last executing test programs: 22m45.758035843s ago: executing program 32 (id=146): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000c00)=@newlink={0x50, 0x10, 0x40d, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x48243, 0x40}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_FLAGS={0x6}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'macvlan0\x00'}]}, 0x50}}, 0x8000) 18m34.432865203s ago: executing program 0 (id=737): r0 = socket$kcm(0x2d, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) epoll_create1(0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000003c0)='kmem_cache_free\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/12, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_usb_connect(0x4, 0x24, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) 18m34.223738616s ago: executing program 0 (id=738): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xc, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140), r1) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000880)=ANY=[@ANYBLOB="600000001000ff"], 0x60}, 0x1, 0x0, 0x0, 0x91}, 0xc010) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0x1000, 0x4) sendto(r1, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x20000090, 0x0, 0x0) recvmmsg(r1, &(0x7f000000a340)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x40002020, 0x0) 18m34.113731333s ago: executing program 0 (id=739): r0 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000000000)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r1, 0x1, &(0x7f0000000040), 0x0) fanotify_mark(0xffffffffffffffff, 0x20, 0x1800101a, 0xffffffffffffffff, 0x0) 18m33.683647232s ago: executing program 0 (id=740): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x7}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000180)={r2, r0}) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)) 18m33.159903247s ago: executing program 0 (id=741): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="07000000040000008000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket(0x2a, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001000)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x0, 0xfff1}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newtfilter={0x84, 0x2c, 0x605, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffe0}, {}, {0xffff, 0x2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4c, 0x2, [@TCA_CGROUP_ACT={0x48, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x10, 0x7ff, 0x6, 0x1, 0xff}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0x84}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 18m32.403266517s ago: executing program 0 (id=742): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x1000000000000248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) syz_emit_ethernet(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x189803, 0x0) 17m47.358259724s ago: executing program 33 (id=742): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x1000000000000248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) syz_emit_ethernet(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x189803, 0x0) 14m26.370549294s ago: executing program 3 (id=1121): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') getxattr(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', 0x0, 0x0) 14m25.571830567s ago: executing program 3 (id=1122): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec5, 0x0, 0x0, 0x0, 0x200}, 0x94) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) dup(r1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 14m24.980842947s ago: executing program 3 (id=1123): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000001800010000000000000000000200009e67"], 0x20}}, 0x0) 14m24.358761588s ago: executing program 3 (id=1124): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$inet(r1, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000000040)=ANY=[], 0xd0}}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="b8", 0x1}], 0x1}}], 0x2, 0x20040017) close(r1) 14m23.522522774s ago: executing program 3 (id=1125): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x23e9c9e, 0x0) mount$bind(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x28a5291, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1) umount2(&(0x7f0000000400)='./file0\x00', 0x2) 14m23.203517965s ago: executing program 3 (id=1126): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000014000103f7000000010000000a"], 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) 14m22.883792747s ago: executing program 34 (id=1126): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000014000103f7000000010000000a"], 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) 12m36.021645755s ago: executing program 4 (id=1291): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x8008000000010, &(0x7f0000001640)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="0213000002"], 0x10}}, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 12m35.772226562s ago: executing program 4 (id=1292): r0 = bpf$ITER_CREATE(0xb, 0x0, 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) setrlimit(0x7, &(0x7f0000000400)) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) 12m35.612235742s ago: executing program 4 (id=1293): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8, 0xffe, 0x1ff, 0x42000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000005200010004000000000000001c00000014"], 0x28}}, 0x0) 12m35.372230029s ago: executing program 4 (id=1294): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040)=0x7fffffff, 0x4) sendmmsg$inet6(r0, &(0x7f0000003a80)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x4, @mcast2, 0x3}, 0x1c, 0x0}}], 0x1, 0x20000000) 12m35.241060577s ago: executing program 4 (id=1295): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="6400000002060108000000000000000000000000050005000a000000050001000700000005000400000000000900020073797a310000000015000300686173683a69702c706f72742c6e65740000000014000780080006400056b20008001340000003"], 0x64}}, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000300000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) 12m34.763175729s ago: executing program 4 (id=1296): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) setresuid(0x0, 0xee00, 0xffffffffffffffff) 11m49.21208296s ago: executing program 35 (id=1296): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) setresuid(0x0, 0xee00, 0xffffffffffffffff) 11m26.516268252s ago: executing program 2 (id=1355): r0 = fsopen(&(0x7f0000000140)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x18) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r1, &(0x7f0000000080)='./file0\x00') readlinkat(r1, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000780)=""/198, 0xc6) 11m25.977942577s ago: executing program 2 (id=1356): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="14"], &(0x7f0000001300), 0x600) 11m25.567501704s ago: executing program 2 (id=1357): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800"/15], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) setrlimit(0x7, &(0x7f0000000400)) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) 11m25.341500899s ago: executing program 2 (id=1358): r0 = syz_clone(0x2000, 0x0, 0x3, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffbfffd) 11m25.052968058s ago: executing program 2 (id=1359): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x1, @multicast}, 0x2b) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a80000000060a010400000000000000000a0000010900010073797a310000000054000480500001800b00010074617267657400004000028008000240000000012c0003007339f2f10455afb9fdd672bad09dfb78c7699c74e891a0c70000000000000000000000000000000008000100544545000900020073797a320000000014000000110001"], 0xa8}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x2, 0x7fff7ffc}]}) close_range(r2, 0xffffffffffffffff, 0x200000000000000) 11m24.260509489s ago: executing program 2 (id=1360): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000100000042000000"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x9, 0x3, 0x238, 0xf8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1c8, 0xffffffff, 0xffffffff, 0x1c8, 0xffffffff, 0x3, 0x0, {[{{@ip={@loopback, @broadcast, 0x0, 0x0, 'lo\x00', 'vxcan1\x00', {}, {}, 0x2e, 0x3, 0x1}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x2, 0x4, 0x1, 0x5], 0x0, 0x6}, {0x4, [0x6, 0xa928861ab5861f86, 0x0, 0x4, 0x2, 0x1], 0x3, 0x2}}}}, {{@ip={@empty, @remote, 0xffffff00, 0xff, 'dvmrp1\x00', 'wlan1\x00', {0xff}, {0xff}, 0x32, 0x5, 0x20}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x3, 0xf, [0x1, 0x35, 0xd, 0x7, 0x35, 0x3, 0x7, 0x3b, 0x39, 0xb, 0x28, 0x40, 0x33, 0x2b, 0x27, 0x34], 0x0, 0xfffff805, 0x4}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) setreuid(0xee01, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[], 0x50) r3 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0x80045505, &(0x7f0000000040)=@usbdevfs_disconnect={0xffffffff}) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) 10m54.481788384s ago: executing program 5 (id=1390): socket$nl_route(0x10, 0x3, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x6, 0x200) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000280)=""/243, 0xf3}], 0x1) read$usbmon(r0, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000240), 0x10, 0x80100) socket$inet_udp(0x2, 0x2, 0x0) 10m54.311470625s ago: executing program 5 (id=1391): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0xf0) pwritev2(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0x1}], 0x1, 0x5412, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) sendfile(r1, r1, 0x0, 0x800000009) 10m54.097009569s ago: executing program 5 (id=1392): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xfffffffffffff001}, 0x18) r2 = io_uring_setup(0x6f6, &(0x7f00000003c0)={0x0, 0x0, 0x802, 0x8000, 0x4}) io_uring_register$IORING_REGISTER_BUFFERS2(r2, 0xf, &(0x7f0000005500)={0x3, 0x0, 0x0, &(0x7f0000005480)=[{0x0}, {0x0}, {&(0x7f0000005380)=""/255, 0xff}], &(0x7f00000054c0)=[0x0, 0x0, 0x5]}, 0x20) 10m53.871594784s ago: executing program 5 (id=1393): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f00000001c0)=@keyring={'key_or_keyring:', r0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r3}, 0x10) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)=@chain={'key_or_keyring:', r1}) 10m53.62524554s ago: executing program 5 (id=1394): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000010c0)=0x5, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000700)={&(0x7f0000000380)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x40}, @local}}}], 0x20}, 0x0) 10m53.503440067s ago: executing program 5 (id=1395): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000003000000000000020000003851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000120180000000000000000000000010000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 10m38.0051797s ago: executing program 36 (id=1360): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000100000042000000"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x9, 0x3, 0x238, 0xf8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1c8, 0xffffffff, 0xffffffff, 0x1c8, 0xffffffff, 0x3, 0x0, {[{{@ip={@loopback, @broadcast, 0x0, 0x0, 'lo\x00', 'vxcan1\x00', {}, {}, 0x2e, 0x3, 0x1}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x2, 0x4, 0x1, 0x5], 0x0, 0x6}, {0x4, [0x6, 0xa928861ab5861f86, 0x0, 0x4, 0x2, 0x1], 0x3, 0x2}}}}, {{@ip={@empty, @remote, 0xffffff00, 0xff, 'dvmrp1\x00', 'wlan1\x00', {0xff}, {0xff}, 0x32, 0x5, 0x20}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x3, 0xf, [0x1, 0x35, 0xd, 0x7, 0x35, 0x3, 0x7, 0x3b, 0x39, 0xb, 0x28, 0x40, 0x33, 0x2b, 0x27, 0x34], 0x0, 0xfffff805, 0x4}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) setreuid(0xee01, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[], 0x50) r3 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r3, 0x80045505, &(0x7f0000000040)=@usbdevfs_disconnect={0xffffffff}) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) 10m17.742851352s ago: executing program 6 (id=1404): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000000), &(0x7f0000000180)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x18) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) 10m17.194138368s ago: executing program 6 (id=1405): ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(0xffffffffffffffff, 0x80083313, 0x0) 10m16.922687356s ago: executing program 6 (id=1406): r0 = syz_open_procfs(0x0, &(0x7f0000001080)='net/vlan/config\x00') read$char_usb(r0, &(0x7f0000000040)=""/4109, 0x100d) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) 10m15.674796927s ago: executing program 6 (id=1407): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) fcntl$lock(r0, 0x6, &(0x7f0000002000)={0x1}) fcntl$lock(r0, 0x6, &(0x7f0000000000)) 10m15.032493639s ago: executing program 6 (id=1408): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 10m13.123015504s ago: executing program 6 (id=1409): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000180)={'nat\x00', 0x0, 0x0, 0x0, [0x0, 0x9, 0x80, 0xb6, 0x9e, 0x9]}, &(0x7f0000000080)=0x78) sendto$inet(r0, 0x0, 0x0, 0x14, 0x0, 0x0) 10m8.088608593s ago: executing program 37 (id=1395): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000003000000000000020000003851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000120180000000000000000000000010000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 9m27.245610569s ago: executing program 38 (id=1409): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000180)={'nat\x00', 0x0, 0x0, 0x0, [0x0, 0x9, 0x80, 0xb6, 0x9e, 0x9]}, &(0x7f0000000080)=0x78) sendto$inet(r0, 0x0, 0x0, 0x14, 0x0, 0x0) 7m38.121265244s ago: executing program 7 (id=1586): socket$netlink(0x10, 0x3, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 7m37.653174244s ago: executing program 7 (id=1588): r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x20000, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) 7m37.42194595s ago: executing program 7 (id=1589): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='illinois', 0x8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x12, 0x0, 0x12) recvfrom$inet(r0, &(0x7f0000000100)=""/24, 0xfffffffffffffd5b, 0xc9100120, 0x0, 0xfffffffffffffd25) 7m34.66460031s ago: executing program 7 (id=1596): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="020000000400000007000000020000000010"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYRESDEC=r4, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_type(r7, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r8, &(0x7f0000000280), 0x9) r9 = openat$cgroup_procs(r7, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000c40), 0x12) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_ro(r10, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r11, &(0x7f0000000200)=0x1, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r5}, 0x18) sched_setscheduler(0x0, 0x2, 0x0) fremovexattr(0xffffffffffffffff, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x27) 7m4.602136152s ago: executing program 7 (id=1625): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000150a01"], 0x34}}, 0x20000000) 7m4.227865537s ago: executing program 7 (id=1626): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) r2 = syz_io_uring_setup(0xbdb, &(0x7f0000000640)={0x0, 0x498, 0x3400, 0x3, 0x151}, &(0x7f0000000dc0)=0x0, &(0x7f0000000380)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_LINKAT={0x27, 0x4c, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x1000}) io_uring_enter(r2, 0x847ba, 0x0, 0xe, 0x0, 0x0) 6m18.769571465s ago: executing program 39 (id=1626): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) r2 = syz_io_uring_setup(0xbdb, &(0x7f0000000640)={0x0, 0x498, 0x3400, 0x3, 0x151}, &(0x7f0000000dc0)=0x0, &(0x7f0000000380)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_LINKAT={0x27, 0x4c, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x1000}) io_uring_enter(r2, 0x847ba, 0x0, 0xe, 0x0, 0x0) 4m33.812790593s ago: executing program 9 (id=1851): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x4, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, 0x0, 0x50) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004810}, 0x800) llistxattr(0x0, 0x0, 0x0) 4m33.492512264s ago: executing program 9 (id=1852): timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0xfd8b, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xb320a000) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="fc0000001d000724ab09254ec100070007ab08001b000000f0ffff002100057e0000000000000e000039000000039815fad151ba0101099cecb94b46fe0000000a00020025", 0xffffff0c) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r1, 0x0, 0x101, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1100000000f334, 0x0) 4m26.623265583s ago: executing program 9 (id=1853): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f9000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000004c0)={'ipvlan1\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x802}, 0x8080) 4m26.262658666s ago: executing program 9 (id=1854): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 4m25.980677484s ago: executing program 9 (id=1855): r0 = syz_io_uring_setup(0xbc1, &(0x7f0000001480)={0x0, 0xfd09, 0x1000, 0x8000001, 0x224}, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_RENAMEAT={0x23, 0x44, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, {0x0, r3}}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r0, 0x47f8, 0xe336, 0x0, 0x0, 0x0) 4m25.13168916s ago: executing program 9 (id=1856): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0x498, 0x3400, 0x1, 0x163}, &(0x7f0000000dc0)=0x0, &(0x7f0000000240)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_LINKAT={0x27, 0x4c, 0x0, 0xffffffffffffffff, &(0x7f0000002200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x1000}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001300)=ANY=[@ANYBLOB="6c0100"], 0x16c}}, 0x0) io_uring_enter(r2, 0x847ba, 0x4c86, 0x5, 0x0, 0x0) 3m39.531027307s ago: executing program 40 (id=1856): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0x498, 0x3400, 0x1, 0x163}, &(0x7f0000000dc0)=0x0, &(0x7f0000000240)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_LINKAT={0x27, 0x4c, 0x0, 0xffffffffffffffff, &(0x7f0000002200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x1000}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001300)=ANY=[@ANYBLOB="6c0100"], 0x16c}}, 0x0) io_uring_enter(r2, 0x847ba, 0x4c86, 0x5, 0x0, 0x0) 51.081387215s ago: executing program 1 (id=2139): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="d3000000f1000000180a00000000000000000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x3, &(0x7f000000cf3d)=""/195}, 0x23) ftruncate(r1, 0x1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000000)={0x6, 'veth1_virt_wifi\x00', {0x1}, 0x200}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) syz_open_dev$usbfs(&(0x7f00000007c0), 0x1ff, 0x2401) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000580)={'veth0_to_team\x00', 0x0}) socket$inet6(0xa, 0x800000000000002, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000004c0)={r3, r5, 0x25, 0x0, @void}, 0x10) r6 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000140)={'veth0_to_team\x00', &(0x7f0000000280)=@ethtool_channels={0x3d, 0x0, 0x0, 0x0, 0x4, 0x2, 0x1}}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'veth0_to_team\x00', 0x800}) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=@newsa={0x104, 0x1a, 0x7, 0x70bd2a, 0x0, {{@in6=@dev={0xfe, 0x80, '\x00', 0x1b}, @in=@multicast1, 0xffff, 0x0, 0x4e22, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, 0xee00}, {@in6=@mcast1, 0x0, 0x2b}, @in6=@loopback, {0x5a, 0xb400, 0x2, 0xfeffff7f00000001, 0x0, 0x60000}, {0x0, 0x200000, 0x7, 0xfffffffffffffffd}, {0x40000, 0x0, 0xae8}, 0x0, 0x0, 0xa, 0x3, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in6=@remote}]}, 0x104}}, 0x0) 50.320604744s ago: executing program 1 (id=2142): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000b8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) syz_emit_ethernet(0x6e, &(0x7f0000000640)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @local, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x7d0, {0x0, 0x6, "8cb02b", 0x0, 0x2f, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @local, [@srh={0x0, 0x0, 0x4, 0x0, 0x20}]}}}}}}}, 0x0) 49.742719592s ago: executing program 1 (id=2144): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)) r3 = epoll_create(0x1) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0x3, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x4000201a}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f00000001c0)={r2}) sendmsg$sock(r0, 0x0, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) 46.512878353s ago: executing program 1 (id=2146): r0 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x20}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000007c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xfff3}, {}, {0x1c, 0xc}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_FLAGS={0x8, 0x16, 0x1}]}}]}, 0x3c}}, 0x44050) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x40000000000009f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 45.509417388s ago: executing program 1 (id=2150): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000e"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000ecff850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r2) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000002c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100d0000000fbdbdf25010000001800018014000200766574683100000000000000000000001c0002800c"], 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x4008800) 45.141502223s ago: executing program 1 (id=2151): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f00000008c0), &(0x7f0000000880)}, 0x20) 29.475477146s ago: executing program 8 (id=2171): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x10000, 0x1000, 0x101, 0x1}, 0x20) 29.305971797s ago: executing program 8 (id=2172): r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0700000004000000800000000400000028"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000700000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r2, 0x0, 0xe}, 0x18) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000000f140164c4bd7000fcdbdf25090045"], 0x1c}, 0x1, 0x0, 0x0, 0x4000840}, 0x4004804) 28.922457862s ago: executing program 8 (id=2173): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x2}, @func_proto]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x34}, 0x20) 28.48329683s ago: executing program 8 (id=2174): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0}, 0x50) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000400)=ANY=[], 0x8) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0xfffe, 0x3000001, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='bridge0\x00', 0x10) write(r0, &(0x7f00000000c0)="8f2a0a65bd8c002b0304000e0580a7b6070d63e286a5cefe", 0x5ac) 27.622695376s ago: executing program 8 (id=2175): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x14, r3, 0x1, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x50}, 0x804) 26.211740648s ago: executing program 8 (id=2176): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x1000000000000248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) syz_emit_ethernet(0x17, &(0x7f0000000180)={@empty, @empty, @void, {@llc={0x4, {@snap={0xaa, 0xaa, "7f5b", "ff1bb5", 0x16}}}}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x189803, 0x0) syz_open_dev$evdev(0x0, 0x3, 0x8402) 0s ago: executing program 41 (id=2151): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f00000008c0), &(0x7f0000000880)}, 0x20) kernel console output (not intermixed with test programs): exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 836.578037][ T8410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 840.897465][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 840.898649][ T29] audit: type=1326 audit(848.794:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8766 comm="syz.2.1148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 840.900621][ T29] audit: type=1326 audit(848.794:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8766 comm="syz.2.1148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 840.913594][ T29] audit: type=1326 audit(848.804:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8766 comm="syz.2.1148" exe="/syz-executor" sig=0 arch=40000028 syscall=286 compat=0 ip=0x132320 code=0x7ffc0000 [ 840.917444][ T29] audit: type=1326 audit(848.804:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8766 comm="syz.2.1148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 840.938685][ T29] audit: type=1326 audit(848.804:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8766 comm="syz.2.1148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 845.542234][ T8829] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1152'. [ 846.077250][ T29] audit: type=1400 audit(853.944:1482): avc: denied { name_bind } for pid=8836 comm="syz.2.1153" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 847.177414][ T29] audit: type=1400 audit(855.074:1483): avc: denied { wake_alarm } for pid=8843 comm="syz.2.1155" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 847.270312][ T8846] netlink: 'syz.2.1155': attribute type 4 has an invalid length. [ 847.280866][ T8846] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1155'. [ 847.316630][ T8846] .