last executing test programs: 12m8.058934728s ago: executing program 1 (id=527): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000004400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014008900b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00', @local}) 12m7.641330426s ago: executing program 1 (id=528): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000780)={'bridge_slave_0\x00', @random="010000201000"}) 12m6.939534864s ago: executing program 1 (id=530): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18e3ead566d1c376b09937299ff72850f7b20000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000380)={'pim6reg1\x00', @broadcast}) 12m6.366514634s ago: executing program 1 (id=531): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) socketpair(0x28, 0x2, 0x28, &(0x7f0000000040)) 12m5.940808153s ago: executing program 1 (id=532): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x2, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x0, 0x61, 0x5e]}}, &(0x7f0000001300)=""/181, 0x29, 0xb5, 0x1}, 0x28) 12m5.627878597s ago: executing program 1 (id=533): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 11m20.307536584s ago: executing program 32 (id=533): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 1m13.650621499s ago: executing program 0 (id=1327): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$evdev(&(0x7f0000000080), 0x168, 0xe0000) socket$nl_route(0x10, 0x3, 0x0) pselect6(0x40, &(0x7f0000000300)={0x0, 0x4000000000000000, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x41f1fd03}, &(0x7f0000000240)={0x18, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x800000000, 0x8000000000000, 0x5}, 0x0, 0x0, 0x0) 1m8.662735965s ago: executing program 0 (id=1329): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r5 = socket$inet_tcp(0x2, 0x1, 0x0) flock(r5, 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 32.443043551s ago: executing program 2 (id=1333): r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x57e, 0x200e, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x8, 0x1, {0x22, 0x7}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x81, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x0, 0x0}, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x118) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00220700000095a96747b1749498345b"], 0x0}, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, 0x0, 0x0) getpid() 28.532199247s ago: executing program 0 (id=1334): syz_usb_connect$hid(0x0, 0x36, &(0x7f0000001100)=ANY=[@ANYBLOB="1201000000000010c41090ea40000000000109022400010000000009040000010e01000009210000000122050009058103", @ANYBLOB="2616bbc5"], 0x0) mkdir(0x0, 0x82) 25.343875332s ago: executing program 2 (id=1335): r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x32c, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x40, 0xb1, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, {0x9, 0x21, 0x101, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0xc, 0x4, 0x8}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000040)={0x20, 0xa, 0x7, {0x7, 0xf, "00f4000000"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 21.874650136s ago: executing program 2 (id=1336): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x110b, 0x8000000000002}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r3, 0x10000000000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x10a, 0x3}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000340)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000100)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000}], 0x0, 0x0, 0x0}) r4 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x68000000) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0xc, 0x0, &(0x7f00000004c0)=[@free_buffer={0x40086303, r4}], 0x0, 0x0, 0x0}) 20.080605067s ago: executing program 0 (id=1337): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003540)=[{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000001580)="fb56510ccefafd15110e1c3ec80a4bd1a438f2862985e3eb2adf543ffce3fa688c5a9f7a3f276d563f34329607abf85dec3f4e461a5049ee7381f055a171f0a643", 0x41}], 0x1, 0x0, 0x0, 0x1}], 0x1, 0x4000) io_setup(0xff, &(0x7f0000000380)=0x0) io_submit(r2, 0x27f, &(0x7f0000001440)=[&(0x7f0000000200)={0x1000000, 0x0, 0x700000000000000, 0x0, 0x0, r1, &(0x7f0000000340), 0x41}]) 15.444825734s ago: executing program 2 (id=1338): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010126bd7000ffffffff2b00000008000300", @ANYRES32=r2, @ANYBLOB="05003400c400000008002600c814000008002700"], 0x34}, 0x1, 0x0, 0x0, 0x24000045}, 0x800) 13.385834521s ago: executing program 0 (id=1339): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x800001) connect$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 9.645580813s ago: executing program 0 (id=1340): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) listen(0xffffffffffffffff, 0xd9) syz_emit_ethernet(0x0, 0x0, 0x0) socket$igmp6(0xa, 0x3, 0x2) syz_emit_ethernet(0x5e, &(0x7f0000000100)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00 ', 0x28, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x2, 0x11, 0x0, 0x1ff, {[@fastopen={0x22, 0x10, "c8fc061db64a237718e43b34c6dc"}, @generic={0x5, 0x2}]}}}}}}}}, 0x0) sendfile(r0, r1, 0x0, 0x20000023896) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') ftruncate(r5, 0x7fffffffffffffff) 7.011740201s ago: executing program 2 (id=1341): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40840}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEAUTHENTICATE(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)={0x34, r1, 0x1, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x6}, @NL80211_ATTR_MAC={0xa, 0x6, @random="76a3cdac698f"}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x84) 0s ago: executing program 2 (id=1342): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x11) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040), 0x2) r2 = memfd_create(&(0x7f00000009c0)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdbU\xb1\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\x90i\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14O\xf8\xb5C\x1f\xb6b8b\x06A2@D\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\x05\x00\x00\x00\x00\x00\x00\x00\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00\x88\xd1\x1eQB\x18\xc1-\xc4\x8fK\xf8\xfa\xb6\xf8\v;\xaa\x8fW\xcc\n\x17\x7f\x98\xb7\xcdqV\xd4\xf0)\xfa\x0fG\xc8\xbf\xfd\xe8>K\f\xcd+\xb0\x99Q\xba/\xa8\xb9`k\b\xd1\xcc\xfc\xeaA\"\v=\x83fC\x90%\xa1d\x91\xf8:\x16<\xad\xc2\x18\xdf\x01\xe2\x96\xfcj\xe9\xa4\x065m\x03\x05Np\xda\"\xf1\xb6\xbcP\x8fP\x8d\x89%\xf2\x12T\xd0\xc3\x15W\x9c\x87\x1b\x8c\xc9\xd9\xc6\xad\x96-d\xa2wFB\xcaB\xa5\x15\xf8,\x04\x1c*\xd98\x8bG\x90\x81`\x03\xe0\xde\x9c\x9a\x0f\x1b\x8f\xd2%*&$Wc\xb3\xa6\xc4TK1}2\xb3\xab\xf4\xb7\xb7\x85\apa\xaf\x1c\x10i\xb9\x9f\x06\xff4%\"7f \x0e\xf5Bk\r\xac\"\x13tNx\xc0$\x85\x9f', 0x3) ftruncate(r2, 0xffff) close(0x3) fcntl$addseals(r2, 0x409, 0x7) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f00000001c0)={r2, 0x1, 0x0, 0x8000}) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000000)='binfmt_misc\x00', 0xc00, 0x0) pselect6(0x40, &(0x7f0000001080)={0x3, 0xfffffffffffffffe, 0x7, 0x400, 0x800, 0x40000003, 0x100000}, 0x0, &(0x7f00000010c0)={0x1f, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0xb, 0x8000000000000001}, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 43.979541][ T29] audit: type=1400 audit(43.910:56): avc: denied { read write } for pid=3088 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 43.982205][ T29] audit: type=1400 audit(43.910:57): avc: denied { open } for pid=3088 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:19778' (ED25519) to the list of known hosts. [ 56.519382][ T29] audit: type=1400 audit(56.440:58): avc: denied { name_bind } for pid=3091 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 58.793002][ T29] audit: type=1400 audit(58.700:59): avc: denied { execute } for pid=3092 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 58.902499][ T29] audit: type=1400 audit(58.820:60): avc: denied { execute_no_trans } for pid=3092 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 61.729956][ T29] audit: type=1400 audit(61.660:61): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 61.736939][ T29] audit: type=1400 audit(61.670:62): avc: denied { mount } for pid=3092 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.745416][ T3092] cgroup: Unknown subsys name 'net' [ 61.750845][ T29] audit: type=1400 audit(61.680:63): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.937719][ T3092] cgroup: Unknown subsys name 'cpuset' [ 61.944988][ T3092] cgroup: Unknown subsys name 'hugetlb' [ 61.946042][ T3092] cgroup: Unknown subsys name 'rlimit' [ 62.196524][ T29] audit: type=1400 audit(62.130:64): avc: denied { setattr } for pid=3092 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 62.198595][ T29] audit: type=1400 audit(62.130:65): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 62.202609][ T29] audit: type=1400 audit(62.130:66): avc: denied { mount } for pid=3092 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 62.391633][ T3094] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 62.394982][ T29] audit: type=1400 audit(62.330:67): avc: denied { relabelto } for pid=3094 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 62.398441][ T29] audit: type=1400 audit(62.330:68): avc: denied { write } for pid=3094 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 62.425599][ T29] audit: type=1400 audit(62.350:69): avc: denied { read } for pid=3092 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 62.428254][ T29] audit: type=1400 audit(62.360:70): avc: denied { open } for pid=3092 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.749033][ T3092] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 69.495132][ T29] audit: type=1400 audit(69.430:71): avc: denied { execmem } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 69.561408][ T29] audit: type=1400 audit(69.490:72): avc: denied { read } for pid=3097 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.573609][ T29] audit: type=1400 audit(69.490:73): avc: denied { open } for pid=3097 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 69.573827][ T29] audit: type=1400 audit(69.500:74): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 69.582979][ T29] audit: type=1400 audit(69.510:75): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 69.584855][ T29] audit: type=1400 audit(69.510:76): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 69.660501][ T29] audit: type=1400 audit(69.590:77): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 70.254930][ T29] audit: type=1400 audit(70.190:78): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.976731][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.982047][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.268989][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.277205][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.693971][ T3097] hsr_slave_0: entered promiscuous mode [ 71.696532][ T3097] hsr_slave_1: entered promiscuous mode [ 72.001380][ T3098] hsr_slave_0: entered promiscuous mode [ 72.002569][ T3098] hsr_slave_1: entered promiscuous mode [ 72.004801][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 72.006372][ T3098] Cannot create hsr debugfs directory [ 72.020786][ T29] audit: type=1400 audit(71.950:79): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 72.027077][ T29] audit: type=1400 audit(71.960:80): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 72.039662][ T3097] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 72.051805][ T3097] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 72.060767][ T3097] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 72.068861][ T3097] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 72.330047][ T3098] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 72.336411][ T3098] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 72.341474][ T3098] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 72.348391][ T3098] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 72.644813][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.829095][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.889989][ T3097] veth0_vlan: entered promiscuous mode [ 74.919885][ T3097] veth1_vlan: entered promiscuous mode [ 74.999417][ T3097] veth0_macvtap: entered promiscuous mode [ 75.018261][ T3097] veth1_macvtap: entered promiscuous mode [ 75.099197][ T3098] veth0_vlan: entered promiscuous mode [ 75.131776][ T265] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.132659][ T265] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.132773][ T265] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.132944][ T265] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.166177][ T3098] veth1_vlan: entered promiscuous mode [ 75.273963][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 75.274229][ T29] audit: type=1400 audit(75.200:82): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 75.274430][ T29] audit: type=1400 audit(75.200:83): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.i8xQ5f/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 75.274610][ T29] audit: type=1400 audit(75.200:84): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 75.300231][ T29] audit: type=1400 audit(75.230:85): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.i8xQ5f/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 75.300544][ T29] audit: type=1400 audit(75.230:86): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.i8xQ5f/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 75.305786][ T3098] veth0_macvtap: entered promiscuous mode [ 75.328902][ T3098] veth1_macvtap: entered promiscuous mode [ 75.329929][ T29] audit: type=1400 audit(75.260:87): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 75.337388][ T29] audit: type=1400 audit(75.270:88): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 75.341219][ T29] audit: type=1400 audit(75.270:89): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="gadgetfs" ino=2503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 75.358851][ T29] audit: type=1400 audit(75.290:90): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 75.364560][ T29] audit: type=1400 audit(75.290:91): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 75.407353][ T265] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.408074][ T265] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.408249][ T265] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.408322][ T265] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.467166][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 76.725073][ T3717] Driver unsupported XDP return value 0 on prog (id 4) dev N/A, expect packet loss! [ 80.105357][ T3774] pim6reg1: entered promiscuous mode [ 80.106751][ T3774] pim6reg1: entered allmulticast mode [ 86.119310][ T3933] veth1_macvtap: left promiscuous mode [ 86.121283][ T3933] macsec0: entered promiscuous mode [ 87.069623][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 87.070750][ T29] audit: type=1400 audit(87.000:104): avc: denied { read write } for pid=3948 comm="syz.1.50" name="cgroup.subtree_control" dev="cgroup2" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 87.072636][ T29] audit: type=1400 audit(87.000:105): avc: denied { open } for pid=3948 comm="syz.1.50" path="" dev="cgroup2" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 101.718134][ T29] audit: type=1400 audit(101.650:106): avc: denied { create } for pid=4196 comm="syz.1.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 107.255915][ T4322] pim6reg1: entered promiscuous mode [ 107.257154][ T4322] pim6reg1: entered allmulticast mode [ 112.138556][ T29] audit: type=1400 audit(112.070:107): avc: denied { create } for pid=4384 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 112.563931][ T29] audit: type=1400 audit(112.490:108): avc: denied { relabelfrom } for pid=4389 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 112.564354][ T29] audit: type=1400 audit(112.490:109): avc: denied { relabelto } for pid=4389 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 113.186386][ T29] audit: type=1400 audit(113.120:110): avc: denied { create } for pid=4404 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 118.768685][ T4493] pim6reg1: entered promiscuous mode [ 118.769869][ T4493] pim6reg1: entered allmulticast mode [ 119.359435][ T4504] pim6reg1: entered promiscuous mode [ 119.364214][ T4504] pim6reg1: entered allmulticast mode [ 122.939365][ T4557] wg2: entered promiscuous mode [ 122.939694][ T4557] wg2: entered allmulticast mode [ 123.274798][ T4561] pim6reg1: entered promiscuous mode [ 123.275592][ T4561] pim6reg1: entered allmulticast mode [ 125.880452][ T4595] pim6reg1: entered promiscuous mode [ 125.881069][ T4595] pim6reg1: entered allmulticast mode [ 126.313111][ T29] audit: type=1400 audit(126.240:111): avc: denied { create } for pid=4617 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 130.594994][ T4643] pim6reg1: entered promiscuous mode [ 130.597014][ T4643] pim6reg1: entered allmulticast mode [ 131.874792][ T29] audit: type=1400 audit(131.810:112): avc: denied { mount } for pid=4670 comm="syz.1.198" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 131.914720][ T29] audit: type=1400 audit(131.850:113): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 132.975661][ T29] audit: type=1400 audit(132.910:114): avc: denied { create } for pid=4683 comm="syz.0.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 132.979826][ T29] audit: type=1400 audit(132.910:115): avc: denied { getopt } for pid=4683 comm="syz.0.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 133.240516][ T29] audit: type=1400 audit(133.170:116): avc: denied { block_suspend } for pid=4688 comm="syz.0.207" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 133.271740][ T29] audit: type=1400 audit(133.200:117): avc: denied { create } for pid=4690 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 133.310935][ T29] audit: type=1400 audit(133.240:118): avc: denied { setopt } for pid=4690 comm="syz.1.208" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 135.089433][ T29] audit: type=1400 audit(135.020:119): avc: denied { write } for pid=4724 comm="syz.0.221" name="unix" dev="proc" ino=4026532685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 137.750616][ T29] audit: type=1400 audit(137.680:120): avc: denied { lock } for pid=4743 comm="syz.1.229" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 138.589355][ T29] audit: type=1400 audit(138.520:121): avc: denied { append } for pid=4749 comm="syz.1.232" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 143.167862][ T29] audit: type=1400 audit(143.100:122): avc: denied { create } for pid=4775 comm="syz.0.