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6681 comm="syz.2.592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 851.834142][ T6732] syz.2.601 uses obsolete (PF_INET,SOCK_PACKET) [ 853.246032][ T6744] netlink: 'syz.2.603': attribute type 15 has an invalid length. [ 856.733434][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 856.733873][ T29] audit: type=1400 audit(856.670:331): avc: denied { read } for pid=6776 comm="syz.2.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 861.513431][ T6815] capability: warning: `syz.2.628' uses 32-bit capabilities (legacy support in use) [ 862.582485][ T6825] netlink: 28 bytes leftover after parsing attributes in process `syz.2.632'. [ 862.583457][ T6825] netlink: 28 bytes leftover after parsing attributes in process `syz.2.632'. [ 863.930629][ T6842] bond1: option all_slaves_active: invalid value (11) [ 863.967291][ T6842] bond1 (unregistering): Released all slaves [ 864.677520][ T6917] netlink: 28 bytes leftover after parsing attributes in process `syz.3.642'. [ 866.949524][ T29] audit: type=1326 audit(866.880:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6931 comm="syz.3.647" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 866.952769][ T29] audit: type=1326 audit(866.890:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6931 comm="syz.3.647" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 866.990075][ T29] audit: type=1326 audit(866.920:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6931 comm="syz.3.647" exe="/syz-executor" sig=0 arch=40000028 syscall=143 compat=0 ip=0x132970 code=0x7ffc0000 [ 866.990551][ T29] audit: type=1326 audit(866.920:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6931 comm="syz.3.647" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 866.990701][ T29] audit: type=1326 audit(866.920:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6931 comm="syz.3.647" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 867.005877][ T29] audit: type=1326 audit(866.940:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6931 comm="syz.3.647" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 867.006174][ T29] audit: type=1326 audit(866.940:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6931 comm="syz.3.647" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 867.012635][ T29] audit: type=1326 audit(866.950:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6931 comm="syz.3.647" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 867.014864][ T29] audit: type=1326 audit(866.950:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6931 comm="syz.3.647" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 867.022010][ T29] audit: type=1326 audit(866.960:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6931 comm="syz.3.647" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 867.574445][ T6946] syzkaller1: entered promiscuous mode [ 867.574866][ T6946] syzkaller1: entered allmulticast mode [ 871.042619][ T7009] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 871.977177][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 871.977672][ T29] audit: type=1326 audit(871.910:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7012 comm="syz.3.668" exe="/syz-executor" sig=0 arch=40000028 syscall=246 compat=0 ip=0x132970 code=0x7ffc0000 [ 871.977914][ T29] audit: type=1326 audit(871.910:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7012 comm="syz.3.668" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 871.984473][ T29] audit: type=1326 audit(871.920:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7012 comm="syz.3.668" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 872.341788][ T29] audit: type=1326 audit(872.280:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7026 comm="syz.3.672" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 872.342255][ T29] audit: type=1326 audit(872.280:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7026 comm="syz.3.672" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 872.345625][ T29] audit: type=1326 audit(872.280:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7026 comm="syz.3.672" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x132970 code=0x7ffc0000 [ 872.346058][ T29] audit: type=1326 audit(872.280:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7026 comm="syz.3.672" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 872.352062][ T29] audit: type=1326 audit(872.280:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7026 comm="syz.3.672" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 872.352223][ T29] audit: type=1326 audit(872.280:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7026 comm="syz.3.672" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 872.352283][ T29] audit: type=1326 audit(872.290:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7026 comm="syz.3.672" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x132970 code=0x7ffc0000 [ 873.021389][ T7037] netlink: 132 bytes leftover after parsing attributes in process `syz.2.675'. [ 876.870311][ T7070] netlink: 28 bytes leftover after parsing attributes in process `syz.2.688'. [ 878.525776][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 878.527217][ T29] audit: type=1326 audit(878.460:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7094 comm="syz.2.697" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 878.528120][ T29] audit: type=1326 audit(878.460:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7094 comm="syz.2.697" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 878.536475][ T29] audit: type=1326 audit(878.470:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7094 comm="syz.2.697" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 878.536785][ T29] audit: type=1326 audit(878.470:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7094 comm="syz.2.697" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 878.579407][ T29] audit: type=1326 audit(878.510:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7094 comm="syz.2.697" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 878.590488][ T29] audit: type=1326 audit(878.530:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7094 comm="syz.2.697" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 878.590811][ T29] audit: type=1326 audit(878.530:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7094 comm="syz.2.697" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 878.599641][ T29] audit: type=1326 audit(878.530:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7094 comm="syz.2.697" exe="/syz-executor" sig=0 arch=40000028 syscall=338 compat=0 ip=0x132970 code=0x7ffc0000 [ 878.600078][ T29] audit: type=1326 audit(878.540:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7094 comm="syz.2.697" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 882.622432][ T29] audit: type=1326 audit(882.550:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7110 comm="syz.3.702" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 883.694587][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 883.694850][ T29] audit: type=1326 audit(883.630:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.3.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 883.695783][ T29] audit: type=1326 audit(883.630:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.3.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 883.703011][ T29] audit: type=1326 audit(883.640:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.3.707" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 883.741627][ T29] audit: type=1326 audit(883.680:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.3.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 883.751223][ T29] audit: type=1326 audit(883.680:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.3.707" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 883.813841][ T29] audit: type=1326 audit(883.700:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.3.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 883.813940][ T29] audit: type=1326 audit(883.700:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.3.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 883.813987][ T29] audit: type=1326 audit(883.720:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.3.707" exe="/syz-executor" sig=0 arch=40000028 syscall=178 compat=0 ip=0x132970 code=0x7ffc0000 [ 883.814027][ T29] audit: type=1326 audit(883.720:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.3.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 883.814069][ T29] audit: type=1326 audit(883.720:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7147 comm="syz.3.707" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 884.726336][ T7166] netlink: 96 bytes leftover after parsing attributes in process `syz.3.712'. [ 886.020593][ T7175] netlink: 4 bytes leftover after parsing attributes in process `syz.2.714'. [ 886.786240][ T7182] netlink: 96 bytes leftover after parsing attributes in process `syz.2.715'. [ 888.352473][ T7201] netlink: 8 bytes leftover after parsing attributes in process `syz.2.718'. [ 888.911586][ T7204] ip6gretap0: entered promiscuous mode [ 888.918277][ T7204] ip6gretap0: left promiscuous mode [ 896.470135][ T7275] netlink: 4 bytes leftover after parsing attributes in process `syz.3.739'. [ 898.456094][ T7302] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 898.848050][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 898.848450][ T29] audit: type=1326 audit(898.780:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7303 comm="syz.3.749" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 898.852615][ T29] audit: type=1326 audit(898.790:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7303 comm="syz.3.749" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 898.865165][ T29] audit: type=1326 audit(898.790:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7303 comm="syz.3.749" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 898.865617][ T29] audit: type=1326 audit(898.800:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7303 comm="syz.3.749" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 898.865796][ T29] audit: type=1326 audit(898.800:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7303 comm="syz.3.749" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 898.865971][ T29] audit: type=1326 audit(898.800:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7303 comm="syz.3.749" exe="/syz-executor" sig=0 arch=40000028 syscall=451 compat=0 ip=0x132970 code=0x7ffc0000 [ 898.866133][ T29] audit: type=1326 audit(898.800:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7303 comm="syz.3.749" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 898.866294][ T29] audit: type=1326 audit(898.800:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7303 comm="syz.3.749" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 900.339774][ T29] audit: type=1326 audit(900.260:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7309 comm="syz.3.751" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 900.341780][ T29] audit: type=1326 audit(900.280:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7309 comm="syz.3.751" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 906.965815][ T7370] pim6reg: entered allmulticast mode [ 906.987098][ T7371] netlink: 24 bytes leftover after parsing attributes in process `syz.2.770'. [ 907.051833][ T7370] pim6reg: left allmulticast mode [ 907.189739][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 907.190383][ T29] audit: type=1400 audit(907.090:588): avc: denied { lock } for pid=7369 comm="syz.2.770" path="socket:[10061]" dev="sockfs" ino=10061 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 908.539531][ T7406] netlink: 'syz.3.776': attribute type 17 has an invalid length. [ 908.539963][ T7406] netlink: 148 bytes leftover after parsing attributes in process `syz.3.776'. [ 912.954810][ T7442] netlink: 4 bytes leftover after parsing attributes in process `syz.2.789'. [ 914.093214][ T29] audit: type=1400 audit(914.030:589): avc: denied { write } for pid=7456 comm="syz.2.792" name="file0" dev="tmpfs" ino=1967 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 914.096645][ T29] audit: type=1400 audit(914.030:590): avc: denied { open } for pid=7456 comm="syz.2.792" path="/384/file0" dev="tmpfs" ino=1967 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 918.160837][ T7511] netlink: 'syz.3.809': attribute type 6 has an invalid length. [ 918.892911][ T7521] SELinux: Context Ü is not valid (left unmapped). [ 919.949423][ T29] audit: type=1400 audit(919.880:591): avc: denied { load_policy } for pid=7532 comm="syz.3.816" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 919.985237][ T7533] SELinux: failed to load policy [ 920.386834][ T7536] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 920.772420][ T29] audit: type=1326 audit(920.710:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7545 comm="syz.2.819" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 920.774708][ T29] audit: type=1326 audit(920.710:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7545 comm="syz.2.819" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 920.779816][ T29] audit: type=1326 audit(920.710:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7546 comm="syz.3.820" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 920.782811][ T29] audit: type=1326 audit(920.720:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7546 comm="syz.3.820" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 920.785630][ T29] audit: type=1326 audit(920.720:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7545 comm="syz.2.819" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132970 code=0x7ffc0000 [ 920.787193][ T29] audit: type=1326 audit(920.720:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7545 comm="syz.2.819" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1329a8 code=0x7ffc0000 [ 920.793410][ T29] audit: type=1326 audit(920.730:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7546 comm="syz.3.820" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 920.801196][ T29] audit: type=1326 audit(920.730:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7546 comm="syz.3.820" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 920.808111][ T29] audit: type=1326 audit(920.740:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7546 comm="syz.3.820" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 922.842421][ T7565] netlink: 12 bytes leftover after parsing attributes in process `syz.2.825'. [ 924.680000][ T7553] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 924.681121][ T7553] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 926.945449][ T7606] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 927.063421][ T7606] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 927.156538][ T7606] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 927.250845][ T7606] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 927.406315][ T7331] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 927.425161][ T7331] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 927.467848][ T6718] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 927.472670][ T6704] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 935.547105][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 935.547437][ T29] audit: type=1326 audit(935.480:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.2.832" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 935.556177][ T29] audit: type=1326 audit(935.490:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.2.832" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 935.556559][ T29] audit: type=1326 audit(935.490:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.2.832" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 935.566986][ T29] audit: type=1326 audit(935.500:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.2.832" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 935.567420][ T29] audit: type=1326 audit(935.500:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.2.832" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 935.580195][ T29] audit: type=1326 audit(935.500:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.2.832" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 935.580609][ T29] audit: type=1326 audit(935.520:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.2.832" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 935.583963][ T29] audit: type=1326 audit(935.510:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.2.832" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 935.584345][ T29] audit: type=1326 audit(935.520:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.2.832" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 935.592407][ T29] audit: type=1326 audit(935.530:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.2.832" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 942.036236][ T7653] netlink: 172 bytes leftover after parsing attributes in process `syz.2.835'. [ 944.094708][ T29] kauditd_printk_skb: 102 callbacks suppressed [ 944.095028][ T29] audit: type=1326 audit(944.030:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 944.095314][ T29] audit: type=1326 audit(944.030:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 944.103397][ T29] audit: type=1326 audit(944.040:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 944.109293][ T29] audit: type=1326 audit(944.040:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 944.130308][ T29] audit: type=1326 audit(944.060:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7672 comm="syz.3.842" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 946.222321][ T29] audit: type=1326 audit(946.140:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7694 comm="syz.2.848" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 946.222995][ T29] audit: type=1326 audit(946.160:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7694 comm="syz.2.848" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 946.234643][ T29] audit: type=1326 audit(946.160:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7694 comm="syz.2.848" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 946.247616][ T29] audit: type=1326 audit(946.180:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7694 comm="syz.2.848" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 946.250925][ T29] audit: type=1326 audit(946.190:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7694 comm="syz.2.848" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 949.252801][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 949.253154][ T29] audit: type=1326 audit(949.190:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7719 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 949.258067][ T29] audit: type=1326 audit(949.190:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7719 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 949.260965][ T29] audit: type=1326 audit(949.190:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7719 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 949.263406][ T29] audit: type=1326 audit(949.190:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7719 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 949.265338][ T29] audit: type=1326 audit(949.200:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7719 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 949.267310][ T29] audit: type=1326 audit(949.200:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7719 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 949.269492][ T29] audit: type=1326 audit(949.200:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7719 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 949.271259][ T29] audit: type=1326 audit(949.200:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7719 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 949.280647][ T29] audit: type=1326 audit(949.220:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7719 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 949.285063][ T29] audit: type=1326 audit(949.220:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7719 comm="syz.2.856" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 950.224844][ T7731] veth0_vlan: left promiscuous mode [ 950.573832][ T7736] bond1: option primary: mode dependency failed, not supported in mode balance-rr(0) [ 950.586672][ T7736] bond1 (unregistering): Released all slaves [ 951.423229][ T7812] netlink: 40 bytes leftover after parsing attributes in process `syz.2.863'. [ 951.435870][ T7812] ip6gre1: entered promiscuous mode [ 951.436233][ T7812] ip6gre1: entered allmulticast mode [ 952.773264][ T7827] pimreg: entered allmulticast mode [ 952.775905][ T7827] pimreg: left allmulticast mode [ 953.872912][ T7838] netlink: 'syz.2.870': attribute type 10 has an invalid length. [ 957.761198][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 957.761627][ T29] audit: type=1400 audit(957.700:796): avc: denied { read } for pid=7854 comm="syz.2.875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 964.150310][ T29] audit: type=1326 audit(964.060:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7868 comm="syz.2.881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 964.150715][ T29] audit: type=1326 audit(964.080:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7868 comm="syz.2.881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 964.159812][ T29] audit: type=1326 audit(964.090:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7868 comm="syz.2.881" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 964.231813][ T29] audit: type=1326 audit(964.170:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7868 comm="syz.2.881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 964.232162][ T29] audit: type=1326 audit(964.170:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7868 comm="syz.2.881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 964.235072][ T29] audit: type=1326 audit(964.170:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7868 comm="syz.2.881" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 964.236527][ T29] audit: type=1326 audit(964.170:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7868 comm="syz.2.881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 964.240551][ T29] audit: type=1326 audit(964.170:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7868 comm="syz.2.881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 964.242192][ T29] audit: type=1326 audit(964.180:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7868 comm="syz.2.881" exe="/syz-executor" sig=0 arch=40000028 syscall=435 compat=0 ip=0x132970 code=0x7ffc0000 [ 964.243655][ T29] audit: type=1326 audit(964.180:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7868 comm="syz.2.881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 964.926952][ T7876] netlink: 4 bytes leftover after parsing attributes in process `syz.2.883'. [ 975.368382][ T7924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7924 comm=syz.2.895 [ 978.062362][ T29] audit: type=1400 audit(977.990:807): avc: denied { create } for pid=7946 comm="syz.2.