`: renamed from dummy0 (while UP) [ 847.410376][ T8410] veth0_vlan: entered promiscuous mode [ 847.448935][ T8410] veth1_vlan: entered promiscuous mode [ 847.633467][ T8410] veth0_macvtap: entered promiscuous mode [ 847.650713][ T8410] veth1_macvtap: entered promiscuous mode [ 847.762020][ T2314] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.763719][ T2314] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.769210][ T2314] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.771863][ T2314] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.936424][ T29] audit: type=1400 audit(855.824:1484): avc: denied { mounton } for pid=8410 comm="syz-executor" path="/syzkaller.6pUHfd/syz-tmp" dev="vda" ino=819 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 847.992194][ T29] audit: type=1400 audit(855.884:1485): avc: denied { mount } for pid=8410 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 848.008866][ T29] audit: type=1400 audit(855.904:1486): avc: denied { mounton } for pid=8410 comm="syz-executor" path="/syzkaller.6pUHfd/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 848.014432][ T29] audit: type=1400 audit(855.904:1487): avc: denied { mounton } for pid=8410 comm="syz-executor" path="/syzkaller.6pUHfd/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=13933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 848.046507][ T29] audit: type=1400 audit(855.934:1488): avc: denied { unmount } for pid=8410 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 848.062604][ T29] audit: type=1400 audit(855.954:1489): avc: denied { mounton } for pid=8410 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 848.077151][ T29] audit: type=1400 audit(855.974:1490): avc: denied { mount } for pid=8410 comm="syz-executor" name="/" dev="gadgetfs" ino=959 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 848.089393][ T29] audit: type=1400 audit(855.984:1491): avc: denied { mount } for pid=8410 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 852.710218][ T8887] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1162'. [ 852.746324][ T8887] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1162'. [ 852.889335][ T8888] netlink: 'syz.2.1163': attribute type 1 has an invalid length. [ 854.864933][ T8918] netlink: 27 bytes leftover after parsing attributes in process `syz.4.1170'. [ 855.354090][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 855.366031][ T29] audit: type=1400 audit(863.234:1497): avc: denied { ioctl } for pid=8921 comm="syz.2.1172" path="socket:[14053]" dev="sockfs" ino=14053 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 855.368939][ T29] audit: type=1400 audit(863.244:1498): avc: denied { write } for pid=8921 comm="syz.2.1172" laddr=::1 lport=6 faddr=::1 fport=20011 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 860.426890][ T29] audit: type=1326 audit(868.324:1499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8957 comm="syz.4.1182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 860.430442][ T29] audit: type=1326 audit(868.324:1500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8957 comm="syz.4.1182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 860.500055][ T29] audit: type=1326 audit(868.394:1501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8957 comm="syz.4.1182" exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x132320 code=0x7ffc0000 [ 860.531941][ T29] audit: type=1326 audit(868.394:1502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8957 comm="syz.4.1182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 860.532501][ T29] audit: type=1326 audit(868.394:1503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8957 comm="syz.4.1182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 866.886815][ T29] audit: type=1400 audit(874.774:1504): avc: denied { setopt } for pid=8989 comm="syz.2.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 867.544443][ T8994] ip6tnl0: Caught tx_queue_len zero misconfig [ 872.041716][ T29] audit: type=1400 audit(879.934:1505): avc: denied { remove_name } for pid=9017 comm="+}[@" name="file0" dev="cgroup2" ino=181 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 873.096951][ T9026] SELinux: policydb version 0 does not match my version range 15-35 [ 873.098030][ T9026] SELinux: failed to load policy [ 873.663893][ T9032] netlink: 56 bytes leftover after parsing attributes in process `syz.2.1205'. [ 873.689482][ T9032] netlink: 56 bytes leftover after parsing attributes in process `syz.2.1205'. [ 876.010359][ T9039] netlink: 'syz.2.1208': attribute type 39 has an invalid length. [ 878.364730][ T29] audit: type=1400 audit(886.254:1506): avc: denied { block_suspend } for pid=9065 comm="syz.2.1215" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 882.976783][ T9095] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1224'. [ 883.144297][ T9095] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1224'. [ 884.529650][ T29] audit: type=1326 audit(892.424:1507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9107 comm="syz.4.1228" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 884.532952][ T29] audit: type=1326 audit(892.424:1508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9107 comm="syz.4.1228" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 884.533111][ T29] audit: type=1326 audit(892.424:1509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9107 comm="syz.4.1228" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 884.540493][ T29] audit: type=1326 audit(892.424:1510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9107 comm="syz.4.1228" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 884.552026][ T29] audit: type=1326 audit(892.444:1511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9107 comm="syz.4.1228" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 884.553935][ T29] audit: type=1326 audit(892.444:1512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9107 comm="syz.4.1228" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 884.554709][ T29] audit: type=1326 audit(892.444:1513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9107 comm="syz.4.1228" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 884.559557][ T29] audit: type=1326 audit(892.444:1514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9107 comm="syz.4.1228" exe="/syz-executor" sig=0 arch=40000028 syscall=108 compat=0 ip=0x132320 code=0x7ffc0000 [ 884.570025][ T29] audit: type=1326 audit(892.464:1515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9107 comm="syz.4.1228" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 884.583251][ T29] audit: type=1326 audit(892.464:1516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9107 comm="syz.4.1228" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 886.377175][ T9116] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1230'. [ 906.902226][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 906.903842][ T29] audit: type=1326 audit(914.794:1519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9185 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 906.916667][ T29] audit: type=1326 audit(914.814:1520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9185 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12ffa8 code=0x7ffc0000 [ 906.923734][ T29] audit: type=1326 audit(914.814:1521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9185 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12ffa8 code=0x7ffc0000 [ 906.937560][ T29] audit: type=1326 audit(914.834:1522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9185 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 906.940865][ T29] audit: type=1326 audit(914.834:1523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9185 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x1302b4 code=0x7ffc0000 [ 906.959580][ T29] audit: type=1326 audit(914.854:1524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9185 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 906.975976][ T29] audit: type=1326 audit(914.864:1525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9185 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 906.979390][ T29] audit: type=1326 audit(914.874:1526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9185 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 906.999215][ T29] audit: type=1326 audit(914.894:1527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9185 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 907.428767][ T29] audit: type=1326 audit(915.304:1528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9193 comm="syz.2.1252" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 912.838618][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 912.874931][ T29] audit: type=1400 audit(920.734:1541): avc: denied { read } for pid=9247 comm="syz.4.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 913.859092][ T9255] batadv_slave_1: entered promiscuous mode [ 913.878055][ T9254] batadv_slave_1: left promiscuous mode [ 921.321727][ T29] audit: type=1400 audit(929.214:1542): avc: denied { write } for pid=9289 comm="syz.4.1278" name="vlan0" dev="proc" ino=4026532925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 921.841990][ T29] audit: type=1107 audit(929.734:1543): pid=9296 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 922.436447][ T9299] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 922.438288][ T9299] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 927.326506][ T29] audit: type=1326 audit(935.214:1544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9315 comm="syz.4.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 927.331634][ T29] audit: type=1326 audit(935.214:1545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9315 comm="syz.4.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 927.339264][ T29] audit: type=1326 audit(935.224:1546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9315 comm="syz.4.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=355 compat=0 ip=0x132320 code=0x7ffc0000 [ 927.343875][ T29] audit: type=1326 audit(935.224:1547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9315 comm="syz.4.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 927.352123][ T29] audit: type=1326 audit(935.224:1548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9315 comm="syz.4.1286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 928.646139][ T29] audit: type=1326 audit(936.534:1549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9321 comm="syz.4.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 928.656828][ T29] audit: type=1326 audit(936.554:1550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9321 comm="syz.4.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12ffa8 code=0x7ffc0000 [ 928.676321][ T29] audit: type=1326 audit(936.564:1551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9321 comm="syz.4.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 928.681725][ T29] audit: type=1326 audit(936.574:1552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9321 comm="syz.4.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 928.836583][ T29] audit: type=1326 audit(936.694:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9321 comm="syz.4.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=361 compat=0 ip=0x132320 code=0x7ffc0000 [ 932.344197][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 932.347264][ T29] audit: type=1326 audit(940.234:1579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9343 comm="syz.4.1296" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 932.360333][ T29] audit: type=1326 audit(940.254:1580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9343 comm="syz.4.1296" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 932.372985][ T29] audit: type=1326 audit(940.264:1581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9343 comm="syz.4.1296" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 932.398181][ T29] audit: type=1326 audit(940.294:1582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9343 comm="syz.4.1296" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 932.414306][ T29] audit: type=1326 audit(940.304:1583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9343 comm="syz.4.1296" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 932.433125][ T29] audit: type=1326 audit(940.324:1584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9343 comm="syz.4.1296" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 932.465873][ T29] audit: type=1326 audit(940.344:1585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9343 comm="syz.4.1296" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 932.548874][ T29] audit: type=1326 audit(940.354:1586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9343 comm="syz.4.1296" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 932.589282][ T29] audit: type=1326 audit(940.364:1587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9343 comm="syz.4.1296" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 932.592467][ T29] audit: type=1326 audit(940.374:1588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9343 comm="syz.4.1296" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 943.357073][ T9364] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1301'. [ 944.026056][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 944.031066][ T29] audit: type=1326 audit(951.914:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9367 comm="syz.2.1303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 944.052652][ T29] audit: type=1326 audit(951.924:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9367 comm="syz.2.1303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 944.057757][ T29] audit: type=1326 audit(951.944:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9367 comm="syz.2.1303" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x1302b4 code=0x7ffc0000 [ 944.069994][ T29] audit: type=1326 audit(951.944:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9367 comm="syz.2.1303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 944.079417][ T29] audit: type=1326 audit(951.964:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9367 comm="syz.2.1303" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 944.081782][ T29] audit: type=1326 audit(951.964:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9367 comm="syz.2.1303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 944.090675][ T29] audit: type=1326 audit(951.974:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9367 comm="syz.2.1303" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132320 code=0x7ffc0000 [ 944.093316][ T29] audit: type=1326 audit(951.974:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9367 comm="syz.2.1303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 944.098486][ T29] audit: type=1326 audit(951.984:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9367 comm="syz.2.1303" exe="/syz-executor" sig=0 arch=40000028 syscall=282 compat=0 ip=0x132320 code=0x7ffc0000 [ 944.106326][ T29] audit: type=1326 audit(951.984:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9367 comm="syz.2.1303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 949.379175][ T9378] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1305'. [ 951.050488][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 951.062624][ T29] audit: type=1326 audit(958.944:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9375 comm="syz.2.1305" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 951.064403][ T29] audit: type=1326 audit(958.944:1716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9375 comm="syz.2.1305" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 957.496332][ T9428] sit0: Caught tx_queue_len zero misconfig [ 957.629602][ T9430] SELinux: Context system_u:object is not valid (left unmapped). [ 957.640341][ T29] audit: type=1400 audit(965.524:1717): avc: denied { relabelto } for pid=9429 comm="syz.2.1320" name="cgroup.procs" dev="cgroup" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object" [ 957.726155][ T29] audit: type=1400 audit(965.524:1718): avc: denied { associate } for pid=9429 comm="syz.2.1320" name="cgroup.procs" dev="cgroup" ino=121 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object" [ 958.591938][ T29] audit: type=1326 audit(966.484:1719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9438 comm="syz.2.1324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 958.600830][ T29] audit: type=1326 audit(966.494:1720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9438 comm="syz.2.1324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 958.612532][ T29] audit: type=1326 audit(966.504:1721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9438 comm="syz.2.1324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 958.618157][ T29] audit: type=1326 audit(966.514:1722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9438 comm="syz.2.1324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 958.653136][ T29] audit: type=1326 audit(966.544:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9438 comm="syz.2.1324" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 958.661871][ T29] audit: type=1326 audit(966.554:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9438 comm="syz.2.1324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 958.672932][ T29] audit: type=1326 audit(966.564:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9438 comm="syz.2.1324" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 958.684459][ T29] audit: type=1326 audit(966.574:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9438 comm="syz.2.1324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 964.043504][ T9475] ALSA: seq fatal error: cannot create timer (-22) [ 964.735007][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 964.749773][ T29] audit: type=1400 audit(972.614:1774): avc: denied { create } for pid=9476 comm="syz.2.1336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 965.717105][ T9482] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1338'. [ 966.128448][ T9485] mmap: syz.2.1339 (9485) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 970.957396][ T29] audit: type=1400 audit(978.854:1775): avc: denied { write } for pid=9490 comm="syz.2.1341" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 983.043520][ T9497] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 983.059869][ T9497] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 985.892386][ T9497] hsr_slave_0: entered promiscuous mode [ 985.894374][ T9497] hsr_slave_1: entered promiscuous mode [ 985.899789][ T9497] debugfs: 'hsr0' already exists in 'hsr' [ 985.901537][ T9497] Cannot create hsr debugfs directory [ 986.721681][ T9497] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 986.741776][ T9497] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 986.760407][ T9497] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 986.771949][ T9497] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 990.330333][ T9497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 990.589402][ T29] audit: type=1326 audit(998.484:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 990.591412][ T29] audit: type=1326 audit(998.484:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 990.670689][ T29] audit: type=1326 audit(998.564:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 990.674108][ T29] audit: type=1326 audit(998.564:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 990.677307][ T29] audit: type=1326 audit(998.564:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x132320 code=0x7ffc0000 [ 990.679323][ T29] audit: type=1326 audit(998.564:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 990.681778][ T29] audit: type=1326 audit(998.564:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 990.681870][ T29] audit: type=1326 audit(998.564:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 990.681930][ T29] audit: type=1326 audit(998.564:1784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 990.681978][ T29] audit: type=1326 audit(998.564:1785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 996.047050][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 996.085644][ T29] audit: type=1326 audit(1003.924:1840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 996.087571][ T29] audit: type=1326 audit(1003.934:1841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 996.087635][ T29] audit: type=1326 audit(1003.934:1842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 996.087673][ T29] audit: type=1326 audit(1003.944:1843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 996.087699][ T29] audit: type=1326 audit(1003.944:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 996.090025][ T29] audit: type=1326 audit(1003.984:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 996.103311][ T29] audit: type=1326 audit(1003.994:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 996.246674][ T29] audit: type=1326 audit(1004.054:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 996.257947][ T29] audit: type=1326 audit(1004.154:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 996.297886][ T29] audit: type=1326 audit(1004.164:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.1349" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 1001.042756][ T9497] veth0_vlan: entered promiscuous mode [ 1001.080596][ T9497] veth1_vlan: entered promiscuous mode [ 1001.178449][ T9497] veth0_macvtap: entered promiscuous mode [ 1001.202899][ T9497] veth1_macvtap: entered promiscuous mode [ 1001.342518][ T56] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.351140][ T56] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.353760][ T56] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1001.354051][ T56] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1006.423764][ T9879] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.1360' sets config #-1 [ 1015.661662][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 1015.663568][ T29] audit: type=1400 audit(1023.554:1911): avc: denied { checkpoint_restore } for pid=9911 comm="syz.5.1380" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1030.472059][ T9927] netlink: 'syz.5.1383': attribute type 10 has an invalid length. [ 1031.151914][ T9943] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1031.160245][ T9943] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1052.279878][ T9969] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1052.290504][ T9969] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1053.401100][ T9969] hsr_slave_0: entered promiscuous mode [ 1053.409483][ T9969] hsr_slave_1: entered promiscuous mode [ 1053.412681][ T9969] debugfs: 'hsr0' already exists in 'hsr' [ 1053.418684][ T9969] Cannot create hsr debugfs directory [ 1053.940213][ T9969] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1053.973999][ T9969] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1053.991934][ T9969] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1054.003778][ T9969] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1057.343009][ T9969] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1065.271763][ T9969] veth0_vlan: entered promiscuous mode [ 1065.331252][ T9969] veth1_vlan: entered promiscuous mode [ 1065.451454][ T9969] veth0_macvtap: entered promiscuous mode [ 1065.473359][ T9969] veth1_macvtap: entered promiscuous mode [ 1065.541924][ T135] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.543499][ T135] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.548853][ T135] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.551441][ T135] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1068.056121][T10293] netlink: 40 bytes leftover after parsing attributes in process `syz.6.1403'. [ 1085.396631][T10314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1085.414279][T10314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1088.977708][T10314] hsr_slave_0: entered promiscuous mode [ 1088.980333][T10314] hsr_slave_1: entered promiscuous mode [ 1088.982450][T10314] debugfs: 'hsr0' already exists in 'hsr' [ 1088.983251][T10314] Cannot create hsr debugfs directory [ 1089.724296][T10314] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1089.812178][T10314] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1089.848427][T10314] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1089.873318][T10314] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1092.133800][T10314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1101.638616][T10314] veth0_vlan: entered promiscuous mode [ 1101.657718][T10314] veth1_vlan: entered promiscuous mode [ 1101.772514][T10314] veth0_macvtap: entered promiscuous mode [ 1101.817042][T10314] veth1_macvtap: entered promiscuous mode [ 1102.062180][ T9014] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1102.064133][ T9014] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1102.067285][ T9014] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1102.068423][ T9014] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1102.944866][ T9386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1102.945265][ T9386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1102.948477][ T9386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1102.948824][ T9386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1102.948930][ T9386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1102.949005][ T9386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1102.949083][ T9386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1102.949156][ T9386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1102.949228][ T9386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1102.949299][ T9386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1102.960627][ T9386] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [sy] on syz0 [ 1109.146895][T10652] netlink: 'syz.7.1418': attribute type 4 has an invalid length. [ 1110.280827][T10660] netlink: 12 bytes leftover after parsing attributes in process `syz.7.1422'. [ 1111.710320][ T68] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1111.821006][ T68] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1111.968415][ T68] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1112.484637][ T68] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1113.481080][T10685] SELinux: failed to load policy [ 1113.721331][ T68] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1113.743114][ T68] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1113.880846][ T29] audit: type=1326 audit(1121.774:1912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.7.1429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1113.926630][ T29] audit: type=1326 audit(1121.774:1913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.7.1429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1114.038960][ T29] audit: type=1326 audit(1121.784:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.7.1429" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 1114.076563][ T29] audit: type=1326 audit(1121.784:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.7.1429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1114.081051][ T29] audit: type=1326 audit(1121.784:1916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.7.1429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1114.128766][ T29] audit: type=1326 audit(1121.804:1917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.7.1429" exe="/syz-executor" sig=0 arch=40000028 syscall=94 compat=0 ip=0x132320 code=0x7ffc0000 [ 1114.134591][ T29] audit: type=1326 audit(1121.804:1918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.7.1429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1114.150325][ T29] audit: type=1326 audit(1121.804:1919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10686 comm="syz.7.1429" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1114.227143][ T68] bond0 (unregistering): Released all slaves [ 1114.403777][ T68] hsr_slave_0: left promiscuous mode [ 1114.440280][ T68] hsr_slave_1: left promiscuous mode [ 1114.477763][ T68] veth1_macvtap: left promiscuous mode [ 1114.478194][ T68] veth0_macvtap: left promiscuous mode [ 1114.478420][ T68] veth1_vlan: left promiscuous mode [ 1114.478498][ T68] veth0_vlan: left promiscuous mode [ 1115.195167][T10695] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1115.211976][T10695] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1116.132520][T10702] ALSA: seq fatal error: cannot create timer (-19) [ 1120.137947][T10729] macvtap0: refused to change device tx_queue_len [ 1127.528456][T10717] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1127.540385][T10717] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1131.920037][T10717] hsr_slave_0: entered promiscuous mode [ 1131.921770][T10717] hsr_slave_1: entered promiscuous mode [ 1132.971641][T10717] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1132.994014][T10717] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1133.020062][T10717] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1133.049735][T10717] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1136.654778][T10717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1147.959563][ T9016] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1148.128047][ T9016] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1148.257932][ T9016] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1148.439608][ T9016] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1149.711989][ T9016] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1149.739834][ T9016] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1149.768231][ T9016] bond0 (unregistering): Released all slaves [ 1149.878085][ T9016] hsr_slave_0: left promiscuous mode [ 1149.897162][ T9016] hsr_slave_1: left promiscuous mode [ 1149.927887][ T9016] veth1_macvtap: left promiscuous mode [ 1149.936437][ T9016] veth0_macvtap: left promiscuous mode [ 1149.942259][ T9016] veth1_vlan: left promiscuous mode [ 1149.943592][ T9016] veth0_vlan: left promiscuous mode [ 1154.480197][T10717] veth0_vlan: entered promiscuous mode [ 1154.570449][T10717] veth1_vlan: entered promiscuous mode [ 1154.786633][T10717] veth0_macvtap: entered promiscuous mode [ 1154.808763][T10717] veth1_macvtap: entered promiscuous mode [ 1155.052941][ T38] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1155.056687][ T38] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1155.066311][ T38] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1155.068401][ T38] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1156.300941][ T29] audit: type=1326 audit(1164.194:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11105 comm="syz.8.1437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1156.318444][ T29] audit: type=1326 audit(1164.214:1921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11105 comm="syz.8.1437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1156.329218][ T29] audit: type=1326 audit(1164.224:1922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11105 comm="syz.8.1437" exe="/syz-executor" sig=0 arch=40000028 syscall=263 compat=0 ip=0x132320 code=0x7ffc0000 [ 1156.342192][ T29] audit: type=1326 audit(1164.234:1923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11105 comm="syz.8.1437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1156.350179][ T29] audit: type=1326 audit(1164.244:1924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11105 comm="syz.8.1437" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1156.366546][ T29] audit: type=1326 audit(1164.244:1925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11105 comm="syz.8.1437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1156.379391][ T29] audit: type=1326 audit(1164.264:1926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11105 comm="syz.8.1437" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1156.383415][ T29] audit: type=1326 audit(1164.264:1927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11105 comm="syz.8.1437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1156.388562][ T29] audit: type=1326 audit(1164.274:1928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11105 comm="syz.8.1437" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1156.426111][ T29] audit: type=1326 audit(1164.274:1929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11105 comm="syz.8.1437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1157.450551][T11116] netlink: 'syz.7.1449': attribute type 4 has an invalid length. [ 1157.451012][T11116] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1449'. [ 1157.471536][T11116] .`: renamed from dummy0 (while UP) [ 1159.174468][T11139] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1455'. [ 1160.059048][T11143] IPv6: Can't replace route, no match found [ 1160.588110][T11147] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1459'. [ 1160.617820][T11147] netlink: 12 bytes leftover after parsing attributes in process `syz.8.1459'. [ 1163.027249][T11168] binfmt_misc: register: failed to install interpreter file ./file0 [ 1164.305032][T11180] netlink: 'syz.7.1470': attribute type 6 has an invalid length. [ 1165.711188][T11185] netlink: 'syz.7.1472': attribute type 10 has an invalid length. [ 1170.028895][T11208] syzkaller1: entered promiscuous mode [ 1170.045174][T11208] syzkaller1: entered allmulticast mode [ 1170.556173][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 1170.558911][ T29] audit: type=1326 audit(1178.444:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11214 comm="syz.7.1480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1170.561940][ T29] audit: type=1326 audit(1178.444:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11214 comm="syz.7.1480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1170.573507][ T29] audit: type=1326 audit(1178.464:1982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11214 comm="syz.7.1480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1170.618050][ T29] audit: type=1326 audit(1178.474:1983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11214 comm="syz.7.1480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1170.618600][ T29] audit: type=1326 audit(1178.474:1984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11214 comm="syz.7.1480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1170.618803][ T29] audit: type=1326 audit(1178.474:1985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11214 comm="syz.7.1480" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x132320 code=0x7ffc0000 [ 1170.619012][ T29] audit: type=1326 audit(1178.484:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11214 comm="syz.7.1480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1170.619200][ T29] audit: type=1326 audit(1178.484:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11214 comm="syz.7.1480" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1170.619377][ T29] audit: type=1326 audit(1178.484:1988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11214 comm="syz.7.1480" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 1170.619595][ T29] audit: type=1326 audit(1178.484:1989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11214 comm="syz.7.1480" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 1190.110741][T11277] netlink: 36 bytes leftover after parsing attributes in process `syz.7.1497'. [ 1197.839155][ T29] audit: type=1326 audit(1205.734:1990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11317 comm="syz.7.1510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1197.843911][ T29] audit: type=1326 audit(1205.734:1991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11317 comm="syz.7.1510" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1197.886181][ T29] audit: type=1326 audit(1205.754:1992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11317 comm="syz.7.1510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1197.886686][ T29] audit: type=1326 audit(1205.764:1993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11317 comm="syz.7.1510" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1197.886798][ T29] audit: type=1326 audit(1205.764:1994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11317 comm="syz.7.1510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1197.886864][ T29] audit: type=1326 audit(1205.764:1995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11317 comm="syz.7.1510" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1197.886940][ T29] audit: type=1326 audit(1205.764:1996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11317 comm="syz.7.1510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1197.886999][ T29] audit: type=1326 audit(1205.764:1997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11317 comm="syz.7.1510" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 1197.887112][ T29] audit: type=1326 audit(1205.764:1998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11317 comm="syz.7.1510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1197.887183][ T29] audit: type=1326 audit(1205.764:1999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11317 comm="syz.7.1510" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132320 code=0x7ffc0000 [ 1200.254762][T11331] bond0: (slave bond_slave_0): Releasing backup interface [ 1200.304864][T11331] bond0: (slave bond_slave_1): Releasing backup interface [ 1200.331315][T11331] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1202.944528][T11360] ip6gre0: entered promiscuous mode [ 1203.181302][T11362] netlink: 48 bytes leftover after parsing attributes in process `syz.8.1522'. [ 1204.288486][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 1204.293923][ T29] audit: type=1326 audit(1212.184:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.8.1526" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1204.295276][ T29] audit: type=1326 audit(1212.184:2030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.8.1526" exe="/syz-executor" sig=0 arch=40000028 syscall=11 compat=0 ip=0x132320 code=0x7ffc0000 [ 1204.323613][ T29] audit: type=1326 audit(1212.184:2031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11371 comm="syz.8.1526" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1205.961676][ T29] audit: type=1400 audit(1213.854:2032): avc: denied { remount } for pid=11384 comm="syz.7.1532" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1206.091355][T11385] bond1: option broadcast_neighbor: mode dependency failed, not supported in mode balance-rr(0) [ 1206.122814][T11385] bond1 (unregistering): Released all slaves [ 1206.532640][ T29] audit: type=1326 audit(1214.414:2033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11462 comm="syz.7.1536" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1206.535162][ T29] audit: type=1326 audit(1214.424:2034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11462 comm="syz.7.1536" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1206.559764][ T29] audit: type=1326 audit(1214.454:2035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11462 comm="syz.7.1536" exe="/syz-executor" sig=0 arch=40000028 syscall=335 compat=0 ip=0x132320 code=0x7ffc0000 [ 1209.300315][T11471] syzkaller0: entered promiscuous mode [ 1209.309056][T11471] syzkaller0: entered allmulticast mode [ 1211.894296][T11506] macvtap0: refused to change device tx_queue_len [ 1212.396493][T11509] syzkaller0: entered promiscuous mode [ 1212.398641][T11509] syzkaller0: entered allmulticast mode [ 1212.996227][ T29] audit: type=1326 audit(1220.884:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11516 comm="syz.8.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1213.038937][ T29] audit: type=1326 audit(1220.894:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11516 comm="syz.8.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x132320 code=0x7ffc0000 [ 1213.041441][ T29] audit: type=1326 audit(1220.904:2038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11516 comm="syz.8.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1213.043717][ T29] audit: type=1326 audit(1220.924:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11516 comm="syz.8.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=311 compat=0 ip=0x132320 code=0x7ffc0000 [ 1213.049770][ T29] audit: type=1326 audit(1220.924:2040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11516 comm="syz.8.