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 143.176066][ T29] audit: type=1400 audit(143.110:123): avc: denied { ioctl } for pid=4775 comm="syz.0.243" path="socket:[4595]" dev="sockfs" ino=4595 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 149.541273][ T4868] pim6reg1: entered promiscuous mode [ 149.551302][ T4868] pim6reg1: entered allmulticast mode [ 153.201479][ T4930] pim6reg1: entered promiscuous mode [ 153.202978][ T4930] pim6reg1: entered allmulticast mode [ 153.571948][ T4939] : renamed from veth0_vlan (while UP) [ 153.934912][ T4944] veth0_vlan: entered allmulticast mode [ 159.129975][ T5063] pim6reg1: entered promiscuous mode [ 159.134237][ T5063] pim6reg1: entered allmulticast mode [ 159.881635][ T29] audit: type=1400 audit(159.810:124): avc: denied { create } for pid=5074 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 166.591310][ T29] audit: type=1400 audit(166.520:125): avc: denied { create } for pid=5174 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 181.060362][ T5335] pim6reg1: entered promiscuous mode [ 181.064463][ T5335] pim6reg1: entered allmulticast mode [ 181.956865][ T5345] pim6reg1: entered promiscuous mode [ 181.962232][ T5345] pim6reg1: entered allmulticast mode [ 182.301951][ T5351] pim6reg1: entered promiscuous mode [ 182.308269][ T5351] pim6reg1: entered allmulticast mode [ 192.486739][ T5535] pim6reg1: entered promiscuous mode [ 192.487398][ T5535] pim6reg1: entered allmulticast mode [ 207.607369][ T5856] -1: renamed from syzkaller0 [ 208.324392][ T5870] pim6reg1: entered promiscuous mode [ 208.326509][ T5870] pim6reg1: entered allmulticast mode [ 211.150444][ T5925] Zero length message leads to an empty skb [ 211.849950][ T29] audit: type=1400 audit(211.780:126): avc: denied { name_bind } for pid=5935 comm="syz.0.465" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 211.854655][ T29] audit: type=1400 audit(211.780:127): avc: denied { node_bind } for pid=5935 comm="syz.0.465" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 212.109990][ T29] audit: type=1400 audit(212.040:128): avc: denied { getopt } for pid=5939 comm="syz.0.467" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 217.990037][ T6036] Freezing with imperfect legacy cgroup freezer. See cgroup.freeze of cgroup v2 [ 221.078380][ T6066] pim6reg1: entered promiscuous mode [ 221.078673][ T6066] pim6reg1: entered allmulticast mode [ 228.244439][ T6155] wg2: entered promiscuous mode [ 228.244762][ T6155] wg2: entered allmulticast mode [ 228.898200][ T6161] macsec0: left promiscuous mode [ 228.900197][ T6161] macsec0: entered allmulticast mode [ 230.069481][ T6170] pim6reg1: entered promiscuous mode [ 230.074196][ T6170] pim6reg1: entered allmulticast mode [ 253.486069][ T6252] pim6reg1: entered promiscuous mode [ 253.494430][ T6252] pim6reg1: entered allmulticast mode [ 261.401531][ T6297] pim6reg1: entered promiscuous mode [ 261.403842][ T6297] pim6reg1: entered allmulticast mode [ 280.789748][ T29] audit: type=1400 audit(280.720:129): avc: denied { setopt } for pid=6500 comm="syz.0.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 283.504977][ T6406] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 283.528814][ T6406] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.307341][ T6406] hsr_slave_0: entered promiscuous mode [ 288.314130][ T6406] hsr_slave_1: entered promiscuous mode [ 288.316124][ T6406] debugfs: 'hsr0' already exists in 'hsr' [ 288.316917][ T6406] Cannot create hsr debugfs directory [ 290.187574][ T6406] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 290.338414][ T6406] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 290.424789][ T6406] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 290.479660][ T6406] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 294.480946][ T6406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 298.868785][ T29] audit: type=1400 audit(298.800:130): avc: denied { write } for pid=6753 comm="syz.0.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 299.513709][ T29] audit: type=1400 audit(299.440:131): avc: denied { mounton } for pid=6760 comm="syz.0.596" path="/331/file0" dev="tmpfs" ino=1689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 300.624508][ T6764] netlink: 8 bytes leftover after parsing attributes in process `syz.0.596'. [ 304.675392][ T6406] veth0_vlan: entered promiscuous mode [ 304.759536][ T6406] veth1_vlan: entered promiscuous mode [ 305.126336][ T6406] veth0_macvtap: entered promiscuous mode [ 305.286288][ T6406] veth1_macvtap: entered promiscuous mode [ 305.764233][ T1328] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 305.764582][ T1328] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 305.765178][ T1328] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 305.771715][ T1328] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.793459][ T29] audit: type=1400 audit(307.720:132): avc: denied { connect } for pid=6775 comm="syz.2.597" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 307.803427][ T29] audit: type=1400 audit(307.730:133): avc: denied { write } for pid=6775 comm="syz.2.597" path="socket:[7414]" dev="sockfs" ino=7414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 309.101005][ T29] audit: type=1400 audit(309.030:134): avc: denied { create } for pid=6779 comm="syz.2.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 309.153702][ T29] audit: type=1400 audit(309.070:135): avc: denied { getopt } for pid=6779 comm="syz.2.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 311.070035][ T29] audit: type=1400 audit(311.000:136): avc: denied { unmount } for pid=6406 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 312.366681][ T29] audit: type=1400 audit(312.300:137): avc: denied { bind } for pid=6791 comm="syz.2.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 312.424299][ T29] audit: type=1400 audit(312.350:138): avc: denied { name_bind } for pid=6792 comm="syz.0.604" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 312.714597][ T29] audit: type=1400 audit(312.640:139): avc: denied { accept } for pid=6791 comm="syz.2.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 312.812640][ T6802] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 312.820239][ T29] audit: type=1400 audit(312.750:140): avc: denied { ioctl } for pid=6801 comm="syz.2.606" path="socket:[7460]" dev="sockfs" ino=7460 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 312.868877][ T1375] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.911380][ T29] audit: type=1326 audit(312.840:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6803 comm="syz.2.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 312.911752][ T29] audit: type=1326 audit(312.840:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6803 comm="syz.2.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 312.916916][ T29] audit: type=1326 audit(312.850:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6803 comm="syz.2.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 312.917271][ T29] audit: type=1326 audit(312.850:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6803 comm="syz.2.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 312.922032][ T29] audit: type=1326 audit(312.850:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6803 comm="syz.2.607" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132a10 code=0x7ffc0000 [ 312.934493][ T29] audit: type=1326 audit(312.870:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6803 comm="syz.2.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 312.934912][ T29] audit: type=1326 audit(312.870:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6803 comm="syz.2.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 312.942133][ T29] audit: type=1326 audit(312.870:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6803 comm="syz.2.607" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132a10 code=0x7ffc0000 [ 312.970623][ T29] audit: type=1326 audit(312.880:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6803 comm="syz.2.607" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132a10 code=0x7ffc0000 [ 313.068813][ T1375] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.249892][ T1375] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.558020][ T1375] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 314.905654][ T1375] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 314.936550][ T1375] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 315.008085][ T1375] bond0 (unregistering): Released all slaves [ 315.184061][ T1375] hsr_slave_0: left promiscuous mode [ 315.186658][ T1375] hsr_slave_1: left promiscuous mode [ 315.236282][ T1375] veth0_macvtap: left promiscuous mode [ 315.236935][ T1375] veth1_vlan: left promiscuous mode [ 315.237251][ T1375] : left promiscuous mode [ 318.011649][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 318.012021][ T29] audit: type=1400 audit(317.940:152): avc: denied { read } for pid=6865 comm="syz.0.618" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 318.033856][ T29] audit: type=1400 audit(317.960:153): avc: denied { open } for pid=6865 comm="syz.0.618" path="/338/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 318.134691][ T6876] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 318.248266][ T29] audit: type=1400 audit(318.180:154): avc: denied { ioctl } for pid=6864 comm="syz.2.617" path="socket:[8680]" dev="sockfs" ino=8680 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 323.727806][ T6921] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 330.041518][ T29] audit: type=1400 audit(329.970:155): avc: denied { ioctl } for pid=6974 comm="syz.2.645" path="socket:[7739]" dev="sockfs" ino=7739 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 330.393675][ T29] audit: type=1400 audit(330.320:156): avc: denied { associate } for pid=6978 comm="syz.0.646" name="3" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 331.268314][ T29] audit: type=1400 audit(331.200:157): avc: denied { bind } for pid=6994 comm="syz.0.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 331.551752][ T29] audit: type=1400 audit(331.470:158): avc: denied { bind } for pid=6999 comm="syz.0.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 331.555363][ T29] audit: type=1400 audit(331.480:159): avc: denied { name_bind } for pid=6999 comm="syz.0.651" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 331.574011][ T29] audit: type=1400 audit(331.480:160): avc: denied { node_bind } for pid=6999 comm="syz.0.651" saddr=::ffff:0.0.0.0 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 331.749414][ T29] audit: type=1400 audit(331.670:161): avc: denied { read } for pid=6999 comm="syz.0.651" laddr=::ffff:127.0.0.1 lport=20001 faddr=::ffff:127.0.0.1 fport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 333.869744][ T29] audit: type=1400 audit(333.800:162): avc: denied { bind } for pid=7006 comm="syz.0.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 334.276560][ T29] audit: type=1400 audit(334.210:163): avc: denied { create } for pid=7012 comm="syz.0.655" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 334.357651][ T29] audit: type=1400 audit(334.290:164): avc: denied { ioctl } for pid=7012 comm="syz.0.655" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7777 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 335.096157][ T29] audit: type=1400 audit(335.030:165): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 335.662026][ T7023] syzkaller0: entered promiscuous mode [ 335.663766][ T7023] syzkaller0: entered allmulticast mode [ 338.173865][ T29] audit: type=1400 audit(338.100:166): avc: denied { watch watch_reads } for pid=7054 comm="syz.0.668" path="/proc/775" dev="proc" ino=7843 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 341.178453][ T7085] netlink: 16 bytes leftover after parsing attributes in process `syz.0.676'. [ 341.504319][ T7092] capability: warning: `syz.0.677' uses deprecated v2 capabilities in a way that may be insecure [ 341.960428][ T7096] €Â0€: renamed from pim6reg1 [ 342.473514][ C0] hrtimer: interrupt took 9777168 ns [ 342.598081][ T7105] syzkaller0: entered promiscuous mode [ 342.600079][ T7105] syzkaller0: entered allmulticast mode [ 357.621822][ T29] audit: type=1400 audit(357.550:167): avc: denied { create } for pid=7146 comm="syz.0.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 357.630207][ T29] audit: type=1400 audit(357.560:168): avc: denied { write } for pid=7146 comm="syz.0.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 357.637245][ T7147] netlink: 16 bytes leftover after parsing attributes in process `syz.0.688'. [ 358.295669][ T7170] af_packet: tpacket_rcv: packet too big, clamped from 62 to 4294967286. macoff=82 [ 363.799603][ T7206] tmpfs: Unsupported parameter 'huge' [ 364.350373][ T29] audit: type=1400 audit(524652.417:169): avc: denied { create } for pid=7210 comm="syz.0.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 365.307612][ T29] audit: type=1326 audit(524653.398:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7217 comm="syz.0.717" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 365.323203][ T29] audit: type=1326 audit(524653.418:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7217 comm="syz.0.717" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 365.323546][ T29] audit: type=1326 audit(524653.418:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7217 comm="syz.0.717" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x132a10 code=0x7ffc0000 [ 365.323836][ T29] audit: type=1326 audit(524653.418:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7217 comm="syz.0.717" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 365.329684][ T29] audit: type=1326 audit(524653.429:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7217 comm="syz.0.717" exe="/syz-executor" sig=0 arch=40000028 syscall=311 compat=0 ip=0x132a10 code=0x7ffc0000 [ 365.334485][ T29] audit: type=1326 audit(524653.429:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7217 comm="syz.0.717" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 365.506221][ T7220] fuse: Bad value for 'fd' [ 369.095697][ T7233] fuse: Bad value for 'fd' [ 369.489066][ T29] audit: type=1400 audit(524657.656:176): avc: denied { map } for pid=7236 comm="syz.0.725" path="socket:[9158]" dev="sockfs" ino=9158 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 373.961187][ T29] audit: type=1326 audit(524662.199:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7258 comm="syz.0.733" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x0 [ 377.889053][ T29] audit: type=1400 audit(524666.161:178): avc: denied { read } for pid=7322 comm="syz.2.754" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=8160 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 383.088646][ T29] audit: type=1326 audit(524671.402:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7359 comm="syz.0.768" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 383.092586][ T29] audit: type=1326 audit(524671.402:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7359 comm="syz.0.768" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 383.098606][ T29] audit: type=1326 audit(524671.412:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7359 comm="syz.0.768" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 383.102342][ T29] audit: type=1326 audit(524671.412:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7359 comm="syz.0.768" exe="/syz-executor" sig=0 arch=40000028 syscall=171 compat=0 ip=0x132a10 code=0x7ffc0000 [ 383.105596][ T29] audit: type=1326 audit(524671.412:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7359 comm="syz.0.768" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 383.108419][ T29] audit: type=1326 audit(524671.412:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7359 comm="syz.0.768" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 383.110895][ T29] audit: type=1326 audit(524671.423:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7359 comm="syz.0.768" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 383.124763][ T29] audit: type=1326 audit(524671.423:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7359 comm="syz.0.768" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132a10 code=0x7ffc0000 [ 383.126123][ T29] audit: type=1326 audit(524671.423:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7359 comm="syz.0.768" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132a10 code=0x7ffc0000 [ 383.199962][ T29] audit: type=1400 audit(524671.513:188): avc: denied { create } for pid=7361 comm="syz.2.769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 383.486165][ T7368] fuse: Bad value for 'fd' [ 388.882698][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 388.883110][ T29] audit: type=1400 audit(524677.225:232): avc: denied { name_bind } for pid=7406 comm="syz.2.789" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 389.386183][ T29] audit: type=1400 audit(524677.737:233): avc: denied { write } for pid=7412 comm="syz.2.792" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 391.841833][ T7432] netlink: 'syz.2.801': attribute type 3 has an invalid length. [ 395.796070][ T29] audit: type=1326 audit(524684.160:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7439 comm="syz.2.804" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 395.801625][ T29] audit: type=1326 audit(524684.170:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7439 comm="syz.2.804" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 395.803904][ T29] audit: type=1326 audit(524684.170:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7439 comm="syz.2.804" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 395.806172][ T29] audit: type=1326 audit(524684.170:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7439 comm="syz.2.804" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 395.810681][ T29] audit: type=1326 audit(524684.180:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7439 comm="syz.2.804" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132a10 code=0x7ffc0000 [ 395.846804][ T29] audit: type=1326 audit(524684.210:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7439 comm="syz.2.804" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 395.915836][ T29] audit: type=1326 audit(524684.281:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7439 comm="syz.2.804" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 395.953141][ T29] audit: type=1326 audit(524684.321:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7439 comm="syz.2.804" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 395.997049][ T29] audit: type=1326 audit(524684.331:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7439 comm="syz.2.804" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 395.998921][ T29] audit: type=1326 audit(524684.331:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7439 comm="syz.2.804" exe="/syz-executor" sig=0 arch=40000028 syscall=388 compat=0 ip=0x132a10 code=0x7ffc0000 [ 397.734065][ T7451] netlink: 48 bytes leftover after parsing attributes in process `syz.2.809'. [ 397.737020][ T7451] netlink: 48 bytes leftover after parsing attributes in process `syz.2.809'. [ 397.738792][ T7451] netlink: 48 bytes leftover after parsing attributes in process `syz.2.809'. [ 397.739763][ T7451] netlink: 48 bytes leftover after parsing attributes in process `syz.2.809'. [ 401.476444][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 401.477796][ T29] audit: type=1400 audit(524689.864:262): avc: denied { allowed } for pid=7470 comm="syz.0.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 401.862897][ T29] audit: type=1400 audit(524690.255:263): avc: denied { bind } for pid=7476 comm="syz.2.