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 979.294236][ T7979] netlink: 'syz.2.905': attribute type 13 has an invalid length. [ 979.581490][ T29] audit: type=1400 audit(979.520:808): avc: denied { create } for pid=7980 comm="syz.2.906" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 979.596566][ T29] audit: type=1400 audit(979.520:809): avc: denied { map } for pid=7980 comm="syz.2.906" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11737 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 979.596903][ T29] audit: type=1400 audit(979.520:810): avc: denied { read write } for pid=7980 comm="syz.2.906" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11737 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 982.500804][ T7999] netlink: 52 bytes leftover after parsing attributes in process `syz.2.911'. [ 983.680748][ T8007] team_slave_1: Caught tx_queue_len zero misconfig [ 984.215832][ T8012] netlink: 14 bytes leftover after parsing attributes in process `syz.2.917'. [ 985.119351][ T29] audit: type=1326 audit(985.050:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8018 comm="syz.2.920" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 985.122222][ T29] audit: type=1326 audit(985.060:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8018 comm="syz.2.920" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 985.134605][ T29] audit: type=1326 audit(985.070:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8018 comm="syz.2.920" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 985.135833][ T29] audit: type=1326 audit(985.070:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8018 comm="syz.2.920" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 985.137705][ T29] audit: type=1326 audit(985.070:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8018 comm="syz.2.920" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 985.151813][ T29] audit: type=1326 audit(985.090:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8018 comm="syz.2.920" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 985.153891][ T29] audit: type=1326 audit(985.090:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8018 comm="syz.2.920" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 985.154013][ T29] audit: type=1326 audit(985.090:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8018 comm="syz.2.920" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 985.157971][ T29] audit: type=1326 audit(985.090:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8018 comm="syz.2.920" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 985.158033][ T29] audit: type=1326 audit(985.090:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8018 comm="syz.2.920" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 986.903503][ T8034] netlink: 40 bytes leftover after parsing attributes in process `syz.2.926'. [ 987.283546][ T8034] bond0: (slave bond_slave_0): Releasing backup interface [ 987.302994][ T8034] bond0: (slave bond_slave_1): Releasing backup interface [ 987.313663][ T8034] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 994.710984][ T8054] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 994.733516][ T8054] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 996.425010][ T8054] hsr_slave_0: entered promiscuous mode [ 996.427009][ T8054] hsr_slave_1: entered promiscuous mode [ 996.428422][ T8054] debugfs: 'hsr0' already exists in 'hsr' [ 996.428663][ T8054] Cannot create hsr debugfs directory [ 997.251720][ T8054] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 997.259324][ T8054] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 997.267706][ T8054] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 997.286266][ T8054] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 999.347458][ T8054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1009.484968][ T8054] veth0_vlan: entered promiscuous mode [ 1009.624075][ T8054] veth1_vlan: entered promiscuous mode [ 1009.815514][ T8054] veth0_macvtap: entered promiscuous mode [ 1009.838142][ T8054] veth1_macvtap: entered promiscuous mode [ 1010.073801][ T6718] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1010.074224][ T6718] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1010.074319][ T6718] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1010.074385][ T6718] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1022.526412][ T8484] Process accounting resumed [ 1022.554013][ T8483] Process accounting resumed [ 1031.051468][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 1031.051907][ T29] audit: type=1326 audit(1030.990:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8505 comm="syz.4.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1031.057384][ T29] audit: type=1326 audit(1030.990:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8505 comm="syz.4.966" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1031.061595][ T29] audit: type=1326 audit(1031.000:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8505 comm="syz.4.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1031.064172][ T29] audit: type=1326 audit(1031.000:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8505 comm="syz.4.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1031.067976][ T29] audit: type=1326 audit(1031.000:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8505 comm="syz.4.966" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132970 code=0x7ffc0000 [ 1031.090110][ T29] audit: type=1326 audit(1031.020:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8505 comm="syz.4.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1031.090692][ T29] audit: type=1326 audit(1031.020:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8505 comm="syz.4.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1031.090908][ T29] audit: type=1326 audit(1031.020:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8505 comm="syz.4.966" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1031.090980][ T29] audit: type=1326 audit(1031.020:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8505 comm="syz.4.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1031.091071][ T29] audit: type=1326 audit(1031.020:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8505 comm="syz.4.966" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1033.694091][ T8525] netlink: 40 bytes leftover after parsing attributes in process `syz.4.973'. [ 1033.696699][ T8525] netlink: 32 bytes leftover after parsing attributes in process `syz.4.973'. [ 1036.871857][ T8534] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 1036.873550][ T8534] SELinux: failed to load policy [ 1047.821918][ T8573] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1047.844302][ T8573] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1049.716124][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 1049.716675][ T29] audit: type=1400 audit(1049.650:850): avc: denied { execute } for pid=8807 comm="syz.4.994" path="/blkio.bfq.io_wait_time" dev="ramfs" ino=12766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 1049.842373][ T8573] hsr_slave_0: entered promiscuous mode [ 1049.843983][ T8573] hsr_slave_1: entered promiscuous mode [ 1049.845030][ T8573] debugfs: 'hsr0' already exists in 'hsr' [ 1049.845286][ T8573] Cannot create hsr debugfs directory [ 1050.751857][ T8573] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1050.773074][ T8573] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1050.787137][ T8573] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1050.817369][ T8573] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1051.797251][ T29] audit: type=1400 audit(1051.730:851): avc: denied { mount } for pid=8920 comm="syz.4.998" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1051.829778][ T29] audit: type=1400 audit(1051.760:852): avc: denied { unmount } for pid=8920 comm="syz.4.998" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1052.845425][ T8573] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1055.233702][ T8573] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1061.512677][ T8573] veth0_vlan: entered promiscuous mode [ 1061.592915][ T8573] veth1_vlan: entered promiscuous mode [ 1061.806249][ T8573] veth0_macvtap: entered promiscuous mode [ 1061.841515][ T8573] veth1_macvtap: entered promiscuous mode [ 1062.032879][ T5445] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.033591][ T5445] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.034010][ T5445] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.034306][ T5445] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1063.815083][ T29] audit: type=1326 audit(1063.750:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9009 comm="syz.4.1013" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1063.837978][ T29] audit: type=1326 audit(1063.770:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9009 comm="syz.4.1013" exe="/syz-executor" sig=0 arch=40000028 syscall=438 compat=0 ip=0x132970 code=0x7ffc0000 [ 1063.838584][ T29] audit: type=1326 audit(1063.770:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9009 comm="syz.4.1013" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1063.839467][ T29] audit: type=1326 audit(1063.770:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9009 comm="syz.4.1013" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1065.700787][ T29] audit: type=1400 audit(1065.640:857): avc: denied { watch watch_reads } for pid=9024 comm="syz.4.1018" path="/73/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1065.704511][ T9026] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 1065.705651][ T29] audit: type=1400 audit(1065.640:858): avc: denied { relabelto } for pid=9024 comm="syz.4.1018" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 1065.709873][ T29] audit: type=1400 audit(1065.650:859): avc: denied { associate } for pid=9024 comm="syz.4.1018" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 1065.711087][ T9027] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1019'. [ 1068.060524][ T29] audit: type=1400 audit(1067.990:860): avc: denied { create } for pid=9051 comm="syz.5.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1068.106453][ T29] audit: type=1400 audit(1068.040:861): avc: denied { bind } for pid=9051 comm="syz.5.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1068.568500][ T29] audit: type=1400 audit(1068.500:862): avc: denied { nlmsg_read } for pid=9059 comm="syz.5.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1072.438208][ T9088] netlink: 20 bytes leftover after parsing attributes in process `syz.5.1042'. [ 1076.670177][ T9132] netlink: 256 bytes leftover after parsing attributes in process `syz.5.1057'. [ 1079.659947][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 1079.660272][ T29] audit: type=1400 audit(1079.590:864): avc: denied { accept } for pid=9168 comm="syz.5.1071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1080.702779][ T9201] syzkaller0: entered promiscuous mode [ 1080.709331][ T9201] syzkaller0: entered allmulticast mode [ 1081.245186][ T29] audit: type=1326 audit(1081.180:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9208 comm="syz.5.1077" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1081.260766][ T29] audit: type=1326 audit(1081.200:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9208 comm="syz.5.1077" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1081.319773][ T29] audit: type=1326 audit(1081.210:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9208 comm="syz.5.1077" exe="/syz-executor" sig=0 arch=40000028 syscall=366 compat=0 ip=0x132970 code=0x7ffc0000 [ 1081.320907][ T29] audit: type=1326 audit(1081.210:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9208 comm="syz.5.1077" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1082.169927][ T29] audit: type=1326 audit(1082.100:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9219 comm="syz.4.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1082.171676][ T29] audit: type=1326 audit(1082.110:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9219 comm="syz.4.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1082.185358][ T29] audit: type=1326 audit(1082.120:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9219 comm="syz.4.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=293 compat=0 ip=0x132970 code=0x7ffc0000 [ 1082.200548][ T29] audit: type=1326 audit(1082.140:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9219 comm="syz.4.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1082.200854][ T29] audit: type=1326 audit(1082.140:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9219 comm="syz.4.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1083.218740][ T9237] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1087'. [ 1083.226704][ T9237] netlink: 32 bytes leftover after parsing attributes in process `syz.5.1087'. [ 1083.933951][ T9241] netlink: 256 bytes leftover after parsing attributes in process `syz.4.1086'. [ 1083.934450][ T9241] netlink: 64 bytes leftover after parsing attributes in process `syz.4.1086'. [ 1084.306639][ T9247] netlink: 16 bytes leftover after parsing attributes in process `syz.5.1090'. [ 1085.223458][ T9250] netlink: 14 bytes leftover after parsing attributes in process `syz.5.1091'. [ 1086.441071][ T9279] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1095'. [ 1086.446661][ T9279] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1095'. [ 1087.115358][ T9283] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1097'. [ 1088.002551][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 1088.002836][ T29] audit: type=1326 audit(1087.940:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9293 comm="syz.5.1100" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1088.003154][ T29] audit: type=1326 audit(1087.940:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9293 comm="syz.5.1100" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1088.030443][ T29] audit: type=1326 audit(1087.940:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9293 comm="syz.5.1100" exe="/syz-executor" sig=0 arch=40000028 syscall=335 compat=0 ip=0x132970 code=0x7ffc0000 [ 1091.106796][ T9302] SELinux: policydb version 536870932 does not match my version range 15-35 [ 1091.133084][ T9302] SELinux: failed to load policy [ 1091.420343][ T9305] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1103'. [ 1094.722809][ T9321] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1094.723486][ T9321] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1100.994112][ T29] audit: type=1326 audit(1100.930:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9342 comm="syz.5.1115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1100.999457][ T29] audit: type=1326 audit(1100.930:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9342 comm="syz.5.1115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1101.010836][ T29] audit: type=1326 audit(1100.930:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9342 comm="syz.5.1115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1101.011151][ T29] audit: type=1326 audit(1100.930:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9342 comm="syz.5.1115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1101.019792][ T29] audit: type=1326 audit(1100.950:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9342 comm="syz.5.1115" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 1101.040125][ T29] audit: type=1326 audit(1100.950:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9342 comm="syz.5.1115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1101.040527][ T29] audit: type=1326 audit(1100.950:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9342 comm="syz.5.1115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1101.040594][ T29] audit: type=1326 audit(1100.950:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9342 comm="syz.5.1115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1101.040637][ T29] audit: type=1326 audit(1100.950:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9342 comm="syz.5.1115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1101.043415][ T29] audit: type=1326 audit(1100.980:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9342 comm="syz.5.1115" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1102.996328][ T9360] netlink: 'syz.5.1119': attribute type 16 has an invalid length. [ 1102.996779][ T9360] netlink: 'syz.5.1119': attribute type 17 has an invalid length. [ 1104.748620][ T9369] Invalid ELF header type: 25773 != 1 [ 1106.115970][ T9403] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1128'. [ 1106.141165][ T9403] veth0_macvtap: left promiscuous mode [ 1106.845023][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 1106.845323][ T29] audit: type=1326 audit(1106.780:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9408 comm="syz.5.1129" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1106.845524][ T29] audit: type=1326 audit(1106.780:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9408 comm="syz.5.1129" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1106.856709][ T29] audit: type=1326 audit(1106.790:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9408 comm="syz.5.1129" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1106.857149][ T29] audit: type=1326 audit(1106.790:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9408 comm="syz.5.1129" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1106.857335][ T29] audit: type=1326 audit(1106.790:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9408 comm="syz.5.1129" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1106.857518][ T29] audit: type=1326 audit(1106.790:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9408 comm="syz.5.1129" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1106.857706][ T29] audit: type=1326 audit(1106.790:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9408 comm="syz.5.1129" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1106.857893][ T29] audit: type=1326 audit(1106.790:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9408 comm="syz.5.1129" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1106.900082][ T29] audit: type=1326 audit(1106.810:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9408 comm="syz.5.1129" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1106.900461][ T29] audit: type=1326 audit(1106.810:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9408 comm="syz.5.1129" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1107.684540][ T9415] netlink: 96 bytes leftover after parsing attributes in process `syz.5.1132'. [ 1112.904880][ T9449] netlink: 64 bytes leftover after parsing attributes in process `syz.5.1141'. [ 1113.305809][ T9451] netlink: 332 bytes leftover after parsing attributes in process `syz.5.1142'. [ 1115.764315][ T9472] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1149'. [ 1116.254113][ T9474] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1150'. [ 1119.011874][ T9503] random: crng reseeded on system resumption [ 1119.062152][ T9471] hid (null): unknown global tag 0xd [ 1119.075005][ T9471] hid-generic 0000:0002:0005.0003: unknown main item tag 0x6 [ 1119.079576][ T9471] hid-generic 0000:0002:0005.0003: reserved main item tag 0xe [ 1119.090081][ T9471] hid-generic 0000:0002:0005.0003: unknown global tag 0xd [ 1119.091035][ T9471] hid-generic 0000:0002:0005.0003: item 0 1 1 13 parsing failed [ 1119.092214][ T9471] hid-generic 0000:0002:0005.0003: probe with driver hid-generic failed with error -22 [ 1121.094453][ T9525] SELinux: failed to load policy [ 1121.827839][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 1121.828158][ T29] audit: type=1326 audit(1121.760:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1121.842638][ T29] audit: type=1326 audit(1121.780:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1121.845693][ T29] audit: type=1326 audit(1121.780:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1121.851181][ T29] audit: type=1326 audit(1121.790:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1121.854496][ T29] audit: type=1326 audit(1121.790:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132970 code=0x7ffc0000 [ 1121.855002][ T29] audit: type=1326 audit(1121.790:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1121.857602][ T29] audit: type=1326 audit(1121.790:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1121.857744][ T29] audit: type=1326 audit(1121.790:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1121.862657][ T29] audit: type=1326 audit(1121.800:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1121.900044][ T29] audit: type=1326 audit(1121.820:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1123.170173][ T9550] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1169'. [ 1124.562948][ T9560] SELinux: policydb string does not match my string SE Linux [ 1124.563506][ T9560] SELinux: failed to load policy [ 1124.766059][ T9562] netlink: 'syz.4.1173': attribute type 1 has an invalid length. [ 1126.878355][ T29] kauditd_printk_skb: 79 callbacks suppressed [ 1126.878707][ T29] audit: type=1326 audit(1126.810:1070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=125 