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1213.052114][ T29] audit: type=1326 audit(1220.924:2041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11516 comm="syz.8.1550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1218.031145][T11549] syzkaller0: entered promiscuous mode [ 1218.033090][T11549] syzkaller0: entered allmulticast mode [ 1218.218889][T11553] netlink: 'syz.8.1559': attribute type 4 has an invalid length. [ 1218.219617][T11553] netlink: 17 bytes leftover after parsing attributes in process `syz.8.1559'. [ 1218.446969][ T29] audit: type=1326 audit(1226.334:2042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11557 comm="syz.7.1560" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1218.477265][ T29] audit: type=1326 audit(1226.344:2043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11557 comm="syz.7.1560" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1218.479489][ T29] audit: type=1326 audit(1226.364:2044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11557 comm="syz.7.1560" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1218.482470][ T29] audit: type=1326 audit(1226.364:2045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11557 comm="syz.7.1560" exe="/syz-executor" sig=0 arch=40000028 syscall=231 compat=0 ip=0x132320 code=0x7ffc0000 [ 1218.484385][ T29] audit: type=1326 audit(1226.364:2046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11557 comm="syz.7.1560" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1218.639738][ T29] audit: type=1400 audit(1226.534:2047): avc: denied { bind } for pid=11561 comm="syz.7.1562" lport=127 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1218.658507][ T29] audit: type=1400 audit(1226.534:2048): avc: denied { node_bind } for pid=11561 comm="syz.7.1562" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1219.116825][T11567] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1563'. [ 1220.374409][T11578] syzkaller1: entered promiscuous mode [ 1220.386937][T11578] syzkaller1: entered allmulticast mode [ 1220.612338][ T29] audit: type=1326 audit(1228.494:2049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11583 comm="syz.8.1570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1220.622979][ T29] audit: type=1326 audit(1228.514:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11583 comm="syz.8.1570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1220.626186][ T29] audit: type=1326 audit(1228.514:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11583 comm="syz.8.1570" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1221.756487][T11593] ip6gre0: left promiscuous mode [ 1222.642990][ T9010] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1222.643424][ T9010] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1222.643541][ T9010] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1222.643597][ T9010] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1226.077099][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 1226.088405][ T29] audit: type=1400 audit(1233.974:2096): avc: denied { write } for pid=11612 comm="syz.7.1581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1235.622734][ T8335] hid_parser_main: 22 callbacks suppressed [ 1235.623876][ T8335] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1235.638488][ T8335] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1236.638145][T11407] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1236.740264][T11407] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1236.859008][T11407] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1236.978087][T11407] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1237.786831][T11407] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1237.810650][T11407] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1237.825852][T11407] bond0 (unregistering): Released all slaves [ 1237.934976][T11407] hsr_slave_0: left promiscuous mode [ 1237.940439][T11407] hsr_slave_1: left promiscuous mode [ 1237.958226][T11407] veth1_macvtap: left promiscuous mode [ 1237.958580][T11407] veth0_macvtap: left promiscuous mode [ 1237.959338][T11407] veth1_vlan: left promiscuous mode [ 1237.959429][T11407] veth0_vlan: left promiscuous mode [ 1244.796617][T11693] netlink: 20 bytes leftover after parsing attributes in process `syz.8.1604'. [ 1252.498773][ T29] audit: type=1326 audit(1260.394:2097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11738 comm="syz.8.1615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1252.501016][ T29] audit: type=1326 audit(1260.394:2098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11738 comm="syz.8.1615" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1252.503563][ T29] audit: type=1326 audit(1260.394:2099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11738 comm="syz.8.1615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1252.509849][ T29] audit: type=1326 audit(1260.404:2100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11738 comm="syz.8.1615" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1252.597677][ T29] audit: type=1326 audit(1260.484:2101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11738 comm="syz.8.1615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1252.598956][ T29] audit: type=1326 audit(1260.484:2102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11738 comm="syz.8.1615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1252.600797][ T29] audit: type=1326 audit(1260.484:2103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11738 comm="syz.8.1615" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1252.626972][ T29] audit: type=1326 audit(1260.524:2104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11738 comm="syz.8.1615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1252.644965][ T29] audit: type=1326 audit(1260.524:2105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11738 comm="syz.8.1615" exe="/syz-executor" sig=0 arch=40000028 syscall=148 compat=0 ip=0x132320 code=0x7ffc0000 [ 1252.686448][ T29] audit: type=1326 audit(1260.524:2106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11738 comm="syz.8.1615" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1261.662035][T11776] netlink: 32 bytes leftover after parsing attributes in process `syz.7.1625'. [ 1264.921888][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1264.926539][ T29] audit: type=1400 audit(1272.814:2109): avc: denied { name_bind } for pid=11782 comm="syz.8.1627" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1265.764675][T11792] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1631'. [ 1273.881678][T11837] netlink: 72 bytes leftover after parsing attributes in process `syz.8.1643'. [ 1274.276641][ T29] audit: type=1400 audit(1282.164:2110): avc: denied { name_bind } for pid=11839 comm="syz.8.1644" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1278.844287][ T29] audit: type=1326 audit(1286.734:2111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11876 comm="syz.8.1654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1278.857020][ T29] audit: type=1326 audit(1286.754:2112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11876 comm="syz.8.1654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1278.858937][ T29] audit: type=1326 audit(1286.754:2113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11876 comm="syz.8.1654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1278.861035][ T29] audit: type=1326 audit(1286.754:2114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11876 comm="syz.8.1654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1278.876268][ T29] audit: type=1326 audit(1286.764:2115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11876 comm="syz.8.1654" exe="/syz-executor" sig=0 arch=40000028 syscall=164 compat=0 ip=0x132320 code=0x7ffc0000 [ 1278.886026][ T29] audit: type=1326 audit(1286.774:2116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11876 comm="syz.8.1654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1278.886435][ T29] audit: type=1326 audit(1286.774:2117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11876 comm="syz.8.1654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1278.886506][ T29] audit: type=1326 audit(1286.774:2118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11876 comm="syz.8.1654" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 1278.945299][ T29] audit: type=1326 audit(1286.834:2119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11876 comm="syz.8.1654" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 1279.917003][ T29] audit: type=1400 audit(1287.804:2120): avc: denied { setopt } for pid=11881 comm="syz.8.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1280.563430][T11886] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1656'. [ 1286.551302][ T29] audit: type=1326 audit(1294.444:2121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11901 comm="syz.8.1661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1286.569258][ T29] audit: type=1326 audit(1294.444:2122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11901 comm="syz.8.1661" exe="/syz-executor" sig=0 arch=40000028 syscall=183 compat=0 ip=0x132320 code=0x7ffc0000 [ 1286.570600][ T29] audit: type=1326 audit(1294.464:2123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11901 comm="syz.8.1661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1290.447881][T11911] tmpfs: Bad value for 'nr_inodes' [ 1294.337311][ T29] audit: type=1107 audit(1302.224:2124): pid=11928 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1295.157885][ T29] audit: type=1400 audit(1303.054:2125): avc: denied { relabelfrom } for pid=11932 comm="syz.8.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1295.158414][ T29] audit: type=1400 audit(1303.054:2126): avc: denied { relabelto } for pid=11932 comm="syz.8.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1296.081782][T11945] SELinux: failed to load policy [ 1300.037817][ T29] audit: type=1400 audit(1307.934:2127): avc: denied { create } for pid=11975 comm="syz.8.1681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1300.078404][ T29] audit: type=1400 audit(1307.974:2128): avc: denied { read } for pid=11975 comm="syz.8.1681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1314.328677][T12006] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1314.344670][T12006] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1317.931991][T12006] hsr_slave_0: entered promiscuous mode [ 1317.934477][T12006] hsr_slave_1: entered promiscuous mode [ 1317.939390][T12006] debugfs: 'hsr0' already exists in 'hsr' [ 1317.948390][T12006] Cannot create hsr debugfs directory [ 1319.069335][T12006] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 1319.140237][T12006] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 1319.197256][T12006] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 1319.219164][T12006] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 1322.724176][T12006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1334.438606][T12006] veth0_vlan: entered promiscuous mode [ 1334.499100][T12006] veth1_vlan: entered promiscuous mode [ 1334.622551][T12006] veth0_macvtap: entered promiscuous mode [ 1334.652756][T12006] veth1_macvtap: entered promiscuous mode [ 1334.781517][ T9016] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1334.791964][ T9016] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1334.796409][ T9016] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1334.797886][ T9016] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1334.906008][T12322] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1335.115230][T12322] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1335.228532][T12322] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1335.367003][T12322] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1335.528747][ T9013] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1335.556654][ T9016] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1335.599717][ T9013] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1335.669433][ T9013] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1338.012211][ T29] audit: type=1326 audit(1345.904:2129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12353 comm="syz.9.1701" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1338.023147][ T29] audit: type=1326 audit(1345.914:2130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12353 comm="syz.9.1701" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1338.037421][ T29] audit: type=1326 audit(1345.934:2131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12353 comm="syz.9.1701" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1338.146352][ T29] audit: type=1326 audit(1346.024:2132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12353 comm="syz.9.1701" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1338.148240][ T29] audit: type=1326 audit(1346.024:2133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12353 comm="syz.9.1701" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1338.148345][ T29] audit: type=1326 audit(1346.024:2134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12353 comm="syz.9.1701" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x132320 code=0x7ffc0000 [ 1338.148444][ T29] audit: type=1326 audit(1346.024:2135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12353 comm="syz.9.1701" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1338.148503][ T29] audit: type=1326 audit(1346.044:2136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12353 comm="syz.9.1701" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1338.150950][ T29] audit: type=1326 audit(1346.044:2137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12353 comm="syz.9.1701" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x132320 code=0x7ffc0000 [ 1338.181723][ T29] audit: type=1326 audit(1346.044:2138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12353 comm="syz.9.1701" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1346.841935][T12401] SELinux: failed to load policy [ 1347.237913][T12403] netlink: 4 bytes leftover after parsing attributes in process `syz.9.1722'. [ 1347.742920][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 1347.746136][ T29] audit: type=1326 audit(1355.634:2188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.9.1723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1347.749243][ T29] audit: type=1326 audit(1355.644:2189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.9.1723" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1347.751643][ T29] audit: type=1326 audit(1355.644:2190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.9.1723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1347.767643][ T29] audit: type=1326 audit(1355.654:2191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.9.1723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1347.772058][ T29] audit: type=1326 audit(1355.664:2192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.9.1723" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1347.773885][ T29] audit: type=1326 audit(1355.664:2193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.9.1723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1347.778432][ T29] audit: type=1326 audit(1355.674:2194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.9.1723" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1347.791202][ T29] audit: type=1326 audit(1355.674:2195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.9.1723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1347.792463][ T29] audit: type=1326 audit(1355.674:2196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.9.1723" exe="/syz-executor" sig=0 arch=40000028 syscall=122 compat=0 ip=0x132320 code=0x7ffc0000 [ 1347.792789][ T29] audit: type=1326 audit(1355.674:2197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12404 comm="syz.9.1723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1351.804782][T12432] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1351.826511][T12432] block device autoloading is deprecated and will be removed. [ 1352.168365][T12439] netlink: 20 bytes leftover after parsing attributes in process `syz.8.1737'. [ 1353.547906][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 1353.552050][ T29] audit: type=1400 audit(1361.434:2207): avc: denied { setopt } for pid=12450 comm="syz.9.1743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1354.762737][T12455] netem: change failed [ 1354.888930][ T9016] bond0 (unregistering): Released all slaves [ 1355.024752][ T9016] hsr_slave_0: left promiscuous mode [ 1355.030523][ T9016] hsr_slave_1: left promiscuous mode [ 1356.067545][T12485] netlink: 8 bytes leftover after parsing attributes in process `syz.9.1752'. [ 1363.380597][ T29] audit: type=1326 audit(1371.274:2208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12511 comm="syz.8.1758" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1363.384597][ T29] audit: type=1326 audit(1371.274:2209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12511 comm="syz.8.1758" exe="/syz-executor" sig=0 arch=40000028 syscall=162 compat=0 ip=0x132320 code=0x7ffc0000 [ 1363.388711][ T29] audit: type=1326 audit(1371.274:2210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12511 comm="syz.8.1758" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1363.421758][ T29] audit: type=1326 audit(1371.314:2211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12511 comm="syz.8.1758" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1364.579524][ T29] audit: type=1326 audit(1372.474:2212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12514 comm="syz.8.1759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1364.580758][ T29] audit: type=1326 audit(1372.474:2214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12514 comm="syz.8.1759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1364.598947][ T29] audit: type=1326 audit(1372.484:2215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12514 comm="syz.8.1759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1364.599216][ T29] audit: type=1326 audit(1372.484:2216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12514 comm="syz.8.1759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1364.600365][ T29] audit: type=1326 audit(1372.474:2213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12514 comm="syz.8.1759" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1364.600456][ T29] audit: type=1326 audit(1372.494:2217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12514 comm="syz.8.1759" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x130834 code=0x7ffc0000 [ 1368.632600][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 1368.633881][ T29] audit: type=1326 audit(1376.524:2314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12557 comm="syz.8.1764" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1368.655102][ T29] audit: type=1326 audit(1376.544:2315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12557 comm="syz.8.1764" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132320 code=0x7ffc0000 [ 1368.664374][ T29] audit: type=1326 audit(1376.554:2316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12557 comm="syz.8.1764" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1368.687348][ T29] audit: type=1326 audit(1376.584:2317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12557 comm="syz.8.1764" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x132320 code=0x7ffc0000 [ 1368.696056][ T29] audit: type=1326 audit(1376.584:2318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12559 comm="syz.8.1764" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 1368.698321][ T29] audit: type=1326 audit(1376.584:2319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12557 comm="syz.8.1764" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1368.700278][ T29] audit: type=1326 audit(1376.584:2320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12557 comm="syz.8.1764" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1368.702235][ T29] audit: type=1326 audit(1376.584:2321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12557 comm="syz.8.1764" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x7ffc0000 [ 1368.709776][ T29] audit: type=1326 audit(1376.584:2322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12557 comm="syz.8.1764" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1372.060399][ T29] audit: type=1326 audit(1379.954:2323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12567 comm="syz.8.1767" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127fac code=0x7ffc0000 [ 1373.180075][T12590] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1773'. [ 1376.384126][T12614] SELinux: failed to load policy [ 1377.258126][T12631] netlink: 'syz.9.1787': attribute type 10 has an invalid length. [ 1377.280306][T12631] netlink: 'syz.9.1787': attribute type 10 has an invalid length. [ 1377.484522][ T38] netdevsim netdevsim8 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1377.484823][ T38] netdevsim netdevsim8 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1377.485162][ T38] netdevsim netdevsim8 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1377.485248][ T38] netdevsim netdevsim8 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1381.445010][ T29] kauditd_printk_skb: 273 callbacks suppressed [ 1381.445732][ T29] audit: type=1400 audit(1389.334:2597): avc: denied { getopt } for pid=12660 comm="syz.8.1795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1383.582786][T12680] netlink: 'syz.9.1802': attribute type 1 has an invalid length. [ 1383.683913][T12680] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1383.784894][T12680] bond1: (slave geneve2): making interface the new active one [ 1383.789149][T12680] bond1: (slave geneve2): Enslaving as an active interface with an up link [ 1384.038766][ T29] audit: type=1400 audit(1391.934:2598): avc: denied { watch watch_reads } for pid=12716 comm="syz.9.1804" path="/60/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 1385.700227][ T29] audit: type=1326 audit(1393.594:2599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12729 comm="syz.8.1807" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1385.700654][ T29] audit: type=1326 audit(1393.594:2600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12729 comm="syz.8.1807" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1385.773007][ T29] audit: type=1326 audit(1393.634:2601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12729 comm="syz.8.1807" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x132320 code=0x7ffc0000 [ 1385.774821][ T29] audit: type=1326 audit(1393.664:2602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12729 comm="syz.8.1807" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1385.782981][ T29] audit: type=1326 audit(1393.674:2603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12729 comm="syz.8.1807" exe="/syz-executor" sig=0 arch=40000028 syscall=298 compat=0 ip=0x132320 code=0x7ffc0000 [ 1385.803844][ T29] audit: type=1326 audit(1393.694:2604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12740 comm="syz.9.1810" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1385.839919][ T29] audit: type=1326 audit(1393.734:2605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12740 comm="syz.9.1810" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1385.856991][ T29] audit: type=1326 audit(1393.734:2606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12740 comm="syz.9.1810" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1388.638153][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 1388.646068][ T29] audit: type=1326 audit(1396.484:2643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12759 comm="syz.8.