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 402.034821][ T7479] fuse: Bad value for 'fd' [ 403.404651][ T7501] mmap: syz.2.828 (7501) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 404.007598][ T7509] netlink: 4 bytes leftover after parsing attributes in process `syz.0.833'. [ 404.068195][ T29] audit: type=1326 audit(524692.459:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7510 comm="syz.0.834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 404.070428][ T29] audit: type=1326 audit(524692.469:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7510 comm="syz.0.834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 404.074476][ T29] audit: type=1326 audit(524692.469:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7510 comm="syz.0.834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 404.076786][ T29] audit: type=1326 audit(524692.469:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7510 comm="syz.0.834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 404.080789][ T29] audit: type=1326 audit(524692.469:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7510 comm="syz.0.834" exe="/syz-executor" sig=0 arch=40000028 syscall=171 compat=0 ip=0x132a10 code=0x7ffc0000 [ 404.083027][ T29] audit: type=1326 audit(524692.469:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7510 comm="syz.0.834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 404.086155][ T29] audit: type=1326 audit(524692.479:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7510 comm="syz.0.834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 404.090507][ T29] audit: type=1326 audit(524692.479:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7510 comm="syz.0.834" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132a10 code=0x7ffc0000 [ 406.073266][ T7521] netlink: 4 bytes leftover after parsing attributes in process `syz.0.838'. [ 410.817950][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 410.821130][ T29] audit: type=1326 audit(524699.218:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7554 comm="syz.2.851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 410.823219][ T29] audit: type=1326 audit(524699.218:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7554 comm="syz.2.851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 410.835335][ T29] audit: type=1326 audit(524699.239:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7554 comm="syz.2.851" exe="/syz-executor" sig=0 arch=40000028 syscall=435 compat=0 ip=0x132a10 code=0x7ffc0000 [ 410.852247][ T29] audit: type=1326 audit(524699.259:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7554 comm="syz.2.851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 410.852591][ T29] audit: type=1326 audit(524699.259:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7558 comm="syz.2.851" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x1604c4 code=0x7ffc0000 [ 410.861368][ T29] audit: type=1326 audit(524699.269:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7554 comm="syz.2.851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 410.871197][ T29] audit: type=1326 audit(524699.279:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7554 comm="syz.2.851" exe="/syz-executor" sig=0 arch=40000028 syscall=424 compat=0 ip=0x132a10 code=0x7ffc0000 [ 410.873247][ T29] audit: type=1326 audit(524699.279:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7554 comm="syz.2.851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 410.885929][ T29] audit: type=1326 audit(524699.289:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7554 comm="syz.2.851" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x7ffc0000 [ 413.877108][ T29] audit: type=1400 audit(524702.272:282): avc: denied { listen } for pid=7587 comm="syz.0.866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 422.680289][ T7626] fuse: Unknown parameter 'grou00000000000000000000' [ 424.281753][ T7641] fuse: Unknown parameter 'group_i00000000000000000000' [ 424.757868][ T7652] fuse: Unknown parameter 'group_i00000000000000000000' [ 425.953918][ T7663] syz.2.897 (7663): /proc/7662/oom_adj is deprecated, please use /proc/7662/oom_score_adj instead. [ 429.621733][ T7701] fuse: Bad value for 'fd' [ 430.003997][ T7706] netlink: 'syz.2.915': attribute type 1 has an invalid length. [ 430.139811][ T7706] 8021q: adding VLAN 0 to HW filter on device bond1 [ 430.258131][ T7706] gretap1: entered promiscuous mode [ 430.293265][ T7706] bond1: (slave gretap1): making interface the new active one [ 430.303050][ T7706] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 433.060560][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 433.061053][ T29] audit: type=1800 audit(524721.472:286): pid=7754 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz.2.920" name="/" dev="fuse" ino=1 res=0 errno=0 [ 434.266165][ T7770] netlink: 8 bytes leftover after parsing attributes in process `syz.2.926'. [ 435.517743][ T7786] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 438.820654][ T7823] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 438.834864][ T7823] block device autoloading is deprecated and will be removed. [ 438.841650][ T29] audit: type=1400 audit(524727.253:287): avc: denied { ioctl } for pid=7818 comm="syz.0.946" path="/518/file0/file0" dev="fuse" ino=63 ioctlcmd=0x921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 440.299870][ T29] audit: type=1400 audit(524728.713:288): avc: denied { getopt } for pid=7847 comm="syz.0.955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 444.168584][ T7904] fuse: Bad value for 'fd' [ 444.456221][ T7909] tmpfs: Unsupported parameter 'huge' [ 444.485848][ T7910] tap0: tun_chr_ioctl cmd 1074025677 [ 444.487693][ T7910] tap0: linktype set to 823 [ 445.147882][ T7920] fuse: Bad value for 'fd' [ 447.159986][ T7946] fuse: Invalid rootmode [ 447.479133][ T7960] fuse: Invalid rootmode [ 447.689006][ T29] audit: type=1400 audit(524736.104:289): avc: denied { audit_write } for pid=7968 comm="syz.0.1007" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 447.716583][ T29] audit: type=1400 audit(524736.134:290): avc: denied { mount } for pid=7967 comm="syz.2.1006" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 450.728522][ T29] audit: type=1400 audit(524739.144:291): avc: denied { write } for pid=7988 comm="syz.0.1015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 450.728778][ T29] audit: type=1400 audit(524739.144:292): avc: denied { read } for pid=7988 comm="syz.0.1015" path="socket:[10135]" dev="sockfs" ino=10135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 456.003895][ T8020] lo: entered promiscuous mode [ 467.684019][ T8105] fuse: Bad value for 'fd' [ 472.496775][ T29] audit: type=1400 audit(524760.915:293): avc: denied { bind } for pid=8130 comm="syz.0.1060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 472.498798][ T29] audit: type=1400 audit(524760.915:294): avc: denied { name_bind } for pid=8130 comm="syz.0.1060" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 472.502994][ T29] audit: type=1400 audit(524760.925:295): avc: denied { node_bind } for pid=8130 comm="syz.0.1060" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 483.430467][ T29] audit: type=1400 audit(524771.846:296): avc: denied { create } for pid=8193 comm="syz.2.1083" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 483.437964][ T29] audit: type=1400 audit(524771.856:297): avc: denied { mounton } for pid=8193 comm="syz.2.1083" path="/220/file0" dev="tmpfs" ino=1152 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 483.739870][ T1375] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.796914][ T1375] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.864978][ T1375] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.930538][ T1375] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.172921][ T1375] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 484.180363][ T1375] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 484.187998][ T1375] bond0 (unregistering): Released all slaves [ 484.287335][ T1375] hsr_slave_0: left promiscuous mode [ 484.289231][ T1375] hsr_slave_1: left promiscuous mode [ 484.308210][ T1375] veth1_macvtap: left promiscuous mode [ 484.308602][ T1375] veth0_macvtap: left promiscuous mode [ 484.309111][ T1375] veth1_vlan: left promiscuous mode [ 484.479023][ T29] audit: type=1800 audit(524772.896:298): pid=8207 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz.2.1083" name="/" dev="fuse" ino=1 res=0 errno=0 [ 484.613793][ T29] audit: type=1400 audit(524773.036:299): avc: denied { unlink } for pid=6406 comm="syz-executor" name="file0" dev="tmpfs" ino=1152 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 484.890491][ T29] audit: type=1326 audit(524773.306:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8231 comm="syz.2.1087" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x0 [ 487.588789][ T8201] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 487.615488][ T8201] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 488.418914][ T29] audit: type=1400 audit(524776.836:301): avc: denied { mount } for pid=8381 comm="syz.2.1091" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 488.511490][ T29] audit: type=1400 audit(524776.926:302): avc: denied { watch } for pid=8381 comm="syz.2.1091" path="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 490.390290][ T8201] hsr_slave_0: entered promiscuous mode [ 490.393612][ T8201] hsr_slave_1: entered promiscuous mode [ 491.868897][ T8201] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 491.918519][ T8201] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 491.929791][ T8201] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 491.959610][ T8201] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 494.150842][ T8201] 8021q: adding VLAN 0 to HW filter on device bond0 [ 496.555127][ T8604] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1111'. [ 502.156031][ T8201] veth0_vlan: entered promiscuous mode [ 502.212795][ T8201] veth1_vlan: entered promiscuous mode [ 502.363303][ T8201] veth0_macvtap: entered promiscuous mode [ 502.390820][ T8201] veth1_macvtap: entered promiscuous mode [ 502.554070][ T265] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 502.554681][ T265] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 502.554831][ T265] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 502.554909][ T265] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 503.832426][ T29] audit: type=1400 audit(524792.236:303): avc: denied { create } for pid=8677 comm="syz.2.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 503.840608][ T29] audit: type=1400 audit(524792.256:304): avc: denied { write } for pid=8677 comm="syz.2.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 503.849668][ T8678] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1118'. [ 503.882074][ T29] audit: type=1400 audit(524792.266:305): avc: denied { nlmsg_read } for pid=8677 comm="syz.2.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 507.830121][ T29] audit: type=1400 audit(524796.246:306): avc: denied { write } for pid=8707 comm="syz.0.1127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 513.069482][ T29] audit: type=1400 audit(524801.486:307): avc: denied { write } for pid=8733 comm="syz.0.1136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 515.885016][ T29] audit: type=1400 audit(524804.306:308): avc: denied { ioctl } for pid=8742 comm="syz.2.1139" path="socket:[12022]" dev="sockfs" ino=12022 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 516.875914][ T29] audit: type=1400 audit(524805.286:309): avc: denied { create } for pid=8750 comm="syz.0.1142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 518.707392][ T29] audit: type=1400 audit(524807.126:310): avc: denied { sqpoll } for pid=8778 comm="syz.0.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 518.723688][ T29] audit: type=1400 audit(524807.146:311): avc: denied { map } for pid=8778 comm="syz.0.1144" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12071 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 518.724360][ T29] audit: type=1400 audit(524807.146:312): avc: denied { write } for pid=8778 comm="syz.0.1144" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12071 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 522.332654][ T8805] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1155'. [ 523.894955][ T8826] syzkaller0: entered promiscuous mode [ 523.895324][ T8826] syzkaller0: entered allmulticast mode [ 525.906597][ T8858] syz.2.1177 uses obsolete (PF_INET,SOCK_PACKET) [ 527.788882][ T29] audit: type=1400 audit(524816.206:313): avc: denied { nlmsg_write } for pid=8875 comm="syz.0.1185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 528.028572][ T8879] pim6reg1: entered promiscuous mode [ 528.042869][ T8879] pim6reg1: entered allmulticast mode [ 532.464222][ T29] audit: type=1400 audit(524820.876:314): avc: denied { remount } for pid=8936 comm="syz.0.1211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 532.482508][ T8937] ======================================================= [ 532.482508][ T8937] WARNING: The mand mount option has been deprecated and [ 532.482508][ T8937] and is ignored by this kernel. Remove the mand [ 532.482508][ T8937] option from the mount to silence this warning. [ 532.482508][ T8937] ======================================================= [ 535.542143][ T29] audit: type=1326 audit(524823.956:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8953 comm="syz.2.1218" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x0 [ 536.636038][ T8961] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1220'. [ 536.644040][ T8961] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1220'. [ 539.689520][ T29] audit: type=1326 audit(524828.106:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8973 comm="syz.2.1227" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132a10 code=0x0 [ 548.129500][ T8987] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1230'. [ 549.253440][ T8988] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1230'. [ 550.543137][ T8987] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1230'. [ 576.247812][ T29] audit: type=1400 audit(524864.466:317): avc: denied { write } for pid=9007 comm="syz.0.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 576.390824][ T29] audit: type=1400 audit(524864.776:318): avc: denied { read } for pid=9007 comm="syz.0.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 593.197326][ T29] audit: type=1400 audit(524881.356:319): avc: denied { create } for pid=9020 comm="syz.2.1246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 598.248922][ T9030] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1247'. [ 625.654482][ T29] audit: type=1400 audit(524913.946:320): avc: denied { create } for pid=9051 comm="syz.0.1257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 625.865111][ T29] audit: type=1400 audit(524914.196:321): avc: denied { write } for pid=9051 comm="syz.0.1257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 631.366055][ T9056] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1258'. [ 631.393727][ T9056] netlink: 64 bytes leftover after parsing attributes in process `syz.0.1258'. [ 634.283482][ T29] audit: type=1400 audit(524922.706:322): avc: denied { create } for pid=9057 comm="syz.2.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 634.524889][ T29] audit: type=1400 audit(524922.886:323): avc: denied { bind } for pid=9057 comm="syz.2.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 634.960050][ T29] audit: type=1400 audit(524923.296:324): avc: denied { setopt } for pid=9057 comm="syz.2.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 635.004570][ T29] audit: type=1400 audit(524923.416:325): avc: denied { accept } for pid=9057 comm="syz.2.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 635.325389][ T29] audit: type=1400 audit(524923.546:326): avc: denied { write } for pid=9057 comm="syz.2.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 635.535015][ T29] audit: type=1400 audit(524923.836:327): avc: denied { read } for pid=9057 comm="syz.2.1260" path="socket:[14517]" dev="sockfs" ino=14517 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 647.416639][ T29] audit: type=1400 audit(524935.826:328): avc: denied { ioctl } for pid=9066 comm="syz.0.1264" path="socket:[13467]" dev="sockfs" ino=13467 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 647.468831][ T9067] syzkaller1: entered promiscuous mode [ 647.714805][ T9067] syzkaller1: entered allmulticast mode [ 655.401707][ C0] sched: DL replenish lagged too much [ 660.987504][ T29] audit: type=1400 audit(524949.406:329): avc: denied { create } for pid=9081 comm="syz.0.