compat=0 ip=0x132abc code=0x7ffc0000 [ 1126.879614][ T29] audit: type=1326 audit(1126.810:1071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=0 ip=0x10b4b0 code=0x7ffc0000 [ 1126.881428][ T29] audit: type=1326 audit(1126.810:1072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x133e2c code=0x7ffc0000 [ 1126.899802][ T29] audit: type=1326 audit(1126.830:1073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=338 compat=0 ip=0x10aa7c code=0x7ffc0000 [ 1126.904317][ T29] audit: type=1326 audit(1126.840:1074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=0 ip=0x10b524 code=0x7ffc0000 [ 1126.904718][ T29] audit: type=1326 audit(1126.840:1075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1126.904801][ T29] audit: type=1326 audit(1126.840:1076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1126.904888][ T29] audit: type=1326 audit(1126.840:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=0 ip=0x10ab10 code=0x7ffc0000 [ 1126.904949][ T29] audit: type=1326 audit(1126.840:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132970 code=0x7ffc0000 [ 1126.905004][ T29] audit: type=1326 audit(1126.840:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9536 comm="syz.5.1165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1127.601564][ T9585] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1179'. [ 1128.961069][ T9614] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1185'. [ 1132.042667][ T9633] SELinux: Context : is not valid (left unmapped). [ 1132.045626][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 1132.046007][ T29] audit: type=1400 audit(1131.980:1125): avc: denied { relabelto } for pid=9632 comm="syz.5.1191" name="rdma.current" dev="tmpfs" ino=505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon=":" [ 1132.050670][ T29] audit: type=1400 audit(1131.990:1126): avc: denied { associate } for pid=9632 comm="syz.5.1191" name="rdma.current" dev="tmpfs" ino=505 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon=":" [ 1132.104071][ T29] audit: type=1400 audit(1132.040:1127): avc: denied { unlink } for pid=8573 comm="syz-executor" name="rdma.current" dev="tmpfs" ino=505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon=":" [ 1132.362399][ T9636] futex_wake_op: syz.5.1192 tries to shift op by -3; fix this program [ 1132.525562][ T29] audit: type=1326 audit(1132.460:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1132.534371][ T29] audit: type=1326 audit(1132.460:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1132.536961][ T29] audit: type=1326 audit(1132.470:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x132970 code=0x7ffc0000 [ 1132.541610][ T29] audit: type=1326 audit(1132.480:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1132.571290][ T29] audit: type=1326 audit(1132.480:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.4.1193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1138.612148][ T29] audit: type=1400 audit(1138.550:1133): avc: denied { module_request } for pid=9653 comm="syz.4.1199" kmod="tty-ldisc-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1158.841438][ T9691] netlink: 'syz.5.1202': attribute type 10 has an invalid length. [ 1158.863442][ T9691] netlink: 'syz.5.1202': attribute type 10 has an invalid length. [ 1164.373016][ T7328] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1164.450768][ T7328] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1164.515102][ T7328] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1164.581584][ T7328] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1165.048085][ T7328] dvmrp6 (unregistering): left allmulticast mode [ 1165.116904][ T7328] bond0 (unregistering): Released all slaves [ 1165.241155][ T7328] hsr_slave_0: left promiscuous mode [ 1165.255256][ T7328] hsr_slave_1: left promiscuous mode [ 1165.287474][ T7328] veth1_macvtap: left promiscuous mode [ 1165.288040][ T7328] veth0_macvtap: left promiscuous mode [ 1166.911290][ T9731] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 1167.582125][ T29] audit: type=1400 audit(1167.520:1134): avc: denied { bind } for pid=9737 comm="syz.4.1216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1188.333078][ T29] audit: type=1326 audit(1188.270:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9845 comm="syz.5.1233" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1189.552208][ T9857] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1190.714117][ T9866] veth2: entered promiscuous mode [ 1190.718672][ T9866] veth2: entered allmulticast mode [ 1207.463336][ T9963] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1255'. [ 1207.926519][ T29] audit: type=1400 audit(1207.860:1136): avc: denied { read open } for pid=9977 comm="syz.4.1256" path="/" dev="configfs" ino=1071 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1208.663349][ T9985] SELinux: Context system_u:object_r:netutils_exec_t:s0 is not valid (left unmapped). [ 1208.670867][ T29] audit: type=1400 audit(1208.610:1137): avc: denied { relabelto } for pid=9984 comm="syz.4.1259" name="cgroup.procs" dev="cgroup" ino=277 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:netutils_exec_t:s0" [ 1208.671467][ T29] audit: type=1400 audit(1208.610:1138): avc: denied { associate } for pid=9984 comm="syz.4.1259" name="cgroup.procs" dev="cgroup" ino=277 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:netutils_exec_t:s0" [ 1209.233998][ T9987] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1260'. [ 1209.651296][ T9992] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1261'. [ 1209.651591][ T9992] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1261'. [ 1213.150315][T10003] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1265'. [ 1226.980105][T10022] netlink: 'syz.5.1272': attribute type 7 has an invalid length. [ 1241.650339][ T29] audit: type=1326 audit(1241.560:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10034 comm="syz.4.1275" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1241.650760][ T29] audit: type=1326 audit(1241.590:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10034 comm="syz.4.1275" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1241.679786][ T29] audit: type=1326 audit(1241.590:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10034 comm="syz.4.1275" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132970 code=0x7ffc0000 [ 1241.680116][ T29] audit: type=1326 audit(1241.620:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10034 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1241.683494][ T29] audit: type=1326 audit(1241.620:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10034 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1241.712465][ T29] audit: type=1326 audit(1241.650:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10034 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1241.717591][ T29] audit: type=1326 audit(1241.650:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10034 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1241.725740][ T29] audit: type=1326 audit(1241.660:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10034 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1241.729893][ T29] audit: type=1326 audit(1241.670:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10034 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1241.736176][ T29] audit: type=1326 audit(1241.670:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10034 comm="wg1" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1242.443393][T10039] geneve2: entered promiscuous mode [ 1244.090729][T10044] SELinux: failed to load policy [ 1247.863510][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 1247.863896][ T29] audit: type=1326 audit(1247.800:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10057 comm="syz.4.1284" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1247.867111][ T29] audit: type=1326 audit(1247.800:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10057 comm="syz.4.1284" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132970 code=0x7ffc0000 [ 1247.868489][ T29] audit: type=1326 audit(1247.800:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10057 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1247.869984][ T29] audit: type=1326 audit(1247.810:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10057 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1247.873887][ T29] audit: type=1326 audit(1247.810:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10057 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1247.878049][ T29] audit: type=1326 audit(1247.810:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10057 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1247.880272][ T29] audit: type=1326 audit(1247.820:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10057 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1247.883758][ T29] audit: type=1326 audit(1247.820:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10057 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1247.889509][ T29] audit: type=1326 audit(1247.820:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10057 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1247.892107][ T29] audit: type=1326 audit(1247.830:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10057 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1255.665514][T10088] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1292'. [ 1256.270889][T10093] syzkaller0: entered promiscuous mode [ 1256.271989][T10093] syzkaller0: entered allmulticast mode [ 1260.623616][T10116] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1262.751002][T10149] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=10149 comm=syz.5.1309 [ 1262.842462][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 1262.842852][ T29] audit: type=1326 audit(1262.780:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10147 comm="syz.4.1308" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1262.882011][ T29] audit: type=1326 audit(1262.820:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10147 comm="syz.4.1308" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1262.912074][ T29] audit: type=1326 audit(1262.850:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10147 comm="syz.4.1308" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1262.949642][ T29] audit: type=1326 audit(1262.880:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10147 comm="syz.4.1308" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1262.980714][ T29] audit: type=1326 audit(1262.920:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10147 comm="syz.4.1308" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1263.020587][ T29] audit: type=1326 audit(1262.960:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10147 comm="syz.4.1308" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 1263.066260][T10152] syzkaller0: entered promiscuous mode [ 1263.066705][T10152] syzkaller0: entered allmulticast mode [ 1263.081454][ T29] audit: type=1326 audit(1263.000:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10147 comm="syz.4.1308" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1263.081914][ T29] audit: type=1326 audit(1263.020:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10147 comm="syz.4.1308" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1263.142930][ T29] audit: type=1326 audit(1263.080:1198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10147 comm="syz.4.1308" exe="/syz-executor" sig=0 arch=40000028 syscall=348 compat=0 ip=0x132970 code=0x7ffc0000 [ 1263.143468][ T29] audit: type=1326 audit(1263.080:1199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10147 comm="syz.4.1308" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1273.122341][T10241] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1322'. [ 1277.191447][T10246] SELinux: failed to load policy [ 1278.160179][T10248] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1326'. [ 1279.532040][T10158] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1279.532518][T10158] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1279.532637][T10158] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1279.532773][T10158] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1279.532912][T10158] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1279.533012][T10158] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1279.533104][T10158] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1279.533195][T10158] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1279.533285][T10158] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1279.533376][T10158] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1279.551581][T10158] hid-generic 0003:0004:0000.0004: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 1280.225750][T10273] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1280.395992][T10273] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1280.552193][T10273] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1280.666612][T10273] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1280.952783][ T6704] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1280.953204][ T6704] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1281.019761][ T641] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1281.282131][ T6718] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1283.779166][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 1283.779502][ T29] audit: type=1400 audit(1283.710:1201): avc: denied { getopt } for pid=10293 comm="syz.4.1330" lport=141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1285.629653][ T29] audit: type=1400 audit(1285.560:1202): avc: denied { bind } for pid=10298 comm="syz.4.1331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1285.695781][ T29] audit: type=1400 audit(1285.630:1203): avc: denied { setopt } for pid=10298 comm="syz.4.1331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1298.040312][T10307] netlink: 'syz.5.1334': attribute type 27 has an invalid length. [ 1299.048036][T10307] veth2: left promiscuous mode [ 1299.059810][T10307] veth2: left allmulticast mode [ 1299.063342][ T5445] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1299.063775][ T5445] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1299.064091][ T5445] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1299.064189][ T5445] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1299.818672][ T29] audit: type=1326 audit(1299.750:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10310 comm="syz.5.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1299.825003][ T29] audit: type=1326 audit(1299.760:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10310 comm="syz.5.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1299.827884][ T29] audit: type=1326 audit(1299.760:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10310 comm="syz.5.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132970 code=0x7ffc0000 [ 1299.860191][ T29] audit: type=1326 audit(1299.770:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10310 comm="syz.5.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1329a8 code=0x7ffc0000 [ 1299.860577][ T29] audit: type=1326 audit(1299.770:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10310 comm="syz.5.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1329a8 code=0x7ffc0000 [ 1299.866449][ T29] audit: type=1326 audit(1299.800:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10310 comm="syz.5.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1299.868453][ T29] audit: type=1326 audit(1299.800:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10310 comm="syz.5.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1299.885349][ T29] audit: type=1326 audit(1299.810:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10310 comm="syz.5.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1299.890175][ T29] audit: type=1326 audit(1299.820:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10310 comm="syz.5.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1299.892232][ T29] audit: type=1326 audit(1299.830:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10310 comm="syz.5.1336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1302.646660][T10320] netlink: 'syz.5.1339': attribute type 27 has an invalid length. [ 1306.675243][T10340] netlink: 'syz.4.1345': attribute type 27 has an invalid length. [ 1307.425899][T10342] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1346'. [ 1310.131376][T10340] geneve2: left promiscuous mode [ 1310.202428][ T7330] netdevsim netdevsim4 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1310.202849][ T7330] netdevsim netdevsim4 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1310.203071][ T7330] netdevsim netdevsim4 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1310.203268][ T7330] netdevsim netdevsim4 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1314.450279][ T30] INFO: task kworker/0:0:9 blocked for more than 430 seconds. [ 1314.450989][ T30] Not tainted syzkaller #0 [ 1314.451198][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.451395][ T30] task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.451852][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.456953][ T30] Call trace: [ 1314.460221][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.460646][ T30] r10:df83dd84 r9:00000002 r8:60000013 r7:829171a0 r6:df83dd8c r5:8320e000 [ 1314.460717][ T30] r4:8320e000 [ 1314.460834][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.461122][ T30] r5:8320e000 r4:8291719c [ 1314.461146][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.461211][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.461286][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 [ 1314.461308][ T30] r4:00000000 [ 1314.461321][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.461377][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.461437][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.461503][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c2300 [ 1314.461523][ T30] r4:00000000 [ 1314.461539][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.461663][ T30] r9:83018405 r8:8320e000 r7:00000000 r6:83018400 r5:00001000 r4:7f26a000 [ 1314.461689][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.461760][ T30] r5:00001000 r4:df8f7000 [ 1314.461805][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.461869][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.461933][ T30] r5:85454f8c r4:830ba780 [ 1314.461949][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.462028][ T30] r7:dddcfd80 r6:83018400 r5:85454f8c r4:830ba780 [ 1314.462045][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.462121][ T30] r10:61c88647 r9:8320e000 r8:830ba7ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1314.462140][ T30] r4:830ba780 [ 1314.462156][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.462263][ T30] r10:00000000 r9:830ba780 r8:80278fec r7:df819e48 r6:830ba800 r5:8320e000 [ 1314.462288][ T30] r4:00000001 [ 1314.462371][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.462517][ T30] Exception stack(0xdf83dfb0 to 0xdf83dff8) [ 1314.462737][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.462816][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.462856][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.462936][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.462960][ T30] r4:830b62c0 [ 1314.463698][ T30] INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.463804][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.463923][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.463981][ T30] Call trace: [ 1314.464006][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.464074][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.464114][ T30] r4:00000000 [ 1314.464133][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.464185][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.464219][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.464252][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.464274][ T30] dd60: 80000113 ffffffff [ 1314.464295][ T30] r5:80000113 r4:80239c10 [ 1314.464412][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.464477][ T30] r4:82acb1e4 [ 1314.464494][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.464555][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.464612][ T30] r4:ea48ddc0 [ 1314.464633][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.464731][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.464755][ T30] r4:00000000 [ 1314.464776][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.464977][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.465129][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.465202][ T30] r5:00001000 r4:eaa35000 [ 1314.465242][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.465299][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.465358][ T30] r5:84f4778c r4:84d64000 [ 1314.465375][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.465445][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.465462][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.465550][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.465571][ T30] r4:84d64000 [ 1314.465587][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.465714][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.465736][ T30] r4:00000001 [ 1314.465783][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.465832][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.465864][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.465896][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.465972][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.466014][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.466036][ T30] r4:85490cc0 [ 1314.466392][ T30] INFO: task kworker/0:2:5490 blocked for more than 430 seconds. SYZFAIL: failed to recv rpc [ 1314.466436][ T30] Not tainted syzkaller #0 [ 1314.466461][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.466546][ T30] task:kworker/0:2 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.466612][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.466716][ T30] Call trace: [ 