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1388.706447][ T29] audit: type=1326 audit(1396.484:2644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12759 comm="syz.8.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1388.710398][ T29] audit: type=1326 audit(1396.514:2645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12759 comm="syz.8.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1388.714520][ T29] audit: type=1326 audit(1396.514:2646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12759 comm="syz.8.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=118 compat=0 ip=0x132320 code=0x7ffc0000 [ 1388.718852][ T29] audit: type=1326 audit(1396.514:2647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12759 comm="syz.8.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1388.718982][ T29] audit: type=1326 audit(1396.514:2648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12759 comm="syz.8.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 1388.719044][ T29] audit: type=1326 audit(1396.514:2649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12759 comm="syz.8.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1388.719096][ T29] audit: type=1326 audit(1396.534:2650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12759 comm="syz.8.1815" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 1402.971969][ T29] audit: type=1326 audit(1410.854:2651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12855 comm="syz.9.1836" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1402.977152][ T29] audit: type=1326 audit(1410.864:2652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12855 comm="syz.9.1836" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1402.982614][ T29] audit: type=1326 audit(1410.864:2653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12855 comm="syz.9.1836" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1402.989932][ T29] audit: type=1326 audit(1410.874:2654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12855 comm="syz.9.1836" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1402.991982][ T29] audit: type=1326 audit(1410.874:2655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12855 comm="syz.9.1836" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1402.992139][ T29] audit: type=1326 audit(1410.874:2656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12855 comm="syz.9.1836" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1402.992221][ T29] audit: type=1326 audit(1410.874:2657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12855 comm="syz.9.1836" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1402.992304][ T29] audit: type=1326 audit(1410.874:2658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12855 comm="syz.9.1836" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1402.992365][ T29] audit: type=1326 audit(1410.874:2659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12855 comm="syz.9.1836" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1402.992420][ T29] audit: type=1326 audit(1410.874:2660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12855 comm="syz.9.1836" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1411.533914][T12899] netlink: 96 bytes leftover after parsing attributes in process `syz.9.1848'. [ 1412.112140][T12906] netlink: 40 bytes leftover after parsing attributes in process `syz.9.1850'. [ 1412.340100][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 1412.340567][ T29] audit: type=1326 audit(1420.234:2688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12909 comm="syz.9.1851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1412.356317][ T29] audit: type=1326 audit(1420.244:2689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12909 comm="syz.9.1851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1412.364422][ T29] audit: type=1326 audit(1420.254:2690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12909 comm="syz.9.1851" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1412.370342][ T29] audit: type=1326 audit(1420.264:2691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12909 comm="syz.9.1851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1412.387185][ T29] audit: type=1326 audit(1420.284:2692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12909 comm="syz.9.1851" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132320 code=0x7ffc0000 [ 1412.388627][ T29] audit: type=1326 audit(1420.284:2693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12909 comm="syz.9.1851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1412.411799][ T29] audit: type=1326 audit(1420.294:2694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12909 comm="syz.9.1851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1412.412309][ T29] audit: type=1326 audit(1420.294:2695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12909 comm="syz.9.1851" exe="/syz-executor" sig=0 arch=40000028 syscall=233 compat=0 ip=0x132320 code=0x7ffc0000 [ 1412.414042][ T29] audit: type=1326 audit(1420.294:2696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12909 comm="syz.9.1851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1420.183979][ T29] audit: type=1400 audit(1428.074:2697): avc: denied { override_creds } for pid=12926 comm="syz.9.1855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1426.978984][ T29] audit: type=1326 audit(1434.844:2698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12931 comm="syz.8.1857" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1427.031040][ T29] audit: type=1326 audit(1434.924:2699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12931 comm="syz.8.1857" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1427.079018][ T29] audit: type=1326 audit(1434.964:2700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12931 comm="syz.8.1857" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132320 code=0x7ffc0000 [ 1427.109526][ T29] audit: type=1326 audit(1435.004:2701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12931 comm="syz.8.1857" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1427.125933][ T29] audit: type=1326 audit(1435.014:2702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12931 comm="syz.8.1857" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1427.190914][ T29] audit: type=1326 audit(1435.034:2703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12931 comm="syz.8.1857" exe="/syz-executor" sig=0 arch=40000028 syscall=393 compat=0 ip=0x132320 code=0x7ffc0000 [ 1427.218356][ T29] audit: type=1326 audit(1435.094:2704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12931 comm="syz.8.1857" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1427.277566][ T29] audit: type=1326 audit(1435.114:2705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12931 comm="syz.8.1857" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1427.278688][ T29] audit: type=1326 audit(1435.164:2706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12931 comm="syz.8.1857" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1427.279298][ T29] audit: type=1326 audit(1435.164:2707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12931 comm="syz.8.1857" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1468.597178][T12987] netlink: 'syz.8.1876': attribute type 4 has an invalid length. [ 1471.172705][T13041] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1878'. [ 1473.587605][T12966] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1473.592577][T12966] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1473.730770][T13151] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1885'. [ 1476.463800][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 1476.467027][ T29] audit: type=1326 audit(1484.354:2727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13182 comm="syz.8.1889" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1476.472107][ T29] audit: type=1326 audit(1484.364:2728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13182 comm="syz.8.1889" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1476.476539][ T29] audit: type=1326 audit(1484.364:2729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13182 comm="syz.8.1889" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1476.478487][ T29] audit: type=1326 audit(1484.364:2730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13182 comm="syz.8.1889" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1476.488692][ T29] audit: type=1326 audit(1484.384:2731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13182 comm="syz.8.1889" exe="/syz-executor" sig=0 arch=40000028 syscall=184 compat=0 ip=0x132320 code=0x7ffc0000 [ 1476.489067][ T29] audit: type=1326 audit(1484.384:2732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13182 comm="syz.8.1889" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1476.496788][ T29] audit: type=1326 audit(1484.394:2733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13182 comm="syz.8.1889" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1476.498016][ T29] audit: type=1326 audit(1484.394:2734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13182 comm="syz.8.1889" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1476.523652][ T29] audit: type=1326 audit(1484.394:2735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13182 comm="syz.8.1889" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 1476.523979][ T29] audit: type=1326 audit(1484.414:2736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13182 comm="syz.8.1889" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 1477.499605][T12966] hsr_slave_0: entered promiscuous mode [ 1477.508457][T12966] hsr_slave_1: entered promiscuous mode [ 1477.511975][T12966] debugfs: 'hsr0' already exists in 'hsr' [ 1477.513909][T12966] Cannot create hsr debugfs directory [ 1479.916713][T12966] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1479.922118][T12966] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1479.949666][T12966] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1479.990243][T12966] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1483.931756][T12966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1497.062629][T12966] veth0_vlan: entered promiscuous mode [ 1497.138222][T12966] veth1_vlan: entered promiscuous mode [ 1497.304739][T12966] veth0_macvtap: entered promiscuous mode [ 1497.336837][T12966] veth1_macvtap: entered promiscuous mode [ 1497.469236][ T56] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1497.469945][ T56] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1497.472598][ T56] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1497.491263][ T56] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1500.838386][T13430] netlink: 'syz.1.1906': attribute type 13 has an invalid length. [ 1513.846689][T13461] policy can only be matched on NF_INET_PRE_ROUTING [ 1513.847198][T13461] unable to load match [ 1520.696758][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 1520.706010][ T29] audit: type=1326 audit(1528.584:2746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13485 comm="syz.1.1916" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1520.717550][ T29] audit: type=1326 audit(1528.614:2747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13485 comm="syz.1.1916" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1520.826175][ T29] audit: type=1326 audit(1528.634:2748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13485 comm="syz.1.1916" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1520.832370][ T29] audit: type=1326 audit(1528.724:2749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13485 comm="syz.1.1916" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1520.920782][ T29] audit: type=1326 audit(1528.814:2750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13485 comm="syz.1.1916" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1520.956955][ T29] audit: type=1326 audit(1528.854:2751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13485 comm="syz.1.1916" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1520.968496][ T29] audit: type=1326 audit(1528.854:2752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13485 comm="syz.1.1916" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 1520.974781][ T29] audit: type=1326 audit(1528.854:2753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13485 comm="syz.1.1916" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1521.091153][ T29] audit: type=1326 audit(1528.984:2754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13485 comm="syz.1.1916" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1521.095982][ T29] audit: type=1326 audit(1528.984:2755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13485 comm="syz.1.1916" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1526.197737][T13518] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1921'. [ 1529.040264][T13535] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1927'. [ 1529.869984][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 1529.870455][ T29] audit: type=1400 audit(1537.764:2765): avc: denied { getopt } for pid=13534 comm="syz.8.1927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1530.071868][ T29] audit: type=1400 audit(1537.954:2766): avc: denied { write } for pid=13534 comm="syz.8.1927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1532.316751][T13587] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13587 comm=syz.8.1934 [ 1532.891998][ T29] audit: type=1326 audit(1540.784:2767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13593 comm="syz.8.1938" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1532.894352][ T29] audit: type=1326 audit(1540.784:2768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13593 comm="syz.8.1938" exe="/syz-executor" sig=0 arch=40000028 syscall=165 compat=0 ip=0x132320 code=0x7ffc0000 [ 1532.903139][ T29] audit: type=1326 audit(1540.794:2769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13593 comm="syz.8.1938" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.555163][ T29] audit: type=1326 audit(1543.444:2770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.1.1949" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.556399][ T29] audit: type=1326 audit(1543.444:2771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.1.1949" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.556499][ T29] audit: type=1326 audit(1543.444:2772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.1.1949" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.556558][ T29] audit: type=1326 audit(1543.444:2773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.1.1949" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.570426][ T29] audit: type=1326 audit(1543.454:2774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.1.1949" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.570960][ T29] audit: type=1326 audit(1543.464:2775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.1.1949" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.571064][ T29] audit: type=1326 audit(1543.464:2776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.1.1949" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.581630][ T29] audit: type=1326 audit(1543.474:2777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.1.1949" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.594039][ T29] audit: type=1326 audit(1543.474:2778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.1.1949" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.599863][ T29] audit: type=1326 audit(1543.494:2779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13619 comm="syz.1.1949" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1535.717944][T13622] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1950'. [ 1536.737721][T13640] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1957'. [ 1541.131847][T13657] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1965'. [ 1544.184330][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 1544.184799][ T29] audit: type=1326 audit(1552.074:2786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13673 comm="syz.8.1969" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1544.185081][ T29] audit: type=1326 audit(1552.074:2787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13673 comm="syz.8.1969" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1544.196192][ T29] audit: type=1326 audit(1552.084:2788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13673 comm="syz.8.1969" exe="/syz-executor" sig=0 arch=40000028 syscall=348 compat=0 ip=0x132320 code=0x7ffc0000 [ 1544.199264][ T29] audit: type=1326 audit(1552.084:2789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13673 comm="syz.8.1969" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1549.231686][ T29] audit: type=1326 audit(1557.124:2790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13675 comm="syz.8.1970" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 1553.928408][ T29] audit: type=1326 audit(1561.824:2791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13683 comm="syz.8.1972" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 1558.878140][ T29] audit: type=1400 audit(1566.764:2792): avc: denied { getopt } for pid=13691 comm="syz.8.1975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1579.372074][T13761] netlink: 16 bytes leftover after parsing attributes in process `syz.8.2004'. [ 1579.380655][ T29] audit: type=1400 audit(1587.274:2793): avc: denied { ioctl } for pid=13760 comm="syz.8.2004" path="socket:[23322]" dev="sockfs" ino=23322 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1582.260588][ T29] audit: type=1326 audit(1590.154:2794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13786 comm="syz.1.2013" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1582.277093][ T29] audit: type=1326 audit(1590.174:2795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13786 comm="syz.1.2013" exe="/syz-executor" sig=0 arch=40000028 syscall=347 compat=0 ip=0x132320 code=0x7ffc0000 [ 1582.287807][ T29] audit: type=1326 audit(1590.174:2796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13786 comm="syz.1.2013" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1582.943689][T13799] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 0) [ 1582.948926][T13799] SELinux: failed to load policy [ 1583.323335][T13803] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13803 comm=syz.8.2020 [ 1583.339087][ T29] audit: type=1107 audit(1591.234:2797): pid=13802 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1587.034410][ T29] audit: type=1401 audit(1594.924:2798): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 1591.100095][T13859] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1591.203279][T13859] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1591.371957][T13859] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1591.521143][T13859] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1592.129855][ T9010] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1592.156185][ T9010] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1592.212692][ T135] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1592.279924][ T9010] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1595.318511][T13909] netlink: 'syz.8.2046': attribute type 4 has an invalid length. [ 1595.321935][T13909] netlink: 'syz.8.2046': attribute type 4 has an invalid length. [ 1599.811917][ T29] audit: type=1326 audit(1607.694:2799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz.1.2056" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1599.812495][ T29] audit: type=1326 audit(1607.704:2800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz.1.2056" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1599.812585][ T29] audit: type=1326 audit(1607.704:2801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz.1.2056" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1599.814120][ T29] audit: type=1326 audit(1607.704:2802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz.1.2056" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1599.816682][ T29] audit: type=1326 audit(1607.704:2803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz.1.2056" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1599.820710][ T29] audit: type=1326 audit(1607.714:2804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz.1.2056" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1599.836155][ T29] audit: type=1326 audit(1607.724:2805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz.1.2056" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1599.838366][ T29] audit: type=1326 audit(1607.734:2806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz.1.2056" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1599.839862][ T29] audit: type=1326 audit(1607.734:2807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz.1.2056" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1599.859081][ T29] audit: type=1326 audit(1607.754:2808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13937 comm="syz.1.2056" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1606.451552][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 1606.451912][ T29] audit: type=1400 audit(1614.344:2850): avc: denied { bind } for pid=13996 comm="syz.8.