last executing test programs: 10m43.899523842s ago: executing program 0 (id=11): r0 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f00000000c0)={0xdb, 0x1ff, 0xb}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000000)={0x7fff, 0x8, 0x100}) close(r0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x20400) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000340)={0xda2, 0x8166, 0x7}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000200)={0x200, 0x1fb, 0xc38}) 10m43.740042052s ago: executing program 0 (id=13): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/power/wakeup_count', 0xa82, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x900, 0x12) 10m43.485606805s ago: executing program 0 (id=15): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r1, 0x107, 0x3, 0x0, &(0x7f0000000240)=0xfffffffffffffeb4) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x5, 0x4) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr', 0x3) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000105509147200ed00000001090224"], 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) close(0x3) 10m42.250261653s ago: executing program 0 (id=17): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000200000000000000", @ANYRES32=0x1, @ANYRES32=0x0], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000380), &(0x7f0000000000), 0x2}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) 10m42.089802504s ago: executing program 0 (id=18): bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000001900), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000039"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) read$hidraw(r1, &(0x7f0000000180)=""/215, 0xd7) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) 10m41.060631976s ago: executing program 0 (id=19): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x4, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x25, 0x18, @val=@tracing={0x0, 0xf3}}, 0x1c) r3 = socket(0x40000000015, 0x5, 0x0) r4 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaef2, 0x1000, 0x2, 0xbfcffffc}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xffffbffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x2000, 0x0, {0x2}}) io_uring_enter(r4, 0x47f6, 0xfff5, 0x2, 0x0, 0x0) 9m55.24877734s ago: executing program 32 (id=19): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x4, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x25, 0x18, @val=@tracing={0x0, 0xf3}}, 0x1c) r3 = socket(0x40000000015, 0x5, 0x0) r4 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaef2, 0x1000, 0x2, 0xbfcffffc}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xffffbffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x2000, 0x0, {0x2}}) io_uring_enter(r4, 0x47f6, 0xfff5, 0x2, 0x0, 0x0) 7m35.931412059s ago: executing program 2 (id=276): r0 = socket(0x840000000002, 0x3, 0x100) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240), 0x4000095, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, 0x0, 0x0) 7m34.272001551s ago: executing program 2 (id=281): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x137b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PMTUDISC={0x5, 0xa, 0x1}, @IFLA_IPTUN_FLAGS={0x6, 0x8, 0xc}]}}}]}, 0x40}}, 0x40800) 7m33.901777899s ago: executing program 2 (id=283): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x2, 0x0, 0x0, 0x5, 0x1, 0x7}]}, {0x0, [0x2e, 0x5f]}}, 0x0, 0x28, 0x0, 0x1, 0x2}, 0x28) 7m33.611361706s ago: executing program 2 (id=285): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000001340)=@newtaction={0x494, 0x30, 0x12f, 0x0, 0x0, {}, [{0x480, 0x1, [@m_police={0x47c, 0x1, 0x0, 0x0, {{0xb}, {0x450, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffe00, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x80, 0x6, 0x0, 0x0, 0x1, 0x3, 0xffff, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0xfffffffc, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc74, 0x0, 0xffffffff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xffffffb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xffffffff, 0x0, 0x0, 0x1000, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeed, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20000000, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x0, 0x0, 0x0, 0x10, {0x7, 0x0, 0xba6d, 0x0, 0x0, 0x7}, {0x0, 0x0, 0xb}}}, @TCA_POLICE_RATE64={0x9, 0x8, 0xfffffffffffffff9}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x494}}, 0x0) 7m33.435596198s ago: executing program 2 (id=287): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000140)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x1c, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x4}]}]}, 0x44}}, 0x0) 7m32.889205269s ago: executing program 2 (id=288): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) syz_emit_ethernet(0x3b3, &(0x7f0000000940)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "122d92", 0x37d, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af0302"}, {0x0, 0x1, "000000050000000026000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000"}, {0x0, 0xb, "17dcea46805d4809c20547406b18901b0aeff04c0300f3c75dc2d227a83b89483b1084743475671545e65eb2e9ac946a3f0e2bc4619f91394c02bcfbbb7d71138537d68e2d2c6393a9f3becd1a9f51a948b5b303f4f003"}, {0x21, 0x7, "b8a3e100908f61640000000200000000000000000002000000008879e66485201a0015ca83747357a02745000400"/55}, {0x0, 0x14, "5e14f0e74d2d42cfb3f27fafb60845f90b6dfc2e37bc87c6905bbc94d33e1ea71a28105f543e868a8a53b360a9d33e2b1e26eb1d18065daa7628cf9ef083611c9f6ae2e1eb3d8bf9c6ab2642c4808288e62afbf03269f1f98aea6ab3beb5fdc5fdaabc2c676d8800871a6aa54155dea2d995cb22c9924e0ad38c6967052cc7786d779b8353aac33a57d79b05613a12328f61129017fb632dbf04542188b196e213408c"}, {0x0, 0x5, "d5170000dce9674a36da018dff16e70b8b14c4b7a94fe18e88605aa6be1a02a326a6bce65f81ed"}]}}}}}}, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000001740)=[{{0x0, 0x500, &(0x7f0000001400)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1}}], 0x4000210, 0x2, 0x0) 6m47.013540322s ago: executing program 33 (id=288): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) syz_emit_ethernet(0x3b3, &(0x7f0000000940)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "122d92", 0x37d, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af0302"}, {0x0, 0x1, "000000050000000026000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000"}, {0x0, 0xb, "17dcea46805d4809c20547406b18901b0aeff04c0300f3c75dc2d227a83b89483b1084743475671545e65eb2e9ac946a3f0e2bc4619f91394c02bcfbbb7d71138537d68e2d2c6393a9f3becd1a9f51a948b5b303f4f003"}, {0x21, 0x7, "b8a3e100908f61640000000200000000000000000002000000008879e66485201a0015ca83747357a02745000400"/55}, {0x0, 0x14, "5e14f0e74d2d42cfb3f27fafb60845f90b6dfc2e37bc87c6905bbc94d33e1ea71a28105f543e868a8a53b360a9d33e2b1e26eb1d18065daa7628cf9ef083611c9f6ae2e1eb3d8bf9c6ab2642c4808288e62afbf03269f1f98aea6ab3beb5fdc5fdaabc2c676d8800871a6aa54155dea2d995cb22c9924e0ad38c6967052cc7786d779b8353aac33a57d79b05613a12328f61129017fb632dbf04542188b196e213408c"}, {0x0, 0x5, "d5170000dce9674a36da018dff16e70b8b14c4b7a94fe18e88605aa6be1a02a326a6bce65f81ed"}]}}}}}}, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000001740)=[{{0x0, 0x500, &(0x7f0000001400)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1}}], 0x4000210, 0x2, 0x0) 3m35.733144022s ago: executing program 1 (id=476): close(0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@setlink={0x28, 0x13, 0x1, 0x3000000, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, 0x0, 0x1, [@AF_INET6={0x4}]}]}, 0x28}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x15, 0x3, &(0x7f0000000000)=@framed={{0x2d, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x13}}, 0x0}, 0x94) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r1, 0x7dda) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='contention_begin\x00', r2}, 0x18) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000001240)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r6, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001bc0)=@deltfilter={0x24, 0x2d, 0x1, 0x78bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0xfff3, 0x8}, {0xffff, 0xffff}, {0x0, 0xf}}}, 0x24}}, 0x20044000) 3m13.438369825s ago: executing program 1 (id=478): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) sendmmsg$inet(r0, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000600)="8a", 0x1}, {&(0x7f0000001500)='\x00', 0x1}, {&(0x7f0000000700)="af", 0x1}, {&(0x7f0000000380)='\b', 0x1}, {&(0x7f0000002800)="cf", 0x1}, {&(0x7f0000000740)="6d4fcb9f", 0x4}], 0x6}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000001580)="ce", 0x1}, {&(0x7f00000007c0)="f2", 0x1}, {&(0x7f0000002e40)="d4", 0x1}], 0x3}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000003000)="e1", 0x1}, {&(0x7f00000010c0)="fa", 0x1}, {&(0x7f00000004c0)="d8ac", 0x2}, {&(0x7f0000001600)='\x00', 0x1}, {&(0x7f0000000580)="ff", 0x1}, {&(0x7f00000006c0)='y@', 0x2}, {&(0x7f0000000100)="f0099820", 0x4}], 0x7}}, {{0x0, 0x5c, &(0x7f0000000200)=[{&(0x7f0000000880)="87", 0xfffffd65}, {&(0x7f00000005c0)="1121", 0x2}], 0x2}}], 0x4, 0x4000000) write$cgroup_subtree(r0, &(0x7f0000000140)={[{0x2b, 'cpuacct'}]}, 0x9) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000)=0x7fffffff, 0x4) 2m53.55686351s ago: executing program 1 (id=480): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 2m40.312429939s ago: executing program 1 (id=482): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@ipv4_newroute={0xac, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x1}, @RTA_ENCAP={0x88, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0x84, 0x1, {{}, [@loopback, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @loopback}, @private2, @loopback, @private1]}}}]}, 0xac}}, 0x0) 2m24.972512425s ago: executing program 1 (id=484): r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000a80)={@dev={0xac, 0x14, 0x14, 0x2f}, @empty}, 0xc) 2m5.583021477s ago: executing program 1 (id=487): r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x3, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@mcast2, 0x4e23, 0xfffe, 0xe23, 0x3, 0xa, 0x80, 0x30, 0x33}, {0x100000000, 0x0, 0x6, 0x0, 0x3, 0x6, 0x8, 0x800000000001}, {0x9, 0x2, 0x0, 0x9}, 0xd6, 0x1000, 0x1, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x210000, 0x33}, 0x0, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffffffb}}, 0xe8) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffe0) setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000000), 0x4) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x25dfdbfd, 0x2ffffffff}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) unshare(0x6a040000) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r3, &(0x7f0000000380)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='veno', 0xfe01) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0x8dcacfa1c6c2afd6, 0xc9100120, 0x0, 0xfffffffffffffd25) 1m57.376021453s ago: executing program 3 (id=488): r0 = socket(0x40000000015, 0x5, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000380)=0xffffffff00000041, 0x8) bind$vsock_stream(r1, &(0x7f0000000940), 0x10) close(0x3) listen(r1, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) writev(r2, &(0x7f00000002c0)=[{&(0x7f0000000080)='?', 0x20000081}], 0x1) r3 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000280)={0x20000015}) 1m39.445050219s ago: executing