1314.466743][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.466817][ T30] r10:dfa79d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfa79d8c r5:83afec00 [ 1314.466838][ T30] r4:83afec00 [ 1314.466853][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.466912][ T30] r5:83afec00 r4:8291719c [ 1314.466966][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.467022][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.467127][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 [ 1314.467179][ T30] r4:00000000 [ 1314.467231][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.467286][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.467340][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.467402][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84999ec0 [ 1314.467423][ T30] r4:00000000 [ 1314.467437][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.467528][ T30] r9:83018405 r8:83afec00 r7:00000000 r6:83018400 r5:00001000 r4:7f26e000 [ 1314.467548][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.467633][ T30] r5:00001000 r4:dfb9b000 [ 1314.467743][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.467809][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.467871][ T30] r5:84f4638c r4:8976d900 [ 1314.467886][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.467984][ T30] r7:dddcfd80 r6:83018400 r5:84f4638c r4:8976d900 [ 1314.468030][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.468147][ T30] r10:61c88647 r9:83afec00 r8:8976d92c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1314.468200][ T30] r4:8976d900 [ 1314.468221][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.468286][ T30] r10:00000000 r9:8976d900 r8:80278fec r7:df841e60 r6:859a4d80 r5:83afec00 [ 1314.468306][ T30] r4:00000001 [ 1314.468322][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.468377][ T30] Exception stack(0xdfa79fb0 to 0xdfa79ff8) [ 1314.468409][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1314.468463][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.468498][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.468536][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.468627][ T30] r4:832ad400 [ 1314.483718][ T30] INFO: task kworker/0:2:5490 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.483848][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.483985][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.484091][ T30] Call trace: [ 1314.484129][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.484220][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.484244][ T30] r4:00000000 [ 1314.484262][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.484321][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.484361][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.484395][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.484489][ T30] dd60: 80000113 ffffffff [ 1314.484523][ T30] r5:80000113 r4:80239c10 [ 1314.484612][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.484689][ T30] r4:82acb1e4 [ 1314.484707][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.484775][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.484797][ T30] r4:ea48ddc0 [ 1314.484815][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.484888][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.484909][ T30] r4:00000000 [ 1314.484926][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.485077][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.485104][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.485171][ T30] r5:00001000 r4:eaa35000 [ 1314.485188][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.485248][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.485351][ T30] r5:84f4778c r4:84d64000 [ 1314.485373][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.485454][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.485472][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.485548][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.485629][ T30] r4:84d64000 [ 1314.485663][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.485739][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.485762][ T30] r4:00000001 [ 1314.485778][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.485829][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.485861][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.485899][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.485935][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.486010][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.486069][ T30] r4:85490cc0 [ 1314.486159][ T30] INFO: task kworker/0:27:7002 blocked for more than 430 seconds. [ 1314.486199][ T30] Not tainted syzkaller #0 [ 1314.486222][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.486237][ T30] task:kworker/0:27 state:D stack:0 pid:7002 tgid:7002 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.486288][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.486333][ T30] Call trace: fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1314.486358][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.486427][ T30] r10:ea465d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea465d8c r5:89b31800 [ 1314.486449][ T30] r4:89b31800 [ 1314.486464][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.486543][ T30] r5:89b31800 r4:8291719c [ 1314.486563][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.486663][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.486759][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea465e08 [ 1314.486783][ T30] r4:00000000 [ 1314.486799][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.486888][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.486947][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.487014][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578dc80 [ 1314.487069][ T30] r4:00000000 [ 1314.487086][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.487153][ T30] r9:83018405 r8:89b31800 r7:00000000 r6:83018400 r5:00001000 r4:7f282000 [ 1314.487169][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.487229][ T30] r5:00001000 r4:e82e7000 [ 1314.487244][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.487296][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.487355][ T30] r5:854eff8c r4:8987ad00 [ 1314.487370][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.487435][ T30] r7:dddcfd80 r6:83018400 r5:854eff8c r4:8987ad00 [ 1314.487490][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.487562][ T30] r10:61c88647 r9:89b31800 r8:8987ad2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1314.487615][ T30] r4:8987ad00 [ 1314.487634][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.487979][ T30] r10:00000000 r9:8987ad00 r8:80278fec r7:ea44de60 r6:84d85e80 r5:89b31800 [ 1314.488038][ T30] r4:00000001 [ 1314.488059][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.488130][ T30] Exception stack(0xea465fb0 to 0xea465ff8) [ 1314.488179][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1314.488256][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.488302][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.488357][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.488390][ T30] r4:854c2800 [ 1314.539815][ T30] INFO: task kworker/0:27:7002 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.539936][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.540048][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.540135][ T30] Call trace: [ 1314.540163][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.540255][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.540277][ T30] r4:00000000 [ 1314.540294][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.540350][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.540391][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.540453][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.540479][ T30] dd60: 80000113 ffffffff [ 1314.540503][ T30] r5:80000113 r4:80239c10 [ 1314.540519][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.540602][ T30] r4:82acb1e4 [ 1314.540622][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.540697][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.540717][ T30] r4:ea48ddc0 [ 1314.540733][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.540800][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.540820][ T30] r4:00000000 [ 1314.540835][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.540922][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.540947][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.541003][ T30] r5:00001000 r4:eaa35000 [ 1314.541020][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.541080][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.541147][ T30] r5:84f4778c r4:84d64000 [ 1314.541166][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.541234][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.541253][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.541351][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.541409][ T30] r4:84d64000 [ 1314.541430][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.541505][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.541526][ T30] r4:00000001 [ 1314.541544][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.541603][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.541636][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.541760][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.541800][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.541868][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.541894][ T30] r4:85490cc0 [ 1314.541943][ T30] INFO: task kworker/1:23:7023 blocked for more than 430 seconds. [ 1314.542087][ T30] Not tainted syzkaller #0 [ 1314.542118][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.542134][ T30] task:kworker/1:23 state:D stack:0 pid:7023 tgid:7023 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.542189][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.542263][ T30] Call trace: [ 1314.542295][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.542370][ T30] r10:ea885d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea885d8c r5:841d3c00 [ 1314.542391][ T30] r4:841d3c00 [ 1314.542432][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.542501][ T30] r5:841d3c00 r4:8291719c [ 1314.542540][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.542607][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.542685][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea885e08 [ 1314.542702][ T30] r4:00000000 [ 1314.542717][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.542774][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.542832][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.542901][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83883c40 [ 1314.542949][ T30] r4:00000000 [ 1314.542966][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.543036][ T30] r9:83018605 r8:841d3c00 r7:00000000 r6:83018600 r5:00001000 r4:7f270000 [ 1314.543055][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.543115][ T30] r5:00001000 r4:dfc05000 [ 1314.543130][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.543183][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.543241][ T30] r5:84ef3b8c r4:8549b580 [ 1314.543255][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.543319][ T30] r7:ddde3d80 r6:83018600 r5:84ef3b8c r4:8549b580 [ 1314.543336][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.543401][ T30] r10:61c88647 r9:841d3c00 r8:8549b5ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.543455][ T30] r4:8549b580 [ 1314.543475][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.543542][ T30] r10:00000000 r9:8549b580 r8:80278fec r7:ea7ede60 r6:8549b800 r5:841d3c00 [ 1314.543562][ T30] r4:00000001 [ 1314.543578][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.543629][ T30] Exception stack(0xea885fb0 to 0xea885ff8) [ 1314.543671][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1314.543708][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.543750][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.543819][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.543845][ T30] r4:8575eb80 [ 1314.544200][ T30] INFO: task kworker/1:23:7023 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.544234][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.544313][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.544369][ T30] Call trace: [ 1314.544392][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.544471][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.544545][ T30] r4:00000000 [ 1314.544564][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.544623][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.544683][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.544765][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.544797][ T30] dd60: 80000113 ffffffff [ 1314.544823][ T30] r5:80000113 r4:80239c10 [ 1314.544839][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.544894][ T30] r4:82acb1e4 [ 1314.544911][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.544981][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.545002][ T30] r4:ea48ddc0 [ 1314.545017][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.545079][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.545098][ T30] r4:00000000 [ 1314.545114][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.545177][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.545192][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.545254][ T30] r5:00001000 r4:eaa35000 [ 1314.545304][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.545363][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.545421][ T30] r5:84f4778c r4:84d64000 [ 1314.545440][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.545512][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.545568][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.545656][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.545678][ T30] r4:84d64000 [ 1314.545699][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.545775][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.545797][ T30] r4:00000001 [ 1314.545815][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.545863][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.545900][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.545937][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.545969][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.546036][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.546061][ T30] r4:85490cc0 [ 1314.546090][ T30] INFO: task kworker/0:30:7029 blocked for more than 430 seconds. [ 1314.546121][ T30] Not tainted syzkaller #0 [ 1314.546144][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.546225][ T30] task:kworker/0:30 state:D stack:0 pid:7029 tgid:7029 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.546352][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.546399][ T30] Call trace: [ 1314.546491][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.546601][ T30] r10:ea851d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea851d8c r5:84e20000 [ 1314.546623][ T30] r4:84e20000 [ 1314.546645][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.546768][ T30] r5:84e20000 r4:8291719c [ 1314.546790][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.546850][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.546926][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea851e08 [ 1314.546981][ T30] r4:00000000 [ 1314.547034][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.547091][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.547139][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.547242][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588c540 [ 1314.547268][ T30] r4:00000000 [ 1314.547283][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.547346][ T30] r9:83018405 r8:84e20000 r7:00000000 r6:83018400 r5:00001000 r4:7f26c000 [ 1314.547362][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.547526][ T30] r5:00001000 r4:dfb11000 [ 1314.547557][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.547618][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.547696][ T30] r5:854bdf8c r4:8987a280 [ 1314.547713][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.547924][ T30] r7:dddcfd80 r6:83018400 r5:854bdf8c r4:8987a280 [ 1314.547948][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.548029][ T30] r10:61c88647 r9:84e20000 r8:8987a2ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1314.548124][ T30] r4:8987a280 [ 1314.548155][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.548225][ T30] r10:00000000 r9:8987a280 r8:80278fec r7:ea465e60 r6:8987af00 r5:84e20000 [ 1314.548246][ T30] r4:00000001 [ 1314.548261][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.548310][ T30] Exception stack(0xea851fb0 to 0xea851ff8) [ 1314.548342][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1314.548375][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.548402][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.548436][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.548483][ T30] r4:849a4ac0 [ 1314.548896][ T30] INFO: task kworker/0:30:7029 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.593754][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.593923][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.594032][ T30] Call trace: [ 1314.594067][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.594160][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.594260][ T30] r4:00000000 [ 1314.594281][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.594338][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.594380][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.594453][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.594482][ T30] dd60: 80000113 ffffffff [ 1314.594510][ T30] r5:80000113 r4:80239c10 [ 1314.594552][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.594616][ T30] r4:82acb1e4 [ 1314.594631][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.594710][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.594732][ T30] r4:ea48ddc0 [ 1314.594820][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.594894][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.594915][ T30] r4:00000000 [ 1314.594931][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.595001][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.595054][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.595163][ T30] r5:00001000 r4:eaa35000 [ 1314.595183][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.595273][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.595343][ T30] r5:84f4778c r4:84d64000 [ 1314.595395][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.595527][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.595559][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.595632][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.595687][ T30] r4:84d64000 [ 1314.595728][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.595803][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.595824][ T30] r4:00000001 [ 1314.595935][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.596006][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.596038][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.596153][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.596190][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.596322][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.596351][ T30] r4:85490cc0 [ 1314.609992][ T30] INFO: task kworker/0:31:7044 blocked for more than 430 seconds. [ 1314.610134][ T30] Not tainted syzkaller #0 [ 1314.610163][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.610181][ T30] task:kworker/0:31 state:D stack:0 pid:7044 tgid:7044 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.610349][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.610488][ T30] Call trace: [ 1314.610517][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.610625][ T30] r10:ea949d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea949d8c r5:84e25400 [ 1314.610657][ T30] r4:84e25400 [ 1314.610674][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.610736][ T30] r5:84e25400 r4:8291719c [ 1314.610775][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.610835][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.610907][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea949e08 [ 1314.610928][ T30] r4:00000000 [ 1314.610946][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.611000][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.611084][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.611148][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:896d21c0 [ 1314.611168][ T30] r4:00000000 [ 1314.611273][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.611352][ T30] r9:83018405 r8:84e25400 r7:00000000 r6:83018400 r5:00001000 r4:7f272000 [ 1314.611455][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.611570][ T30] r5:00001000 r4:dfc0d000 [ 1314.611693][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.611754][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.611816][ T30] r5:8564638c r4:8987a000 [ 1314.611832][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.611903][ T30] r7:dddcfd80 r6:83018400 r5:8564638c r4:8987a000 [ 1314.611921][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.611991][ T30] r10:61c88647 r9:84e25400 r8:8987a02c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1314.612013][ T30] r4:8987a000 [ 1314.612046][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.612119][ T30] r10:00000000 r9:8987a000 r8:80278fec r7:ea465e60 r6:8987ad80 r5:84e25400 [ 1314.612141][ T30] r4:00000001 [ 1314.612157][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.612208][ T30] Exception stack(0xea949fb0 to 0xea949ff8) [ 1314.612277][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1314.612314][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.612362][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.612401][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.612421][ T30] r4:85758f00 [ 1314.612792][ T30] INFO: task kworker/0:31:7044 