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1606.468175][T13997] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2572 sclass=netlink_xfrm_socket pid=13997 comm=syz.8.2075 [ 1607.379600][ T29] audit: type=1326 audit(1615.274:2851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13999 comm="syz.8.2076" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1607.398821][ T29] audit: type=1326 audit(1615.284:2852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13999 comm="syz.8.2076" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1607.421267][ T29] audit: type=1326 audit(1615.314:2853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13999 comm="syz.8.2076" exe="/syz-executor" sig=0 arch=40000028 syscall=355 compat=0 ip=0x132320 code=0x7ffc0000 [ 1607.456888][ T29] audit: type=1326 audit(1615.314:2854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13999 comm="syz.8.2076" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1607.457163][ T29] audit: type=1326 audit(1615.344:2855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13999 comm="syz.8.2076" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1607.696710][ T29] audit: type=1326 audit(1615.584:2856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14003 comm="syz.1.2077" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1607.713984][ T29] audit: type=1326 audit(1615.604:2857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14003 comm="syz.1.2077" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x132320 code=0x7ffc0000 [ 1607.719894][ T29] audit: type=1326 audit(1615.614:2858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14003 comm="syz.1.2077" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1608.202267][T14015] smc: net device hsr0 applied user defined pnetid SYZ2 [ 1608.213726][T14015] smc: net device hsr0 erased user defined pnetid SYZ2 [ 1609.638552][T14029] netlink: 12 bytes leftover after parsing attributes in process `syz.8.2085'. [ 1609.639842][T14029] netlink: 12 bytes leftover after parsing attributes in process `syz.8.2085'. [ 1610.123235][T14035] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1612.492421][T13984] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1612.497594][T13984] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1612.777910][ T29] audit: type=1400 audit(1620.674:2859): avc: denied { map } for pid=14050 comm="syz.8.2091" path="socket:[25646]" dev="sockfs" ino=25646 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1612.887693][ T29] audit: type=1400 audit(1620.784:2860): avc: denied { create } for pid=14042 comm="syz.1.2089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1612.935926][ T29] audit: type=1400 audit(1620.814:2861): avc: denied { bind } for pid=14042 comm="+}[K" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1618.472418][T14081] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1618.501005][T14081] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1619.351389][ T29] audit: type=1400 audit(1627.244:2862): avc: denied { map } for pid=14105 comm="syz.8.2106" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1619.601656][ T29] audit: type=1326 audit(1627.494:2863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14113 comm="syz.8.2107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1619.621777][ T29] audit: type=1326 audit(1627.514:2864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14113 comm="syz.8.2107" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1619.626950][ T29] audit: type=1326 audit(1627.514:2865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14113 comm="syz.8.2107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1619.640191][ T29] audit: type=1326 audit(1627.534:2866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14113 comm="syz.8.2107" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1619.647034][ T29] audit: type=1326 audit(1627.534:2867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14113 comm="syz.8.2107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1619.649943][ T29] audit: type=1326 audit(1627.544:2868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14113 comm="syz.8.2107" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1619.654386][ T29] audit: type=1326 audit(1627.544:2869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14113 comm="syz.8.2107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1619.657667][ T29] audit: type=1326 audit(1627.554:2870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14113 comm="syz.8.2107" exe="/syz-executor" sig=0 arch=40000028 syscall=225 compat=0 ip=0x132320 code=0x7ffc0000 [ 1619.662112][ T29] audit: type=1326 audit(1627.554:2871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14113 comm="syz.8.2107" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1620.376076][T14032] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 1620.608673][T14032] usb 2-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 1620.608896][T14032] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1620.610481][T14032] usb 2-1: Product: syz [ 1620.610738][T14032] usb 2-1: Manufacturer: syz [ 1620.610854][T14032] usb 2-1: SerialNumber: syz [ 1621.245007][T14032] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPROTO [ 1621.246079][T14032] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): lan78xx_setup_irq_domain() failed : -71 [ 1621.246138][T14032] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 1621.278581][T14032] lan78xx 2-1:1.0: probe with driver lan78xx failed with error -71 [ 1621.290036][T14032] usb 2-1: USB disconnect, device number 4 [ 1626.843727][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 1626.856538][ T29] audit: type=1400 audit(1634.734:2881): avc: denied { ioctl } for pid=14173 comm="syz.1.2124" path="socket:[25407]" dev="sockfs" ino=25407 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1630.095888][T14201] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2129'. [ 1630.119584][ C1] vcan0: j1939_session_tx_dat: 0x8619bb00: queue data error: -100 [ 1630.130926][ T29] audit: type=1400 audit(1638.024:2882): avc: denied { read } for pid=2904 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1630.137205][ T29] audit: type=1400 audit(1638.034:2883): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1630.157291][ T29] audit: type=1400 audit(1638.034:2884): avc: denied { search } for pid=2904 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1630.187815][ T29] audit: type=1400 audit(1638.054:2885): avc: denied { add_name } for pid=2904 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1630.190435][ T29] audit: type=1400 audit(1638.054:2886): avc: denied { create } for pid=2904 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1630.201986][ T29] audit: type=1400 audit(1638.054:2887): avc: denied { append open } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1630.259977][ T29] audit: type=1400 audit(1638.154:2888): avc: denied { getattr } for pid=2904 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1631.237480][ T29] audit: type=1326 audit(1639.124:2889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14220 comm="syz.1.2133" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1631.261768][ T29] audit: type=1326 audit(1639.154:2890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14220 comm="syz.1.2133" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1634.076058][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 1634.078837][ T29] audit: type=1326 audit(1641.964:2903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14229 comm="syz.8.2136" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1634.080674][ T29] audit: type=1326 audit(1641.964:2904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14229 comm="syz.8.2136" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1634.101705][ T29] audit: type=1326 audit(1641.994:2905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14229 comm="syz.8.2136" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x132320 code=0x7ffc0000 [ 1634.107063][ T29] audit: type=1326 audit(1641.994:2906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14229 comm="syz.8.2136" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1634.110765][ T29] audit: type=1326 audit(1642.004:2907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14229 comm="syz.8.2136" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1634.111303][ T29] audit: type=1326 audit(1642.004:2908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14229 comm="syz.8.2136" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1634.119701][ T29] audit: type=1326 audit(1642.004:2909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14229 comm="syz.8.2136" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1634.126859][ T29] audit: type=1326 audit(1642.014:2910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14229 comm="syz.8.2136" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132320 code=0x7ffc0000 [ 1634.145850][ T29] audit: type=1326 audit(1642.034:2911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14229 comm="syz.8.2136" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132358 code=0x7ffc0000 [ 1634.169144][ T29] audit: type=1326 audit(1642.054:2912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14229 comm="syz.8.2136" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132358 code=0x7ffc0000 [ 1639.369611][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 1639.374649][ T29] audit: type=1326 audit(1647.264:2918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14255 comm="syz.1.2144" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7fc00000 [ 1640.750932][T14278] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2150'. [ 1648.751067][ T29] audit: type=1804 audit(1656.644:2919): pid=14306 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz.8.2157" name="/newroot/378/file0" dev="tmpfs" ino=1932 res=1 errno=0 [ 1656.113139][ T29] audit: type=1326 audit(1663.994:2920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14337 comm="syz.8.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1656.119285][ T29] audit: type=1326 audit(1664.014:2921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14337 comm="syz.8.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1656.136402][ T29] audit: type=1326 audit(1664.024:2922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14337 comm="syz.8.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1656.136810][ T29] audit: type=1326 audit(1664.024:2923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14337 comm="syz.8.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1656.137105][ T29] audit: type=1326 audit(1664.024:2924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14337 comm="syz.8.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1656.142955][ T29] audit: type=1326 audit(1664.034:2925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14337 comm="syz.8.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1656.149671][ T29] audit: type=1326 audit(1664.044:2926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14337 comm="syz.8.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1656.158963][ T29] audit: type=1326 audit(1664.054:2927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14337 comm="syz.8.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1656.168016][ T29] audit: type=1326 audit(1664.054:2928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14337 comm="syz.8.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1656.168783][ T29] audit: type=1326 audit(1664.064:2929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14337 comm="syz.8.2168" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 1665.253880][T14364] random: crng reseeded on system resumption [ 1692.368321][T14366] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1692.384902][T14366] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1693.380417][ T30] INFO: task kworker/1:144:8288 blocked for more than 430 seconds. [ 1693.437019][ T30] Not tainted syzkaller #0 [ 1693.443934][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1693.511319][ T30] task:kworker/1:144 state:D stack:0 pid:8288 tgid:8288 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1693.544172][ T30] Workqueue: events bpf_prog_free_deferred [ 1693.568851][ T29] kauditd_printk_skb: 4 callbacks suppressed SYZFAIL: failed to recv rpc [ 1693.591003][ T29] audit: type=1400 audit(1701.464:2934): avc: denied { write } for pid=3090 comm="syz-executor" path="pipe:[487]" dev="pipefs" ino=487 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1693.596060][ T30] [ 1693.596167][ T30] Call trace: [ 1693.596222][ T30] [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130) [ 1693.596346][ T30] r10:ea959d84 r9:829174e8 r8:60000113 r7:829174e8 r6:ea959d8c r5:858ba400 [ 1693.596369][ T30] r4:858ba400 [ 1693.596384][ T30] [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24) [ 1693.596442][ T30] r5:858ba400 r4:829174e4 [ 1693.596455][ T30] [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 1693.596505][ T30] [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18) [ 1693.596564][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08 [ 1693.596585][ T30] r4:00000000 [ 1693.596598][ T30] [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40) [ 1693.596642][ T30] [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240) [ 1693.596697][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1693.596763][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cae900 [ 1693.596783][ T30] r4:00000000 [ 1693.596796][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1693.596864][ T30] r9:83018605 r8:858ba400 r7:00000000 r6:83018600 r5:00001000 r4:7f28e000 [ 1693.596884][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1693.596947][ T30] r5:00001000 r4:dfae1000 [ 1693.596961][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1693.597016][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1693.597073][ T30] r5:85acf394 r4:83f9b100 [ 1693.597086][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1693.597153][ T30] r7:ddde3b40 r6:83018600 r5:85acf394 r4:83f9b100 [ 1693.597169][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1693.597233][ T30] r10:61c88647 r9:858ba400 r8:83f9b12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1693.597251][ T30] r4:83f9b100 [ 1693.597265][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1693.597329][ T30] r10:00000000 r9:83f9b100 r8:802762fc r7:ea93de60 r6:83f9b080 r5:858ba400 [ 1693.597347][ T30] r4:00000001 [ 1693.597360][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1693.597404][ T30] Exception stack(0xea959fb0 to 0xea959ff8) [ 1693.597442][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1693.597475][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1693.597504][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1693.597539][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1693.597556][ T30] r4:850b8100 [ 1693.598894][ T30] INFO: task kworker/1:144:8288 is blocked on a mutex likely owned by task kworker/1:146:8299. [ 1693.599002][ T30] task:kworker/1:146 state:R running task stack:0 pid:8299 tgid:8299 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1693.599484][ T30] Workqueue: events bpf_prog_free_deferred [ 1693.599651][ T30] Call trace: [ 1693.599825][ T30] [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8) [ 1693.600030][ T30] r10:8280ca38 r9:84df8c00 r8:80200c04 r7:dfd49d54 r6:ffffffff r5:84df8c00 [ 1693.600128][ T30] r4:00000000 [ 1693.600145][ T30] [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1693.600294][ T30] Exception stack(0xdfd49d20 to 0xdfd49d68) [ 1693.600332][ T30] 9d20: e5635000 ebec7000 00000001 80239018 7f23e000 00000001 82ace204 82acd5e0 [ 1693.600364][ T30] 9d40: 7f23e000 ebec7000 8280ca38 dfd49d9c dfd49da0 dfd49d70 8022fe10 80239030 [ 1693.600432][ T30] 9d60: 80000113 ffffffff [ 1693.600459][ T30] r5:80000113 r4:80239030 [ 1693.600746][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458) [ 1693.600810][ T30] r4:82ace224 [ 1693.600890][ T30] [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240) [ 1693.600955][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd49dc0 r5:dfd49e08 [ 1693.601215][ T30] r4:dfd49dc0 [ 1693.601233][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1693.601676][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8670e940 [ 1693.601741][ T30] r4:00000000 [ 1693.601847][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1693.602236][ T30] r9:83018605 r8:84df8c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2e2000 [ 1693.602300][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1693.602390][ T30] r5:00001000 r4:e84e1000 [ 1693.602410][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1693.602524][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1693.602606][ T30] r5:8517c394 r4:85bcd700 [ 1693.602732][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1693.602817][ T30] r7:ddde3b40 r6:83018600 r5:8517c394 r4:85bcd700 [ 1693.602838][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1693.602925][ T30] r10:61c88647 r9:84df8c00 r8:85bcd72c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1693.602949][ T30] r4:85bcd700 [ 1693.602967][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1693.603049][ T30] r10:00000000 r9:85bcd700 r8:802762fc r7:ea959e60 r6:85bcd280 r5:84df8c00 [ 1693.603124][ T30] r4:00000001 [ 1693.603151][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1693.603212][ T30] Exception stack(0xdfd49fb0 to 0xdfd49ff8) [ 1693.603254][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1693.603298][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1693.603351][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1693.603400][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1693.603426][ T30] r4:84f0e240 [ 1693.604073][ T30] INFO: task kworker/1:145:8295 blocked for more than 430 seconds. [ 1693.604127][ T30] Not tainted syzkaller #0 [ 1693.604158][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1693.604173][ T30] task:kworker/1:145 state:D stack:0 pid:8295 tgid:8295 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1693.604247][ T30] Workqueue: events bpf_prog_free_deferred [ 1693.604294][ T30] Call trace: [ 1693.604319][ T30] [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130) [ 1693.604403][ T30] r10:dfce1d84 r9:829174e8 r8:600f0113 r7:829174e8 r6:dfce1d8c r5:85113000 [ 1693.604422][ T30] r4:85113000 [ 1693.604437][ T30] [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24) [ 1693.604498][ T30] r5:85113000 r4:829174e4 [ 1693.604514][ T30] [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 1693.604567][ T30] [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18) [ 1693.604629][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce1e08 [ 1693.604648][ T30] r4:00000000 [ 1693.604664][ T30] [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40) [ 1693.604709][ T30] [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240) [ 1693.604760][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1693.604824][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8681a7c0 [ 1693.604841][ T30] r4:00000000 [ 1693.604854][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1693.604923][ T30] r9:83018605 r8:85113000 r7:00000000 r6:83018600 r5:00001000 r4:7f2f2000 [ 1693.604938][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1693.605000][ T30] r5:00001000 r4:ea65f000 [ 1693.605013][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1693.605067][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1693.605119][ T30] r5:86b61b94 r4:85ba0c00 [ 1693.605144][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1693.605346][ T30] r7:ddde3b40 r6:83018600 r5:86b61b94 r4:85ba0c00 [ 1693.858200][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1693.860174][ T30] r10:61c88647 r9:85113000 r8:85ba0c2c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1693.861845][ T30] r4:85ba0c00 [ 1693.862837][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1693.875787][ T30] r10:00000000 r9:85ba0c00 r8:802762fc r7:ea959e60 r6:83f9b000 r5:85113000 [ 1693.877641][ T30] r4:00000001 [ 1693.878669][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1693.880482][ T30] Exception stack(0xdfce1fb0 to 0xdfce1ff8) [ 1693.881564][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1693.882684][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1693.883577][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1693.884349][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1693.885163][ T30] r4:84f0ef00 [ 1693.886281][ T30] INFO: task kworker/1:145:8295 is blocked on a mutex likely owned by task kworker/1:146:8299. [ 1693.887253][ T30] task:kworker/1:146 state:R running task stack:0 pid:8299 tgid:8299 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1693.888832][ T30] Workqueue: events bpf_prog_free_deferred [ 1693.889667][ T30] Call trace: [ 1693.890355][ T30] [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8) [ 1693.891084][ T30] r10:8280ca38 r9:84df8c00 r8:80200c04 r7:dfd49d54 r6:ffffffff r5:84df8c00 [ 1693.891913][ T30] r4:00000000 [ 1693.892454][ T30] [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1693.893932][ T30] Exception stack(0xdfd49d20 to 0xdfd49d68) [ 1693.894565][ T30] 9d20: e5a3d000 ebec7000 00000001 80239018 7f23e000 00000001 82ace204 82acd5e0 [ 1693.897398][ T30] 9d40: 7f23e000 ebec7000 8280ca38 dfd49d9c dfd49da0 dfd49d70 8022fe10 80239030 [ 1693.898246][ T30] 9d60: 80000113 ffffffff [ 1693.898823][ T30] r5:80000113 r4:80239030 [ 1693.899497][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458) [ 1693.901967][ T30] r4:82ace224 [ 1693.902870][ T30] [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240) [ 1693.915925][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd49dc0 r5:dfd49e08 [ 1693.917553][ T30] r4:dfd49dc0 [ 1693.918269][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1693.919675][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8670e940 [ 1693.920707][ T30] r4:00000000 [ 1693.921434][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1693.922424][ T30] r9:83018605 r8:84df8c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2e2000 [ 1693.923646][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1693.924975][ T30] r5:00001000 r4:e84e1000 [ 1693.926801][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1693.927977][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1693.929534][ T30] r5:8517c394 r4:85bcd700 [ 1693.930239][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1693.931329][ T30] r7:ddde3b40 r6:83018600 r5:8517c394 r4:85bcd700 [ 1693.932556][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1693.933615][ T30] r10:61c88647 r9:84df8c00 r8:85bcd72c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1693.934510][ T30] r4:85bcd700 [ 1693.935012][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1693.937817][ T30] r10:00000000 r9:85bcd700 r8:802762fc r7:ea959e60 r6:85bcd280 r5:84df8c00 [ 1693.938769][ T30] r4:00000001 [ 1693.939275][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1693.940297][ T30] Exception stack(0xdfd49fb0 to 0xdfd49ff8) [ 1693.940974][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1693.941861][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1693.943809][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1693.946146][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1693.947962][ T30] r4:84f0e240 [ 1693.949392][ T30] INFO: task kworker/1:148:8311 blocked for more than 430 seconds. [ 1693.951403][ T30] Not tainted syzkaller #0 [ 1693.952535][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1693.954625][ T30] task:kworker/1:148 state:D stack:0 pid:8311 tgid:8311 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1693.958849][ T30] Workqueue: events bpf_prog_free_deferred [ 1693.960677][ T30] Call trace: [ 1693.962114][ T30] [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130) [ 1693.964765][ T30] r10:dfd7dd84 r9:829174e8 r8:60000113 r7:829174e8 r6:dfd7dd8c r5:84dfbc00 [ 1693.970555][ T30] r4:84dfbc00 [ 1693.972508][ T30] [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24) [ 1693.977465][ T30] r5:84dfbc00 r4:829174e4 [ 1693.978870][ T30] [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 1693.981522][ T30] [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18) [ 1693.984963][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd7de08 [ 1693.996397][ T30] r4:00000000 [ 1693.997617][ T30] [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40) [ 1693.999016][ T30] [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240) [ 1694.001132][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.003552][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971a00 [ 1694.007803][ T30] r4:00000000 [ 1694.008975][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.010867][ T30] r9:83018605 r8:84dfbc00 r7:00000000 r6:83018600 r5:00001000 r4:7f28c000 [ 1694.015753][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1694.038933][ T30] r5:00001000 r4:dfacd000 [ 1694.039509][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.039962][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.040195][ T30] r5:85accf94 r4:85bcd800 [ 1694.040416][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.040685][ T30] r7:ddde3b40 r6:83018600 r5:85accf94 r4:85bcd800 [ 1694.040829][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.041071][ T30] r10:61c88647 r9:84dfbc00 r8:85bcd82c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1694.041630][ T30] r4:85bcd800 [ 1694.041844][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.042135][ T30] r10:00000000 r9:85bcd800 r8:802762fc r7:ea959e60 r6:85bcdc00 r5:84dfbc00 [ 1694.042288][ T30] r4:00000001 [ 1694.042426][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.042721][ T30] Exception stack(0xdfd7dfb0 to 0xdfd7dff8) [ 1694.042909][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1694.043077][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.043237][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.043398][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.043581][ T30] r4:84f0e040 [ 1694.044200][ T30] INFO: task kworker/1:148:8311 is blocked on a mutex likely owned by task kworker/1:146:8299. [ 1694.044471][ T30] task:kworker/1:146 state:R running task stack:0 pid:8299 tgid:8299 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.044938][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.106285][ T30] Call trace: [ 1694.106836][ T30] [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8) [ 1694.107177][ T30] r10:8280ca38 r9:84df8c00 r8:80200c04 r7:dfd49d54 r6:ffffffff r5:84df8c00 [ 1694.107249][ T30] r4:00000000 [ 1694.107272][ T30] [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1694.107399][ T30] Exception stack(0xdfd49d20 to 0xdfd49d68) [ 1694.107453][ T30] 9d20: e5e0d000 ebec7000 00000001 80239018 7f23e000 00000001 82ace204 82acd5e0 [ 1694.107522][ T30] 9d40: 7f23e000 ebec7000 8280ca38 dfd49d9c dfd49da0 dfd49d70 8022fe10 80239030 [ 1694.107548][ T30] 9d60: 80000113 ffffffff [ 1694.107594][ T30] r5:80000113 r4:80239030 [ 1694.107622][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458) [ 1694.107695][ T30] r4:82ace224 [ 1694.107711][ T30] [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240) [ 1694.107781][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd49dc0 r5:dfd49e08 [ 1694.107871][ T30] r4:dfd49dc0 [ 1694.107986][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.108065][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8670e940 [ 1694.108087][ T30] r4:00000000 [ 1694.108102][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.108181][ T30] r9:83018605 r8:84df8c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2e2000 [ 1694.108233][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.108307][ T30] r5:00001000 r4:e84e1000 [ 1694.108326][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.108383][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.108630][ T30] r5:8517c394 r4:85bcd700 [ 1694.108656][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.108722][ T30] r7:ddde3b40 r6:83018600 r5:8517c394 r4:85bcd700 [ 1694.108741][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.108847][ T30] r10:61c88647 r9:84df8c00 r8:85bcd72c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1694.108886][ T30] r4:85bcd700 [ 1694.108920][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.108993][ T30] r10:00000000 r9:85bcd700 r8:802762fc r7:ea959e60 r6:85bcd280 r5:84df8c00 [ 1694.109015][ T30] r4:00000001 [ 1694.109033][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.109079][ T30] Exception stack(0xdfd49fb0 to 0xdfd49ff8) [ 1694.109110][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1694.109150][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.109185][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.109222][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.109243][ T30] r4:84f0e240 [ 1694.109903][ T30] INFO: task kworker/1:149:8312 blocked for more than 430 seconds. [ 1694.110070][ T30] Not tainted syzkaller #0 [ 1694.110110][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1694.110131][ T30] task:kworker/1:149 state:D stack:0 pid:8312 tgid:8312 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.110299][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.110373][ T30] Call trace: [ 1694.110405][ T30] [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130) [ 1694.110478][ T30] r10:dfd05d84 r9:829174e8 r8:60000113 r7:829174e8 r6:dfd05d8c r5:84dfc800 [ 1694.110499][ T30] r4:84dfc800 [ 1694.110513][ T30] [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24) [ 1694.110573][ T30] r5:84dfc800 r4:829174e4 [ 1694.110588][ T30] [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 1694.110637][ T30] [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18) [ 1694.110699][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 [ 1694.110719][ T30] r4:00000000 [ 1694.110735][ T30] [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40) [ 1694.110788][ T30] [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240) [ 1694.110835][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.110906][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971900 [ 1694.110927][ T30] r4:00000000 [ 1694.110942][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.111007][ T30] r9:83018605 r8:84dfc800 r7:00000000 r6:83018600 r5:00001000 r4:7f2e6000 [ 1694.111026][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.111084][ T30] r5:00001000 r4:ea5a4000 [ 1694.111099][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.111152][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.111208][ T30] r5:85acd794 r4:85bcd080 [ 1694.111223][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.111284][ T30] r7:ddde3b40 r6:83018600 r5:85acd794 r4:85bcd080 [ 1694.111300][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.111362][ T30] r10:61c88647 r9:84dfc800 r8:85bcd0ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1694.111383][ T30] r4:85bcd080 [ 1694.111398][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.111496][ T30] r10:00000000 r9:85bcd080 r8:802762fc r7:ea959e60 r6:85bcd380 r5:84dfc800 [ 1694.111521][ T30] r4:00000001 [ 1694.111539][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.111586][ T30] Exception stack(0xdfd05fb0 to 0xdfd05ff8) [ 1694.111784][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1694.111855][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.111900][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.111939][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.112009][ T30] r4:84f0e040 [ 1694.112494][ T30] INFO: task kworker/1:149:8312 is blocked on a mutex likely owned by task kworker/1:146:8299. [ 1694.112542][ T30] task:kworker/1:146 state:R running task stack:0 pid:8299 tgid:8299 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.112681][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.112770][ T30] Call trace: [ 1694.112885][ T30] [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8) [ 1694.112974][ T30] r10:8280ca38 r9:84df8c00 r8:80200c04 r7:dfd49d54 r6:ffffffff r5:84df8c00 [ 1694.112999][ T30] r4:00000000 [ 1694.113058][ T30] [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1694.113125][ T30] Exception stack(0xdfd49d20 to 0xdfd49d68) [ 1694.113167][ T30] 9d20: e5e0d000 ebec7000 00000001 80239018 7f23e000 00000001 82ace204 82acd5e0 [ 1694.113229][ T30] 9d40: 7f23e000 ebec7000 8280ca38 dfd49d9c dfd49da0 dfd49d70 8022fe10 80239030 [ 1694.113261][ T30] 9d60: 80000113 ffffffff [ 1694.113326][ T30] r5:80000113 r4:80239030 [ 1694.113388][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458) [ 1694.113507][ T30] r4:82ace224 [ 1694.113604][ T30] [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240) [ 1694.113682][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd49dc0 r5:dfd49e08 [ 1694.113708][ T30] r4:dfd49dc0 [ 1694.113724][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.113821][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8670e940 [ 1694.113843][ T30] r4:00000000 [ 1694.113860][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.113949][ T30] r9:83018605 r8:84df8c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2e2000 [ 1694.113971][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.114041][ T30] r5:00001000 r4:e84e1000 [ 1694.114097][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.114173][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.114284][ T30] r5:8517c394 r4:85bcd700 [ 1694.114308][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.114407][ T30] r7:ddde3b40 r6:83018600 r5:8517c394 r4:85bcd700 [ 1694.114432][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.114503][ T30] r10:61c88647 r9:84df8c00 r8:85bcd72c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1694.114523][ T30] r4:85bcd700 [ 1694.114577][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.114649][ T30] r10:00000000 r9:85bcd700 r8:802762fc r7:ea959e60 r6:85bcd280 r5:84df8c00 [ 1694.114672][ T30] r4:00000001 [ 1694.114791][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.114880][ T30] Exception stack(0xdfd49fb0 to 0xdfd49ff8) [ 1694.115062][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1694.115110][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.115146][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.115239][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.115266][ T30] r4:84f0e240 [ 1694.115378][ T30] INFO: task kworker/1:151:8316 blocked for more than 430 seconds. [ 1694.179949][ T30] Not tainted syzkaller #0 [ 1694.180032][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1694.180056][ T30] task:kworker/1:151 state:D stack:0 pid:8316 tgid:8316 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.180260][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.180350][ T30] Call trace: [ 1694.180382][ T30] [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130) [ 1694.180479][ T30] r10:dfcf1d84 r9:829174e8 r8:600c0113 r7:829174e8 r6:dfcf1d8c r5:84dfa400 [ 1694.180515][ T30] r4:84dfa400 [ 1694.180534][ T30] [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24) [ 1694.180593][ T30] r5:84dfa400 r4:829174e4 [ 1694.180729][ T30] [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 1694.180818][ T30] [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18) [ 1694.180898][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf1e08 [ 1694.180920][ T30] r4:00000000 [ 1694.180937][ T30] [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40) [ 1694.180990][ T30] [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240) [ 1694.181110][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.181188][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86059c80 [ 1694.181249][ T30] r4:00000000 [ 1694.181269][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.181346][ T30] r9:83018605 r8:84dfa400 r7:00000000 r6:83018600 r5:00001000 r4:7f2e4000 [ 1694.181399][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.181478][ T30] r5:00001000 r4:ea59f000 [ 1694.181497][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.181557][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.181614][ T30] r5:87333f94 r4:85bcdd80 [ 1694.181631][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.181695][ T30] r7:ddde3b40 r6:83018600 r5:87333f94 r4:85bcdd80 [ 1694.181712][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.181890][ T30] r10:61c88647 r9:84dfa400 r8:85bcddac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1694.181924][ T30] r4:85bcdd80 [ 1694.181945][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.182015][ T30] r10:00000000 r9:85bcdd80 r8:802762fc r7:dfde5e60 r6:85bcdb00 r5:84dfa400 [ 1694.182130][ T30] r4:00000001 [ 1694.182182][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.182236][ T30] Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) [ 1694.182271][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1694.182331][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.182369][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.182409][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.182430][ T30] r4:85dd3740 [ 1694.182970][ T30] INFO: task kworker/1:151:8316 is blocked on a mutex likely owned by task kworker/1:146:8299. [ 1694.183010][ T30] task:kworker/1:146 state:R running task stack:0 pid:8299 tgid:8299 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.183196][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.183283][ T30] Call trace: [ 1694.183311][ T30] [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8) [ 1694.183436][ T30] r10:8280ca38 r9:84df8c00 r8:80200c04 r7:dfd49d54 r6:ffffffff r5:84df8c00 [ 1694.183526][ T30] r4:00000000 [ 1694.183548][ T30] [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1694.183642][ T30] Exception stack(0xdfd49d20 to 0xdfd49d68) [ 1694.183691][ T30] 9d20: e5f98000 ebec7000 00000001 80239018 7f23e000 00000001 82ace204 82acd5e0 [ 1694.183724][ T30] 9d40: 7f23e000 ebec7000 8280ca38 dfd49d9c dfd49da0 dfd49d70 8022fe10 80239030 [ 1694.183748][ T30] 9d60: 80000113 ffffffff [ 1694.183771][ T30] r5:80000113 r4:80239030 [ 1694.183830][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458) [ 1694.184018][ T30] r4:82ace224 [ 1694.184134][ T30] [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240) [ 1694.184211][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd49dc0 r5:dfd49e08 [ 1694.184233][ T30] r4:dfd49dc0 [ 1694.184250][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.184318][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8670e940 [ 1694.184339][ T30] r4:00000000 [ 1694.184356][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.184487][ T30] r9:83018605 r8:84df8c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2e2000 [ 1694.184534][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.184679][ T30] r5:00001000 r4:e84e1000 [ 1694.184711][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.184940][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.185049][ T30] r5:8517c394 r4:85bcd700 [ 1694.185117][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.185187][ T30] r7:ddde3b40 r6:83018600 r5:8517c394 r4:85bcd700 [ 1694.185206][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.236395][ T30] r10:61c88647 r9:84df8c00 r8:85bcd72c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1694.236497][ T30] r4:85bcd700 [ 1694.236522][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.236635][ T30] r10:00000000 r9:85bcd700 r8:802762fc r7:ea959e60 r6:85bcd280 r5:84df8c00 [ 1694.236705][ T30] r4:00000001 [ 1694.236729][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.236783][ T30] Exception stack(0xdfd49fb0 to 0xdfd49ff8) [ 1694.236861][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1694.236949][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.236988][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.237084][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.237109][ T30] r4:84f0e240 [ 1694.237344][ T30] INFO: task kworker/0:127:9138 blocked for more than 430 seconds. [ 1694.237391][ T30] Not tainted syzkaller #0 [ 1694.237416][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1694.237436][ T30] task:kworker/0:127 state:D stack:0 pid:9138 tgid:9138 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.237606][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.237668][ T30] Call trace: [ 1694.237745][ T30] [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130) [ 1694.237871][ T30] r10:dfaa5d84 r9:829174e8 r8:60010013 r7:829174e8 r6:dfaa5d8c r5:85816000 [ 1694.237917][ T30] r4:85816000 [ 1694.237934][ T30] [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24) [ 1694.238000][ T30] r5:85816000 r4:829174e4 [ 1694.238016][ T30] [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 1694.238071][ T30] [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18) [ 1694.238182][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 [ 1694.238271][ T30] r4:00000000 [ 1694.238293][ T30] [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40) [ 1694.238345][ T30] [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240) [ 1694.238945][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.239102][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8681ac40 [ 1694.239129][ T30] r4:00000000 [ 1694.239190][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.239274][ T30] r9:83018405 r8:85816000 r7:00000000 r6:83018400 r5:00001000 r4:7f2ea000 [ 1694.239329][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.239439][ T30] r5:00001000 r4:ea5c1000 [ 1694.239500][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.239604][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.239720][ T30] r5:87333394 r4:853e0900 [ 1694.239743][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.239923][ T30] r7:dddcfb40 r6:83018400 r5:87333394 r4:853e0900 [ 1694.239945][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.240012][ T30] r10:61c88647 r9:85816000 r8:853e092c r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 1694.240034][ T30] r4:853e0900 [ 1694.240078][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.240157][ T30] r10:00000000 r9:853e0900 r8:802762fc r7:eaac1e60 r6:853e0980 r5:85816000 [ 1694.240178][ T30] r4:00000001 [ 1694.240193][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.240239][ T30] Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) [ 1694.240272][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 1694.240306][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.240336][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.240367][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.240386][ T30] r4:85c76340 [ 1694.240994][ T30] INFO: task kworker/0:127:9138 is blocked on a mutex likely owned by task kworker/1:146:8299. [ 1694.241094][ T30] task:kworker/1:146 state:R running task stack:0 pid:8299 tgid:8299 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.241336][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.241517][ T30] Call trace: [ 1694.241576][ T30] [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8) [ 1694.241697][ T30] r10:8280ca38 r9:84df8c00 r8:80200c04 r7:dfd49d54 r6:ffffffff r5:84df8c00 [ 1694.241730][ T30] r4:00000000 [ 1694.241749][ T30] [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1694.241805][ T30] Exception stack(0xdfd49d20 to 0xdfd49d68) [ 1694.241889][ T30] 9d20: e6172000 ebec7000 00000001 80239018 7f23e000 00000001 82ace204 82acd5e0 [ 1694.241933][ T30] 9d40: 7f23e000 ebec7000 8280ca38 dfd49d9c dfd49da0 dfd49d70 8022fe10 80239030 [ 1694.241958][ T30] 9d60: 80000113 ffffffff [ 1694.242023][ T30] r5:80000113 r4:80239030 [ 1694.242049][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458) [ 1694.242117][ T30] r4:82ace224 [ 1694.242134][ T30] [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240) [ 1694.242198][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd49dc0 r5:dfd49e08 [ 1694.242223][ T30] r4:dfd49dc0 [ 1694.242239][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.242443][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8670e940 [ 1694.242513][ T30] r4:00000000 [ 1694.242538][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.242615][ T30] r9:83018605 r8:84df8c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2e2000 [ 