program 3 (id=489): r0 = socket$nl_route(0x10, 0x3, 0x0) close(0x3) r1 = socket(0x10, 0x803, 0x0) write(r1, &(0x7f0000000040)="2600000022004701050007108980e8ff06006d20002b1ffec0e90101c7bb0000b00000000000", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newtaction={0x88, 0x30, 0xffff, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x74, 0x1, [@m_mirred={0x70, 0x1, 0x0, 0x0, {{0xb}, {0x44, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x4, {{0xfffff7e8}}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x10000000}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x88}}, 0x0) 1m26.685748906s ago: executing program 3 (id=490): r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) r2 = socket$netlink(0x10, 0x3, 0x8000000004) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x1c) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0x9, 0x0, 0x0) bind$unix(r5, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e20}, 0x1c) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="580000001400add4050000000000000001117fffffff81004e230e227f000001925aa80020007b00090080007f000001e809000000ffff0100f5c71002000000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) bind$unix(r3, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e21}, 0x6e) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x3) 1m21.24231507s ago: executing program 34 (id=487): r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x3, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@mcast2, 0x4e23, 0xfffe, 0xe23, 0x3, 0xa, 0x80, 0x30, 0x33}, {0x100000000, 0x0, 0x6, 0x0, 0x3, 0x6, 0x8, 0x800000000001}, {0x9, 0x2, 0x0, 0x9}, 0xd6, 0x1000, 0x1, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x210000, 0x33}, 0x0, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffffffb}}, 0xe8) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffe0) setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000000), 0x4) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x25dfdbfd, 0x2ffffffff}, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) unshare(0x6a040000) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r3, &(0x7f0000000380)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='veno', 0xfe01) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0x8dcacfa1c6c2afd6, 0xc9100120, 0x0, 0xfffffffffffffd25) 56.488800167s ago: executing program 3 (id=492): r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 37.158250532s ago: executing program 3 (id=493): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x42, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @dev={0xac, 0x14, 0x14, 0x30}, @multicast1}, {0x0, 0x17c1, 0x8}}}}}, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0x280) 0s ago: executing program 3 (id=494): socket$nl_generic(0x10, 0x3, 0x10) socket(0x1e, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, 0x0, 0x20000080) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x4c881, 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f00000003c0)='GPL\x00'}, 0x94) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x19, 0x4, 0x8, 0x27c8}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r7}, &(0x7f0000000240), &(0x7f00000006c0)=r3}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={r8, r5, 0x25, 0x2, @val=@tcx={@void, @value=r8}}, 0x1c) syz_emit_ethernet(0x5e, &(0x7f0000000440)={@multicast, @local, @val={@val={0x88a8, 0x2, 0x1, 0x4}, {0x8100, 0x0, 0x1, 0x1}}, {@canfd={0xd, {{0x3, 0x0, 0x0, 0x1}, 0xb, 0x0, 0x0, 0x0, "0cb856e81536a86a9e4986d11c207376637d7fbe25ce0cdc69945bc841fb9ed0615d50a4cb52b1b960f5a21fb573aa7f871ac5c02a692c1b775f51b2840330e8"}}}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) kernel console output (not intermixed with test programs): [ 46.720241][ T29] audit: type=1400 audit(46.630:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.757949][ T29] audit: type=1400 audit(46.640:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:47965' (ED25519) to the list of known hosts. [ 61.397563][ T29] audit: type=1400 audit(61.310:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.186827][ T29] audit: type=1400 audit(63.100:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.267678][ T29] audit: type=1400 audit(63.160:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.614631][ T29] audit: type=1400 audit(67.530:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.619265][ T29] audit: type=1400 audit(67.540:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.630423][ T3093] cgroup: Unknown subsys name 'net' [ 67.636140][ T29] audit: type=1400 audit(67.550:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.798069][ T3093] cgroup: Unknown subsys name 'cpuset' [ 67.804404][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 67.811358][ T3093] cgroup: Unknown subsys name 'rlimit' [ 68.018515][ T29] audit: type=1400 audit(67.940:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.020826][ T29] audit: type=1400 audit(67.940:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.023159][ T29] audit: type=1400 audit(67.940:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.220832][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.226057][ T29] audit: type=1400 audit(68.140:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.236578][ T29] audit: type=1400 audit(68.150:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.278795][ T29] audit: type=1400 audit(68.200:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.281404][ T29] audit: type=1400 audit(68.200:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.539332][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.542185][ T29] audit: type=1400 audit(77.460:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.597545][ T29] audit: type=1400 audit(77.510:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.600170][ T29] audit: type=1400 audit(77.520:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.611211][ T29] audit: type=1400 audit(77.530:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.633882][ T29] audit: type=1400 audit(77.550:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.640000][ T29] audit: type=1400 audit(77.550:76): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.710564][ T29] audit: type=1400 audit(77.630:77): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.198975][ T29] audit: type=1400 audit(78.100:78): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.254198][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.263085][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.503371][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.512281][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.183239][ T3099] hsr_slave_0: entered promiscuous mode [ 80.191168][ T3099] hsr_slave_1: entered promiscuous mode [ 80.366406][ T3098] hsr_slave_0: entered promiscuous mode [ 80.371217][ T3098] hsr_slave_1: entered promiscuous mode [ 80.372393][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 80.375982][ T3098] Cannot create hsr debugfs directory [ 80.715707][ T29] audit: type=1400 audit(80.630:79): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.720482][ T29] audit: type=1400 audit(80.640:80): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.734115][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.752451][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.760589][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.780070][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.870464][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.880133][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.889250][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.901761][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.539950][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.587026][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.016665][ T3098] veth0_vlan: entered promiscuous mode [ 84.043299][ T3098] veth1_vlan: entered promiscuous mode [ 84.120542][ T3098] veth0_macvtap: entered promiscuous mode [ 84.143666][ T3098] veth1_macvtap: entered promiscuous mode [ 84.231444][ T1363] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.235650][ T1363] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.236980][ T1363] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.249873][ T1363] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.409588][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 84.414805][ T3099] veth0_vlan: entered promiscuous mode [ 84.415338][ T29] audit: type=1400 audit(84.320:82): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.426258][ T29] audit: type=1400 audit(84.340:83): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.I32AbR/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.434367][ T29] audit: type=1400 audit(84.350:84): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.445161][ T3099] veth1_vlan: entered promiscuous mode [ 84.463973][ T29] audit: type=1400 audit(84.380:85): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.I32AbR/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.465997][ T29] audit: type=1400 audit(84.380:86): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.I32AbR/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.488439][ T29] audit: type=1400 audit(84.400:87): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.490115][ T29] audit: type=1400 audit(84.400:88): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.491871][ T29] audit: type=1400 audit(84.410:89): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="gadgetfs" ino=3139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.494127][ T29] audit: type=1400 audit(84.410:90): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.495682][ T29] audit: type=1400 audit(84.410:91): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.552175][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 84.564795][ T3099] veth0_macvtap: entered promiscuous mode [ 84.579023][ T3099] veth1_macvtap: entered promiscuous mode [ 84.686170][ T1220] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.690253][ T1220] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.695565][ T1220] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.696707][ T1220] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.288123][ T3709] syz.1.2 uses obsolete (PF_INET,SOCK_PACKET) [ 86.215559][ T3734] faux_driver vkms: [drm] Unknown color mode 11; guessing buffer size. [ 87.029205][ T23] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 87.241786][ T23] usb 1-1: Using ep0 maxpacket: 16 [ 87.349122][ T23] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 87.353460][ T23] usb 1-1: config 0 has no interfaces? [ 87.375765][ T23] usb 1-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 87.378791][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 87.467824][ T23] usb 1-1: config 0 descriptor?? [ 87.704160][ T41] usb 1-1: USB disconnect, device number 2 [ 89.920055][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 89.920390][ T29] audit: type=1400 audit(89.840:125): avc: denied { write } for pid=3765 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 92.723209][ T29] audit: type=1400 audit(92.610:126): avc: denied { create } for pid=3763 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 93.148159][ T29] audit: type=1400 audit(92.730:127): avc: denied { read } for pid=3763 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 96.267712][ T29] audit: type=1400 audit(96.110:128): avc: denied { mount } for pid=3775 comm="syz.1.22" name="/" dev="ramfs" ino=3231 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 97.143147][ C1] hrtimer: interrupt took 6224080 ns [ 115.095473][ T29] audit: type=1400 audit(115.010:129): avc: denied { watch watch_reads } for pid=3800 comm="syz.1.28" path="/14" dev="tmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 117.325677][ T29] audit: type=1400 audit(117.240:130): avc: denied { bind } for pid=3815 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 117.328885][ T29] audit: type=1400 audit(117.240:131): avc: denied { node_bind } for pid=3815 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 117.340196][ T29] audit: type=1400 audit(117.260:132): avc: denied { connect } for pid=3815 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 122.164760][ T3835] netlink: 68 bytes leftover after parsing attributes in process `syz.1.42'. [ 122.165062][ T29] audit: type=1400 audit(122.080:133): avc: denied { write } for pid=3834 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 122.165470][ T29] audit: type=1400 audit(122.080:134): avc: denied { nlmsg_write } for pid=3834 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 122.664305][ T29] audit: type=1400 audit(122.580:135): avc: denied { create } for pid=3838 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 122.670403][ T29] audit: type=1400 audit(122.590:136): avc: denied { write } for pid=3838 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 138.929613][ T29] audit: type=1400 audit(138.830:137): avc: denied { create } for pid=3973 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 138.934807][ T29] audit: type=1400 audit(138.850:138): avc: denied { write } for pid=3973 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 141.560850][ T3857] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 141.581064][ T3857] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 144.189132][ T3857] hsr_slave_0: entered promiscuous mode [ 144.192845][ T3857] hsr_slave_1: entered promiscuous mode [ 144.198848][ T3857] debugfs: 'hsr0' already exists in 'hsr' [ 144.199573][ T3857] Cannot create hsr debugfs directory [ 144.736152][ T3857] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 144.755806][ T3857] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 144.782603][ T3857] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 144.802296][ T3857] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 146.299863][ T3857] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.029056][ T3857] veth0_vlan: entered promiscuous mode [ 152.045690][ T3857] veth1_vlan: entered promiscuous mode [ 152.114396][ T3857] veth0_macvtap: entered promiscuous mode [ 152.147771][ T3857] veth1_macvtap: entered promiscuous mode [ 152.204283][ T1363] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.205122][ T1363] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.207795][ T1363] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.209204][ T1363] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.742108][ T4180] netlink: 'syz.2.50': attribute type 3 has an invalid length. [ 153.069660][ T4184] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 153.071333][ T4184] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 153.408122][ T29] audit: type=1400 audit(153.320:139): avc: denied { write } for pid=4190 comm="syz.2.62" laddr=fe80::a8aa:aaff:feaa:aaaa lport=6 faddr=2001::2 fport=20011 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 154.865761][ T29] audit: type=1400 audit(154.780:140): avc: denied { ioctl } for pid=4192 comm="syz.2.63" path="socket:[3961]" dev="sockfs" ino=3961 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 154.869872][ T4193] syzkaller1: entered promiscuous mode [ 154.875762][ T4193] syzkaller1: entered allmulticast mode [ 154.890573][ T29] audit: type=1400 audit(154.810:141): avc: denied { name_bind } for pid=4192 comm="syz.2.63" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 157.502440][ T1363] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 157.581130][ T1363] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 157.656825][ T1363] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 157.756397][ T1363] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 158.037930][ T29] audit: type=1400 audit(157.920:142): avc: denied { create } for pid=4199 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 158.039604][ T29] audit: type=1400 audit(157.920:143): avc: denied { ioctl } for pid=4199 comm="syz.1.65" path="socket:[3978]" dev="sockfs" ino=3978 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 158.041409][ T29] audit: type=1400 audit(157.930:144): avc: denied { bind } for pid=4199 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 158.042853][ T29] audit: type=1400 audit(157.940:145): avc: denied { connect } for pid=4199 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 158.044066][ T29] audit: type=1400 audit(157.940:146): avc: denied { write } for pid=4199 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 158.208516][ T1363] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 158.215547][ T1363] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 158.225690][ T1363] bond0 (unregistering): Released all slaves [ 158.321841][ T1363] hsr_slave_0: left promiscuous mode [ 158.323884][ T1363] hsr_slave_1: left promiscuous mode [ 158.334521][ T1363] veth1_macvtap: left promiscuous mode [ 158.335058][ T1363] veth0_macvtap: left promiscuous mode [ 158.335278][ T1363] veth1_vlan: left promiscuous mode [ 158.335483][ T1363] veth0_vlan: left promiscuous mode [ 170.627783][ T29] audit: type=1400 audit(170.530:147): avc: denied { bind } for pid=4291 comm="syz.2.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 175.573446][ T4313] netlink: 52 bytes leftover after parsing attributes in process `syz.2.82'. [ 180.079779][ T29] audit: type=1400 audit(179.980:148): avc: denied { write } for pid=4353 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 180.381463][ T29] audit: type=1400 audit(180.300:149): avc: denied { bind } for pid=4356 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 180.798994][ T29] audit: type=1400 audit(180.720:150): avc: denied { mounton } for pid=4363 comm="syz.2.99" path="/23/file0" dev="tmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 189.533210][ T4401] Zero length message leads to an empty skb [ 189.617880][ T29] audit: type=1400 audit(189.530:151): avc: denied { read } for pid=4404 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 192.233000][ T29] audit: type=1400 audit(192.150:152): avc: denied { unmount } for pid=3857 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 198.288332][ T29] audit: type=1400 audit(198.200:153): avc: denied { create } for pid=4442 comm="syz.2.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 198.298813][ T29] audit: type=1400 audit(198.220:154): avc: denied { ioctl } for pid=4442 comm="syz.2.121" path="socket:[2796]" dev="sockfs" ino=2796 ioctlcmd=0x89b0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 198.962768][ T4447] syzkaller0: entered promiscuous mode [ 198.967601][ T4447] syzkaller0: entered allmulticast mode [ 200.848624][ T29] audit: type=1400 audit(200.760:155): avc: denied { write } for pid=4461 comm="syz.2.128" name="mcfilter6" dev="proc" ino=4026533011 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 202.869748][ T29] audit: type=1400 audit(202.790:156): avc: denied { read write } for pid=4466 comm="syz.2.130" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 202.870910][ T29] audit: type=1400 audit(202.790:157): avc: denied { open } for pid=4466 comm="syz.2.130" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 203.404264][ T29] audit: type=1400 audit(203.320:158): avc: denied { ioctl } for pid=4466 comm="syz.2.130" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4468 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 203.568633][ T29] audit: type=1400 audit(203.490:159): avc: denied { ioctl } for pid=4469 comm="syz.2.131" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 203.571484][ T29] audit: type=1400 audit(203.490:160): avc: denied { set_context_mgr } for pid=4469 comm="syz.2.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 209.660741][ T29] audit: type=1400 audit(209.580:161): avc: denied { getopt } for pid=4501 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 213.265183][ T29] audit: type=1400 audit(213.180:162): avc: denied { execute } for pid=4512 comm="syz.1.147" path="/88/pids.events" dev="tmpfs" ino=471 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 215.621546][ T29] audit: type=1326 audit(215.540:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x7ffc0000 [ 215.630398][ T29] audit: type=1326 audit(215.550:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 215.638796][ T29] audit: type=1326 audit(215.550:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x7ffc0000 [ 215.650789][ T29] audit: type=1326 audit(215.560:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 215.650976][ T29] audit: type=1326 audit(215.570:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x7ffc0000 [ 215.652358][ T29] audit: type=1326 audit(215.570:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x7ffc0000 [ 215.652410][ T29] audit: type=1326 audit(215.570:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x7ffc0000 [ 215.652436][ T29] audit: type=1326 audit(215.570:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x7ffc0000 [ 215.652459][ T29] audit: type=1326 audit(215.570:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x7ffc0000 [ 215.652519][ T29] audit: type=1326 audit(215.570:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4529 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x7ffc0000 [ 216.044043][ T4535] netlink: 67 bytes leftover after parsing attributes in process `syz.1.154'. [ 231.776743][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 231.778219][ T29] audit: type=1400 audit(231.690:182): avc: denied { listen } for pid=4565 comm="syz.2.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 231.784536][ T29] audit: type=1400 audit(231.700:183): avc: denied { connect } for pid=4565 comm="syz.2.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 231.795619][ T29] audit: type=1400 audit(231.710:184): avc: denied { accept } for pid=4565 comm="syz.2.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 231.801899][ T29] audit: type=1400 audit(231.720:185): avc: denied { write } for pid=4565 comm="syz.2.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 231.809537][ T29] audit: type=1400 audit(231.730:186): avc: denied { read } for pid=4565 comm="syz.2.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 234.276713][ T4575] process 'syz.1.170' launched './file0' with NULL argv: empty string added [ 234.278966][ T29] audit: type=1400 audit(234.200:187): avc: denied { execute_no_trans } for pid=4574 comm="syz.1.170" path="/104/file0" dev="tmpfs" ino=553 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 234.466731][ T29] audit: type=1400 audit(234.380:188): avc: denied { create } for pid=4571 comm="syz.2.