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.612825][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.612964][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.613035][ T30] Call trace: [ 1314.613062][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.613135][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.613157][ T30] r4:00000000 [ 1314.613239][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.613297][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.613336][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.613371][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.613395][ T30] dd60: 80000113 ffffffff [ 1314.613420][ T30] r5:80000113 r4:80239c10 [ 1314.613437][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.613497][ T30] r4:82acb1e4 [ 1314.613515][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.613580][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.613601][ T30] r4:ea48ddc0 [ 1314.613617][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.613689][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.613712][ T30] r4:00000000 [ 1314.613728][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.613811][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.613829][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.613889][ T30] r5:00001000 r4:eaa35000 [ 1314.613920][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.613976][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.614038][ T30] r5:84f4778c r4:84d64000 [ 1314.614054][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.614121][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.614138][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.614208][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.614228][ T30] r4:84d64000 [ 1314.614242][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.614307][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.614326][ T30] r4:00000001 [ 1314.614343][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.614389][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.614421][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.614477][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.614510][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.614563][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.614584][ T30] r4:85490cc0 [ 1314.614609][ T30] INFO: task kworker/1:27:7057 blocked for more than 430 seconds. [ 1314.614704][ T30] Not tainted syzkaller #0 [ 1314.614786][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.614814][ T30] task:kworker/1:27 state:D stack:0 pid:7057 tgid:7057 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.614918][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.615006][ T30] Call trace: [ 1314.615069][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.615142][ T30] r10:ea9f9d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea9f9d8c r5:898fb000 [ 1314.615164][ T30] r4:898fb000 [ 1314.615192][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.615286][ T30] r5:898fb000 r4:8291719c [ 1314.615356][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.615414][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.615506][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f9e08 [ 1314.615559][ T30] r4:00000000 [ 1314.615609][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.615675][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.615764][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.615830][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83883a40 [ 1314.615852][ T30] r4:00000000 [ 1314.615868][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.615986][ T30] r9:83018605 r8:898fb000 r7:00000000 r6:83018600 r5:00001000 r4:7f278000 [ 1314.616042][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.616107][ T30] r5:00001000 r4:e0101000 [ 1314.616123][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.616216][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.616284][ T30] r5:84b0078c r4:84d64480 [ 1314.616302][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.616376][ T30] r7:ddde3d80 r6:83018600 r5:84b0078c r4:84d64480 [ 1314.616393][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.616466][ T30] r10:61c88647 r9:898fb000 r8:84d644ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.616487][ T30] r4:84d64480 [ 1314.616628][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.616713][ T30] r10:00000000 r9:84d64480 r8:80278fec r7:ea885e60 r6:84d64380 r5:898fb000 [ 1314.616827][ T30] r4:00000001 [ 1314.616845][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.616932][ T30] Exception stack(0xea9f9fb0 to 0xea9f9ff8) [ 1314.616966][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1314.617002][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.617041][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.617081][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.617102][ T30] r4:8588ca00 [ 1314.617278][ T30] INFO: task kworker/1:27:7057 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.617308][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.617490][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.617571][ T30] Call trace: [ 1314.617598][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.617675][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.617696][ T30] r4:00000000 [ 1314.617726][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.617785][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.617892][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.618005][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.618049][ T30] dd60: 80000113 ffffffff [ 1314.618073][ T30] r5:80000113 r4:80239c10 [ 1314.618103][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.618198][ T30] r4:82acb1e4 [ 1314.618217][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.618343][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.618368][ T30] r4:ea48ddc0 [ 1314.618384][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.618448][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.618466][ T30] r4:00000000 [ 1314.618637][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.618954][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.641951][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.642137][ T30] r5:00001000 r4:eaa35000 [ 1314.642157][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.642215][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.642283][ T30] r5:84f4778c r4:84d64000 [ 1314.642301][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.642374][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.642392][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.642468][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.642539][ T30] r4:84d64000 [ 1314.642601][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.642748][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.642776][ T30] r4:00000001 [ 1314.642793][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.642845][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.642881][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.642916][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.642947][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.643071][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.643098][ T30] r4:85490cc0 [ 1314.643133][ T30] INFO: task kworker/1:28:7063 blocked for more than 430 seconds. [ 1314.643204][ T30] Not tainted syzkaller #0 [ 1314.643232][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.643249][ T30] task:kworker/1:28 state:D stack:0 pid:7063 tgid:7063 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.643355][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.643407][ T30] Call trace: [ 1314.643434][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.643512][ T30] r10:dfb15d84 r9:00000002 r8:60000113 r7:829171a0 r6:dfb15d8c r5:898fa400 [ 1314.643625][ T30] r4:898fa400 [ 1314.643692][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.643754][ T30] r5:898fa400 r4:8291719c [ 1314.643771][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.643823][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.643888][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 [ 1314.643907][ T30] r4:00000000 [ 1314.644036][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.644096][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.644149][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.644226][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588e540 [ 1314.644282][ T30] r4:00000000 [ 1314.644300][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.644362][ T30] r9:83018605 r8:898fa400 r7:00000000 r6:83018600 r5:00001000 r4:7f274000 [ 1314.644379][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.644436][ T30] r5:00001000 r4:dfc49000 [ 1314.644451][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.644500][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.644559][ T30] r5:8564438c r4:8570d600 [ 1314.644578][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.644690][ T30] r7:ddde3d80 r6:83018600 r5:8564438c r4:8570d600 [ 1314.644711][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.644787][ T30] r10:61c88647 r9:898fa400 r8:8570d62c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.644810][ T30] r4:8570d600 [ 1314.644824][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.644889][ T30] r10:00000000 r9:8570d600 r8:80278fec r7:ea885e60 r6:8570d080 r5:898fa400 [ 1314.644943][ T30] r4:00000001 [ 1314.644985][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.645035][ T30] Exception stack(0xdfb15fb0 to 0xdfb15ff8) [ 1314.645065][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1314.645208][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.645252][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.645356][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.645379][ T30] r4:84fa8400 [ 1314.645768][ T30] INFO: task kworker/1:28:7063 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.645815][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.645884][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.645933][ T30] Call trace: [ 1314.645985][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.646094][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.646118][ T30] r4:00000000 [ 1314.646132][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.646186][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.646223][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.646260][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.646285][ T30] dd60: 80000113 ffffffff [ 1314.646309][ T30] r5:80000113 r4:80239c10 [ 1314.646328][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.646385][ T30] r4:82acb1e4 [ 1314.646402][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.646517][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.646559][ T30] r4:ea48ddc0 [ 1314.646574][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.646661][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.646685][ T30] r4:00000000 [ 1314.646701][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.646770][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.646788][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.646846][ T30] r5:00001000 r4:eaa35000 [ 1314.646918][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.647013][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.647100][ T30] r5:84f4778c r4:84d64000 [ 1314.647120][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.647252][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.647273][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.647396][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.647422][ T30] r4:84d64000 [ 1314.647438][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.647506][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.647526][ T30] r4:00000001 [ 1314.647558][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.647610][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.647684][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.647756][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.647792][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.647830][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.647870][ T30] r4:85490cc0 [ 1314.647896][ T30] INFO: task kworker/1:29:7075 blocked for more than 430 seconds. [ 1314.647927][ T30] Not tainted syzkaller #0 [ 1314.647949][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.647989][ T30] task:kworker/1:29 state:D stack:0 pid:7075 tgid:7075 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.648080][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.648121][ T30] Call trace: [ 1314.648145][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.648218][ T30] r10:dfc51d84 r9:00000002 r8:60000013 r7:829171a0 r6:dfc51d8c r5:898fe000 [ 1314.648239][ T30] r4:898fe000 [ 1314.648252][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.648305][ T30] r5:898fe000 r4:8291719c [ 1314.648319][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.648368][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.648467][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 [ 1314.648491][ T30] r4:00000000 [ 1314.648535][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.648592][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.648648][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.648836][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8579f480 [ 1314.648950][ T30] r4:00000000 [ 1314.671567][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.671765][ T30] r9:83018605 r8:898fe000 r7:00000000 r6:83018600 r5:00001000 r4:7f276000 [ 1314.671789][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.671857][ T30] r5:00001000 r4:e0099000 [ 1314.671911][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.671974][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.672037][ T30] r5:84b0138c r4:8549b680 [ 1314.672075][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.672202][ T30] r7:ddde3d80 r6:83018600 r5:84b0138c r4:8549b680 [ 1314.672221][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.672296][ T30] r10:61c88647 r9:898fe000 r8:8549b6ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.672317][ T30] r4:8549b680 [ 1314.672333][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.672404][ T30] r10:00000000 r9:8549b680 r8:80278fec r7:ea9f9e60 r6:8549b900 r5:898fe000 [ 1314.672424][ T30] r4:00000001 [ 1314.672441][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.672491][ T30] Exception stack(0xdfc51fb0 to 0xdfc51ff8) [ 1314.672528][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1314.672566][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.672597][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.672635][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.672700][ T30] r4:8588e700 [ 1314.673073][ T30] INFO: task kworker/1:29:7075 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.673180][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.673298][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.673462][ T30] Call trace: [ 1314.673491][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.673573][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.673595][ T30] r4:00000000 [ 1314.673664][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.673721][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.673759][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.673797][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.673822][ T30] dd60: 80000113 ffffffff [ 1314.673849][ T30] r5:80000113 r4:80239c10 [ 1314.673906][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.673969][ T30] r4:82acb1e4 [ 1314.673987][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.674148][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.674171][ T30] r4:ea48ddc0 [ 1314.674187][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.674252][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.674273][ T30] r4:00000000 [ 1314.674288][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.674355][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.674372][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.674432][ T30] r5:00001000 r4:eaa35000 [ 1314.674448][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.674507][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.674592][ T30] r5:84f4778c r4:84d64000 [ 1314.674611][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.674692][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.674709][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.674779][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.674800][ T30] r4:84d64000 [ 1314.674814][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.674876][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.674896][ T30] r4:00000001 [ 1314.674910][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.674958][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.674989][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.675061][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.675095][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.675132][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.675171][ T30] r4:85490cc0 [ 1314.675207][ T30] INFO: task kworker/1:30:7085 blocked for more than 430 seconds. [ 1314.675247][ T30] Not tainted syzkaller #0 [ 1314.675271][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.675286][ T30] task:kworker/1:30 state:D stack:0 pid:7085 tgid:7085 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.675338][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.675382][ T30] Call trace: [ 1314.675409][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.675478][ T30] r10:e00f9d84 r9:00000002 r8:60000013 r7:829171a0 r6:e00f9d8c r5:898fec00 [ 1314.675526][ T30] r4:898fec00 [ 1314.675543][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.675603][ T30] r5:898fec00 r4:8291719c [ 1314.675619][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.675740][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.675817][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f9e08 [ 1314.675840][ T30] r4:00000000 [ 1314.675856][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.675911][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.675965][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.676031][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3f00 [ 1314.676086][ T30] r4:00000000 [ 1314.676123][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.676191][ T30] r9:83018605 r8:898fec00 r7:00000000 r6:83018600 r5:00001000 r4:7f27a000 [ 1314.676226][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.676287][ T30] r5:00001000 r4:e01af000 [ 1314.676302][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.676390][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.676454][ T30] r5:84b01b8c r4:84cb8d80 [ 1314.676469][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.676543][ T30] r7:ddde3d80 r6:83018600 r5:84b01b8c r4:84cb8d80 [ 1314.676594][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.676678][ T30] r10:61c88647 r9:898fec00 r8:84cb8dac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.676727][ T30] r4:84cb8d80 [ 1314.676744][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.676817][ T30] r10:00000000 r9:84cb8d80 r8:80278fec r7:ea9f9e60 r6:84cb8e00 r5:898fec00 [ 1314.676910][ T30] r4:00000001 [ 1314.676930][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.676982][ T30] Exception stack(0xe00f9fb0 to 0xe00f9ff8) [ 1314.677014][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1314.677049][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.677081][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.677117][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.677138][ T30] r4:857a8540 [ 1314.677334][ T30] INFO: task kworker/1:30:7085 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.677367][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.677431][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.677479][ T30] Call trace: [ 1314.677502][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.677570][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.677603][ T30] r4:00000000 [ 1314.677619][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.677713][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.677755][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.677792][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.677816][ T30] dd60: 80000113 ffffffff [ 1314.677843][ T30] r5:80000113 r4:80239c10 [ 1314.677863][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.677923][ T30] r4:82acb1e4 [ 1314.677940][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.678000][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.678109][ T30] r4:ea48ddc0 [ 1314.678140][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.678206][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.678224][ T30] r4:00000000 [ 1314.678271][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.678339][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.678356][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.678429][ T30] r5:00001000 r4:eaa35000 [ 1314.678447][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.678503][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.678660][ T30] r5:84f4778c r4:84d64000 [ 1314.678681][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.678753][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.678846][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.700041][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.700150][ T30] r4:84d64000 [ 1314.700172][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.700304][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.700326][ T30] r4:00000001 [ 1314.700344][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.700396][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.700435][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.700487][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.700520][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.700575][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.700597][ T30] r4:85490cc0 [ 