1694.242658][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.242764][ T30] r5:00001000 r4:e84e1000 [ 1694.242849][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.242989][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.243055][ T30] r5:8517c394 r4:85bcd700 [ 1694.243072][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.243139][ T30] r7:ddde3b40 r6:83018600 r5:8517c394 r4:85bcd700 [ 1694.243158][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.243225][ T30] r10:61c88647 r9:84df8c00 r8:85bcd72c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1694.243245][ T30] r4:85bcd700 [ 1694.243259][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.243392][ T30] r10:00000000 r9:85bcd700 r8:802762fc r7:ea959e60 r6:85bcd280 r5:84df8c00 [ 1694.243423][ T30] r4:00000001 [ 1694.243489][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.243582][ T30] Exception stack(0xdfd49fb0 to 0xdfd49ff8) [ 1694.243621][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1694.243767][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.243806][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.243845][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.243866][ T30] r4:84f0e240 [ 1694.243941][ T30] INFO: task kworker/0:139:9191 blocked for more than 430 seconds. [ 1694.244028][ T30] Not tainted syzkaller #0 [ 1694.244059][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1694.244076][ T30] task:kworker/0:139 state:D stack:0 pid:9191 tgid:9191 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.244141][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.244186][ T30] Call trace: [ 1694.244257][ T30] [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130) [ 1694.244331][ T30] r10:eabedd84 r9:829174e8 r8:60000013 r7:829174e8 r6:eabedd8c r5:86430000 [ 1694.244351][ T30] r4:86430000 [ 1694.244367][ T30] [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24) [ 1694.244577][ T30] r5:86430000 r4:829174e4 [ 1694.244610][ T30] [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 1694.244669][ T30] [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18) [ 1694.244731][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 [ 1694.244791][ T30] r4:00000000 [ 1694.244888][ T30] [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40) [ 1694.244941][ T30] [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240) [ 1694.245018][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.245090][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8681ae40 [ 1694.245111][ T30] r4:00000000 [ 1694.245127][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.245196][ T30] r9:83018405 r8:86430000 r7:00000000 r6:83018400 r5:00001000 r4:7f2ec000 [ 1694.245215][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.317155][ T30] r5:00001000 r4:ea619000 [ 1694.317225][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.317345][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.317414][ T30] r5:87332794 r4:850f0a80 [ 1694.317458][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.317649][ T30] r7:dddcfb40 r6:83018400 r5:87332794 r4:850f0a80 [ 1694.317676][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.317755][ T30] r10:61c88647 r9:86430000 r8:850f0aac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 1694.317778][ T30] r4:850f0a80 [ 1694.317794][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.317867][ T30] r10:00000000 r9:850f0a80 r8:802762fc r7:ea995e60 r6:850f0c80 r5:86430000 [ 1694.317975][ T30] r4:00000001 [ 1694.317996][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.318048][ T30] Exception stack(0xeabedfb0 to 0xeabedff8) [ 1694.318111][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 1694.318153][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.318187][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.318226][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.318247][ T30] r4:85e43c40 [ 1694.318969][ T30] INFO: task kworker/0:139:9191 is blocked on a mutex likely owned by task kworker/1:146:8299. [ 1694.319096][ T30] task:kworker/1:146 state:R running task stack:0 pid:8299 tgid:8299 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.319255][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.319477][ T30] Call trace: [ 1694.319521][ T30] [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8) [ 1694.319634][ T30] r10:8280ca38 r9:84df8c00 r8:80200c04 r7:dfd49d54 r6:ffffffff r5:84df8c00 [ 1694.319662][ T30] r4:00000000 [ 1694.319723][ T30] [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1694.319990][ T30] Exception stack(0xdfd49d20 to 0xdfd49d68) [ 1694.320084][ T30] 9d20: e63dc000 ebec7000 00000001 80239018 7f23e000 00000001 82ace204 82acd5e0 [ 1694.320141][ T30] 9d40: 7f23e000 ebec7000 8280ca38 dfd49d9c dfd49da0 dfd49d70 8022fe10 80239030 [ 1694.320170][ T30] 9d60: 80000113 ffffffff [ 1694.320199][ T30] r5:80000113 r4:80239030 [ 1694.320225][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458) [ 1694.320305][ T30] r4:82ace224 [ 1694.320321][ T30] [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240) [ 1694.320381][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd49dc0 r5:dfd49e08 [ 1694.320402][ T30] r4:dfd49dc0 [ 1694.320418][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.320479][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8670e940 [ 1694.320496][ T30] r4:00000000 [ 1694.320510][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.320579][ T30] r9:83018605 r8:84df8c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2e2000 [ 1694.320596][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.320700][ T30] r5:00001000 r4:e84e1000 [ 1694.320727][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.320808][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.320874][ T30] r5:8517c394 r4:85bcd700 [ 1694.321037][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.321119][ T30] r7:ddde3b40 r6:83018600 r5:8517c394 r4:85bcd700 [ 1694.321149][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.321218][ T30] r10:61c88647 r9:84df8c00 r8:85bcd72c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1694.321238][ T30] r4:85bcd700 [ 1694.321257][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.321322][ T30] r10:00000000 r9:85bcd700 r8:802762fc r7:ea959e60 r6:85bcd280 r5:84df8c00 [ 1694.321341][ T30] r4:00000001 [ 1694.321357][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.321402][ T30] Exception stack(0xdfd49fb0 to 0xdfd49ff8) [ 1694.321530][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1694.321615][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.321828][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.322829][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.322883][ T30] r4:84f0e240 [ 1694.322933][ T30] INFO: task kworker/0:141:9197 blocked for more than 431 seconds. [ 1694.322980][ T30] Not tainted syzkaller #0 [ 1694.323005][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1694.323022][ T30] task:kworker/0:141 state:D stack:0 pid:9197 tgid:9197 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.323110][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.323190][ T30] Call trace: [ 1694.323222][ T30] [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130) [ 1694.323312][ T30] r10:eacb1d84 r9:829174e8 r8:60000113 r7:829174e8 r6:eacb1d8c r5:85815400 [ 1694.323333][ T30] r4:85815400 [ 1694.323348][ T30] [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24) [ 1694.323412][ T30] r5:85815400 r4:829174e4 [ 1694.323493][ T30] [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 1694.323556][ T30] [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18) [ 1694.323618][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08 [ 1694.323638][ T30] r4:00000000 [ 1694.323713][ T30] [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40) [ 1694.323890][ T30] [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240) [ 1694.324023][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.324098][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8670e9c0 [ 1694.324183][ T30] r4:00000000 [ 1694.324206][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.324284][ T30] r9:83018405 r8:85815400 r7:00000000 r6:83018400 r5:00001000 r4:7f28a000 [ 1694.324310][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.324373][ T30] r5:00001000 r4:dfa1f000 [ 1694.324461][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.324527][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.324584][ T30] r5:85acf794 r4:85086180 [ 1694.324600][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.324663][ T30] r7:dddcfb40 r6:83018400 r5:85acf794 r4:85086180 [ 1694.324718][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.324929][ T30] r10:61c88647 r9:85815400 r8:850861ac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 1694.324963][ T30] r4:85086180 [ 1694.325020][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.325094][ T30] r10:00000000 r9:85086180 r8:802762fc r7:eabede60 r6:85086980 r5:85815400 [ 1694.325114][ T30] r4:00000001 [ 1694.325136][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.325186][ T30] Exception stack(0xeacb1fb0 to 0xeacb1ff8) [ 1694.325223][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1694.366071][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.366167][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.366213][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.366239][ T30] r4:86092e00 [ 1694.366753][ T30] INFO: task kworker/0:141:9197 is blocked on a mutex likely owned by task kworker/1:146:8299. [ 1694.366795][ T30] task:kworker/1:146 state:R running task stack:0 pid:8299 tgid:8299 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.366998][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.367103][ T30] Call trace: [ 1694.367140][ T30] [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8) [ 1694.367230][ T30] r10:8280ca38 r9:84df8c00 r8:80200c04 r7:dfd49d54 r6:ffffffff r5:84df8c00 [ 1694.367254][ T30] r4:00000000 [ 1694.367269][ T30] [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1694.367323][ T30] Exception stack(0xdfd49d20 to 0xdfd49d68) [ 1694.367396][ T30] 9d20: e6454000 ebec7000 00000001 80239018 7f23e000 00000001 82ace204 82acd5e0 [ 1694.367509][ T30] 9d40: 7f23e000 ebec7000 8280ca38 dfd49d9c dfd49da0 dfd49d70 8022fe10 80239030 [ 1694.367540][ T30] 9d60: 80000113 ffffffff [ 1694.367638][ T30] r5:80000113 r4:80239030 [ 1694.367674][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458) [ 1694.367745][ T30] r4:82ace224 [ 1694.367762][ T30] [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240) [ 1694.367864][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd49dc0 r5:dfd49e08 [ 1694.367893][ T30] r4:dfd49dc0 [ 1694.367911][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.368000][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8670e940 [ 1694.368023][ T30] r4:00000000 [ 1694.368042][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.368111][ T30] r9:83018605 r8:84df8c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2e2000 [ 1694.368135][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.368197][ T30] r5:00001000 r4:e84e1000 [ 1694.368214][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.368266][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.368380][ T30] r5:8517c394 r4:85bcd700 [ 1694.368440][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.368509][ T30] r7:ddde3b40 r6:83018600 r5:8517c394 r4:85bcd700 [ 1694.368527][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.368632][ T30] r10:61c88647 r9:84df8c00 r8:85bcd72c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1694.368654][ T30] r4:85bcd700 [ 1694.368672][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.368737][ T30] r10:00000000 r9:85bcd700 r8:802762fc r7:ea959e60 r6:85bcd280 r5:84df8c00 [ 1694.368793][ T30] r4:00000001 [ 1694.368810][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.368857][ T30] Exception stack(0xdfd49fb0 to 0xdfd49ff8) [ 1694.368925][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1694.368982][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.369014][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.369050][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.369070][ T30] r4:84f0e240 [ 1694.369339][ T30] INFO: task kworker/0:206:9901 blocked for more than 431 seconds. [ 1694.369421][ T30] Not tainted syzkaller #0 [ 1694.369450][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1694.369499][ T30] task:kworker/0:206 state:D stack:0 pid:9901 tgid:9901 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.369570][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.369653][ T30] Call trace: [ 1694.369727][ T30] [<81ab22ec>] (__schedule) from [<81ab3598>] (schedule+0x2c/0x130) [ 1694.369801][ T30] r10:eac91d84 r9:829174e8 r8:60000113 r7:829174e8 r6:eac91d8c r5:8591e000 [ 1694.369820][ T30] r4:8591e000 [ 1694.369836][ T30] [<81ab356c>] (schedule) from [<81ab3720>] (schedule_preempt_disabled+0x18/0x24) [ 1694.369897][ T30] r5:8591e000 r4:829174e4 [ 1694.369912][ T30] [<81ab3708>] (schedule_preempt_disabled) from [<81ab6da4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 1694.369963][ T30] [<81ab674c>] (__mutex_lock.constprop.0) from [<81ab77ac>] (__mutex_lock_slowpath+0x14/0x18) [ 1694.370047][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 [ 1694.370077][ T30] r4:00000000 [ 1694.370098][ T30] [<81ab7798>] (__mutex_lock_slowpath) from [<81ab77ec>] (mutex_lock+0x3c/0x40) [ 1694.370161][ T30] [<81ab77b0>] (mutex_lock) from [<804f4400>] (_vm_unmap_aliases+0x68/0x240) [ 1694.370208][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.370269][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ec5580 [ 1694.370287][ T30] r4:00000000 [ 1694.370300][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.370360][ T30] r9:83018405 r8:8591e000 r7:00000000 r6:83018400 r5:00001000 r4:7f2e8000 [ 1694.370376][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.370432][ T30] r5:00001000 r4:dfc2b000 [ 1694.370449][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.370577][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.370645][ T30] r5:8729b394 r4:859f2b80 [ 1694.370663][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.370722][ T30] r7:dddcfb40 r6:83018400 r5:8729b394 r4:859f2b80 [ 1694.370740][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.370839][ T30] r10:61c88647 r9:8591e000 r8:859f2bac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 1694.370878][ T30] r4:859f2b80 [ 1694.370955][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.371022][ T30] r10:00000000 r9:859f2b80 r8:802762fc r7:eaad1e60 r6:859f2b00 r5:8591e000 [ 1694.371083][ T30] r4:00000001 [ 1694.371134][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.371189][ T30] Exception stack(0xeac91fb0 to 0xeac91ff8) [ 1694.371248][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 1694.371325][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.371399][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.371439][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.371492][ T30] r4:84de9000 [ 1694.371954][ T30] INFO: task kworker/0:206:9901 is blocked on a mutex likely owned by task kworker/1:146:8299. [ 1694.372559][ T30] task:kworker/1:146 state:R running task stack:0 pid:8299 tgid:8299 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1694.372684][ T30] Workqueue: events bpf_prog_free_deferred [ 1694.372748][ T30] Call trace: [ 1694.372811][ T30] [<81ab22ec>] (__schedule) from [<81ab39cc>] (preempt_schedule_irq+0x40/0xa8) [ 1694.372903][ T30] r10:8280ca38 r9:84df8c00 r8:80200c04 r7:dfd49d54 r6:ffffffff r5:84df8c00 [ 1694.372924][ T30] r4:00000000 [ 1694.372985][ T30] [<81ab398c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1694.373043][ T30] Exception stack(0xdfd49d20 to 0xdfd49d68) [ 1694.373114][ T30] 9d20: e6454000 ebec7000 00000001 80239018 7f23e000 00000001 82ace204 82acd5e0 [ 1694.373166][ T30] 9d40: 7f23e000 ebec7000 8280ca38 dfd49d9c dfd49da0 dfd49d70 8022fe10 80239030 [ 1694.373191][ T30] 9d60: 80000113 ffffffff [ 1694.373249][ T30] r5:80000113 r4:80239030 [ 1694.373269][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f41c4>] (__purge_vmap_area_lazy+0x284/0x458) [ 1694.373346][ T30] r4:82ace224 [ 1694.373361][ T30] [<804f3f40>] (__purge_vmap_area_lazy) from [<804f457c>] (_vm_unmap_aliases+0x1e4/0x240) [ 1694.373431][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd49dc0 r5:dfd49e08 [ 1694.373451][ T30] r4:dfd49dc0 [ 1694.373502][ T30] [<804f4398>] (_vm_unmap_aliases) from [<804f81e8>] (vfree+0x16c/0x210) [ 1694.373570][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8670e940 [ 1694.373589][ T30] r4:00000000 [ 1694.373638][ T30] [<804f807c>] (vfree) from [<80564020>] (execmem_free+0x30/0x50) [ 1694.373717][ T30] r9:83018605 r8:84df8c00 r7:00000000 r6:83018600 r5:00001000 r4:7f2e2000 [ 1694.373734][ T30] [<80563ff0>] (execmem_free) from [<803cb2cc>] (bpf_jit_free_exec+0x10/0x14) [ 1694.373819][ T30] r5:00001000 r4:e84e1000 [ 1694.373873][ T30] [<803cb2bc>] (bpf_jit_free_exec) from [<803cb6ac>] (bpf_jit_free+0x68/0xe4) [ 1694.373949][ T30] [<803cb644>] (bpf_jit_free) from [<803cc7d4>] (bpf_prog_free_deferred+0x140/0x158) [ 1694.374024][ T30] r5:8517c394 r4:85bcd700 [ 1694.374046][ T30] [<803cc694>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 1694.374107][ T30] r7:ddde3b40 r6:83018600 r5:8517c394 r4:85bcd700 [ 1694.374132][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 1694.374229][ T30] r10:61c88647 r9:84df8c00 r8:85bcd72c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 1694.374290][ T30] r4:85bcd700 [ 1694.374364][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.374433][ T30] r10:00000000 r9:85bcd700 r8:802762fc r7:ea959e60 r6:85bcd280 r5:84df8c00 [ 1694.374453][ T30] r4:00000001 [ 1694.374468][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.374508][ T30] Exception stack(0xdfd49fb0 to 0xdfd49ff8) [ 1694.374570][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1694.374637][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.374669][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.374723][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.374748][ T30] r4:84f0e240 [ 1694.466790][ T30] NMI backtrace for cpu 1 [ 1694.466976][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 1694.467039][ T30] Hardware name: ARM-Versatile Express [ 1694.467062][ T30] Call trace: [ 1694.467137][ T30] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 1694.467248][ T30] r7:00000000 r6:000f0113 r5:600f0193 r4:822958fc [ 1694.467265][ T30] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 1694.467312][ T30] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 1694.467365][ T30] r5:00000001 r4:00000001 [ 1694.467422][ T30] [<8021ee40>] (dump_stack) from [<81a9bdd0>] (nmi_cpu_backtrace+0x160/0x17c) [ 1694.467585][ T30] [<81a9bc70>] (nmi_cpu_backtrace) from [<81a9bf1c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 1694.467659][ T30] r7:00000001 r6:8280c710 r5:8281af5c r4:ffffffff [ 1694.467675][ T30] [<81a9bdec>] (nmi_trigger_cpumask_backtrace) from [<8022f818>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 1694.467746][ T30] r9:00007d5a r8:8280c890 r7:000220a4 r6:00007d5a r5:82ac27e4 r4:00000048 [ 1694.467761][ T30] [<8022f800>] (arch_trigger_cpumask_backtrace) from [<81aa3a2c>] (sys_info+0x68/0xa8) [ 1694.467878][ T30] [<81aa39c4>] (sys_info) from [<803837fc>] (watchdog+0x464/0x8a0) [ 1694.468003][ T30] r5:82ac27e4 r4:866b390c [ 1694.468025][ T30] [<80383398>] (watchdog) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.468090][ T30] r10:00000000 r9:00000000 r8:80383398 r7:832d4180 r6:832d4180 r5:832e2400 [ 1694.468110][ T30] r4:00000001 [ 1694.468168][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.468220][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 1694.468262][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 1694.468300][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.468428][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.468471][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.468492][ T30] r4:838c6500 [ 1694.468653][ T30] Sending NMI from CPU 1 to CPUs 0: [ 1694.469206][ C0] NMI backtrace for cpu 0 [ 1694.469406][ C0] CPU: 0 UID: 0 PID: 2817 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 1694.469464][ C0] Hardware name: ARM-Versatile Express [ 1694.469521][ C0] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 1694.469617][ C0] LR is at pl011_console_device_unlock+0x20/0x24 [ 1694.469698][ C0] pc : [<81abcf40>] lr : [<80aa3b1c>] psr: 60010013 [ 1694.469741][ C0] sp : eb31deb0 ip : eb31dec0 fp : eb31debc [ 1694.469790][ C0] r10: 82959c04 r9 : 00000000 r8 : 00000000 [ 1694.469838][ C0] r7 : 00000117 r6 : 82959b68 r5 : 00000000 r4 : 00000001 [ 1694.469884][ C0] r3 : 000013cd r2 : 00000000 r1 : 60010013 r0 : 846aa440 [ 1694.470019][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 1694.470094][ C0] Control: 30c5387d Table: 84e031c0 DAC: fffffffd [ 1694.470156][ C0] Call trace: [ 1694.470200][ C0] [<81abcf18>] (_raw_spin_unlock_irqrestore) from [<80aa3b1c>] (pl011_console_device_unlock+0x20/0x24) [ 1694.470272][ C0] [<80aa3afc>] (pl011_console_device_unlock) from [<802e5768>] (nbcon_emit_one+0x88/0x100) [ 1694.470338][ C0] [<802e56e0>] (nbcon_emit_one) from [<802e59e8>] (nbcon_kthread_func+0x208/0x2e4) [ 1694.470404][ C0] r6:82abf0fc r5:82959b68 r4:84634800 [ 1694.470426][ C0] [<802e57e0>] (nbcon_kthread_func) from [<8027f6fc>] (kthread+0x12c/0x280) [ 1694.470493][ C0] r10:00000000 r9:82959b68 r8:802e57e0 r7:84b40000 r6:84b40000 r5:84634800 [ 1694.470514][ C0] r4:00000001 [ 1694.470530][ C0] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1694.470578][ C0] Exception stack(0xeb31dfb0 to 0xeb31dff8) [ 1694.470613][ C0] dfa0: 00000000 00000000 00000000 00000000 [ 1694.470647][ C0] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1694.470675][ C0] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1694.470734][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 1694.470754][ C0] r4:8448a1c0 [ 1694.909592][ T1140] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1694.933815][ T1140] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1694.955828][ T1140] bond0 (unregistering): Released all slaves