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 234.482827][ T29] audit: type=1400 audit(234.400:189): avc: denied { getopt } for pid=4571 comm="syz.2.169" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 244.801842][ T4594] syzkaller1: entered promiscuous mode [ 244.803091][ T4594] syzkaller1: entered allmulticast mode [ 245.072319][ T29] audit: type=1400 audit(244.990:190): avc: denied { map } for pid=4601 comm="syz.2.179" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 245.085253][ T29] audit: type=1400 audit(245.000:191): avc: denied { call } for pid=4601 comm="syz.2.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 245.380421][ T4604] netlink: 'syz.2.180': attribute type 1 has an invalid length. [ 245.425213][ T4604] bond1: entered promiscuous mode [ 245.426316][ T4604] 8021q: adding VLAN 0 to HW filter on device bond1 [ 245.448207][ T4604] netlink: 28 bytes leftover after parsing attributes in process `syz.2.180'. [ 245.448629][ T4604] bond1: entered allmulticast mode [ 249.077648][ T29] audit: type=1400 audit(248.990:192): avc: denied { setopt } for pid=4696 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 250.151792][ T4707] ip6gre1: entered promiscuous mode [ 250.156832][ T4707] ip6gre1: entered allmulticast mode [ 252.058566][ T29] audit: type=1400 audit(251.970:193): avc: denied { read } for pid=4726 comm="syz.2.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 252.648076][ T4737] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 253.510249][ T4753] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 253.511159][ T4753] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 253.861208][ T29] audit: type=1400 audit(253.780:194): avc: denied { create } for pid=4758 comm="syz.2.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 254.069539][ T29] audit: type=1400 audit(253.990:195): avc: denied { read } for pid=4761 comm="syz.1.218" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 256.144211][ T4770] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 256.146016][ T4770] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 256.685836][ T29] audit: type=1400 audit(256.600:196): avc: denied { setopt } for pid=4773 comm="syz.2.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 256.870503][ T29] audit: type=1400 audit(256.790:197): avc: denied { create } for pid=4775 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 257.030760][ T29] audit: type=1400 audit(256.930:198): avc: denied { write } for pid=4775 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 257.536017][ T29] audit: type=1400 audit(257.450:199): avc: denied { write } for pid=4775 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 258.343142][ T4790] bond2: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 258.378209][ T4790] bond2 (unregistering): Released all slaves [ 259.503649][ T4867] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 260.264905][ T4896] netlink: 4 bytes leftover after parsing attributes in process `syz.2.236'. [ 261.251891][ T4898] *** NOT YET: opcode db *** [ 261.478445][ C0] vxcan1: j1939_tp_rxtimer: 0x8509dc00: rx timeout, send abort [ 261.488483][ C0] vxcan1: j1939_xtp_rx_abort_one: 0x8509dc00: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. [ 261.498991][ T29] audit: type=1400 audit(261.410:200): avc: denied { read } for pid=2905 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 261.501048][ T29] audit: type=1400 audit(261.420:201): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 261.509591][ T29] audit: type=1400 audit(261.420:202): avc: denied { search } for pid=2905 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 261.510394][ T29] audit: type=1400 audit(261.420:203): avc: denied { add_name } for pid=2905 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 261.510523][ T29] audit: type=1400 audit(261.420:204): avc: denied { create } for pid=2905 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 261.510609][ T29] audit: type=1400 audit(261.420:205): avc: denied { append open } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 261.510697][ T29] audit: type=1400 audit(261.420:206): avc: denied { getattr } for pid=2905 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 261.980886][ T4906] netlink: 20 bytes leftover after parsing attributes in process `syz.1.239'. [ 262.247612][ T29] audit: type=1400 audit(262.160:207): avc: denied { create } for pid=4908 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 262.259155][ T29] audit: type=1400 audit(262.180:208): avc: denied { setopt } for pid=4908 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 262.792699][ T29] audit: type=1400 audit(262.710:209): avc: denied { getopt } for pid=4908 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 262.805112][ T29] audit: type=1400 audit(262.720:210): avc: denied { create } for pid=4913 comm="syz.2.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 262.820196][ T29] audit: type=1400 audit(262.740:211): avc: denied { bind } for pid=4913 comm="syz.2.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 266.589044][ T4924] raw_sendmsg: syz.2.247 forgot to set AF_INET. Fix it! [ 266.791523][ T4926] netlink: 8 bytes leftover after parsing attributes in process `syz.2.248'. [ 268.770846][ T29] audit: type=1400 audit(268.690:212): avc: denied { create } for pid=4937 comm="syz.2.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 270.091927][ T4953] netlink: 4 bytes leftover after parsing attributes in process `syz.2.258'. [ 270.120492][ T4953] netem: incorrect ge model size [ 270.121025][ T4953] netem: change failed [ 272.832823][ T4981] netlink: 76 bytes leftover after parsing attributes in process `syz.1.268'. [ 273.660128][ T4994] Driver unsupported XDP return value 0 on prog (id 28) dev N/A, expect packet loss! [ 276.484538][ T5027] netlink: 'syz.2.285': attribute type 8 has an invalid length. [ 277.411931][ T29] audit: type=1400 audit(277.330:213): avc: denied { connect } for pid=5032 comm="syz.2.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 277.414764][ T29] audit: type=1400 audit(277.330:214): avc: denied { bind } for pid=5032 comm="syz.2.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 277.449329][ T29] audit: type=1400 audit(277.360:215): avc: denied { write } for pid=5032 comm="syz.2.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 291.413171][ T29] audit: type=1400 audit(291.280:216): avc: denied { create } for pid=5051 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 295.090435][ T29] audit: type=1400 audit(295.010:217): avc: denied { bind } for pid=5075 comm="syz.1.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 295.092731][ T29] audit: type=1400 audit(295.010:218): avc: denied { setopt } for pid=5075 comm="syz.1.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 295.108096][ T5076] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2573 sclass=netlink_xfrm_socket pid=5076 comm=syz.1.304 [ 300.975539][ T5101] netlink: 'syz.1.311': attribute type 1 has an invalid length. [ 303.104027][ T5118] netlink: 'syz.1.316': attribute type 1 has an invalid length. [ 306.741021][ T5128] netlink: 'syz.1.321': attribute type 1 has an invalid length. [ 309.043121][ T29] audit: type=1400 audit(308.960:219): avc: denied { setopt } for pid=5148 comm="syz.1.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 312.081219][ T5164] netlink: 'syz.1.333': attribute type 4 has an invalid length. [ 312.082704][ T5164] netlink: 152 bytes leftover after parsing attributes in process `syz.1.333'. [ 312.099566][ T5164] .`: renamed from dummy0 (while UP) [ 313.412516][ T29] audit: type=1400 audit(313.330:220): avc: denied { ioctl } for pid=5171 comm="syz.1.336" path="socket:[6162]" dev="sockfs" ino=6162 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 313.801571][ T5172] netlink: 28 bytes leftover after parsing attributes in process `syz.1.336'. [ 314.009209][ T5176] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 315.689402][ T5191] netlink: 8 bytes leftover after parsing attributes in process `syz.1.344'. [ 320.521751][ T5252] A link change request failed with some changes committed already. Interface ip_vti0 may have been left with an inconsistent configuration, please check. [ 326.007616][ T29] audit: type=1400 audit(325.920:221): avc: denied { write } for pid=5324 comm="syz.1.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 327.520191][ T5258] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 327.528884][ T5258] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 330.122100][ T5258] hsr_slave_0: entered promiscuous mode [ 330.131160][ T5258] hsr_slave_1: entered promiscuous mode [ 330.140729][ T5258] debugfs: 'hsr0' already exists in 'hsr' [ 330.141165][ T5258] Cannot create hsr debugfs directory [ 330.880093][ T5258] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 330.915273][ T5258] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 330.934519][ T5258] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 330.954141][ T5258] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 332.915547][ T5258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 335.659098][ T5589] netlink: 28 bytes leftover after parsing attributes in process `syz.1.370'. [ 336.639266][ T5599] netlink: 8 bytes leftover after parsing attributes in process `syz.1.373'. [ 336.944561][ T5604] netlink: 28 bytes leftover after parsing attributes in process `syz.1.374'. [ 340.233110][ T5258] veth0_vlan: entered promiscuous mode [ 340.289706][ T5258] veth1_vlan: entered promiscuous mode [ 340.417887][ T5258] veth0_macvtap: entered promiscuous mode [ 340.423788][ T5258] veth1_macvtap: entered promiscuous mode [ 340.525061][ T67] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.526326][ T67] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.530458][ T67] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.530826][ T67] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.732950][ T5731] netlink: 12 bytes leftover after parsing attributes in process `syz.3.390'. [ 347.818958][ T29] audit: type=1400 audit(347.740:222): avc: denied { setopt } for pid=5741 comm="syz.3.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 357.746387][ T5803] netlink: 60 bytes leftover after parsing attributes in process `syz.1.409'. [ 357.748993][ T5803] netlink: 16 bytes leftover after parsing attributes in process `syz.1.409'. [ 357.750441][ T5803] netlink: 60 bytes leftover after parsing attributes in process `syz.1.409'. [ 360.022459][ T29] audit: type=1400 audit(359.940:223): avc: denied { read } for pid=5824 comm="syz.3.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 363.196465][ T5856] netlink: 4 bytes leftover after parsing attributes in process `syz.1.427'. [ 365.142226][ T5871] netlink: 28 bytes leftover after parsing attributes in process `syz.3.434'. [ 367.622081][ T29] audit: type=1400 audit(367.540:224): avc: denied { ioctl } for pid=5880 comm="syz.3.437" path="socket:[7371]" dev="sockfs" ino=7371 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 368.891019][ T5903] netlink: 'syz.1.445': attribute type 1 has an invalid length. [ 369.901210][ T5915] netlink: 'syz.1.448': attribute type 4 has an invalid length. [ 370.613064][ T29] audit: type=1400 audit(370.530:225): avc: denied { setopt } for pid=5916 comm="syz.1.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 370.650945][ T29] audit: type=1400 audit(370.570:226): avc: denied { create } for pid=5916 comm="syz.1.