1314.700678][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.700774][ T30] INFO: task kworker/1:31:7087 blocked for more than 430 seconds. [ 1314.700820][ T30] Not tainted syzkaller #0 [ 1314.700844][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.700861][ T30] task:kworker/1:31 state:D stack:0 pid:7087 tgid:7087 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.700946][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.701010][ T30] Call trace: [ 1314.701039][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.701127][ T30] r10:e0085d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0085d8c r5:898fbc00 [ 1314.701150][ T30] r4:898fbc00 [ 1314.701167][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.701229][ T30] r5:898fbc00 r4:8291719c [ 1314.701280][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.701341][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.701413][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08 [ 1314.701434][ T30] r4:00000000 [ 1314.701452][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.701508][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.701566][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.701671][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a9a80 [ 1314.701697][ T30] r4:00000000 [ 1314.701713][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.701786][ T30] r9:83018605 r8:898fbc00 r7:00000000 r6:83018600 r5:00001000 r4:7f280000 [ 1314.701805][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.701867][ T30] r5:00001000 r4:e82c3000 [ 1314.701885][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.701945][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.702009][ T30] r5:84ef378c r4:84cb8a80 [ 1314.702027][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.702097][ T30] r7:ddde3d80 r6:83018600 r5:84ef378c r4:84cb8a80 [ 1314.702115][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.702220][ T30] r10:61c88647 r9:898fbc00 r8:84cb8aac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.702243][ T30] r4:84cb8a80 [ 1314.702259][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.702328][ T30] r10:00000000 r9:84cb8a80 r8:80278fec r7:e00f9e60 r6:84cb8380 r5:898fbc00 [ 1314.702351][ T30] r4:00000001 [ 1314.702366][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.702414][ T30] Exception stack(0xe0085fb0 to 0xe0085ff8) [ 1314.702445][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1314.702515][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.702572][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.702632][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.702665][ T30] r4:858636c0 [ 1314.703055][ T30] INFO: task kworker/1:31:7087 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.703124][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.703198][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.703271][ T30] Call trace: [ 1314.703336][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.703413][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.703434][ T30] r4:00000000 [ 1314.703451][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.703509][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.703548][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.703585][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.703611][ T30] dd60: 80000113 ffffffff [ 1314.703670][ T30] r5:80000113 r4:80239c10 [ 1314.703690][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.703751][ T30] r4:82acb1e4 [ 1314.703770][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.703873][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.703916][ T30] r4:ea48ddc0 [ 1314.703935][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.704036][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.704082][ T30] r4:00000000 [ 1314.704099][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.704240][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.704262][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.704343][ T30] r5:00001000 r4:eaa35000 [ 1314.704379][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.704438][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.704500][ T30] r5:84f4778c r4:84d64000 [ 1314.704517][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.704624][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.704652][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.704756][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.704778][ T30] r4:84d64000 [ 1314.704793][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.704875][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.704911][ T30] r4:00000001 [ 1314.704939][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.704997][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.705032][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.705070][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.705100][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.705134][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.705153][ T30] r4:85490cc0 [ 1314.705206][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.705241][ T30] INFO: task kworker/1:32:7095 blocked for more than 430 seconds. [ 1314.705273][ T30] Not tainted syzkaller #0 [ 1314.705329][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.705380][ T30] task:kworker/1:32 state:D stack:0 pid:7095 tgid:7095 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.705438][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.705531][ T30] Call trace: [ 1314.705624][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.705806][ T30] r10:dfc1dd84 r9:00000002 r8:60000113 r7:829171a0 r6:dfc1dd8c r5:83afc800 [ 1314.705834][ T30] r4:83afc800 [ 1314.705849][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.705944][ T30] r5:83afc800 r4:8291719c [ 1314.706001][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.706070][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.706400][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 [ 1314.706426][ T30] r4:00000000 [ 1314.706541][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.706609][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.706718][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.706826][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca3100 [ 1314.706863][ T30] r4:00000000 [ 1314.706879][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.706984][ T30] r9:83018605 r8:83afc800 r7:00000000 r6:83018600 r5:00001000 r4:7f27c000 [ 1314.707019][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.707089][ T30] r5:00001000 r4:e01b1000 [ 1314.707105][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.707163][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.707264][ T30] r5:84b0278c r4:84cb8580 [ 1314.707306][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.707414][ T30] r7:ddde3d80 r6:83018600 r5:84b0278c r4:84cb8580 [ 1314.707446][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.707565][ T30] r10:61c88647 r9:83afc800 r8:84cb85ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.707603][ T30] r4:84cb8580 [ 1314.707627][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.707728][ T30] r10:00000000 r9:84cb8580 r8:80278fec r7:e00f9e60 r6:84cb8000 r5:83afc800 [ 1314.707751][ T30] r4:00000001 [ 1314.707766][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.707907][ T30] Exception stack(0xdfc1dfb0 to 0xdfc1dff8) [ 1314.707948][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.707986][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.708022][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.708064][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.708086][ T30] r4:84ca3d40 [ 1314.708288][ T30] INFO: task kworker/1:32:7095 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.708327][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.708409][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.708486][ T30] Call trace: [ 1314.708516][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.708589][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.708616][ T30] r4:00000000 [ 1314.708632][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.708700][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.708738][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.708774][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.730191][ T30] dd60: 80000113 ffffffff [ 1314.730358][ T30] r5:80000113 r4:80239c10 [ 1314.730384][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.730485][ T30] r4:82acb1e4 [ 1314.730503][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.730600][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.730624][ T30] r4:ea48ddc0 [ 1314.730649][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.730721][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.730741][ T30] r4:00000000 [ 1314.730757][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.731193][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.731242][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.731317][ T30] r5:00001000 r4:eaa35000 [ 1314.731334][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.731395][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.731463][ T30] r5:84f4778c r4:84d64000 [ 1314.731480][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.731552][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.731572][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.731657][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.731680][ T30] r4:84d64000 [ 1314.731697][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.731845][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.731949][ T30] r4:00000001 [ 1314.731974][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.732063][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.732106][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.732179][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.732216][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.732290][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.732317][ T30] r4:85490cc0 [ 1314.732343][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.740011][ T30] INFO: task kworker/0:32:7096 blocked for more than 430 seconds. [ 1314.740132][ T30] Not tainted syzkaller #0 [ 1314.740162][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.740202][ T30] task:kworker/0:32 state:D stack:0 pid:7096 tgid:7096 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.740295][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.740416][ T30] Call trace: [ 1314.740453][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.740545][ T30] r10:ea9b9d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea9b9d8c r5:84e22400 [ 1314.740570][ T30] r4:84e22400 [ 1314.740647][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.740720][ T30] r5:84e22400 r4:8291719c [ 1314.740737][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.740798][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.740912][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 [ 1314.740952][ T30] r4:00000000 [ 1314.740969][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.741027][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.741088][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.741160][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586f380 [ 1314.741183][ T30] r4:00000000 [ 1314.741200][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.741390][ T30] r9:83018405 r8:84e22400 r7:00000000 r6:83018400 r5:00001000 r4:7f27e000 [ 1314.741419][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.741488][ T30] r5:00001000 r4:e4229000 [ 1314.741506][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.741566][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.741629][ T30] r5:84b02f8c r4:8987af80 [ 1314.741661][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.741737][ T30] r7:dddcfd80 r6:83018400 r5:84b02f8c r4:8987af80 [ 1314.741757][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.741832][ T30] r10:61c88647 r9:84e22400 r8:8987afac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1314.741853][ T30] r4:8987af80 [ 1314.741869][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.741936][ T30] r10:00000000 r9:8987af80 r8:80278fec r7:ea465e60 r6:8987ac00 r5:84e22400 [ 1314.741957][ T30] r4:00000001 [ 1314.741974][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.742027][ T30] Exception stack(0xea9b9fb0 to 0xea9b9ff8) [ 1314.742062][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1314.742100][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.742136][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.742176][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.742237][ T30] r4:857a6780 [ 1314.742652][ T30] INFO: task kworker/0:32:7096 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.742717][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.742823][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.743020][ T30] Call trace: [ 1314.743056][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.743137][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.743183][ T30] r4:00000000 [ 1314.743204][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.743265][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.743306][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.743445][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.743490][ T30] dd60: 80000113 ffffffff [ 1314.743518][ T30] r5:80000113 r4:80239c10 [ 1314.743651][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.743722][ T30] r4:82acb1e4 [ 1314.743775][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.743855][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.743903][ T30] r4:ea48ddc0 [ 1314.743966][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.744033][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.744109][ T30] r4:00000000 [ 1314.744131][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.744225][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.744281][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.744351][ T30] r5:00001000 r4:eaa35000 [ 1314.744368][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.744425][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.744691][ T30] r5:84f4778c r4:84d64000 [ 1314.744716][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.744789][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.744808][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.744950][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.744988][ T30] r4:84d64000 [ 1314.745006][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.745292][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.745331][ T30] r4:00000001 [ 1314.745347][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.745400][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.745431][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.745468][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.745500][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.745542][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.745564][ T30] r4:85490cc0 [ 1314.745582][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.745610][ T30] INFO: task kworker/1:33:7098 blocked for more than 430 seconds. [ 1314.745652][ T30] Not tainted syzkaller #0 [ 1314.745676][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.745700][ T30] task:kworker/1:33 state:D stack:0 pid:7098 tgid:7098 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.745884][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.745942][ T30] Call trace: [ 1314.745973][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.746052][ T30] r10:e4231d84 r9:00000002 r8:60000013 r7:829171a0 r6:e4231d8c r5:84e26c00 [ 1314.746075][ T30] r4:84e26c00 [ 1314.746092][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.746154][ T30] r5:84e26c00 r4:8291719c [ 1314.746196][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.746259][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.746338][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4231e08 [ 1314.746360][ T30] r4:00000000 [ 1314.746377][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.746435][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.746515][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.746620][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8972cf40 [ 1314.746652][ T30] r4:00000000 [ 1314.746733][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.746809][ T30] r9:83018605 r8:84e26c00 r7:00000000 r6:83018600 r5:00001000 r4:7f29a000 [ 1314.746835][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.746898][ T30] r5:00001000 r4:ea315000 [ 1314.746916][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.746971][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.747053][ T30] r5:84fcef8c r4:83884300 [ 1314.747157][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.747336][ T30] r7:ddde3d80 r6:83018600 r5:84fcef8c r4:83884300 [ 1314.747434][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.747510][ T30] r10:61c88647 r9:84e26c00 r8:8388432c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.747531][ T30] r4:83884300 [ 1314.747603][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.747683][ T30] r10:00000000 r9:83884300 r8:80278fec r7:e0085e60 r6:8987a480 r5:84e26c00 [ 1314.747706][ T30] r4:00000001 [ 1314.747721][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.747768][ T30] Exception stack(0xe4231fb0 to 0xe4231ff8) [ 1314.747796][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1314.747830][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.747896][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.747959][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.748051][ T30] r4:85863b80 [ 1314.748247][ T30] INFO: task kworker/1:33:7098 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.748322][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.748392][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.748439][ T30] Call trace: [ 1314.748524][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.748622][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.748656][ T30] r4:00000000 [ 1314.748715][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.773369][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.773569][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.773612][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.773639][ T30] dd60: 80000113 ffffffff [ 1314.773701][ T30] r5:80000113 r4:80239c10 [ 1314.773726][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.773826][ T30] r4:82acb1e4 [ 1314.773844][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.773918][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.773940][ T30] r4:ea48ddc0 [ 1314.773958][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.774030][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.774051][ T30] r4:00000000 [ 1314.774066][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.774136][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.774183][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.774252][ T30] r5:00001000 r4:eaa35000 [ 1314.774271][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.774329][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.774394][ T30] r5:84f4778c r4:84d64000 [ 1314.774412][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.774487][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.774507][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.774607][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.774631][ T30] r4:84d64000 [ 1314.774659][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.774735][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.774820][ T30] r4:00000001 [ 1314.774840][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.774895][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.774930][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.774967][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.774999][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.775040][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.775097][ T30] r4:85490cc0 [ 1314.775123][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.775157][ T30] INFO: task kworker/0:33:7103 blocked for more than 430 seconds. [ 1314.775199][ T30] Not tainted syzkaller #0 [ 1314.775224][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.775242][ T30] task:kworker/0:33 state:D stack:0 pid:7103 tgid:7103 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.775359][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.775439][ T30] Call trace: [ 1314.775475][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.775579][ T30] r10:e0151d84 r9:00000002 r8:60010113 r7:829171a0 r6:e0151d8c r5:84e26000 [ 1314.775599][ T30] r4:84e26000 [ 1314.775617][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.775687][ T30] r5:84e26000 r4:8291719c [ 1314.775705][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.775763][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.775834][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0151e08 [ 1314.775854][ T30] r4:00000000 [ 1314.775870][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.775966][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.776045][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.776109][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589eac0 [ 1314.776154][ T30] r4:00000000 [ 1314.776174][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.776238][ T30] r9:83018405 r8:84e26000 r7:00000000 r6:83018400 r5:00001000 r4:7f298000 [ 1314.776254][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.776308][ T30] r5:00001000 r4:e82e9000 [ 1314.776323][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.776376][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.776431][ T30] r5:857f1b8c r4:8987a180 [ 1314.776446][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.776512][ T30] r7:dddcfd80 r6:83018400 r5:857f1b8c r4:8987a180 [ 1314.776528][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.776594][ T30] r10:61c88647 r9:84e26000 r8:8987a1ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1314.776613][ T30] r4:8987a180 [ 1314.776628][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.776707][ T30] r10:00000000 r9:8987a180 r8:80278fec r7:ea465e60 r6:8987a080 r5:84e26000 [ 1314.776728][ T30] r4:00000001 [ 1314.776746][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.776800][ T30] Exception stack(0xe0151fb0 to 0xe0151ff8) [ 1314.776828][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1314.776859][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.776888][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.776947][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.776971][ T30] r4:84ca3200 [ 1314.777358][ T30] INFO: task kworker/0:33:7103 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.777446][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.777527][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.777583][ T30] Call trace: [ 1314.777606][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.777748][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.777789][ T30] r4:00000000 [ 1314.777809][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.777866][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.777904][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.777941][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.777966][ T30] dd60: 80000113 ffffffff [ 1314.777990][ T30] r5:80000113 r4:80239c10 [ 1314.778007][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.778070][ T30] r4:82acb1e4 [ 1314.778087][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.778149][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.778168][ T30] r4:ea48ddc0 [ 1314.778202][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.778278][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.778301][ T30] r4:00000000 [ 1314.778319][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.778388][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.778406][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.778464][ T30] r5:00001000 r4:eaa35000 [ 1314.778482][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.778558][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.778618][ T30] r5:84f4778c r4:84d64000 [ 1314.778632][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.794388][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.794471][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.794645][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.794673][ T30] r4:84d64000 [ 1314.794689][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.794764][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.794785][ T30] r4:00000001 [ 1314.794802][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.794898][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.794943][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.794981][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.795014][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.795076][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.795104][ T30] r4:85490cc0 [ 1314.795142][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.795176][ T30] INFO: task kworker/1:34:7111 blocked for more than 430 seconds. [ 1314.795216][ T30] Not tainted syzkaller #0 [ 1314.795241][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.795273][ T30] task:kworker/1:34 state:D stack:0 pid:7111 tgid:7111 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.795355][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.795414][ T30] Call trace: [ 1314.795444][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.795545][ T30] r10:e01c1d84 r9:00000002 r8:60000113 r7:829171a0 r6:e01c1d8c r5:8985ec00 [ 1314.795568][ T30] r4:8985ec00 [ 1314.795584][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.795652][ T30] r5:8985ec00 r4:8291719c [ 1314.795670][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.795729][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.795805][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01c1e08 [ 1314.795827][ T30] r4:00000000 [ 1314.795843][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.795901][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.795963][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.796031][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:89818040 [ 1314.796054][ T30] r4:00000000 [ 1314.796071][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.796139][ T30] r9:83018605 r8:8985ec00 r7:00000000 r6:83018600 r5:00001000 r4:7f29e000 [ 1314.796222][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.796283][ T30] r5:00001000 r4:ea3ef000 [ 1314.796387][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.796448][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.796524][ T30] r5:8545778c r4:83884000 [ 1314.796578][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.796656][ T30] r7:ddde3d80 r6:83018600 r5:8545778c r4:83884000 [ 1314.796674][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.796747][ T30] r10:61c88647 r9:8985ec00 r8:8388402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.796768][ T30] r4:83884000 [ 1314.796784][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.796851][ T30] r10:00000000 r9:83884000 r8:80278fec r7:e4231e60 r6:83884980 r5:8985ec00 [ 1314.796982][ T30] r4:00000001 [ 1314.797090][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.797140][ T30] Exception stack(0xe01c1fb0 to 0xe01c1ff8) [ 1314.797173][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1314.797207][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.797237][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.797269][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.797289][ T30] r4:849cc380 [ 1314.797631][ T30] INFO: task kworker/1:34:7111 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.797713][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.797805][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.797922][ T30] Call trace: [ 1314.797991][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.798091][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.798118][ T30] r4:00000000 [ 1314.798133][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.798187][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.798228][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.798287][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.798317][ T30] dd60: 80000113 ffffffff [ 1314.798358][ T30] r5:80000113 r4:80239c10 [ 1314.798377][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.798433][ T30] r4:82acb1e4 [ 1314.798579][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.809828][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.809914][ T30] r4:ea48ddc0 [ 1314.809936][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.810053][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.810076][ T30] r4:00000000 [ 1314.810091][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.810160][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.810212][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.810280][ T30] r5:00001000 r4:eaa35000 [ 1314.810297][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.810352][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.810414][ T30] r5:84f4778c r4:84d64000 [ 1314.810430][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.810501][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.810538][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.810617][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.810657][ T30] r4:84d64000 [ 1314.810674][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.810764][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.810787][ T30] r4:00000001 [ 1314.810804][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.810876][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.810915][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.810951][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.810982][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.811069][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.811093][ T30] r4:85490cc0 [ 1314.811117][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.811166][ T30] INFO: task kworker/0:34:7113 blocked for more than 430 seconds. [ 1314.811207][ T30] Not tainted syzkaller #0 [ 1314.811244][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.811285][ T30] task:kworker/0:34 state:D stack:0 pid:7113 tgid:7113 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.811368][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.811433][ T30] Call trace: [ 1314.811465][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.811649][ T30] r10:ea325d84 r9:00000002 r8:60000013 r7:829171a0 r6:ea325d8c r5:854e3000 [ 1314.811728][ T30] r4:854e3000 [ 1314.811747][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.811810][ T30] r5:854e3000 r4:8291719c [ 1314.811843][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.811960][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.812034][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea325e08 [ 1314.812056][ T30] r4:00000000 [ 1314.812072][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.812127][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.812273][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.812341][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c9cc0 [ 1314.812361][ T30] r4:00000000 [ 1314.812376][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.812475][ T30] r9:83018405 r8:854e3000 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 1314.812494][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.812556][ T30] r5:00001000 r4:ea34b000 [ 1314.812572][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.812628][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.812697][ T30] r5:85457f8c r4:8987a580 [ 1314.812714][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.812820][ T30] r7:dddcfd80 r6:83018400 r5:85457f8c r4:8987a580 [ 1314.812898][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.812970][ T30] r10:61c88647 r9:854e3000 r8:8987a5ac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1314.812990][ T30] r4:8987a580 [ 1314.813020][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.813089][ T30] r10:00000000 r9:8987a580 r8:80278fec r7:e0151e60 r6:84cb8d00 r5:854e3000 [ 1314.813117][ T30] r4:00000001 [ 1314.813134][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.813217][ T30] Exception stack(0xea325fb0 to 0xea325ff8) [ 1314.813249][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1314.813408][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.813460][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.813498][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.813518][ T30] r4:857a93c0 [ 1314.813885][ T30] INFO: task kworker/0:34:7113 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.814031][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.814115][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.814417][ T30] Call trace: [ 1314.814445][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.814559][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.814586][ T30] r4:00000000 [ 1314.814602][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.814665][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.814741][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.814787][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.814811][ T30] dd60: 80000113 ffffffff [ 1314.814868][ T30] r5:80000113 r4:80239c10 [ 1314.814888][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.814985][ T30] r4:82acb1e4 [ 1314.815005][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.815075][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.815096][ T30] r4:ea48ddc0 [ 1314.815173][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.815241][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.815317][ T30] r4:00000000 [ 1314.815335][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.815402][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.815419][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.815508][ T30] r5:00001000 r4:eaa35000 [ 1314.815526][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.815578][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.815843][ T30] r5:84f4778c r4:84d64000 [ 1314.815989][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.816074][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.816091][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.816164][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.816183][ T30] r4:84d64000 [ 1314.816199][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.816296][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.816321][ T30] r4:00000001 [ 1314.816382][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.816436][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.816471][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.816697][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.816764][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.816808][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.816830][ T30] r4:85490cc0 [ 1314.816847][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.816872][ T30] INFO: task kworker/1:35:7116 blocked for more than 430 seconds. [ 1314.817140][ T30] Not tainted syzkaller #0 [ 1314.817173][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.817387][ T30] task:kworker/1:35 state:D stack:0 pid:7116 tgid:7116 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.817525][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.817581][ T30] Call trace: [ 1314.817608][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.817704][ T30] r10:ea471d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea471d8c r5:84e23c00 [ 1314.817730][ T30] r4:84e23c00 [ 1314.817745][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.817800][ T30] r5:84e23c00 r4:8291719c [ 1314.817815][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.817869][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.817974][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea471e08 [ 1314.818002][ T30] r4:00000000 [ 1314.818020][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.818076][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.818125][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.818192][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ffe80 [ 1314.818214][ T30] r4:00000000 [ 1314.818228][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.818310][ T30] r9:83018605 r8:84e23c00 r7:00000000 r6:83018600 r5:00001000 r4:7f29c000 [ 1314.818331][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.818397][ T30] r5:00001000 r4:ea319000 [ 1314.818414][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.818470][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.818665][ T30] r5:84b00f8c r4:8570da80 [ 1314.831460][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.831664][ T30] r7:ddde3d80 r6:83018600 r5:84b00f8c r4:8570da80 [ 1314.831685][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.831766][ T30] r10:61c88647 r9:84e23c00 r8:8570daac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.831786][ T30] r4:8570da80 [ 1314.831802][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.831876][ T30] r10:00000000 r9:8570da80 r8:80278fec r7:e01c1e60 r6:8987a900 r5:84e23c00 [ 1314.831958][ T30] r4:00000001 [ 1314.831981][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.832037][ T30] Exception stack(0xea471fb0 to 0xea471ff8) [ 1314.832076][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1314.832114][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.832147][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.832186][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.832243][ T30] r4:856ffc80 [ 1314.832666][ T30] INFO: task kworker/1:35:7116 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.832708][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.832803][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.832861][ T30] Call trace: [ 1314.832888][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.832973][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.833072][ T30] r4:00000000 [ 1314.833093][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.833184][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.833236][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.833275][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.833420][ T30] dd60: 80000113 ffffffff [ 1314.833466][ T30] r5:80000113 r4:80239c10 [ 1314.833486][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.833586][ T30] r4:82acb1e4 [ 1314.833667][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.833750][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.833774][ T30] r4:ea48ddc0 [ 1314.833791][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.833899][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.833932][ T30] r4:00000000 [ 1314.833949][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.834020][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.834040][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.834100][ T30] r5:00001000 r4:eaa35000 [ 1314.834117][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.834198][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.834265][ T30] r5:84f4778c r4:84d64000 [ 1314.834282][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.834385][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.834405][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.834477][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.834505][ T30] r4:84d64000 [ 1314.834555][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.834626][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.834660][ T30] r4:00000001 [ 1314.834682][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.834730][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.834765][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.834802][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.834830][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.834887][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.834912][ T30] r4:85490cc0 [ 1314.834965][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.834999][ T30] INFO: task kworker/1:36:7121 blocked for more than 430 seconds. [ 1314.835037][ T30] Not tainted syzkaller #0 [ 1314.835065][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.835079][ T30] task:kworker/1:36 state:D stack:0 pid:7121 tgid:7121 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.835132][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.835199][ T30] Call trace: [ 1314.835247][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.835317][ T30] r10:df9edd84 r9:00000002 r8:60000113 r7:829171a0 r6:df9edd8c r5:854e6000 [ 1314.835339][ T30] r4:854e6000 [ 1314.835355][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.835412][ T30] r5:854e6000 r4:8291719c [ 1314.835429][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.835506][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.835579][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 [ 1314.835603][ T30] r4:00000000 [ 1314.835619][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.835680][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.835751][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.835817][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8976bb00 [ 1314.835838][ T30] r4:00000000 [ 1314.835852][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.835951][ T30] r9:83018605 r8:854e6000 r7:00000000 r6:83018600 r5:00001000 r4:7f284000 [ 1314.835971][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.836029][ T30] r5:00001000 r4:dfa2d000 [ 1314.836045][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.836105][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.836169][ T30] r5:84e1878c r4:84ca7600 [ 1314.836186][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.836255][ T30] r7:ddde3d80 r6:83018600 r5:84e1878c r4:84ca7600 [ 1314.836271][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.836340][ T30] r10:61c88647 r9:854e6000 r8:84ca762c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.836379][ T30] r4:84ca7600 [ 1314.836397][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.836465][ T30] r10:00000000 r9:84ca7600 r8:80278fec r7:e01c1e60 r6:84ca7280 r5:854e6000 [ 1314.836486][ T30] r4:00000001 [ 1314.836502][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.836570][ T30] Exception stack(0xdf9edfb0 to 0xdf9edff8) [ 1314.836604][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.836664][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.836698][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.836735][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.836755][ T30] r4:84fd9c40 [ 1314.836921][ T30] INFO: task kworker/1:36:7121 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.836971][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.837072][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.837124][ T30] Call trace: [ 1314.837151][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.837228][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.837252][ T30] r4:00000000 [ 1314.837267][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.837332][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.837373][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.837408][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.837504][ T30] dd60: 80000113 ffffffff [ 1314.837576][ T30] r5:80000113 r4:80239c10 [ 1314.837597][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.837713][ T30] r4:82acb1e4 [ 1314.837734][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.837805][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.837826][ T30] r4:ea48ddc0 [ 1314.837843][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.837907][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.838343][ T30] r4:00000000 [ 1314.838372][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.838444][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.838463][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.838520][ T30] r5:00001000 r4:eaa35000 [ 1314.838560][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.838620][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.850128][ T30] r5:84f4778c r4:84d64000 [ 