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 660.995262][ T29] audit: type=1400 audit(524949.416:330): avc: denied { sys_admin } for pid=9081 comm="syz.0.1266" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 670.728060][ T6274] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 671.160192][ T6274] usb 1-1: Using ep0 maxpacket: 8 [ 671.725697][ T6274] usb 1-1: config 0 has an invalid interface number: 55 but max is 0 [ 671.733450][ T6274] usb 1-1: config 0 has no interface number 0 [ 671.747156][ T6274] usb 1-1: config 0 interface 55 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 671.755066][ T6274] usb 1-1: config 0 interface 55 altsetting 0 has an endpoint descriptor with address 0xAB, changing to 0x8B [ 671.763838][ T6274] usb 1-1: config 0 interface 55 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 671.772331][ T6274] usb 1-1: config 0 interface 55 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 671.784728][ T6274] usb 1-1: New USB device found, idVendor=0f11, idProduct=1080, bcdDevice=fc.6a [ 671.792409][ T6274] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 671.807493][ T6274] usb 1-1: config 0 descriptor?? [ 671.886226][ T6274] ldusb 1-1:0.55: LD USB Device #0 now attached to major 180 minor 0 [ 672.587266][ T6206] usb 1-1: USB disconnect, device number 2 [ 672.679406][ T6206] ldusb 1-1:0.55: LD USB Device #0 now disconnected [ 687.747947][ T6275] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 690.165723][ T6275] usb 1-1: New USB device found, idVendor=09c0, idProduct=0203, bcdDevice=d3.32 [ 690.172971][ T6275] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 690.217725][ T6275] usb 1-1: config 0 descriptor?? [ 693.457366][ T9130] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 693.465848][ T9130] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 696.990314][ T9135] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 696.999356][ T9135] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 701.237496][ T6206] usb 1-1: USB disconnect, device number 3 [ 706.617140][ T3859] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 707.597160][ T3859] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 707.604803][ T3859] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 707.612402][ T3859] usb 1-1: Product: syz [ 707.625705][ T3859] usb 1-1: Manufacturer: syz [ 707.633777][ T3859] usb 1-1: SerialNumber: syz [ 708.903262][ T3859] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPIPE [ 708.917551][ T3859] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to sync IRQ enable register: -EPIPE [ 712.323010][ T3859] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to write register index 0x000000e4. ret = -EPROTO [ 712.337221][ T3859] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to init LTM with error -EPROTO [ 712.345202][ T3859] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 712.354540][ T3859] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 712.447761][ T3859] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -71 [ 712.479357][ T3859] usb 1-1: USB disconnect, device number 4 [ 718.603439][ T6275] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 719.127997][ T6275] usb 1-1: Using ep0 maxpacket: 32 [ 719.309496][ T6275] usb 1-1: config 0 has an invalid interface number: 67 but max is 0 [ 719.313228][ T6275] usb 1-1: config 0 has no interface number 0 [ 719.486957][ T6275] usb 1-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 719.494383][ T6275] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 719.507290][ T6275] usb 1-1: Product: syz [ 719.513650][ T6275] usb 1-1: Manufacturer: syz [ 719.522473][ T6275] usb 1-1: SerialNumber: syz [ 719.800126][ T6275] usb 1-1: config 0 descriptor?? [ 719.860232][ T6275] smsc95xx v2.0.0 [ 720.725743][ T6275] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -32 [ 720.733416][ T6275] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 724.046960][ T6275] smsc95xx 1-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000006c: -71 [ 724.054391][ T6275] smsc95xx 1-1:0.67: probe with driver smsc95xx failed with error -71 [ 724.113141][ T6275] usb 1-1: USB disconnect, device number 5 [ 728.608462][ T29] audit: type=1400 audit(525016.436:331): avc: denied { bind } for pid=9312 comm="syz.0.1281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 728.616680][ T29] audit: type=1400 audit(525016.526:332): avc: denied { write } for pid=9312 comm="syz.0.1281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 729.765174][ C1] vcan0: j1939_tp_rxtimer: 0x8567a500: rx timeout, send abort [ 729.767070][ C1] vcan0: j1939_xtp_rx_abort_one: 0x8567a500: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 729.829093][ T29] audit: type=1400 audit(525018.216:333): avc: denied { read } for pid=2906 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 729.837245][ T29] audit: type=1400 audit(525018.216:334): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 729.846120][ T29] audit: type=1400 audit(525018.216:335): avc: denied { search } for pid=2906 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 729.886902][ T29] audit: type=1400 audit(525018.216:336): avc: denied { add_name } for pid=2906 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 729.895043][ T29] audit: type=1400 audit(525018.216:337): avc: denied { create } for pid=2906 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 729.903590][ T29] audit: type=1400 audit(525018.216:338): avc: denied { append open } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 730.448458][ T29] audit: type=1400 audit(525018.216:339): avc: denied { getattr } for pid=2906 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 731.006079][ C0] vcan0: j1939_tp_rxtimer: 0x85df4100: rx timeout, send abort [ 731.006417][ C0] vcan0: j1939_tp_rxtimer: 0x85df4a00: rx timeout, send abort [ 731.007009][ C0] vcan0: j1939_xtp_rx_abort_one: 0x85df4100: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 731.007369][ C0] vcan0: j1939_xtp_rx_abort_one: 0x85df4a00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 733.258150][ T9317] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 733.266824][ T9317] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 736.950470][ T9324] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 736.958323][ T9324] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 741.053999][ T6337] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 741.730368][ T6337] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 741.734861][ T6337] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 741.742364][ T6337] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 741.754967][ T6337] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 741.887959][ T6337] usb 1-1: config 0 descriptor?? [ 742.093286][ T6337] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 754.674400][ T9122] usb 1-1: USB disconnect, device number 6 [ 777.799271][ T9122] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 778.096174][ T9122] usb 1-1: Using ep0 maxpacket: 32 [ 778.217784][ T9122] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 778.226004][ T9122] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 778.234053][ T9122] usb 1-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 778.241742][ T9122] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 778.259519][ T9122] usb 1-1: config 0 descriptor?? [ 778.298054][ T9122] hub 1-1:0.0: USB hub found [ 779.575008][ T9122] hub 1-1:0.0: config failed, can't read hub descriptor (err -90) [ 780.280412][ T9122] hid-generic 0003:046D:C31C.0001: hidraw0: USB HID v8.00 Device [HID 046d:c31c] on usb-dummy_hcd.0-1/input0 [ 781.534555][ T9122] usb 1-1: USB disconnect, device number 7 [ 784.525235][ T9396] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 784.533737][ T9396] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 803.753545][ T9421] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 803.762595][ T29] audit: type=1400 audit(525092.176:340): avc: denied { load_policy } for pid=9419 comm="syz.0.1304" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 804.169090][ T9421] SELinux: failed to load policy [ 891.766741][ T9502] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 891.775596][ T9502] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 897.287604][ T29] audit: type=1400 audit(525185.696:341): avc: denied { create } for pid=9506 comm="syz.2.1330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 900.147294][ T29] audit: type=1400 audit(525188.476:342): avc: denied { lock } for pid=9501 comm="syz.0.1329" path="socket:[13702]" dev="sockfs" ino=13702 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 926.955648][ T29] audit: type=1400 audit(525215.286:343): avc: denied { read write } for pid=8201 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 926.963835][ T29] audit: type=1400 audit(525215.336:344): avc: denied { open } for pid=8201 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 927.055107][ T29] audit: type=1400 audit(525215.336:345): avc: denied { ioctl } for pid=8201 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 928.866190][ T9521] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 928.874263][ T9521] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 933.490477][ T9530] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 933.499203][ T9530] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 933.499631][ T6274] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 934.297244][ T6274] usb 1-1: Using ep0 maxpacket: 16 [ 934.774905][ T6274] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 187, changing to 11 [ 934.785028][ T6274] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1574, setting to 1024 [ 934.785155][ T6274] usb 1-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.40 [ 934.785181][ T6274] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 934.838427][ T6274] usb 1-1: config 0 descriptor?? [ 934.970293][ T9525] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 935.520211][ T9442] usb 1-1: USB disconnect, device number 8 [ 938.397828][ T29] audit: type=1400 audit(525226.816:346): avc: denied { read } for pid=9542 comm="syz.2.1336" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 938.407919][ T29] audit: type=1400 audit(525226.816:347): avc: denied { open } for pid=9542 comm="syz.2.1336" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 938.720281][ T29] audit: type=1400 audit(525226.986:348): avc: denied { ioctl } for pid=9542 comm="syz.2.1336" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 938.835786][ T29] audit: type=1400 audit(525227.236:349): avc: denied { set_context_mgr } for pid=9542 comm="syz.2.1336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 939.541860][ T29] audit: type=1400 audit(525227.936:350): avc: denied { map } for pid=9542 comm="syz.2.1336" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 939.821782][ T29] audit: type=1400 audit(525228.216:351): avc: denied { call } for pid=9542 comm="syz.2.1336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 962.078548][ T30] INFO: task kworker/0:9:3829 blocked for more than 430 seconds. [ 962.099223][ T30] Not tainted syzkaller #0 [ 962.124985][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 962.132511][ T30] task:kworker/0:9 state:D stack:0 pid:3829 tgid:3829 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 962.150687][ T30] Workqueue: events bpf_prog_free_deferred SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 963.922798][ T30] Call trace: [ 964.518521][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 964.537821][ T30] r10:eafedd84 r9:00000002 r8:60010113 r7:829171a0 r6:eafedd8c r5:83b52400 [ 965.466349][ T30] r4:83b52400 [ 965.474658][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 965.498202][ T30] r5:83b52400 r4:8291719c [ 965.875719][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 966.182706][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 966.182894][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 [ 966.182918][ T30] r4:00000000 [ 966.182933][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 966.182988][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 966.183044][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 966.183104][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b3cc0 [ 966.183122][ T30] r4:00000000 [ 966.183136][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 966.183199][ T30] r9:83018405 r8:83b52400 r7:00000000 r6:83018400 r5:00001000 r4:7f276000 [ 966.183216][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 966.183275][ T30] r5:00001000 r4:ead59000 [ 966.183290][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 966.183342][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 966.183397][ T30] r5:84fc1b8c r4:859bf500 [ 966.183411][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 966.183485][ T30] r7:dddcfd80 r6:83018400 r5:84fc1b8c r4:859bf500 [ 966.183502][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 966.183572][ T30] r10:61c88647 r9:83b52400 r8:859bf52c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 966.183592][ T30] r4:859bf500 [ 966.183609][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 966.183676][ T30] r10:00000000 r9:859bf500 r8:80278fec r7:eaed9e60 r6:8594e680 r5:83b52400 [ 966.183705][ T30] r4:00000001 [ 966.183723][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 966.183898][ T30] Exception stack(0xeafedfb0 to 0xeafedff8) [ 966.184106][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 966.184169][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 966.184203][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 966.184289][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 966.184320][ T30] r4:8599dac0 [ 966.184994][ T30] INFO: task kworker/0:9:3829 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 966.185198][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 966.185379][ T30] Workqueue: events bpf_prog_free_deferred [ 966.185445][ T30] Call trace: [ 966.185480][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 966.185563][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 966.185585][ T30] r4:00000000 [ 966.185599][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 966.185655][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 966.185714][ T30] 9d20: c2a71000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 966.185757][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 966.185783][ T30] 9d60: 80000013 ffffffff [ 966.185808][ T30] r5:80000013 r4:80239c10 [ 966.185826][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 966.185891][ T30] r4:82acb1e4 [ 966.185912][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 966.185985][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 966.186006][ T30] r4:ea669dc0 [ 966.186020][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 966.186079][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 966.186099][ T30] r4:00000000 [ 966.186116][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 966.186184][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 966.186202][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 966.186292][ T30] r5:00001000 r4:dfd0b000 [ 966.220862][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 966.234981][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 966.235159][ T30] r5:84e86f8c r4:85c78380 [ 966.235185][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 966.235272][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 966.235294][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 966.235381][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 966.235406][ T30] r4:85c78380 [ 966.235427][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 966.235512][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 966.235537][ T30] r4:00000001 [ 966.235557][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 966.235617][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 966.235661][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 966.235715][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 966.235755][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 966.235799][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 966.235822][ T30] r4:8584e440 [ 966.236275][ T30] INFO: task kworker/1:22:3866 blocked for more than 434 seconds. [ 966.236333][ T30] Not tainted syzkaller #0 [ 966.236372][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 966.236392][ T30] task:kworker/1:22 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 966.236492][ T30] Workqueue: events bpf_prog_free_deferred [ 966.236553][ T30] Call trace: [ 966.236580][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 966.236656][ T30] r10:eb92dd84 r9:00000002 r8:60000013 r7:829171a0 r6:eb92dd8c r5:855fc800 [ 966.236676][ T30] r4:855fc800 [ 966.236690][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 966.236756][ T30] r5:855fc800 r4:8291719c [ 966.236770][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 966.236819][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 966.236883][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 [ 966.236902][ T30] r4:00000000 [ 966.236916][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 966.236966][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 966.237014][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 966.237075][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c7c0c0 [ 966.237095][ T30] r4:00000000 [ 966.237111][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 966.237177][ T30] r9:83018605 r8:855fc800 r7:00000000 r6:83018600 r5:00001000 r4:7f270000 [ 966.237194][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 966.237251][ T30] r5:00001000 r4:eac3f000 [ 966.237267][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 966.237345][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 966.237411][ T30] r5:84c73b8c r4:85992580 [ 966.237429][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 966.237506][ T30] r7:ddde3d80 r6:83018600 r5:84c73b8c r4:85992580 [ 966.237526][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 966.237603][ T30] r10:61c88647 r9:855fc800 r8:859925ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 966.237629][ T30] r4:85992580 [ 966.237646][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 966.237730][ T30] r10:00000000 r9:85992580 r8:80278fec r7:eaedde60 r6:85992680 r5:855fc800 [ 966.237755][ T30] r4:00000001 [ 966.237772][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 966.237825][ T30] Exception stack(0xeb92dfb0 to 0xeb92dff8) [ 966.237859][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 966.237898][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 966.237934][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 966.237975][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 966.237998][ T30] r4:859a5800 [ 966.238287][ T30] INFO: task kworker/1:22:3866 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 966.238325][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 966.238401][ T30] Workqueue: events bpf_prog_free_deferred [ 966.238459][ T30] Call trace: [ 966.238489][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 966.238573][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 966.238596][ T30] r4:00000000 [ 966.238613][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 966.238672][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 966.238723][ T30] 9d20: c2a71000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 966.238764][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 966.238792][ T30] 9d60: 80000013 ffffffff [ 966.238819][ T30] r5:80000013 r4:80239c10 [ 966.238838][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 966.238904][ T30] r4:82acb1e4 [ 966.238922][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 966.238997][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 966.239020][ T30] r4:ea669dc0 [ 966.239036][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 966.239108][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 966.239132][ T30] r4:00000000 [ 966.239149][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 966.239221][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 966.239240][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 966.239307][ T30] r5:00001000 r4:dfd0b000 [ 966.239325][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 966.239385][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 966.239452][ T30] r5:84e86f8c r4:85c78380 [ 966.239471][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 966.239551][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 966.239571][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 966.239649][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 966.239672][ T30] r4:85c78380 [ 966.239689][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 966.239775][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 966.239798][ T30] r4:00000001 [ 966.239816][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 966.239868][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 966.239903][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 966.239942][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 966.239976][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 966.240016][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 966.240038][ T30] r4:8584e440 [ 966.240062][ T30] INFO: task kworker/1:24:3874 blocked for more than 434 seconds. [ 966.240094][ T30] Not tainted syzkaller #0 [ 966.240118][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 966.240132][ T30] task:kworker/1:24 state:D stack:0 pid:3874 tgid:3874 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 966.240190][ T30] Workqueue: events bpf_prog_free_deferred [ 966.240240][ T30] Call trace: [ 