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 370.672946][ T5918] netlink: 'syz.1.449': attribute type 12 has an invalid length. [ 381.556394][ C0] sched: DL replenish lagged too much [ 410.791515][ T5970] netlink: 8 bytes leftover after parsing attributes in process `syz.3.463'. [ 621.753569][ T29] audit: type=1400 audit(621.670:227): avc: denied { setopt } for pid=6064 comm="syz.3.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 627.122103][ T29] audit: type=1400 audit(626.650:228): avc: denied { block_suspend } for pid=6064 comm="syz.3.488" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 638.370981][ T6074] netlink: 'syz.3.489': attribute type 4 has an invalid length. [ 654.656459][ T29] audit: type=1400 audit(654.570:229): avc: denied { create } for pid=6075 comm="syz.3.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 744.673071][ T29] audit: type=1400 audit(744.590:230): avc: denied { create } for pid=6099 comm="syz.3.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 746.441440][ T29] audit: type=1400 audit(745.930:231): avc: denied { setopt } for pid=6099 comm="syz.3.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 764.110069][ T30] INFO: task kworker/1:3:1806 blocked for more than 430 seconds. [ 764.121129][ T30] Not tainted syzkaller #0 [ 764.153775][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 764.160703][ T30] task:kworker/1:3 state:D stack:0 pid:1806 tgid:1806 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 765.240633][ T30] Workqueue: events bpf_prog_free_deferred [ 765.255143][ T30] Call trace: [ 765.275358][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 766.162363][ T30] r10:ea955d84 r9:829174e8 r8:60000113 r7:829174e8 r6:ea955d8c r5:8454bc00 [ 766.173452][ T30] r4:8454bc00 [ 766.184463][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 766.196393][ T30] r5:8454bc00 r4:829174e4 [ 766.209293][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 766.220092][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 766.230695][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea955e08 [ 766.243095][ T30] r4:00000000 [ 766.256214][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 766.269456][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 766.362654][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 766.373530][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d2f7c0 [ 766.384087][ T30] r4:00000000 [ 767.379292][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 768.282605][ T30] r9:83018605 r8:8454bc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 768.291814][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 768.301915][ T30] r5:00001000 r4:e018b000 [ 768.310425][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 768.324987][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 768.332037][ T30] r5:84e76f94 r4:84b0d080 [ 768.339381][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 768.564370][ T30] r7:ddde3b40 r6:83018600 r5:84e76f94 r4:84b0d080 [ 768.575525][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 768.586703][ T30] r10:61c88647 r9:8454bc00 r8:84b0d0ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 770.039817][ T30] r4:84b0d080 [ 770.795065][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 770.802331][ T30] r10:00000000 r9:84b0d080 r8:802762fc r7:df919e60 r6:84b0d100 r5:8454bc00 [ 770.809144][ T30] r4:00000001 [ 771.792633][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 771.803752][ T30] Exception stack(0xea955fb0 to 0xea955ff8) [ 772.430207][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 772.444612][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 772.456692][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 772.469919][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 772.483099][ T30] r4:84b07440 [ 772.500076][ T30] INFO: task kworker/1:3:1806 is blocked on a mutex likely owned by task kworker/0:8:4966. [ 772.512933][ T30] task:kworker/0:8 state:R running task stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 772.550280][ T30] Workqueue: events bpf_prog_free_deferred [ 772.575023][ T30] Call trace: [ 772.600494][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 772.613079][ T30] r10:8280ca38 r9:83f73000 r8:80200c04 r7:e0201d54 r6:ffffffff r5:83f73000 [ 774.152315][ T30] r4:00000000 [ 774.158882][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 774.418205][ T30] Exception stack(0xe0201d20 to 0xe0201d68) [ 774.430999][ T30] 1d20: bd02c000 ea93f000 00000001 80239018 7f250000 00000001 82ace204 82acd5e0 [ 774.445267][ T30] 1d40: 7f250000 ea93f000 8280ca38 e0201d9c e0201da0 e0201d70 8022fe10 80239030 [ 774.461551][ T30] 1d60: 80000013 ffffffff [ 774.475924][ T30] r5:80000013 r4:80239030 [ 774.488902][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 774.500350][ T30] r4:82ace224 [ 774.511860][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 774.522673][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0201dc0 r5:e0201e08 [ 774.533212][ T30] r4:e0201dc0 [ 774.545377][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 774.558695][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a609c0 [ 774.558779][ T30] r4:00000000 [ 774.558804][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 774.558940][ T30] r9:83018405 r8:83f73000 r7:00000000 r6:83018400 r5:00001000 r4:7f248000 [ 774.558964][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 774.559039][ T30] r5:00001000 r4:e013b000 [ 774.559081][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 774.559146][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 774.559205][ T30] r5:85a52794 r4:8508eb80 [ 774.559222][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 774.559288][ T30] r7:dddcfb40 r6:83018400 r5:85a52794 r4:8508eb80 [ 774.559474][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 774.559573][ T30] r10:61c88647 r9:83f73000 r8:8508ebac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 774.559639][ T30] r4:8508eb80 [ 774.559664][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 774.559816][ T30] r10:00000000 r9:8508eb80 r8:802762fc r7:dfd79e60 r6:8508ec80 r5:83f73000 [ 774.559844][ T30] r4:00000001 [ 774.559869][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 774.559971][ T30] Exception stack(0xe0201fb0 to 0xe0201ff8) [ 774.560014][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 774.560048][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 774.560079][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 774.560121][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 774.560181][ T30] r4:850a1000 [ 774.758921][ T30] INFO: task kworker/0:5:3057 blocked for more than 441 seconds. [ 774.770527][ T30] Not tainted syzkaller #0 [ 774.783425][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 774.794888][ T30] task:kworker/0:5 state:D stack:0 pid:3057 tgid:3057 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 776.258730][ T30] Workqueue: events bpf_prog_free_deferred [ 776.364426][ T30] Call trace: [ 776.386649][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 776.396983][ T30] r10:ebc59d84 r9:829174e8 r8:60000113 r7:829174e8 r6:ebc59d8c r5:838f3000 [ 776.418422][ T30] r4:838f3000 [ 776.429017][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 776.440573][ T30] r5:838f3000 r4:829174e4 [ 776.520877][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 776.525883][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 776.532209][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08 [ 776.538314][ T30] r4:00000000 [ 776.816873][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 777.822509][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 777.846187][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 777.859327][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cf1fc0 [ 777.870803][ T30] r4:00000000 [ 777.881341][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 778.138855][ T30] r9:83018405 r8:838f3000 r7:00000000 r6:83018400 r5:00001000 r4:7f258000 [ 778.151989][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 778.163932][ T30] r5:00001000 r4:e025d000 [ 778.175278][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 778.186819][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 778.496122][ T30] r5:85a53b94 r4:84b89900 [ 778.506809][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 778.528647][ T30] r7:dddcfb40 r6:83018400 r5:85a53b94 r4:84b89900 [ 778.539264][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 778.549392][ T30] r10:61c88647 r9:838f3000 r8:84b8992c r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 778.560841][ T30] r4:84b89900 [ 778.571580][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 779.174815][ T30] r10:00000000 r9:84b89900 r8:802762fc r7:ebbdde60 r6:84ebd200 r5:838f3000 [ 779.941721][ T30] r4:00000001 [ 779.953235][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 779.963154][ T30] Exception stack(0xebc59fb0 to 0xebc59ff8) [ 780.353005][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 780.358845][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 780.370783][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 780.376630][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 780.382179][ T30] r4:851a5340 [ 780.388169][ T30] INFO: task kworker/0:5:3057 is blocked on a mutex likely owned by task kworker/0:8:4966. [ 780.658288][ T30] task:kworker/0:8 state:R running task stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 780.686580][ T30] Workqueue: events bpf_prog_free_deferred [ 781.062505][ T30] Call trace: [ 781.073482][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 781.080065][ T30] r10:8280ca38 r9:83f73000 r8:80200c04 r7:e0201d54 r6:ffffffff r5:83f73000 [ 781.188346][ T30] r4:00000000 [ 781.199034][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 781.243097][ T30] Exception stack(0xe0201d20 to 0xe0201d68) [ 781.243283][ T30] 1d20: bf356000 ea93f000 00000001 80239018 7f250000 00000001 82ace204 82acd5e0 [ 781.243328][ T30] 1d40: 7f250000 ea93f000 8280ca38 e0201d9c e0201da0 e0201d70 8022fe10 80239030 [ 781.243355][ T30] 1d60: 80000013 ffffffff [ 781.243391][ T30] r5:80000013 r4:80239030 [ 781.243412][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 781.243545][ T30] r4:82ace224 [ 781.243565][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 781.243644][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0201dc0 r5:e0201e08 [ 781.243667][ T30] r4:e0201dc0 [ 781.243684][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 781.243762][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a609c0 [ 781.243785][ T30] r4:00000000 [ 781.243803][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 781.243885][ T30] r9:83018405 r8:83f73000 r7:00000000 r6:83018400 r5:00001000 r4:7f248000 [ 781.243905][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 781.243989][ T30] r5:00001000 r4:e013b000 [ 781.244008][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 781.244072][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 781.244138][ T30] r5:85a52794 r4:8508eb80 [ 781.244156][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 781.244227][ T30] r7:dddcfb40 r6:83018400 r5:85a52794 r4:8508eb80 [ 781.244245][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 781.244316][ T30] r10:61c88647 r9:83f73000 r8:8508ebac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 781.244339][ T30] r4:8508eb80 [ 781.244356][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 781.244429][ T30] r10:00000000 r9:8508eb80 r8:802762fc r7:dfd79e60 r6:8508ec80 r5:83f73000 [ 781.244451][ T30] r4:00000001 [ 781.244468][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 781.244520][ T30] Exception stack(0xe0201fb0 to 0xe0201ff8) [ 781.244552][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 781.244588][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 781.244620][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 781.244658][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 781.244680][ T30] r4:850a1000 [ 781.245363][ T30] INFO: task kworker/1:6:3787 blocked for more than 447 seconds. [ 781.245436][ T30] Not tainted syzkaller #0 [ 781.245466][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 781.245486][ T30] task:kworker/1:6 state:D stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 781.245582][ T30] Workqueue: events bpf_prog_free_deferred [ 781.245644][ T30] Call trace: [ 781.245677][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 781.245773][ T30] r10:e011dd84 r9:829174e8 r8:60010013 r7:829174e8 r6:e011dd8c r5:83f14800 [ 781.245796][ T30] r4:83f14800 [ 781.245816][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 781.245883][ T30] r5:83f14800 r4:829174e4 [ 781.245900][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 781.245970][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 781.246040][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e011de08 [ 781.246062][ T30] r4:00000000 [ 781.246079][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 781.246130][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 781.246183][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 781.246255][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d82100 [ 781.246277][ T30] r4:00000000 [ 781.246295][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 781.246368][ T30] r9:83018605 r8:83f14800 r7:00000000 r6:83018600 r5:00001000 r4:7f24a000 [ 781.246387][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 781.246457][ T30] r5:00001000 r4:dfc43000 [ 781.246474][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 781.246567][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 781.246637][ T30] r5:85a86394 r4:85fef100 [ 781.246655][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 781.246722][ T30] r7:ddde3b40 r6:83018600 r5:85a86394 r4:85fef100 [ 781.246740][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 781.246812][ T30] r10:61c88647 r9:83f14800 r8:85fef12c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 781.246833][ T30] r4:85fef100 [ 781.246849][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 781.246915][ T30] r10:00000000 r9:85fef100 r8:802762fc r7:ea955e60 r6:85fef500 r5:83f14800 [ 781.246937][ T30] r4:00000001 [ 781.247022][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 781.336616][ T30] Exception stack(0xe011dfb0 to 0xe011dff8) [ 781.336742][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 781.336777][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 781.336805][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 781.336851][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 781.336873][ T30] r4:85d711c0 [ 781.348846][ T30] INFO: task kworker/1:6:3787 is blocked on a mutex likely owned by task kworker/0:8:4966. [ 781.348989][ T30] task:kworker/0:8 state:R running task stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 781.349095][ T30] Workqueue: events bpf_prog_free_deferred [ 781.349177][ T30] Call trace: [ 781.349207][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 781.349301][ T30] r10:8280ca38 r9:83f73000 r8:80200c04 r7:e0201d54 r6:ffffffff r5:83f73000 [ 781.349324][ T30] r4:00000000 [ 781.349339][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 781.349393][ T30] Exception stack(0xe0201d20 to 0xe0201d68) [ 781.349428][ T30] 1d20: bf356000 ea93f000 00000001 80239018 7f250000 00000001 82ace204 82acd5e0 [ 781.349462][ T30] 1d40: 7f250000 ea93f000 8280ca38 e0201d9c e0201da0 e0201d70 8022fe10 80239030 [ 781.349486][ T30] 1d60: 80000013 ffffffff [ 781.349510][ T30] r5:80000013 r4:80239030 [ 781.349524][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 781.349590][ T30] r4:82ace224 [ 781.349604][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 781.349665][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0201dc0 r5:e0201e08 [ 781.349685][ T30] r4:e0201dc0 [ 781.349700][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 781.349766][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a609c0 [ 781.349785][ T30] r4:00000000 [ 781.349801][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 781.349868][ T30] r9:83018405 r8:83f73000 r7:00000000 r6:83018400 r5:00001000 r4:7f248000 [ 781.349886][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 781.349956][ T30] r5:00001000 r4:e013b000 [ 781.349971][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 781.350027][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 781.350082][ T30] r5:85a52794 r4:8508eb80 [ 781.350097][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 781.350160][ T30] r7:dddcfb40 r6:83018400 r5:85a52794 r4:8508eb80 [ 781.350178][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 781.350242][ T30] r10:61c88647 r9:83f73000 r8:8508ebac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 781.350261][ T30] r4:8508eb80 [ 781.350275][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 781.350340][ T30] r10:00000000 r9:8508eb80 r8:802762fc r7:dfd79e60 r6:8508ec80 r5:83f73000 [ 781.350358][ T30] r4:00000001 [ 781.350373][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 781.350415][ T30] Exception stack(0xe0201fb0 to 0xe0201ff8) [ 781.350443][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 781.350473][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 781.350503][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 781.350566][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 781.350587][ T30] r4:850a1000 [ 781.350687][ T30] INFO: task kworker/1:10:5048 blocked for more than 427 seconds. [ 781.350732][ T30] Not tainted syzkaller #0 [ 781.350754][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 781.350770][ T30] task:kworker/1:10 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 781.350823][ T30] Workqueue: events drain_vmap_area_work [ 781.350864][ T30] Call trace: [ 781.350889][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 781.350975][ T30] r10:dfb85e54 r9:829174e8 r8:60000013 r7:829174e8 r6:dfb85e5c r5:84423000 [ 781.350997][ T30] r4:84423000 [ 781.351014][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 781.351073][ T30] r5:84423000 r4:829174e4 [ 781.351087][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 781.351137][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 781.351195][ T30] r10:83016170 r9:83018615 r8:84423000 r7:ddde3b40 r6:83018600 r5:829174cc [ 781.351215][ T30] r4:829174e4 [ 781.351230][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 781.351273][ T30] [<81ab72c0>] (mutex_lock) from [<804f4578>] (drain_vmap_area_work+0x18/0x38) [ 781.351320][ T30] [<804f4560>] (drain_vmap_area_work) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 781.351372][ T30] r5:829174cc r4:862c6d00 [ 781.351386][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 781.351446][ T30] r10:61c88647 r9:84423000 r8:862c6d2c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 781.351464][ T30] r4:862c6d00 [ 781.351477][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 781.351536][ T30] r10:00000000 r9:862c6d00 r8:802762fc r7:df879e60 r6:8508ef00 r5:84423000 [ 781.351554][ T30] r4:00000001 [ 781.351568][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 781.351612][ T30] Exception stack(0xdfb85fb0 to 0xdfb85ff8) [ 781.351640][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 781.351671][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 781.351701][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 781.351736][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 781.351757][ T30] r4:85a9c900 [ 781.352025][ T30] INFO: task kworker/1:10:5048 is blocked on a mutex likely owned by task kworker/0:8:4966. [ 781.352062][ T30] task:kworker/0:8 state:R running task stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 781.352124][ T30] Workqueue: events bpf_prog_free_deferred [ 781.352168][ T30] Call trace: [ 781.352191][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 781.352271][ T30] r10:8280ca38 r9:83f73000 r8:80200c04 r7:e0201d54 r6:ffffffff r5:83f73000 [ 781.352291][ T30] r4:00000000 [ 781.352305][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 781.352355][ T30] Exception stack(0xe0201d20 to 0xe0201d68) [ 781.352391][ T30] 1d20: bf356000 ea93f000 00000001 80239018 7f250000 00000001 82ace204 82acd5e0 [ 781.352422][ T30] 1d40: 7f250000 ea93f000 8280ca38 e0201d9c e0201da0 e0201d70 8022fe10 80239030 [ 781.352445][ T30] 1d60: 80000013 ffffffff [ 781.352468][ T30] r5:80000013 r4:80239030 [ 781.352482][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 781.352541][ T30] r4:82ace224 [ 781.352556][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 781.352619][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0201dc0 r5:e0201e08 [ 781.352638][ T30] r4:e0201dc0 [ 781.352653][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 781.352718][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a609c0 [ 781.352737][ T30] r4:00000000 [ 781.352752][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 781.352817][ T30] r9:83018405 r8:83f73000 r7:00000000 r6:83018400 r5:00001000 r4:7f248000 [ 781.352833][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 781.352891][ T30] r5:00001000 r4:e013b000 [ 781.352905][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 781.352963][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 781.353021][ T30] r5:85a52794 r4:8508eb80 [ 781.353035][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 781.353096][ T30] r7:dddcfb40 r6:83018400 r5:85a52794 r4:8508eb80 [ 781.353112][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 781.353175][ T30] r10:61c88647 r9:83f73000 r8:8508ebac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 781.353194][ T30] r4:8508eb80 [ 781.353207][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 781.353267][ T30] r10:00000000 r9:8508eb80 r8:802762fc r7:dfd79e60 r6:8508ec80 r5:83f73000 [ 781.353285][ T30] r4:00000001 [ 781.353300][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 781.353341][ T30] Exception stack(0xe0201fb0 to 0xe0201ff8) [ 781.353367][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 781.353398][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 781.353425][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 781.353461][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 781.353480][ T30] r4:850a1000 [ 781.353515][ T30] INFO: task kworker/1:11:5450 blocked for more than 427 seconds. [ 781.353544][ T30] Not tainted syzkaller #0 [ 781.353562][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 781.353575][ T30] task:kworker/1:11 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 781.353624][ T30] Workqueue: events bpf_prog_free_deferred [ 781.353662][ T30] Call