1314.850207][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.850325][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.850346][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.850430][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.850453][ T30] r4:84d64000 [ 1314.850469][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.850567][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.850590][ T30] r4:00000001 [ 1314.850607][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.850672][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.850713][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.850750][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.850819][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.850866][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.850888][ T30] r4:85490cc0 [ 1314.850913][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.853233][ T30] INFO: task kworker/1:38:7154 blocked for more than 430 seconds. [ 1314.853291][ T30] Not tainted syzkaller #0 [ 1314.853321][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.853339][ T30] task:kworker/1:38 state:D stack:0 pid:7154 tgid:7154 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.853421][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.853524][ T30] Call trace: [ 1314.853583][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.853678][ T30] r10:e0081d84 r9:00000002 r8:60000113 r7:829171a0 r6:e0081d8c r5:854e4800 [ 1314.853774][ T30] r4:854e4800 [ 1314.853795][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.853857][ T30] r5:854e4800 r4:8291719c [ 1314.853945][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.854011][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.854090][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08 [ 1314.854113][ T30] r4:00000000 [ 1314.854180][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.854281][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.854347][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.854416][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c22c0 [ 1314.854437][ T30] r4:00000000 [ 1314.854472][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.854570][ T30] r9:83018605 r8:854e4800 r7:00000000 r6:83018600 r5:00001000 r4:7f286000 [ 1314.854591][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.854662][ T30] r5:00001000 r4:dfa73000 [ 1314.854680][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.854738][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.854804][ T30] r5:896fd78c r4:8987aa00 [ 1314.854820][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.854894][ T30] r7:ddde3d80 r6:83018600 r5:896fd78c r4:8987aa00 [ 1314.854914][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.854990][ T30] r10:61c88647 r9:854e4800 r8:8987aa2c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.855035][ T30] r4:8987aa00 [ 1314.855057][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.855133][ T30] r10:00000000 r9:8987aa00 r8:80278fec r7:dfa3de60 r6:84ca7080 r5:854e4800 [ 1314.855156][ T30] r4:00000001 [ 1314.855171][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.855346][ T30] Exception stack(0xe0081fb0 to 0xe0081ff8) [ 1314.855386][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1314.855433][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.855540][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.855590][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.855682][ T30] r4:857a3180 [ 1314.856074][ T30] INFO: task kworker/1:38:7154 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.856113][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.856185][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.856313][ T30] Call trace: [ 1314.856459][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.856543][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.856565][ T30] r4:00000000 [ 1314.856666][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.856729][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.856771][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.856812][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.856836][ T30] dd60: 80000113 ffffffff [ 1314.856863][ T30] r5:80000113 r4:80239c10 [ 1314.856882][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.856980][ T30] r4:82acb1e4 [ 1314.857002][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.857076][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.857097][ T30] r4:ea48ddc0 [ 1314.857113][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.857182][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.857200][ T30] r4:00000000 [ 1314.857215][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.857275][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.857290][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.857343][ T30] r5:00001000 r4:eaa35000 [ 1314.857359][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.857444][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.857513][ T30] r5:84f4778c r4:84d64000 [ 1314.857530][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.857599][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.857614][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.857688][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.857727][ T30] r4:84d64000 [ 1314.857743][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.857843][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.857879][ T30] r4:00000001 [ 1314.857896][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.857974][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.858009][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.858042][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.858073][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.858108][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.858127][ T30] r4:85490cc0 [ 1314.858143][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.858167][ T30] INFO: task kworker/1:39:7157 blocked for more than 430 seconds. [ 1314.858196][ T30] Not tainted syzkaller #0 [ 1314.858216][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.858246][ T30] task:kworker/1:39 state:D stack:0 pid:7157 tgid:7157 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.858364][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.858448][ T30] Call trace: [ 1314.858616][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.869851][ T30] r10:ea5edd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea5edd8c r5:854e0000 [ 1314.869916][ T30] r4:854e0000 [ 1314.869974][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.870069][ T30] r5:854e0000 r4:8291719c [ 1314.870090][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.870148][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.870221][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea5ede08 [ 1314.870277][ T30] r4:00000000 [ 1314.870327][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.870388][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.870448][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.870516][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a3640 [ 1314.870557][ T30] r4:00000000 [ 1314.870609][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.870689][ T30] r9:83018605 r8:854e0000 r7:00000000 r6:83018600 r5:00001000 r4:7f288000 [ 1314.870709][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.870773][ T30] r5:00001000 r4:dfa75000 [ 1314.870792][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.870881][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.870980][ T30] r5:896fdf8c r4:8987a980 [ 1314.871000][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.871076][ T30] r7:ddde3d80 r6:83018600 r5:896fdf8c r4:8987a980 [ 1314.871096][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.871182][ T30] r10:61c88647 r9:854e0000 r8:8987a9ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.871204][ T30] r4:8987a980 [ 1314.871220][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.871292][ T30] r10:00000000 r9:8987a980 r8:80278fec r7:dfa3de60 r6:84ca7c00 r5:854e0000 [ 1314.871313][ T30] r4:00000001 [ 1314.871329][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.871380][ T30] Exception stack(0xea5edfb0 to 0xea5edff8) [ 1314.871418][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.871491][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.871526][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.871567][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.871610][ T30] r4:857a3740 [ 1314.871983][ T30] INFO: task kworker/1:39:7157 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.872022][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.872155][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.872247][ T30] Call trace: [ 1314.872346][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.872420][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.872461][ T30] r4:00000000 [ 1314.872477][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.872532][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.872607][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.872693][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.872719][ T30] dd60: 80000113 ffffffff [ 1314.872760][ T30] r5:80000113 r4:80239c10 [ 1314.872779][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.872843][ T30] r4:82acb1e4 [ 1314.872882][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.872952][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.872994][ T30] r4:ea48ddc0 [ 1314.873046][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.873112][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.873139][ T30] r4:00000000 [ 1314.873157][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.873226][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.873243][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.873334][ T30] r5:00001000 r4:eaa35000 [ 1314.873352][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.873409][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.873488][ T30] r5:84f4778c r4:84d64000 [ 1314.873505][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.873575][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.873593][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.873668][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.873693][ T30] r4:84d64000 [ 1314.873708][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.873774][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.873814][ T30] r4:00000001 [ 1314.873831][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.873917][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.873948][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.874016][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.874049][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.874118][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.874177][ T30] r4:85490cc0 [ 1314.874227][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.874264][ T30] INFO: task kworker/0:36:7159 blocked for more than 430 seconds. [ 1314.874304][ T30] Not tainted syzkaller #0 [ 1314.874329][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1314.874343][ T30] task:kworker/0:36 state:D stack:0 pid:7159 tgid:7159 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.874398][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.874445][ T30] Call trace: [ 1314.874506][ T30] [<81a643fc>] (__schedule) from [<81a65390>] (schedule+0x2c/0x130) [ 1314.874604][ T30] r10:ea349d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea349d8c r5:84e71800 [ 1314.874625][ T30] r4:84e71800 [ 1314.874639][ T30] [<81a65364>] (schedule) from [<81a65778>] (schedule_preempt_disabled+0x18/0x24) [ 1314.874705][ T30] r5:84e71800 r4:8291719c [ 1314.874721][ T30] [<81a65760>] (schedule_preempt_disabled) from [<81a68328>] (__mutex_lock.constprop.0+0x350/0xa24) [ 1314.874779][ T30] [<81a67fd8>] (__mutex_lock.constprop.0) from [<81a68ad0>] (__mutex_lock_slowpath+0x14/0x18) [ 1314.874851][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea349e08 [ 1314.874872][ T30] r4:00000000 [ 1314.874888][ T30] [<81a68abc>] (__mutex_lock_slowpath) from [<81a68b10>] (mutex_lock+0x3c/0x40) [ 1314.874944][ T30] [<81a68ad4>] (mutex_lock) from [<804ea31c>] (_vm_unmap_aliases+0x68/0x240) [ 1314.874995][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.875063][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a8540 [ 1314.875083][ T30] r4:00000000 [ 1314.875098][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.875198][ T30] r9:83018405 r8:84e71800 r7:00000000 r6:83018400 r5:00001000 r4:7f28c000 [ 1314.875217][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.875352][ T30] r5:00001000 r4:ea377000 [ 1314.875397][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.875627][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.875704][ T30] r5:8545738c r4:855c4c80 [ 1314.875720][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.875792][ T30] r7:dddcfd80 r6:83018400 r5:8545738c r4:855c4c80 [ 1314.875809][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.875881][ T30] r10:61c88647 r9:84e71800 r8:855c4cac r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 1314.875902][ T30] r4:855c4c80 [ 1314.875921][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.875989][ T30] r10:00000000 r9:855c4c80 r8:80278fec r7:e82a9e60 r6:855c4380 r5:84e71800 [ 1314.876013][ T30] r4:00000001 [ 1314.876029][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.876077][ T30] Exception stack(0xea349fb0 to 0xea349ff8) [ 1314.876108][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1314.876175][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.876240][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.876278][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.876332][ T30] r4:857a84c0 [ 1314.876512][ T30] INFO: task kworker/0:36:7159 is blocked on a mutex likely owned by task kworker/1:26:7035. [ 1314.876564][ T30] task:kworker/1:26 state:R running task stack:0 pid:7035 tgid:7035 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1314.876630][ T30] Workqueue: events bpf_prog_free_deferred [ 1314.876710][ T30] Call trace: [ 1314.876738][ T30] [<81a643fc>] (__schedule) from [<81a657c4>] (preempt_schedule_irq+0x40/0xa8) [ 1314.876830][ T30] r10:8280c9b4 r9:84e24800 r8:80200c04 r7:ea48dd54 r6:ffffffff r5:84e24800 [ 1314.876855][ T30] r4:00000000 [ 1314.876871][ T30] [<81a65784>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1314.876927][ T30] Exception stack(0xea48dd20 to 0xea48dd68) [ 1314.876967][ T30] dd20: b90d5000 eadcb000 00000001 80239bf8 7f28a000 00000001 82acb1c4 82aca5a0 [ 1314.877034][ T30] dd40: 7f28a000 eadcb000 8280c9b4 ea48dd9c ea48dda0 ea48dd70 80230af0 80239c10 [ 1314.877061][ T30] dd60: 80000113 ffffffff [ 1314.877088][ T30] r5:80000113 r4:80239c10 [ 1314.877106][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea0e0>] (__purge_vmap_area_lazy+0x284/0x458) [ 1314.877169][ T30] r4:82acb1e4 [ 1314.877185][ T30] [<804e9e5c>] (__purge_vmap_area_lazy) from [<804ea498>] (_vm_unmap_aliases+0x1e4/0x240) [ 1314.877247][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea48ddc0 r5:ea48de08 [ 1314.877288][ T30] r4:ea48ddc0 [ 1314.877337][ T30] [<804ea2b4>] (_vm_unmap_aliases) from [<804ee0fc>] (vfree+0x16c/0x210) [ 1314.877425][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ba100 [ 1314.877516][ T30] r4:00000000 [ 1314.877538][ T30] [<804edf90>] (vfree) from [<80559048>] (execmem_free+0x30/0x50) [ 1314.877603][ T30] r9:83018605 r8:84e24800 r7:00000000 r6:83018600 r5:00001000 r4:7f2ae000 [ 1314.877677][ T30] [<80559018>] (execmem_free) from [<803c5f98>] (bpf_jit_free_exec+0x10/0x14) [ 1314.877741][ T30] r5:00001000 r4:eaa35000 [ 1314.877755][ T30] [<803c5f88>] (bpf_jit_free_exec) from [<803c6378>] (bpf_jit_free+0x68/0xe4) [ 1314.877813][ T30] [<803c6310>] (bpf_jit_free) from [<803c7420>] (bpf_prog_free_deferred+0x140/0x158) [ 1314.877869][ T30] r5:84f4778c r4:84d64000 [ 1314.877883][ T30] [<803c72e0>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1314.877947][ T30] r7:ddde3d80 r6:83018600 r5:84f4778c r4:84d64000 [ 1314.877962][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1314.878063][ T30] r10:61c88647 r9:84e24800 r8:84d6402c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 1314.878113][ T30] r4:84d64000 [ 1314.878167][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.878247][ T30] r10:00000000 r9:84d64000 r8:80278fec r7:ea885e60 r6:8987a680 r5:84e24800 [ 1314.878269][ T30] r4:00000001 [ 1314.878284][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.878328][ T30] Exception stack(0xea48dfb0 to 0xea48dff8) [ 1314.878359][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1314.878393][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.878421][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.878454][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.878496][ T30] r4:85490cc0 [ 1314.878591][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 1314.893362][ T30] NMI backtrace for cpu 0 [ 1314.894304][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 1314.894666][ T30] Hardware name: ARM-Versatile Express [ 1314.895473][ T30] Call trace: [ 1314.896129][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1314.896433][ T30] r7:00000000 r6:00000013 r5:60000093 r4:82252738 [ 1314.896746][ T30] [<80201b08>] (show_stack) from [<8021f8f8>] (dump_stack_lvl+0x70/0x7c) [ 1314.896993][ T30] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1314.897204][ T30] r5:00000000 r4:00000001 [ 1314.897384][ T30] [<8021f904>] (dump_stack) from [<81a4e014>] (nmi_cpu_backtrace+0x160/0x17c) [ 1314.897582][ T30] [<81a4deb4>] (nmi_cpu_backtrace) from [<81a4e160>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 1314.898054][ T30] r7:00000000 r6:8280c690 r5:8281ae34 r4:ffffffff [ 1314.898382][ T30] [<81a4e030>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 1314.898466][ T30] r9:8281ba28 r8:8280c810 r7:00018c68 r6:00007d5c r5:82abf7d4 r4:87a0e90c [ 1314.899008][ T30] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037faf0>] (watchdog+0x5d0/0x850) [ 1314.899114][ T30] [<8037f520>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.899435][ T30] r10:00000000 r9:00000000 r8:8037f520 r7:83329100 r6:83329100 r5:8321e000 [ 1314.899788][ T30] r4:00000001 [ 1314.899940][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.900093][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 1314.900140][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1314.900180][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.900214][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.900256][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.900279][ T30] r4:832c0ac0 [ 1314.901740][ T30] Sending NMI from CPU 0 to CPUs 1: [ 1314.902340][ C1] NMI backtrace for cpu 1 [ 1314.902515][ C1] CPU: 1 UID: 0 PID: 2817 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 1314.902607][ C1] Hardware name: ARM-Versatile Express [ 1314.902667][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 1314.902755][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 1314.902812][ C1] pc : [<81a6e264>] lr : [<80a8f568>] psr: 60000113 [ 1314.902852][ C1] sp : eb08deb0 ip : eb08dec0 fp : eb08debc [ 1314.902884][ C1] r10: 82959594 r9 : 00000001 r8 : 00000000 [ 1314.902922][ C1] r7 : 00000117 r6 : 829594f8 r5 : 00000000 r4 : 00000001 [ 1314.902963][ C1] r3 : 00000ed6 r2 : 00000000 r1 : 60000113 r0 : 840fec40 [ 1314.903086][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1314.903149][ C1] Control: 30c5387d Table: 84947d40 DAC: 00000000 [ 1314.903204][ C1] Call trace: [ 1314.903239][ C1] [<81a6e23c>] (_raw_spin_unlock_irqrestore) from [<80a8f568>] (pl011_console_device_unlock+0x20/0x24) [ 1314.903299][ C1] [<80a8f548>] (pl011_console_device_unlock) from [<802e3750>] (nbcon_emit_one+0x88/0x100) [ 1314.903352][ C1] [<802e36c8>] (nbcon_emit_one) from [<802e3970>] (nbcon_kthread_func+0x1a8/0x2a4) [ 1314.903412][ C1] r6:8280c690 r5:841e0c00 r4:829594f8 [ 1314.903426][ C1] [<802e37c8>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280) [ 1314.903491][ C1] r10:00000000 r9:829594f8 r8:802e37c8 r7:844e4d00 r6:844e4d00 r5:841e0c00 [ 1314.903509][ C1] r4:00000001 [ 1314.903522][ C1] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1314.903566][ C1] Exception stack(0xeb08dfb0 to 0xeb08dff8) [ 1314.903600][ C1] dfa0: 00000000 00000000 00000000 00000000 [ 1314.903632][ C1] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1314.903681][ C1] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1314.903716][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1314.903733][ C1] r4:8423e840 [ 1314.920694][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 1315.217749][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 1315.220484][ T30] Hardware name: ARM-Versatile Express [ 1315.224361][ T30] Call trace: [ 1315.228841][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1315.231717][ T30] r7:8225345c r6:8321e000 r5:00000000 r4:82252738 [ 1315.236884][ T30] [<80201b08>] (show_stack) from [<8021f8dc>] (dump_stack_lvl+0x54/0x7c) [ 1315.240044][ T30] [<8021f888>] (dump_stack_lvl) from [<8021f91c>] (dump_stack+0x18/0x1c) [ 1315.245828][ T30] r5:00000000 r4:82a78d18 [ 1315.248867][ T30] [<8021f904>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 1315.252058][ T30] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 1315.258879][ T30] r7:00018c68 [ 1315.259139][ T30] [<80202800>] (panic) from [<8037f930>] (watchdog+0x410/0x850) [ 1315.266749][ T30] r3:00000001 r2:00000000 r1:00000000 r0:8225345c [ 1315.269233][ T30] [<8037f520>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 1315.269669][ T30] r10:00000000 r9:00000000 r8:8037f520 r7:83329100 r6:83329100 r5:8321e000 [ 1315.270024][ T30] r4:00000001 [ 1315.270194][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1315.270633][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 1315.273212][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1315.278843][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1315.281629][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1315.286821][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1315.289204][ T30] r4:832c0ac0 [ 1315.293323][ T30] Rebooting in 86400 seconds..