966.240268][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 966.240348][ T30] r10:eb0a1d84 r9:00000002 r8:60000113 r7:829171a0 r6:eb0a1d8c r5:8549ec00 [ 966.240372][ T30] r4:8549ec00 [ 966.240388][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 966.240455][ T30] r5:8549ec00 r4:8291719c [ 966.240475][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 966.240536][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 966.240615][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 [ 966.240636][ T30] r4:00000000 [ 966.240654][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 966.240723][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 966.240781][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 966.240851][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8461f2c0 [ 966.240873][ T30] r4:00000000 [ 966.240890][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 966.240962][ T30] r9:83018605 r8:8549ec00 r7:00000000 r6:83018600 r5:00001000 r4:7f266000 [ 966.280310][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 966.280521][ T30] r5:00001000 r4:ea68f000 [ 966.280542][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 966.280608][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 966.280675][ T30] r5:857aab8c r4:85919780 [ 966.280694][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 966.280772][ T30] r7:ddde3d80 r6:83018600 r5:857aab8c r4:85919780 [ 966.280794][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 966.280882][ T30] r10:61c88647 r9:8549ec00 r8:859197ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 966.280907][ T30] r4:85919780 [ 966.280924][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 966.282313][ T30] r10:00000000 r9:85919780 r8:80278fec r7:eb92de60 r6:85919800 r5:8549ec00 [ 966.675198][ T30] r4:00000001 [ 966.675273][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 966.675388][ T30] Exception stack(0xeb0a1fb0 to 0xeb0a1ff8) [ 966.675453][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 966.675508][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 966.675551][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 966.675599][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 966.675621][ T30] r4:8590e840 [ 966.675929][ T30] INFO: task kworker/1:24:3874 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 966.675975][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 966.676081][ T30] Workqueue: events bpf_prog_free_deferred [ 966.676150][ T30] Call trace: [ 966.676180][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 966.676275][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 966.676294][ T30] r4:00000000 [ 966.676306][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 966.676363][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 966.676421][ T30] 9d20: c2a71000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 966.676464][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 966.676493][ T30] 9d60: 80000013 ffffffff [ 966.676522][ T30] r5:80000013 r4:80239c10 [ 966.676538][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 966.676598][ T30] r4:82acb1e4 [ 966.676613][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 966.676680][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 966.676700][ T30] r4:ea669dc0 [ 966.676715][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 966.676782][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 966.676801][ T30] r4:00000000 [ 966.676817][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 966.676886][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 966.676911][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 966.676979][ T30] r5:00001000 r4:dfd0b000 [ 966.676997][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 966.677056][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 966.677126][ T30] r5:84e86f8c r4:85c78380 [ 966.677144][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 966.677221][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 966.677239][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 966.677347][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 966.677370][ T30] r4:85c78380 [ 966.677385][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 966.677469][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 966.677488][ T30] r4:00000001 [ 966.677503][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 966.677548][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 966.677575][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 966.677607][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 966.677637][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 966.677670][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 966.677688][ T30] r4:8584e440 [ 966.677738][ T30] INFO: task kworker/0:11:3899 blocked for more than 434 seconds. [ 966.677775][ T30] Not tainted syzkaller #0 [ 966.677799][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 966.677812][ T30] task:kworker/0:11 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 966.677862][ T30] Workqueue: events bpf_prog_free_deferred [ 966.677903][ T30] Call trace: [ 966.677924][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 966.677994][ T30] r10:eb011d84 r9:00000002 r8:60000113 r7:829171a0 r6:eb011d8c r5:833b0c00 [ 966.678012][ T30] r4:833b0c00 [ 966.678026][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 966.678082][ T30] r5:833b0c00 r4:8291719c [ 966.678097][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 966.678153][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 966.678230][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 [ 966.678253][ T30] r4:00000000 [ 966.678272][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 966.678330][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 966.678385][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 966.678465][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855318c0 [ 966.678485][ T30] r4:00000000 [ 966.678502][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 966.678570][ T30] r9:83018405 r8:833b0c00 r7:00000000 r6:83018400 r5:00001000 r4:7f26a000 [ 966.678588][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 966.678654][ T30] r5:00001000 r4:ea8fb000 [ 966.678678][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 966.678733][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 966.678795][ T30] r5:84fc3b8c r4:859bb400 [ 966.678810][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 966.678887][ T30] r7:dddcfd80 r6:83018400 r5:84fc3b8c r4:859bb400 [ 966.678904][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 966.678977][ T30] r10:61c88647 r9:833b0c00 r8:859bb42c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 966.678999][ T30] r4:859bb400 [ 966.679017][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 966.679090][ T30] r10:00000000 r9:859bb400 r8:80278fec r7:eb041e60 r6:859bb600 r5:833b0c00 [ 966.679112][ T30] r4:00000001 [ 966.679131][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 966.679187][ T30] Exception stack(0xeb011fb0 to 0xeb011ff8) [ 966.679219][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 966.679250][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 966.679276][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 966.679307][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 966.679323][ T30] r4:85941440 [ 966.679509][ T30] INFO: task kworker/0:11:3899 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 966.679547][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 966.679657][ T30] Workqueue: events bpf_prog_free_deferred [ 966.679727][ T30] Call trace: [ 966.679749][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 966.679817][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 966.679836][ T30] r4:00000000 [ 966.679848][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 966.679899][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 966.679935][ T30] 9d20: c2a71000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 966.679967][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 966.679988][ T30] 9d60: 80000013 ffffffff [ 966.680010][ T30] r5:80000013 r4:80239c10 [ 966.680025][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 966.680084][ T30] r4:82acb1e4 [ 966.680098][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 966.680155][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 966.680176][ T30] r4:ea669dc0 [ 966.680189][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 966.680259][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 966.680281][ T30] r4:00000000 [ 966.680297][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 966.680370][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 966.680390][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 966.680475][ T30] r5:00001000 r4:dfd0b000 [ 966.680490][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 966.680548][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 966.680614][ T30] r5:84e86f8c r4:85c78380 [ 966.680635][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 966.680715][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 966.680733][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 966.680808][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 966.680830][ T30] r4:85c78380 [ 966.680847][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 966.680924][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 966.680944][ T30] r4:00000001 [ 966.680961][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 966.681042][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 966.712080][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 966.712167][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 966.712203][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 966.712249][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 966.712269][ T30] r4:8584e440 [ 966.712342][ T30] INFO: task kworker/0:253:6289 blocked for more than 434 seconds. [ 966.712390][ T30] Not tainted syzkaller #0 [ 966.712432][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 966.712452][ T30] task:kworker/0:253 state:D stack:0 pid:6289 tgid:6289 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 966.712541][ T30] Workqueue: events bpf_prog_free_deferred [ 966.712631][ T30] Call trace: [ 966.712666][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 966.712764][ T30] r10:ea49dd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea49dd8c r5:85551800 [ 966.712790][ T30] r4:85551800 [ 966.712810][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 966.712879][ T30] r5:85551800 r4:8291719c [ 966.712899][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 966.712960][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 966.713037][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea49de08 [ 966.713062][ T30] r4:00000000 [ 966.729329][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 969.183533][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 969.183717][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 969.183825][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bab80 [ 969.183853][ T30] r4:00000000 [ 969.183873][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 969.183955][ T30] r9:83018405 r8:85551800 r7:00000000 r6:83018400 r5:00001000 r4:7f264000 [ 969.183980][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 969.184054][ T30] r5:00001000 r4:ea689000 [ 969.184075][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 969.184137][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 969.184206][ T30] r5:84fc278c r4:8582fc00 [ 969.184224][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 969.184299][ T30] r7:dddcfd80 r6:83018400 r5:84fc278c r4:8582fc00 [ 969.184320][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 969.184392][ T30] r10:61c88647 r9:85551800 r8:8582fc2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 969.184412][ T30] r4:8582fc00 [ 969.184430][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 969.184504][ T30] r10:00000000 r9:8582fc00 r8:80278fec r7:ea55de60 r6:8582f780 r5:85551800 [ 969.184526][ T30] r4:00000001 [ 969.184543][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 969.184594][ T30] Exception stack(0xea49dfb0 to 0xea49dff8) [ 969.184634][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 969.184670][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 969.184702][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 969.184753][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 969.184774][ T30] r4:85f57cc0 [ 969.185065][ T30] INFO: task kworker/0:253:6289 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 969.185104][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 969.185204][ T30] Workqueue: events bpf_prog_free_deferred [ 969.185262][ T30] Call trace: [ 969.185291][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 969.185404][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 969.185426][ T30] r4:00000000 [ 969.185443][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 969.185501][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 969.185543][ T30] 9d20: c4a80000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 969.185583][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 969.185607][ T30] 9d60: 80000013 ffffffff [ 969.185633][ T30] r5:80000013 r4:80239c10 [ 969.185651][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 969.185711][ T30] r4:82acb1e4 [ 969.185738][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 969.185808][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 969.185828][ T30] r4:ea669dc0 [ 969.185844][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 969.185910][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 969.185929][ T30] r4:00000000 [ 969.185944][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 969.186012][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 969.186030][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 969.186089][ T30] r5:00001000 r4:dfd0b000 [ 969.186106][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 969.186163][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 969.186226][ T30] r5:84e86f8c r4:85c78380 [ 969.186243][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 969.186348][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 969.186367][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 969.186440][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 969.186461][ T30] r4:85c78380 [ 969.186477][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 969.186554][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 969.186574][ T30] r4:00000001 [ 969.186590][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 969.186641][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 969.186670][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 969.186700][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 969.186742][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 969.186787][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 969.186808][ T30] r4:8584e440 [ 969.187090][ T30] INFO: task kworker/0:254:6294 blocked for more than 437 seconds. [ 969.187143][ T30] Not tainted syzkaller #0 [ 969.187172][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 969.187188][ T30] task:kworker/0:254 state:D stack:0 pid:6294 tgid:6294 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 969.187248][ T30] Workqueue: events bpf_prog_free_deferred [ 969.187309][ T30] Call trace: [ 969.187338][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 969.187421][ T30] r10:ea57dd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea57dd8c r5:86071800 [ 969.187445][ T30] r4:86071800 [ 969.187463][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 969.187535][ T30] r5:86071800 r4:8291719c [ 969.187552][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 969.187612][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 969.187692][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea57de08 [ 969.187714][ T30] r4:00000000 [ 969.187745][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 969.187808][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 969.187864][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 969.187940][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3fe40 [ 969.187962][ T30] r4:00000000 [ 969.187977][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 969.188052][ T30] r9:83018405 r8:86071800 r7:00000000 r6:83018400 r5:00001000 r4:7f256000 [ 969.188072][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 969.188153][ T30] r5:00001000 r4:ea88b000 [ 969.188168][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 969.188225][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 969.188289][ T30] r5:84e79b8c r4:8582f400 [ 969.188305][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 969.188388][ T30] r7:dddcfd80 r6:83018400 r5:84e79b8c r4:8582f400 [ 969.188407][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 969.188490][ T30] r10:61c88647 r9:86071800 r8:8582f42c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 969.188515][ T30] r4:8582f400 [ 969.188533][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 969.188606][ T30] r10:00000000 r9:8582f400 r8:80278fec r7:ea55de60 r6:85c75a00 r5:86071800 [ 969.188627][ T30] r4:00000001 [ 969.188643][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 969.188695][ T30] Exception stack(0xea57dfb0 to 0xea57dff8) [ 969.188756][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 969.188798][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 969.188833][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 969.188873][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 969.188893][ T30] r4:85a865c0 [ 969.189083][ T30] INFO: task kworker/0:254:6294 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 969.189116][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 969.189191][ T30] Workqueue: events bpf_prog_free_deferred [ 969.189246][ T30] Call trace: [ 969.189270][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 969.189396][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 969.189421][ T30] r4:00000000 [ 969.189437][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 969.189501][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 969.189543][ T30] 9d20: c4a80000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 969.189584][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 969.189612][ T30] 9d60: 80000013 ffffffff [ 969.189639][ T30] r5:80000013 r4:80239c10 [ 969.189656][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 969.189724][ T30] r4:82acb1e4 [ 969.189761][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 969.189842][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 969.189869][ T30] r4:ea669dc0 [ 969.189889][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 969.189967][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 969.189992][ T30] r4:00000000 [ 969.190009][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 969.190090][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 969.190111][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 969.190186][ T30] r5:00001000 r4:dfd0b000 [ 969.190206][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 969.190268][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 