trace: [ 781.353690][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 781.353762][ T30] r10:e0281d84 r9:829174e8 r8:60000113 r7:829174e8 r6:e0281d8c r5:846a4800 [ 781.353780][ T30] r4:846a4800 [ 781.353800][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 781.353858][ T30] r5:846a4800 r4:829174e4 [ 781.353873][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 781.353922][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 781.353990][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0281e08 [ 781.354008][ T30] r4:00000000 [ 781.354022][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 781.354065][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 781.354107][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 781.354170][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c77140 [ 781.354189][ T30] r4:00000000 [ 781.354205][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 781.354271][ T30] r9:83018605 r8:846a4800 r7:00000000 r6:83018600 r5:00001000 r4:7f248000 [ 781.354287][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 781.354342][ T30] r5:00001000 r4:e019f000 [ 781.354355][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 781.354405][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 781.354461][ T30] r5:85fdbf94 r4:8585f600 [ 781.354475][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 781.354558][ T30] r7:ddde3b40 r6:83018600 r5:85fdbf94 r4:8585f600 [ 781.354576][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 781.354641][ T30] r10:61c88647 r9:846a4800 r8:8585f62c r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 781.354660][ T30] r4:8585f600 [ 781.354673][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 781.354744][ T30] r10:00000000 r9:8585f600 r8:802762fc r7:dfb31e60 r6:8529dc80 r5:846a4800 [ 781.354765][ T30] r4:00000001 [ 781.354779][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 781.354818][ T30] Exception stack(0xe0281fb0 to 0xe0281ff8) [ 781.354844][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 781.354874][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 781.354901][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 781.354942][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 781.354961][ T30] r4:858deec0 [ 781.355186][ T30] INFO: task kworker/1:11:5450 is blocked on a mutex likely owned by task kworker/0:8:4966. [ 781.355221][ T30] task:kworker/0:8 state:R running task stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 781.355284][ T30] Workqueue: events bpf_prog_free_deferred [ 781.355327][ T30] Call trace: [ 781.355351][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 781.355430][ T30] r10:8280ca38 r9:83f73000 r8:80200c04 r7:e0201d54 r6:ffffffff r5:83f73000 [ 781.355450][ T30] r4:00000000 [ 781.355465][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 781.355513][ T30] Exception stack(0xe0201d20 to 0xe0201d68) [ 781.355547][ T30] 1d20: bf356000 ea93f000 00000001 80239018 7f250000 00000001 82ace204 82acd5e0 [ 781.355578][ T30] 1d40: 7f250000 ea93f000 8280ca38 e0201d9c e0201da0 e0201d70 8022fe10 80239030 [ 781.355599][ T30] 1d60: 80000013 ffffffff [ 781.355622][ T30] r5:80000013 r4:80239030 [ 781.355635][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 781.355698][ T30] r4:82ace224 [ 781.355712][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 781.355777][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0201dc0 r5:e0201e08 [ 781.355796][ T30] r4:e0201dc0 [ 781.355811][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 781.355873][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a609c0 [ 781.355892][ T30] r4:00000000 [ 781.355906][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 781.355977][ T30] r9:83018405 r8:83f73000 r7:00000000 r6:83018400 r5:00001000 r4:7f248000 [ 781.355994][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 781.356055][ T30] r5:00001000 r4:e013b000 [ 781.356069][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 781.356123][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 781.356179][ T30] r5:85a52794 r4:8508eb80 [ 781.356193][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 781.356250][ T30] r7:dddcfb40 r6:83018400 r5:85a52794 r4:8508eb80 [ 781.356265][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 781.356325][ T30] r10:61c88647 r9:83f73000 r8:8508ebac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 781.356343][ T30] r4:8508eb80 [ 781.356356][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 781.356414][ T30] r10:00000000 r9:8508eb80 r8:802762fc r7:dfd79e60 r6:8508ec80 r5:83f73000 [ 781.356433][ T30] r4:00000001 [ 781.356447][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 781.356490][ T30] Exception stack(0xe0201fb0 to 0xe0201ff8) [ 781.356518][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 781.356547][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 781.356574][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 781.356607][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 781.356625][ T30] r4:850a1000 [ 781.356660][ T30] INFO: task kworker/1:12:5577 blocked for more than 427 seconds. [ 781.356689][ T30] Not tainted syzkaller #0 [ 781.356708][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 781.356720][ T30] task:kworker/1:12 state:D stack:0 pid:5577 tgid:5577 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 781.356766][ T30] Workqueue: events bpf_prog_free_deferred [ 781.356804][ T30] Call trace: [ 781.356828][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 781.356896][ T30] r10:df9e5d84 r9:829174e8 r8:60000013 r7:829174e8 r6:df9e5d8c r5:846a6c00 [ 781.356914][ T30] r4:846a6c00 [ 781.356960][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 782.159476][ T30] r5:846a6c00 r4:829174e4 [ 782.189381][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 782.200274][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 782.220591][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 [ 782.226511][ T30] r4:00000000 [ 782.234786][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 782.240066][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 782.245919][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 782.252287][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524b8c0 [ 782.258330][ T30] r4:00000000 [ 782.264612][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 782.271647][ T30] r9:83018605 r8:846a6c00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 782.299666][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 782.309675][ T30] r5:00001000 r4:ea529000 [ 782.339213][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 782.349847][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 782.360605][ T30] r5:85fa5394 r4:846ac780 [ 782.370884][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 782.869579][ T30] r7:ddde3b40 r6:83018600 r5:85fa5394 r4:846ac780 [ 782.876853][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 782.902493][ T30] r10:61c88647 r9:846a6c00 r8:846ac7ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 782.914523][ T30] r4:846ac780 [ 782.922114][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 782.930066][ T30] r10:00000000 r9:846ac780 r8:802762fc r7:e0281e60 r6:8528c200 r5:846a6c00 [ 782.944180][ T30] r4:00000001 [ 782.950806][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 782.956581][ T30] Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) [ 782.963486][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 782.969720][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 782.981150][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 782.991857][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 783.021827][ T30] r4:85b093c0 [ 783.044171][ T30] INFO: task kworker/1:12:5577 is blocked on a mutex likely owned by task kworker/0:8:4966. [ 783.050007][ T30] task:kworker/0:8 state:R running task stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 783.805750][ T30] Workqueue: events bpf_prog_free_deferred [ 784.185130][ T30] Call trace: [ 784.805169][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 784.828829][ T30] r10:8280ca38 r9:83f73000 r8:80200c04 r7:e0201d54 r6:ffffffff r5:83f73000 [ 784.840006][ T30] r4:00000000 [ 784.861938][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 784.873517][ T30] Exception stack(0xe0201d20 to 0xe0201d68) [ 784.886298][ T30] 1d20: bf8c8000 ea93f000 00000001 80239018 7f250000 00000001 82ace204 82acd5e0 [ 784.907891][ T30] 1d40: 7f250000 ea93f000 8280ca38 e0201d9c e0201da0 e0201d70 8022fe10 80239030 [ 786.431282][ T30] 1d60: 80000013 ffffffff [ 787.108571][ T30] r5:80000013 r4:80239030 [ 787.121249][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 787.133729][ T30] r4:82ace224 [ 787.386773][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 787.988895][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0201dc0 r5:e0201e08 [ 787.995296][ T30] r4:e0201dc0 [ 788.002346][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 788.228423][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a609c0 [ 788.252630][ T30] r4:00000000 [ 788.263278][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 788.275027][ T30] r9:83018405 r8:83f73000 r7:00000000 r6:83018400 r5:00001000 r4:7f248000 [ 788.286618][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 788.760512][ T30] r5:00001000 r4:e013b000 [ 788.778727][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 788.793546][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 788.801687][ T30] r5:85a52794 r4:8508eb80 [ 788.809761][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 789.375091][ T30] r7:dddcfb40 r6:83018400 r5:85a52794 r4:8508eb80 [ 789.384771][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 789.384968][ T30] r10:61c88647 r9:83f73000 r8:8508ebac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 789.385004][ T30] r4:8508eb80 [ 789.385020][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 789.385088][ T30] r10:00000000 r9:8508eb80 r8:802762fc r7:dfd79e60 r6:8508ec80 r5:83f73000 [ 789.385107][ T30] r4:00000001 [ 789.385122][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 789.385168][ T30] Exception stack(0xe0201fb0 to 0xe0201ff8) [ 789.385203][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 789.385234][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 789.385263][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 789.385296][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 789.385315][ T30] r4:850a1000 [ 790.135933][ T30] INFO: task kworker/1:13:5628 blocked for more than 436 seconds. [ 790.318693][ T30] Not tainted syzkaller #0 [ 790.329100][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 790.336587][ T30] task:kworker/1:13 state:D stack:0 pid:5628 tgid:5628 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 790.386380][ T30] Workqueue: events bpf_prog_free_deferred [ 790.763211][ T30] Call trace: [ 790.786033][ T30] [<81ab1dfc>] (__schedule) from [<81ab30a8>] (schedule+0x2c/0x130) [ 790.839969][ T30] r10:e028dd84 r9:829174e8 r8:600d0113 r7:829174e8 r6:e028dd8c r5:83f13000 [ 790.862892][ T30] r4:83f13000 [ 790.875062][ T30] [<81ab307c>] (schedule) from [<81ab3230>] (schedule_preempt_disabled+0x18/0x24) [ 790.887936][ T30] r5:83f13000 r4:829174e4 [ 790.899636][ T30] [<81ab3218>] (schedule_preempt_disabled) from [<81ab68b4>] (__mutex_lock.constprop.0+0x658/0xf8c) [ 