969.190341][ T30] r5:84e86f8c r4:85c78380 [ 969.190363][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 969.190440][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 969.190461][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 969.190533][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 969.190551][ T30] r4:85c78380 [ 969.190566][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 969.190626][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 969.190645][ T30] r4:00000001 [ 969.190658][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 969.190701][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 969.190740][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 969.190772][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 969.190797][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 969.190828][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 969.190844][ T30] r4:8584e440 [ 969.190870][ T30] INFO: task kworker/0:255:6302 blocked for more than 437 seconds. [ 969.190903][ T30] Not tainted syzkaller #0 [ 969.190927][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 969.190939][ T30] task:kworker/0:255 state:D stack:0 pid:6302 tgid:6302 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 970.327942][ T30] Workqueue: events bpf_prog_free_deferred [ 970.328135][ T30] Call trace: [ 970.328170][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 970.328302][ T30] r10:ea6b5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6b5d8c r5:85554800 [ 970.328333][ T30] r4:85554800 [ 970.328354][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 970.328427][ T30] r5:85554800 r4:8291719c [ 970.328450][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 970.328529][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 970.328616][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6b5e08 [ 970.328643][ T30] r4:00000000 [ 970.328663][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 970.328747][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 970.328825][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 970.328905][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1f00 [ 970.328928][ T30] r4:00000000 [ 970.328945][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 970.329025][ T30] r9:83018405 r8:85554800 r7:00000000 r6:83018400 r5:00001000 r4:7f258000 [ 970.329050][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 970.329124][ T30] r5:00001000 r4:e00b2000 [ 970.329145][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 970.329213][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 970.329283][ T30] r5:84e84b8c r4:8592eb00 [ 970.329333][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 970.329423][ T30] r7:dddcfd80 r6:83018400 r5:84e84b8c r4:8592eb00 [ 970.329444][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 970.329529][ T30] r10:61c88647 r9:85554800 r8:8592eb2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 970.329555][ T30] r4:8592eb00 [ 970.329576][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 970.329661][ T30] r10:00000000 r9:8592eb00 r8:80278fec r7:ea49de60 r6:8592e580 r5:85554800 [ 970.329685][ T30] r4:00000001 [ 970.329701][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 970.329778][ T30] Exception stack(0xea6b5fb0 to 0xea6b5ff8) [ 970.329828][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 970.329874][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 970.329918][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 970.329971][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 970.329999][ T30] r4:858e9080 [ 970.330294][ T30] INFO: task kworker/0:255:6302 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 970.330345][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 970.330441][ T30] Workqueue: events bpf_prog_free_deferred [ 970.330509][ T30] Call trace: [ 970.330537][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 970.330628][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 970.330659][ T30] r4:00000000 [ 970.330679][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 970.330770][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 970.330825][ T30] 9d20: c4b0d000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 970.330881][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 970.330915][ T30] 9d60: 80000013 ffffffff [ 970.330949][ T30] r5:80000013 r4:80239c10 [ 970.330972][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 971.860161][ T30] r4:82acb1e4 [ 971.860231][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 971.860357][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 971.860382][ T30] r4:ea669dc0 [ 971.860401][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 971.860485][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 971.860509][ T30] r4:00000000 [ 971.860528][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 971.860605][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 971.860626][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 971.860698][ T30] r5:00001000 r4:dfd0b000 [ 971.860717][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 971.860779][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 971.860846][ T30] r5:84e86f8c r4:85c78380 [ 971.860865][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 971.860941][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 971.860969][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 971.884202][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 971.884278][ T30] r4:85c78380 [ 971.884300][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 971.884424][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 971.884447][ T30] r4:00000001 [ 971.884475][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 971.884534][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 971.884577][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 971.884616][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 971.884652][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 971.884693][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 971.884715][ T30] r4:8584e440 [ 971.884925][ T30] INFO: task kworker/0:256:6303 blocked for more than 440 seconds. [ 971.884981][ T30] Not tainted syzkaller #0 [ 971.885010][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 971.885027][ T30] task:kworker/0:256 state:D stack:0 pid:6303 tgid:6303 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 971.885117][ T30] Workqueue: events bpf_prog_free_deferred [ 971.885179][ T30] Call trace: [ 971.885209][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 971.885328][ T30] r10:ea6bdd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6bdd8c r5:86073000 [ 971.885354][ T30] r4:86073000 [ 971.885372][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 971.885440][ T30] r5:86073000 r4:8291719c [ 971.885468][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 971.885534][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 971.885613][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6bde08 [ 971.885637][ T30] r4:00000000 [ 971.885654][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 971.885715][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 971.885779][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 971.885852][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bacc0 [ 971.885878][ T30] r4:00000000 [ 971.885895][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 971.885972][ T30] r9:83018405 r8:86073000 r7:00000000 r6:83018400 r5:00001000 r4:7f24e000 [ 971.885994][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 971.886062][ T30] r5:00001000 r4:dfbe7000 [ 971.886080][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 971.886142][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 971.886211][ T30] r5:857ab78c r4:8592e900 [ 971.886231][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 971.886329][ T30] r7:dddcfd80 r6:83018400 r5:857ab78c r4:8592e900 [ 971.886350][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 971.886429][ T30] r10:61c88647 r9:86073000 r8:8592e92c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 971.886454][ T30] r4:8592e900 [ 971.886483][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 971.886561][ T30] r10:00000000 r9:8592e900 r8:80278fec r7:ea6b5e60 r6:85c75600 r5:86073000 [ 971.886584][ T30] r4:00000001 [ 971.886601][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 971.886653][ T30] Exception stack(0xea6bdfb0 to 0xea6bdff8) [ 971.886689][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 971.886727][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 971.886761][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 971.886800][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 971.886822][ T30] r4:85bd3e00 [ 971.887104][ T30] INFO: task kworker/0:256:6303 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 971.887147][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 971.887228][ T30] Workqueue: events bpf_prog_free_deferred [ 971.887288][ T30] Call trace: [ 971.887317][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 971.887399][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 971.887423][ T30] r4:00000000 [ 971.887439][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 971.887510][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 971.887555][ T30] 9d20: c5fd9000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 971.887596][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 971.887624][ T30] 9d60: 80000013 ffffffff [ 971.887652][ T30] r5:80000013 r4:80239c10 [ 971.887669][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 971.887737][ T30] r4:82acb1e4 [ 971.887757][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 971.887831][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 971.887854][ T30] r4:ea669dc0 [ 971.887870][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 971.887942][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 971.887965][ T30] r4:00000000 [ 971.887981][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 971.888057][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 971.888077][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 971.888144][ T30] r5:00001000 r4:dfd0b000 [ 971.888162][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 971.888224][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 971.888293][ T30] r5:84e86f8c r4:85c78380 [ 971.888311][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 971.888385][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 971.888404][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 971.888492][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 971.888516][ T30] r4:85c78380 [ 971.888534][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 971.888614][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 971.888637][ T30] r4:00000001 [ 971.888654][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 971.888708][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 971.888744][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 971.888783][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 971.888818][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 971.888857][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 971.888881][ T30] r4:8584e440 [ 971.888910][ T30] INFO: task kworker/1:286:6306 blocked for more than 440 seconds. [ 971.888946][ T30] Not tainted syzkaller #0 [ 971.888972][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 971.888989][ T30] task:kworker/1:286 state:D stack:0 pid:6306 tgid:6306 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 971.889050][ T30] Workqueue: events bpf_prog_free_deferred [ 971.889101][ T30] Call trace: [ 971.889130][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 971.889209][ T30] r10:ea6a5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6a5d8c r5:85553c00 [ 971.889233][ T30] r4:85553c00 [ 971.889250][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 971.889346][ T30] r5:85553c00 r4:8291719c [ 971.889364][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 971.889426][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 971.889516][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6a5e08 [ 971.889541][ T30] r4:00000000 [ 971.889558][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 971.889617][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 971.889676][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 971.889751][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b3c40 [ 971.889776][ T30] r4:00000000 [ 971.889792][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 971.889864][ T30] r9:83018605 r8:85553c00 r7:00000000 r6:83018600 r5:00001000 r4:7f278000 [ 971.889884][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 971.889949][ T30] r5:00001000 r4:ead53000 [ 971.889968][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 971.890029][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 971.890098][ T30] r5:84fc1f8c r4:85c75700 [ 971.890116][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 971.890191][ T30] r7:ddde3d80 r6:83018600 r5:84fc1f8c r4:85c75700 [ 971.890210][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 971.890289][ T30] r10:61c88647 r9:85553c00 r8:85c7572c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 971.890312][ T30] r4:85c75700 [ 971.890330][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 971.890406][ T30] r10:00000000 r9:85c75700 r8:80278fec r7:eb92de60 r6:8592ee00 r5:85553c00 [ 971.890430][ T30] r4:00000001 [ 971.890446][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 971.890512][ T30] Exception stack(0xea6a5fb0 to 0xea6a5ff8) [ 971.890548][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 971.890586][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 971.890620][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 971.890659][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 971.890683][ T30] r4:85a91c80 [ 971.890870][ T30] INFO: task kworker/1:286:6306 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 971.905331][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 973.740336][ T30] Workqueue: events bpf_prog_free_deferred [ 973.740456][ T30] Call trace: [ 973.740506][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 973.740625][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 973.740656][ T30] r4:00000000 [ 973.740677][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 973.740748][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 973.740803][ T30] 9d20: c5fdb000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 973.740855][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 973.740893][ T30] 9d60: 80000013 ffffffff [ 973.740927][ T30] r5:80000013 r4:80239c10 [ 973.740948][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 973.782080][ T30] r4:82acb1e4 [ 973.782152][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 973.782287][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 973.782315][ T30] r4:ea669dc0 [ 973.782335][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 973.782420][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 973.782447][ T30] r4:00000000 [ 973.782478][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 973.782567][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 973.782593][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 973.782674][ T30] r5:00001000 r4:dfd0b000 [ 973.782695][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 973.782765][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 973.782843][ T30] r5:84e86f8c r4:85c78380 [ 973.782865][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 973.782954][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 973.782976][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 973.783066][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 973.783093][ T30] r4:85c78380 [ 973.783112][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 973.783201][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 973.783229][ T30] r4:00000001 [ 973.783247][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 973.783308][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 973.783353][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 973.783401][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 973.783442][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 973.783502][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 973.783528][ T30] r4:8584e440 [ 973.783777][ T30] INFO: task kworker/1:288:6311 blocked for more than 441 seconds. [ 973.783828][ T30] Not tainted syzkaller #0 [ 973.783859][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 973.783880][ T30] task:kworker/1:288 state:D stack:0 pid:6311 tgid:6311 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 973.783969][ T30] Workqueue: events bpf_prog_free_deferred [ 973.784030][ T30] Call trace: [ 973.784063][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 973.784154][ T30] r10:ea6c5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6c5d8c r5:85556c00 [ 973.784177][ T30] r4:85556c00 [ 973.784194][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 973.784255][ T30] r5:85556c00 r4:8291719c [ 973.784272][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 973.784333][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 973.784413][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6c5e08 [ 973.784440][ T30] r4:00000000 [ 973.784459][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 973.784529][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 973.784585][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 973.784656][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:830b6080 [ 973.784677][ T30] r4:00000000 [ 973.784693][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 973.784771][ T30] r9:83018605 r8:85556c00 r7:00000000 r6:83018600 r5:00001000 r4:7f26e000 [ 973.784792][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 973.784861][ T30] r5:00001000 r4:eab01000 [ 973.784881][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 973.784944][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 973.785017][ T30] r5:84aab38c r4:85c75c80 [ 973.785033][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 973.785107][ T30] r7:ddde3d80 r6:83018600 r5:84aab38c r4:85c75c80 [ 973.785126][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 973.785212][ T30] r10:61c88647 r9:85556c00 r8:85c75cac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 973.785234][ T30] r4:85c75c80 [ 973.785251][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 973.785357][ T30] r10:00000000 r9:85c75c80 r8:80278fec r7:eb92de60 r6:85ec6480 r5:85556c00 [ 973.785386][ T30] r4:00000001 [ 973.785405][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 973.785460][ T30] Exception stack(0xea6c5fb0 to 0xea6c5ff8) [ 973.785500][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 973.785699][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 973.785763][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 973.797324][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 976.835405][ T30] r4:84fd9e40 [ 976.835745][ T30] INFO: task kworker/1:288:6311 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 976.835791][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 976.835910][ T30] Workqueue: events bpf_prog_free_deferred [ 976.836006][ T30] Call trace: [ 976.836042][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 976.836150][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 976.836177][ T30] r4:00000000 [ 976.836198][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 976.836264][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 976.836309][ T30] 9d20: c5fdc000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 976.836353][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 976.836383][ T30] 9d60: 80000013 ffffffff [ 976.836409][ T30] r5:80000013 r4:80239c10 [ 976.836426][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 976.836502][ T30] r4:82acb1e4 [ 976.836518][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 976.836590][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 976.836615][ T30] r4:ea669dc0 [ 976.836633][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 976.836712][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 976.836737][ T30] r4:00000000 [ 976.836754][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 976.836827][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 976.836848][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 976.836923][ T30] r5:00001000 r4:dfd0b000 [ 976.836939][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 976.837001][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 976.837083][ T30] r5:84e86f8c r4:85c78380 [ 976.837107][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 976.837197][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 976.837222][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 976.837346][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 976.837377][ T30] r4:85c78380 [ 976.837399][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 976.837500][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 976.837527][ T30] r4:00000001 [ 976.837548][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 976.837608][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 976.837645][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 976.837694][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 976.837737][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 976.837784][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 976.837809][ T30] r4:8584e440 [ 976.837892][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 976.838273][ T30] INFO: task kworker/1:289:6314 blocked for more than 444 seconds. [ 976.838328][ T30] Not tainted syzkaller #0 [ 976.838363][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 976.838381][ T30] task:kworker/1:289 state:D stack:0 pid:6314 tgid:6314 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 976.838470][ T30] Workqueue: events bpf_prog_free_deferred [ 976.838532][ T30] Call trace: [ 976.838564][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 976.838648][ T30] r10:ea6c9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6c9d8c r5:85553000 [ 976.838670][ T30] r4:85553000 [ 976.838689][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 976.838766][ T30] r5:85553000 r4:8291719c [ 976.838787][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 976.838852][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 976.838949][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6c9e08 [ 976.838977][ T30] r4:00000000 [ 976.838998][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 976.839059][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 976.839118][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 976.839190][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3fe00 [ 976.839219][ T30] r4:00000000 [ 976.839234][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 976.839307][ T30] r9:83018605 r8:85553000 r7:00000000 r6:83018600 r5:00001000 r4:7f268000 [ 976.839329][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 976.839407][ T30] r5:00001000 r4:ea8ed000 [ 976.839428][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 976.839504][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 976.839572][ T30] r5:84e8638c r4:85c75d80 [ 976.839590][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 976.839672][ T30] r7:ddde3d80 r6:83018600 r5:84e8638c r4:85c75d80 [ 976.839696][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 976.839789][ T30] r10:61c88647 r9:85553000 r8:85c75dac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 976.839816][ T30] r4:85c75d80 [ 976.839832][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 976.839911][ T30] r10:00000000 r9:85c75d80 r8:80278fec r7:eb92de60 r6:85ec6c00 r5:85553000 [ 976.839933][ T30] r4:00000001 [ 976.839950][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 976.839999][ T30] Exception stack(0xea6c9fb0 to 0xea6c9ff8) [ 976.840032][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 976.840072][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 976.840110][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 976.840161][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 976.840188][ T30] r4:84fd94c0 [ 976.840411][ T30] INFO: task kworker/1:289:6314 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 976.840466][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 976.840544][ T30] Workqueue: events bpf_prog_free_deferred [ 976.840601][ T30] Call trace: [ 976.840626][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 976.840713][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 976.840736][ T30] r4:00000000 [ 976.840751][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 976.840807][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 976.840848][ T30] 9d20: c5fdc000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 976.840888][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 976.840918][ T30] 9d60: 80000013 ffffffff [ 976.840952][ T30] r5:80000013 r4:80239c10 [ 976.853340][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 977.458937][ T30] r4:82acb1e4 [ 977.459015][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 977.459156][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 977.459186][ T30] r4:ea669dc0 [ 977.459207][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 977.459282][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 977.459305][ T30] r4:00000000 [ 977.459323][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 977.459412][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 977.459438][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 977.459512][ T30] r5:00001000 r4:dfd0b000 [ 977.459534][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 977.459610][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 977.459684][ T30] r5:84e86f8c r4:85c78380 [ 977.459705][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 977.459798][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 977.459817][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 977.459898][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 977.459921][ T30] r4:85c78380 [ 977.459940][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 977.460036][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 977.460064][ T30] r4:00000001 [ 977.460084][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 977.460145][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 977.460187][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 977.460228][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 977.460265][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 977.460319][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 977.460349][ T30] r4:8584e440 [ 977.460377][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 977.460454][ T30] INFO: task kworker/1:290:6315 blocked for more than 445 seconds. [ 977.460516][ T30] Not tainted syzkaller #0 [ 977.460544][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 977.460561][ T30] task:kworker/1:290 state:D stack:0 pid:6315 tgid:6315 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 977.460642][ T30] Workqueue: events bpf_prog_free_deferred [ 977.460697][ T30] Call trace: [ 977.460740][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 977.460847][ T30] r10:ea6cdd84 r9:00000002 r8:60000013 r7:829171a0 r6:ea6cdd8c r5:85550c00 [ 977.460875][ T30] r4:85550c00 [ 977.460895][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 977.460971][ T30] r5:85550c00 r4:8291719c [ 977.469890][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 979.598234][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 979.598431][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6cde08 [ 979.598460][ T30] r4:00000000 [ 979.598480][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 979.598543][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 979.598608][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 979.598675][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d43580 [ 979.598709][ T30] r4:00000000 [ 979.598727][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 979.598798][ T30] r9:83018605 r8:85550c00 r7:00000000 r6:83018600 r5:00001000 r4:7f272000 [ 979.598817][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 979.598885][ T30] r5:00001000 r4:eac55000 [ 979.598903][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 979.599056][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 979.599127][ T30] r5:85ffe78c r4:85c75b80 [ 979.599145][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 979.599288][ T30] r7:ddde3d80 r6:83018600 r5:85ffe78c r4:85c75b80 [ 979.599311][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 979.599390][ T30] r10:61c88647 r9:85550c00 r8:85c75bac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 979.599413][ T30] r4:85c75b80 [ 979.599430][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 979.599517][ T30] r10:00000000 r9:85c75b80 r8:80278fec r7:ea6c9e60 r6:85ec6400 r5:85550c00 [ 979.599541][ T30] r4:00000001 [ 979.599558][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 979.599615][ T30] Exception stack(0xea6cdfb0 to 0xea6cdff8) [ 979.599660][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 979.599710][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 979.599749][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 979.599793][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 979.599817][ T30] r4:84fd9400 [ 979.600102][ T30] INFO: task kworker/1:290:6315 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 979.600143][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 979.600300][ T30] Workqueue: events bpf_prog_free_deferred [ 979.600365][ T30] Call trace: [ 979.600396][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 979.600566][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 979.600592][ T30] r4:00000000 [ 979.600609][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 979.600671][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 979.600730][ T30] 9d20: c6106000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 979.600777][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 979.600804][ T30] 9d60: 80000013 ffffffff [ 979.600831][ T30] r5:80000013 r4:80239c10 [ 979.600849][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 979.600914][ T30] r4:82acb1e4 [ 979.600934][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 979.627782][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 979.627845][ T30] r4:ea669dc0 [ 979.627864][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 979.627966][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 979.627984][ T30] r4:00000000 [ 979.627999][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 979.628066][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 979.628082][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 979.628145][ T30] r5:00001000 r4:dfd0b000 [ 979.628160][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 979.628215][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 979.628272][ T30] r5:84e86f8c r4:85c78380 [ 979.628288][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 979.628356][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 979.628375][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 979.628443][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 979.628471][ T30] r4:85c78380 [ 979.628488][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 979.628559][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 979.628579][ T30] r4:00000001 [ 979.628594][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 979.628641][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 979.628675][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 979.628712][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 979.628740][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 979.628774][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 979.628793][ T30] r4:8584e440 [ 979.628816][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 979.628879][ T30] INFO: task kworker/1:291:6318 blocked for more than 447 seconds. [ 979.628919][ T30] Not tainted syzkaller #0 [ 979.628944][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 979.628960][ T30] task:kworker/1:291 state:D stack:0 pid:6318 tgid:6318 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 979.629035][ T30] Workqueue: events bpf_prog_free_deferred [ 979.629084][ T30] Call trace: [ 979.629112][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 979.629187][ T30] r10:ea6d1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6d1d8c r5:85552400 [ 979.629207][ T30] r4:85552400 [ 979.629222][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 979.629280][ T30] r5:85552400 r4:8291719c [ 979.629325][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 979.629395][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 979.629489][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6d1e08 [ 979.629508][ T30] r4:00000000 [ 979.629522][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 979.629574][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 979.629622][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 979.629680][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a91e80 [ 979.629702][ T30] r4:00000000 [ 979.629717][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 979.629781][ T30] r9:83018605 r8:85552400 r7:00000000 r6:83018600 r5:00001000 r4:7f26c000 [ 979.629799][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 979.629866][ T30] r5:00001000 r4:eaa55000 [ 979.629887][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 979.629943][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 979.630011][ T30] r5:84fc3f8c r4:85c75280 [ 979.630028][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 979.630092][ T30] r7:ddde3d80 r6:83018600 r5:84fc3f8c r4:85c75280 [ 979.630108][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 979.630174][ T30] r10:61c88647 r9:85552400 r8:85c752ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 979.630194][ T30] r4:85c75280 [ 979.630207][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 979.630273][ T30] r10:00000000 r9:85c75280 r8:80278fec r7:ea6c9e60 r6:85ec6980 r5:85552400 [ 979.630293][ T30] r4:00000001 [ 979.630307][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 979.630353][ T30] Exception stack(0xea6d1fb0 to 0xea6d1ff8) [ 979.630381][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 979.630410][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 979.630438][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 979.630494][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 979.630514][ T30] r4:859e0840 [ 979.630776][ T30] INFO: task kworker/1:291:6318 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 979.630819][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 979.630896][ T30] Workqueue: events bpf_prog_free_deferred [ 979.630948][ T30] Call trace: [ 979.630973][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 980.923610][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 980.923684][ T30] r4:00000000 [ 980.923708][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 980.923817][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 980.923870][ T30] 9d20: c8460000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 980.923911][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 980.923937][ T30] 9d60: 80000013 ffffffff [ 980.923965][ T30] r5:80000013 r4:80239c10 [ 980.923985][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 980.924055][ T30] r4:82acb1e4 [ 980.924075][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 980.924155][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 980.924181][ T30] r4:ea669dc0 [ 980.924200][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 980.924276][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 980.924300][ T30] r4:00000000 [ 980.924328][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 980.924405][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 980.924428][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 980.924513][ T30] r5:00001000 r4:dfd0b000 [ 980.924534][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 980.924599][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 980.924671][ T30] r5:84e86f8c r4:85c78380 [ 980.924693][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 980.924780][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 980.924803][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 980.924886][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 980.924911][ T30] r4:85c78380 [ 980.924929][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 980.925010][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 980.925034][ T30] r4:00000001 [ 980.925052][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 980.925109][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 980.925143][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 980.925183][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 980.925222][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 980.925355][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 980.925383][ T30] r4:8584e440 [ 980.925411][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 980.925495][ T30] INFO: task kworker/1:292:6319 blocked for more than 449 seconds. [ 980.925544][ T30] Not tainted syzkaller #0 [ 980.925573][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 980.925592][ T30] task:kworker/1:292 state:D stack:0 pid:6319 tgid:6319 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 980.925676][ T30] Workqueue: events bpf_prog_free_deferred [ 980.925739][ T30] Call trace: [ 980.925772][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 980.925851][ T30] r10:ea6d5d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6d5d8c r5:85550000 [ 980.925874][ T30] r4:85550000 [ 980.925888][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 980.925954][ T30] r5:85550000 r4:8291719c [ 980.925972][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 980.926037][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 980.926115][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6d5e08 [ 980.926140][ T30] r4:00000000 [ 980.926159][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 980.926217][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 980.926298][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 