790.920937][ T30] [<81ab625c>] (__mutex_lock.constprop.0) from [<81ab72bc>] (__mutex_lock_slowpath+0x14/0x18) [ 790.931521][ T30] r10:8280c9e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e028de08 [ 790.943290][ T30] r4:00000000 [ 790.968247][ T30] [<81ab72a8>] (__mutex_lock_slowpath) from [<81ab72fc>] (mutex_lock+0x3c/0x40) [ 790.980639][ T30] [<81ab72c0>] (mutex_lock) from [<804f4368>] (_vm_unmap_aliases+0x68/0x240) [ 790.992390][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 791.003416][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d2e480 [ 791.013757][ T30] r4:00000000 [ 791.024734][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 791.024958][ T30] r9:83018605 r8:83f13000 r7:00000000 r6:83018600 r5:00001000 r4:7f24e000 [ 791.024979][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 791.025044][ T30] r5:00001000 r4:e02fd000 [ 791.025059][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 791.025112][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 791.025167][ T30] r5:84e60f94 r4:846af980 [ 791.025183][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 791.025245][ T30] r7:ddde3b40 r6:83018600 r5:84e60f94 r4:846af980 [ 791.025261][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 791.025325][ T30] r10:61c88647 r9:83f13000 r8:846af9ac r7:82804d80 r6:ddde3b40 r5:ddde3b60 [ 791.025344][ T30] r4:846af980 [ 791.025358][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 791.025422][ T30] r10:00000000 r9:846af980 r8:802762fc r7:df879e60 r6:85dcd100 r5:83f13000 [ 791.025440][ T30] r4:00000001 [ 791.025455][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 791.025498][ T30] Exception stack(0xe028dfb0 to 0xe028dff8) [ 791.025546][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 791.025581][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 791.025608][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 791.025643][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 791.025663][ T30] r4:858acc80 [ 791.026031][ T30] INFO: task kworker/1:13:5628 is blocked on a mutex likely owned by task kworker/0:8:4966. [ 791.026075][ T30] task:kworker/0:8 state:R running task stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 791.026168][ T30] Workqueue: events bpf_prog_free_deferred [ 791.026218][ T30] Call trace: [ 791.026243][ T30] [<81ab1dfc>] (__schedule) from [<81ab34dc>] (preempt_schedule_irq+0x40/0xa8) [ 791.026325][ T30] r10:8280ca38 r9:83f73000 r8:80200c04 r7:e0201d54 r6:ffffffff r5:83f73000 [ 791.026345][ T30] r4:00000000 [ 791.026361][ T30] [<81ab349c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 791.026409][ T30] Exception stack(0xe0201d20 to 0xe0201d68) [ 791.026443][ T30] 1d20: c20f6000 ea93f000 00000001 80239018 7f250000 00000001 82ace204 82acd5e0 [ 791.026476][ T30] 1d40: 7f250000 ea93f000 8280ca38 e0201d9c e0201da0 e0201d70 8022fe10 80239030 [ 791.026498][ T30] 1d60: 80000013 ffffffff [ 791.026520][ T30] r5:80000013 r4:80239030 [ 791.026567][ T30] [<8022fdac>] (flush_tlb_kernel_range) from [<804f412c>] (__purge_vmap_area_lazy+0x284/0x458) [ 791.026631][ T30] r4:82ace224 [ 791.026646][ T30] [<804f3ea8>] (__purge_vmap_area_lazy) from [<804f44e4>] (_vm_unmap_aliases+0x1e4/0x240) [ 791.026710][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0201dc0 r5:e0201e08 [ 791.026735][ T30] r4:e0201dc0 [ 791.026751][ T30] [<804f4300>] (_vm_unmap_aliases) from [<804f8150>] (vfree+0x16c/0x210) [ 791.026816][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a609c0 [ 791.026834][ T30] r4:00000000 [ 791.026849][ T30] [<804f7fe4>] (vfree) from [<80563f5c>] (execmem_free+0x30/0x50) [ 791.026912][ T30] r9:83018405 r8:83f73000 r7:00000000 r6:83018400 r5:00001000 r4:7f248000 [ 791.026929][ T30] [<80563f2c>] (execmem_free) from [<803cb24c>] (bpf_jit_free_exec+0x10/0x14) [ 791.039933][ T30] r5:00001000 r4:e013b000 [ 791.040012][ T30] [<803cb23c>] (bpf_jit_free_exec) from [<803cb62c>] (bpf_jit_free+0x68/0xe4) [ 791.040116][ T30] [<803cb5c4>] (bpf_jit_free) from [<803cc754>] (bpf_prog_free_deferred+0x140/0x158) [ 791.040175][ T30] r5:85a52794 r4:8508eb80 [ 791.040191][ T30] [<803cc614>] (bpf_prog_free_deferred) from [<80275db8>] (process_one_work+0x1b4/0x4f4) [ 791.040253][ T30] r7:dddcfb40 r6:83018400 r5:85a52794 r4:8508eb80 [ 791.040272][ T30] [<80275c04>] (process_one_work) from [<802764f8>] (worker_thread+0x1fc/0x3d8) [ 791.040346][ T30] r10:61c88647 r9:83f73000 r8:8508ebac r7:82804d80 r6:dddcfb40 r5:dddcfb60 [ 791.040369][ T30] r4:8508eb80 [ 791.040384][ T30] [<802762fc>] (worker_thread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 791.040453][ T30] r10:00000000 r9:8508eb80 r8:802762fc r7:dfd79e60 r6:8508ec80 r5:83f73000 [ 791.040474][ T30] r4:00000001 [ 791.040490][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 791.040536][ T30] Exception stack(0xe0201fb0 to 0xe0201ff8) [ 791.040570][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 791.040600][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 791.040624][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 791.040659][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 791.040681][ T30] r4:850a1000 [ 791.041477][ T30] NMI backtrace for cpu 0 [ 791.041854][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 791.041980][ T30] Hardware name: ARM-Versatile Express [ 791.042054][ T30] Call trace: [ 791.042107][ T30] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 791.042177][ T30] r7:00000000 r6:00000113 r5:60000193 r4:82295830 [ 791.042192][ T30] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 791.042242][ T30] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 791.042291][ T30] r5:00000000 r4:00000001 [ 791.042306][ T30] [<8021ee40>] (dump_stack) from [<81a9b8e0>] (nmi_cpu_backtrace+0x160/0x17c) [ 791.042362][ T30] [<81a9b780>] (nmi_cpu_backtrace) from [<81a9ba2c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 791.042424][ T30] r7:00000000 r6:8280c710 r5:8281af5c r4:ffffffff [ 791.042440][ T30] [<81a9b8fc>] (nmi_trigger_cpumask_backtrace) from [<8022f818>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 791.042510][ T30] r9:00007f11 r8:8280c890 r7:0000bfc8 r6:00007f11 r5:82ac27e4 r4:00000048 [ 791.042525][ T30] [<8022f800>] (arch_trigger_cpumask_backtrace) from [<81aa353c>] (sys_info+0x68/0xa8) [ 791.042612][ T30] [<81aa34d4>] (sys_info) from [<80383780>] (watchdog+0x464/0x8a0) [ 791.042662][ T30] r5:82ac27e4 r4:8404bf0c [ 791.042677][ T30] [<8038331c>] (watchdog) from [<8027f6fc>] (kthread+0x12c/0x280) [ 791.042744][ T30] r10:00000000 r9:00000000 r8:8038331c r7:830d6a00 r6:830d6a00 r5:8321c800 [ 791.042764][ T30] r4:00000001 [ 791.042777][ T30] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 791.042821][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 791.042849][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 791.042877][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 791.042907][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 791.042941][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 791.042959][ T30] r4:833ce700 [ 791.043176][ T30] Sending NMI from CPU 0 to CPUs 1: [ 791.043867][ C1] NMI backtrace for cpu 1 [ 791.044015][ C1] CPU: 1 UID: 0 PID: 2818 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 791.044056][ C1] Hardware name: ARM-Versatile Express [ 791.044086][ C1] PC is at filter_irq_stacks+0x74/0x7c [ 791.044142][ C1] LR is at handle_fiq_as_nmi+0x0/0xb0 [ 791.044192][ C1] pc : [<8032286c>] lr : [<802011b0>] psr: 60070113 [ 791.044214][ C1] sp : df805d80 ip : 802012f4 fp : df805d94 [ 791.044235][ C1] r10: 81c03d5c r9 : 00002800 r8 : df805e04 [ 791.044257][ C1] r7 : 00000019 r6 : 00000001 r5 : 802012dc r4 : 802012dc [ 791.044278][ C1] r3 : df805e40 r2 : 8027f6fc r1 : 00000010 r0 : 00000010 [ 791.044362][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 791.044404][ C1] Control: 30c5387d Table: 84ffdc80 DAC: 00000000 [ 791.044440][ C1] Call trace: frame pointer underflow [ 791.044481][ C1] [<803227f8>] (filter_irq_stacks) from [<809a0714>] (stack_depot_save_flags+0x28/0x778) [ 791.044524][ C1] r5:874b9a40 r4:85c2e350 [ 791.044534][ C1] [<809a06ec>] (stack_depot_save_flags) from [<809a0e78>] (stack_depot_save+0x14/0x18) [ 791.044566][ C1] r10:81c03d5c r9:2e07f816 r8:df805eb8 r7:00000019 r6:00000000 r5:874b9a40 [ 791.044577][ C1] r4:85c2e350 [ 791.044584][ C1] [<809a0e64>] (stack_depot_save) from [<809a1a98>] (ref_tracker_free+0x74/0x298) [ 791.044606][ C1] [<809a1a24>] (ref_tracker_free) from [<815db078>] (dst_destroy+0x4c/0x138) [ 791.044640][ C1] r8:df805eb8 r7:00000019 r6:00000000 r5:85c2e000 r4:874ba800 [ 791.044648][ C1] [<815db02c>] (dst_destroy) from [<815db178>] (dst_destroy_rcu+0x14/0x18) [ 791.044686][ C1] r7:00000019 r6:84640c00 r5:0000001a r4:874ba82c [ 791.044693][ C1] [<815db164>] (dst_destroy_rcu) from [<803044b0>] (rcu_do_batch+0x1cc/0x658) [ 791.044717][ C1] [<803042e4>] (rcu_do_batch) from [<8030762c>] (rcu_core+0x1d4/0x4e4) [ 791.044746][ C1] r10:84640c00 r9:5b720000 r8:8280c710 r7:84640c00 r6:82a6d9ac r5:ddde4c08 [ 791.044756][ C1] r4:ddde4bc0 [ 791.044763][ C1] [<80307458>] (rcu_core) from [<80307d38>] (rcu_core_si+0x10/0x14) [ 791.044792][ C1] r10:84640c00 r9:82804d80 r8:00000101 r7:00000009 r6:00000002 r5:00000002 [ 791.044802][ C1] r4:828040a4 [ 791.044808][ C1] [<80307d28>] (rcu_core_si) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 791.044834][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 791.044866][ C1] r10:82959c04 r9:84640c00 r8:00000000 r7:eb1ade60 r6:82444074 r5:8247f1f4 [ 791.044875][ C1] r4:84640c00 [ 791.044882][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 791.044909][ C1] r5:8247f1f4 r4:826c3a9c [ 791.044920][ C1] [<8025be38>] (irq_exit) from [<81aae624>] (generic_handle_arch_irq+0x7c/0x80) [ 791.044950][ C1] [<81aae5a8>] (generic_handle_arch_irq) from [<81a7e5c4>] (call_with_stack+0x1c/0x20) [ 791.044999][ C1] r9:84640c00 r8:00000000 r7:eb1ade94 r6:ffffffff r5:60070013 r4:81abca50 [ 791.045018][ C1] [<81a7e5a8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 791.045137][ C1] Exception stack(0xeb1ade60 to 0xeb1adea8) [ 791.045186][ C1] de60: 846eb840 60070013 00000000 0000097e 00000001 00000000 82959b68 00000117 [ 791.045216][ C1] de80: 00000000 00000001 82959c04 eb1adebc eb1adec0 eb1adeb0 80aa3928 81abca50 [ 791.045236][ C1] dea0: 60070013 ffffffff [ 791.045254][ C1] [<81abca28>] (_raw_spin_unlock_irqrestore) from [<80aa3928>] (pl011_console_device_unlock+0x20/0x24) [ 791.045313][ C1] [<80aa3908>] (pl011_console_device_unlock) from [<802e5720>] (nbcon_emit_one+0x88/0x100) [ 791.045370][ C1] [<802e5698>] (nbcon_emit_one) from [<802e59a0>] (nbcon_kthread_func+0x208/0x2e4) [ 791.045429][ C1] r6:82abf0fc r5:82959b68 r4:84640c00 [ 791.045445][ C1] [<802e5798>] (nbcon_kthread_func) from [<8027f6fc>] (kthread+0x12c/0x280) [ 791.045507][ C1] r10:00000000 r9:82959b68 r8:802e5798 r7:84f21500 r6:84f21500 r5:84640c00 [ 791.045524][ C1] r4:00000001 [ 791.045538][ C1] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 791.045580][ C1] Exception stack(0xeb1adfb0 to 0xeb1adff8) [ 791.045606][ C1] dfa0: 00000000 00000000 00000000 00000000 [ 791.045635][ C1] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 791.045671][ C1] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 791.045703][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 791.045721][ C1] r4:84b71900