980.926371][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ce340 [ 980.926394][ T30] r4:00000000 [ 980.926414][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 980.926505][ T30] r9:83018605 r8:85550000 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 980.926527][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 980.926597][ T30] r5:00001000 r4:dfc76000 [ 980.926616][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 980.926679][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 980.926749][ T30] r5:857a838c r4:85c75300 [ 980.926765][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 980.926841][ T30] r7:ddde3d80 r6:83018600 r5:857a838c r4:85c75300 [ 980.926860][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 980.926937][ T30] r10:61c88647 r9:85550000 r8:85c7532c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 980.926962][ T30] r4:85c75300 [ 980.926978][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 980.927050][ T30] r10:00000000 r9:85c75300 r8:80278fec r7:ea6d1e60 r6:85ec6680 r5:85550000 [ 980.927073][ T30] r4:00000001 [ 980.927091][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 980.927143][ T30] Exception stack(0xea6d5fb0 to 0xea6d5ff8) [ 980.927175][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 980.927216][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 980.927251][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 980.927291][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 980.927313][ T30] r4:85bc20c0 [ 980.927613][ T30] INFO: task kworker/1:292:6319 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 980.927658][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 980.927740][ T30] Workqueue: events bpf_prog_free_deferred [ 980.927799][ T30] Call trace: [ 980.927827][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 980.927913][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 980.927941][ T30] r4:00000000 [ 980.927958][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 980.928017][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 980.928062][ T30] 9d20: c8460000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 980.928102][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 980.928127][ T30] 9d60: 80000013 ffffffff [ 980.928154][ T30] r5:80000013 r4:80239c10 [ 980.928172][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 980.928240][ T30] r4:82acb1e4 [ 980.928259][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 980.928327][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 980.928348][ T30] r4:ea669dc0 [ 980.928364][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 980.928438][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 980.928475][ T30] r4:00000000 [ 980.928492][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 980.928574][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 980.928595][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 980.928664][ T30] r5:00001000 r4:dfd0b000 [ 980.928682][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 980.928747][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 980.928816][ T30] r5:84e86f8c r4:85c78380 [ 980.928838][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 980.928916][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 980.928937][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 980.929014][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 980.929037][ T30] r4:85c78380 [ 980.929055][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 980.929133][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 980.929156][ T30] r4:00000001 [ 980.929175][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 980.929231][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 980.929266][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 981.600133][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 981.600247][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 981.600303][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 981.600331][ T30] r4:8584e440 [ 981.600360][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 981.600575][ T30] INFO: task kworker/1:293:6322 blocked for more than 449 seconds. [ 981.646703][ T30] Not tainted syzkaller #0 [ 981.646781][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 981.646806][ T30] task:kworker/1:293 state:D stack:0 pid:6322 tgid:6322 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 981.646911][ T30] Workqueue: events bpf_prog_free_deferred [ 981.647007][ T30] Call trace: [ 981.647041][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 981.647134][ T30] r10:ea6ddd84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6ddd8c r5:85556000 [ 981.647165][ T30] r4:85556000 [ 981.647189][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 981.647268][ T30] r5:85556000 r4:8291719c [ 981.647291][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 981.647366][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 981.647456][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6dde08 [ 981.647496][ T30] r4:00000000 [ 981.647518][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 981.647581][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 981.647650][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 981.647735][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85851b40 [ 981.647764][ T30] r4:00000000 [ 981.647786][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 981.647878][ T30] r9:83018605 r8:85556000 r7:00000000 r6:83018600 r5:00001000 r4:7f25a000 [ 981.647906][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 981.647992][ T30] r5:00001000 r4:e0115000 [ 981.648015][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 981.648078][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 981.648159][ T30] r5:84e78b8c r4:8582f800 [ 981.648184][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 981.648268][ T30] r7:ddde3d80 r6:83018600 r5:84e78b8c r4:8582f800 [ 981.648286][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 981.648371][ T30] r10:61c88647 r9:85556000 r8:8582f82c r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 981.648398][ T30] r4:8582f800 [ 981.648420][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 981.648514][ T30] r10:00000000 r9:8582f800 r8:80278fec r7:ea6d1e60 r6:85ec6300 r5:85556000 [ 981.648540][ T30] r4:00000001 [ 981.648560][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 981.648616][ T30] Exception stack(0xea6ddfb0 to 0xea6ddff8) [ 981.648649][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 981.648687][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 981.648722][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 981.648762][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 981.648782][ T30] r4:85f54d40 [ 981.649062][ T30] INFO: task kworker/1:293:6322 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 981.649113][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 981.649201][ T30] Workqueue: events bpf_prog_free_deferred [ 981.649264][ T30] Call trace: [ 981.649321][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 981.649427][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 981.649458][ T30] r4:00000000 [ 981.649490][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 981.649562][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 981.649612][ T30] 9d20: c8628000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 981.649663][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 981.649696][ T30] 9d60: 80000013 ffffffff [ 981.649727][ T30] r5:80000013 r4:80239c10 [ 981.649748][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 981.649819][ T30] r4:82acb1e4 [ 981.649840][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 981.649924][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 981.649951][ T30] r4:ea669dc0 [ 981.649966][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 981.650049][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 981.650082][ T30] r4:00000000 [ 981.650102][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 981.650192][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 981.650215][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 981.650291][ T30] r5:00001000 r4:dfd0b000 [ 981.650311][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 981.650380][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 981.650456][ T30] r5:84e86f8c r4:85c78380 [ 981.650490][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 981.650581][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 981.650607][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 981.650699][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 981.650730][ T30] r4:85c78380 [ 981.650753][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 981.650842][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 981.650869][ T30] r4:00000001 [ 981.650888][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 981.650946][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 982.999103][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 982.999218][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 982.999256][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 982.999307][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 982.999334][ T30] r4:8584e440 [ 982.999360][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 982.999435][ T30] INFO: task kworker/1:294:6325 blocked for more than 451 seconds. [ 982.999486][ T30] Not tainted syzkaller #0 [ 982.999522][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 982.999541][ T30] task:kworker/1:294 state:D stack:0 pid:6325 tgid:6325 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 982.999629][ T30] Workqueue: events bpf_prog_free_deferred [ 982.999720][ T30] Call trace: [ 982.999764][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 982.999890][ T30] r10:ea6d9d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea6d9d8c r5:86076000 [ 982.999917][ T30] r4:86076000 [ 982.999935][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 983.000004][ T30] r5:86076000 r4:8291719c [ 983.000025][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 983.000088][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 983.000169][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6d9e08 [ 983.000193][ T30] r4:00000000 [ 983.000211][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 983.000266][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 983.000345][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 983.000429][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9bb80 [ 983.000470][ T30] r4:00000000 [ 983.000505][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 983.000595][ T30] r9:83018605 r8:86076000 r7:00000000 r6:83018600 r5:00001000 r4:7f254000 [ 983.000617][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 983.000685][ T30] r5:00001000 r4:dfabb000 [ 983.000704][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 983.000780][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 983.000851][ T30] r5:857a978c r4:8582fe80 [ 983.000871][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 983.000952][ T30] r7:ddde3d80 r6:83018600 r5:857a978c r4:8582fe80 [ 983.809030][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 983.809212][ T30] r10:61c88647 r9:86076000 r8:8582feac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 983.809232][ T30] r4:8582fe80 [ 983.809246][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 983.809338][ T30] r10:00000000 r9:8582fe80 r8:80278fec r7:ea6dde60 r6:8582f080 r5:86076000 [ 983.809360][ T30] r4:00000001 [ 983.809373][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 983.809417][ T30] Exception stack(0xea6d9fb0 to 0xea6d9ff8) [ 983.809450][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 983.809483][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 983.809511][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 983.809545][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 983.809561][ T30] r4:85f54d40 [ 983.809853][ T30] INFO: task kworker/1:294:6325 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 983.809884][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 983.809969][ T30] Workqueue: events bpf_prog_free_deferred [ 983.810021][ T30] Call trace: [ 983.810045][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 983.810114][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 983.810131][ T30] r4:00000000 [ 983.810145][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 983.810190][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 983.810223][ T30] 9d20: ca730000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 983.810255][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 983.810275][ T30] 9d60: 80000013 ffffffff [ 983.810296][ T30] r5:80000013 r4:80239c10 [ 983.810310][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 983.810362][ T30] r4:82acb1e4 [ 983.810376][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 983.810433][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 983.810450][ T30] r4:ea669dc0 [ 983.810463][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 983.810520][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 983.810536][ T30] r4:00000000 [ 983.810549][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 983.810607][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000 [ 983.810622][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 983.810671][ T30] r5:00001000 r4:dfd0b000 [ 983.810685][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 983.810740][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 983.810797][ T30] r5:84e86f8c r4:85c78380 [ 983.810811][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 983.810873][ T30] r7:ddde3d80 r6:83018600 r5:84e86f8c r4:85c78380 [ 983.810887][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 983.810949][ T30] r10:61c88647 r9:85bebc00 r8:85c783ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 983.821331][ T30] r4:85c78380 [ 985.270495][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 985.270683][ T30] r10:00000000 r9:85c78380 r8:80278fec r7:ea629e60 r6:85c78d00 r5:85bebc00 [ 985.270703][ T30] r4:00000001 [ 985.270717][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 985.270760][ T30] Exception stack(0xea669fb0 to 0xea669ff8) [ 985.270793][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 985.270824][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 985.270850][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 985.270882][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 985.270899][ T30] r4:8584e440 [ 985.270918][ T30] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 986.248934][ T30] INFO: task kworker/0:258:6334 blocked for more than 454 seconds. [ 986.249083][ T30] Not tainted syzkaller #0 [ 986.249116][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 986.249138][ T30] task:kworker/0:258 state:D stack:0 pid:6334 tgid:6334 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 986.249250][ T30] Workqueue: events bpf_prog_free_deferred [ 987.617108][ T30] Call trace: [ 987.617166][ T30] [<81a6441c>] (__schedule) from [<81a653b0>] (schedule+0x2c/0x130) [ 987.617322][ T30] r10:ea6e5d84 r9:00000002 r8:600e0113 r7:829171a0 r6:ea6e5d8c r5:855bbc00 [ 987.617348][ T30] r4:855bbc00 [ 987.617365][ T30] [<81a65384>] (schedule) from [<81a65798>] (schedule_preempt_disabled+0x18/0x24) [ 987.617426][ T30] r5:855bbc00 r4:8291719c [ 987.617441][ T30] [<81a65780>] (schedule_preempt_disabled) from [<81a68348>] (__mutex_lock.constprop.0+0x350/0xa24) [ 987.617505][ T30] [<81a67ff8>] (__mutex_lock.constprop.0) from [<81a68af0>] (__mutex_lock_slowpath+0x14/0x18) [ 987.617573][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea6e5e08 [ 987.617591][ T30] r4:00000000 [ 987.617606][ T30] [<81a68adc>] (__mutex_lock_slowpath) from [<81a68b30>] (mutex_lock+0x3c/0x40) [ 987.617657][ T30] [<81a68af4>] (mutex_lock) from [<804ea37c>] (_vm_unmap_aliases+0x68/0x240) [ 987.617718][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 987.617785][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cb65c0 [ 987.617804][ T30] r4:00000000 [ 987.617820][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 987.617889][ T30] r9:83018405 r8:855bbc00 r7:00000000 r6:83018400 r5:00001000 r4:7f252000 [ 987.617908][ T30] [<80559058>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 987.617976][ T30] r5:00001000 r4:df9ef000 [ 987.617995][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 987.618051][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 987.618110][ T30] r5:857a938c r4:85d2cd00 [ 987.618125][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 987.618190][ T30] r7:dddcfd80 r6:83018400 r5:857a938c r4:85d2cd00 [ 987.618208][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 987.618277][ T30] r10:61c88647 r9:855bbc00 r8:85d2cd2c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 987.618297][ T30] r4:85d2cd00 [ 987.618312][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 987.618378][ T30] r10:00000000 r9:85d2cd00 r8:80278fec r7:ea6a1e60 r6:85d2c080 r5:855bbc00 [ 987.618400][ T30] r4:00000001 [ 987.618415][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 987.618473][ T30] Exception stack(0xea6e5fb0 to 0xea6e5ff8) [ 987.618510][ T30] 5fa0: 00000000 00000000 00000000 00000000 [ 987.618548][ T30] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 987.618579][ T30] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 987.618613][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 987.618632][ T30] r4:85ab0b40 [ 987.618913][ T30] INFO: task kworker/0:258:6334 is blocked on a mutex likely owned by task kworker/1:282:6189. [ 987.618955][ T30] task:kworker/1:282 state:R running task stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 987.619039][ T30] Workqueue: events bpf_prog_free_deferred [ 987.619089][ T30] Call trace: [ 987.619115][ T30] [<81a6441c>] (__schedule) from [<81a657e4>] (preempt_schedule_irq+0x40/0xa8) [ 987.619189][ T30] r10:8280c9b4 r9:85bebc00 r8:80200c04 r7:ea669d54 r6:ffffffff r5:85bebc00 [ 987.619212][ T30] r4:00000000 [ 987.619227][ T30] [<81a657a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 987.619283][ T30] Exception stack(0xea669d20 to 0xea669d68) [ 987.619327][ T30] 9d20: cb4b4000 ec0c1000 00000001 80239bf8 7f00d000 00000001 82acb1c4 82aca5a0 [ 987.619366][ T30] 9d40: 7f00d000 ec0c1000 8280c9b4 ea669d9c ea669da0 ea669d70 80230af0 80239c10 [ 987.619395][ T30] 9d60: 80000013 ffffffff [ 987.619422][ T30] r5:80000013 r4:80239c10 [ 987.619438][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804ea140>] (__purge_vmap_area_lazy+0x284/0x458) [ 987.619513][ T30] r4:82acb1e4 [ 987.619529][ T30] [<804e9ebc>] (__purge_vmap_area_lazy) from [<804ea4f8>] (_vm_unmap_aliases+0x1e4/0x240) [ 987.619592][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea669dc0 r5:ea669e08 [ 987.619612][ T30] r4:ea669dc0 [ 987.619627][ T30] [<804ea314>] (_vm_unmap_aliases) from [<804ee15c>] (vfree+0x16c/0x210) [ 987.619694][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d7f40 [ 987.619719][ T30] r4:00000000 [ 987.619733][ T30] [<804edff0>] (vfree) from [<80559088>] (execmem_free+0x30/0x50) [ 987.619802][ T30] r9:83018605 r8:85bebc00 r7:00000000 r6:83018600 r5:00001000 r4:7f250000