Warning: Permanently added '10.128.1.48' (ED25519) to the list of known hosts.
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 71.495804][ T4372] ------------[ cut here ]------------
[ 71.501784][ T4372] WARNING: CPU: 0 PID: 4372 at kernel/trace/bpf_trace.c:1797 bpf_get_stack_raw_tp+0x1d3/0x220
[ 71.512282][ T4372] Modules linked in:
[ 71.516271][ T4372] CPU: 0 PID: 4372 Comm: syz-executor142 Not tainted 6.1.115-syzkaller #0
[ 71.524863][ T4372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 71.535346][ T4372] RIP: 0010:bpf_get_stack_raw_tp+0x1d3/0x220
[ 71.541366][ T4372] Code: f1 45 31 c0 e8 7e b9 17 00 65 ff 0d 37 5b 6e 7e 4c 63 e8 4c 89 e8 48 83 c4 18 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 bd ae f5 ff <0f> 0b 65 ff 0d 14 5b 6e 7e 49 c7 c5 f0 ff ff ff eb d7 e8 a6 ae f5
[ 71.561057][ T4372] RSP: 0018:ffffc90003c2e610 EFLAGS: 00010293
[ 71.567200][ T4372] RAX: ffffffff8194e493 RBX: 0000000000000003 RCX: ffff88807e6f3b80
[ 71.575291][ T4372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000fffffffc
[ 71.583316][ T4372] RBP: ffffc90003c2e650 R08: ffffffff8194e353 R09: fffffbfff224604d
[ 71.591357][ T4372] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90003c2e668
[ 71.599406][ T4372] R13: 0000000000000000 R14: 0000000000000900 R15: ffff8880b8e33db8
[ 71.607449][ T4372] FS: 0000555565be9380(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000
[ 71.616510][ T4372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 71.623093][ T4372] CR2: 0000000000000000 CR3: 000000007434e000 CR4: 00000000003506f0
[ 71.631155][ T4372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 71.639222][ T4372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 71.647280][ T4372] Call Trace:
[ 71.650590][ T4372]
[ 71.653520][ T4372] ? __warn+0x15a/0x520
[ 71.657729][ T4372] ? bpf_get_stack_raw_tp+0x1d3/0x220
[ 71.663137][ T4372] ? report_bug+0x2af/0x500
[ 71.668141][ T4372] ? bpf_get_stack_raw_tp+0x1d3/0x220
[ 71.673573][ T4372] ? handle_bug+0x3d/0x70
[ 71.677957][ T4372] ? exc_invalid_op+0x16/0x40
[ 71.682660][ T4372] ? asm_exc_invalid_op+0x16/0x20
[ 71.687761][ T4372] ? bpf_get_stack_raw_tp+0x93/0x220
[ 71.693085][ T4372] ? bpf_get_stack_raw_tp+0x1d3/0x220
[ 71.698619][ T4372] ? bpf_get_stack_raw_tp+0x1d3/0x220
[ 71.704028][ T4372] ? strscpy+0x89/0x220
[ 71.708279][ T4372] bpf_prog_ec3b2eefa702d8d3+0x3a/0x3e
[ 71.713775][ T4372] ? bpf_trace_run4+0x16a/0x470
[ 71.718679][ T4372] bpf_trace_run4+0x253/0x470
[ 71.723381][ T4372] ? bpf_trace_run3+0x440/0x440
[ 71.728289][ T4372] ? get_mem_cgroup_from_mm+0x34/0x290
[ 71.733875][ T4372] ? __bpf_trace_mmap_lock+0x30/0x30
[ 71.739219][ T4372] __traceiter_mmap_lock_acquire_returned+0x8c/0xe0
[ 71.745867][ T4372] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360
[ 71.752561][ T4372] ? get_mm_memcg_path+0x370/0x370
[ 71.757800][ T4372] ? __init_rwsem+0x160/0x160
[ 71.762519][ T4372] stack_map_get_build_id_offset+0x99e/0x9c0
[ 71.768569][ T4372] ? __lock_acquire+0x125b/0x1f80
[ 71.773718][ T4372] ? __bpf_get_stackid+0x910/0x910
[ 71.778905][ T4372] __bpf_get_stack+0x495/0x570
[ 71.783707][ T4372] ? stack_map_get_build_id_offset+0x9c0/0x9c0
[ 71.789924][ T4372] ? lockdep_hardirqs_on+0x94/0x130
[ 71.795180][ T4372] ? __cant_sleep+0x270/0x270
[ 71.799869][ T4372] bpf_get_stack_raw_tp+0x1b2/0x220
[ 71.805145][ T4372] bpf_prog_ec3b2eefa702d8d3+0x3a/0x3e
[ 71.810643][ T4372] ? bpf_trace_run4+0x16a/0x470
[ 71.815576][ T4372] bpf_trace_run4+0x253/0x470
[ 71.820291][ T4372] ? bpf_trace_run3+0x440/0x440
[ 71.825222][ T4372] ? get_mem_cgroup_from_mm+0x34/0x290
[ 71.830716][ T4372] ? __bpf_trace_mmap_lock+0x30/0x30
[ 71.836072][ T4372] __traceiter_mmap_lock_acquire_returned+0x8c/0xe0
[ 71.842688][ T4372] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360
[ 71.849423][ T4372] ? get_mm_memcg_path+0x370/0x370
[ 71.854605][ T4372] ? __init_rwsem+0x160/0x160
[ 71.859312][ T4372] stack_map_get_build_id_offset+0x99e/0x9c0
[ 71.866074][ T4372] ? __lock_acquire+0x125b/0x1f80
[ 71.871155][ T4372] ? __bpf_get_stackid+0x910/0x910
[ 71.876340][ T4372] __bpf_get_stack+0x495/0x570
[ 71.881156][ T4372] ? stack_map_get_build_id_offset+0x9c0/0x9c0
[ 71.887373][ T4372] ? lockdep_hardirqs_on+0x94/0x130
[ 71.892602][ T4372] ? __cant_sleep+0x270/0x270
[ 71.897358][ T4372] bpf_get_stack_raw_tp+0x1b2/0x220
[ 71.902587][ T4372] ? bpf_trace_run4+0x16a/0x470
[ 71.907501][ T4372] ? bpf_trace_run4+0x253/0x470
[ 71.912388][ T4372] ? bpf_trace_run3+0x440/0x440
[ 71.917297][ T4372] ? get_mem_cgroup_from_mm+0x34/0x290
[ 71.922825][ T4372] ? __bpf_trace_mmap_lock+0x30/0x30
[ 71.928176][ T4372] ? __traceiter_mmap_lock_acquire_returned+0x8c/0xe0
[ 71.935021][ T4372] ? __mmap_lock_do_trace_acquire_returned+0x2c0/0x360
[ 71.941908][ T4372] ? get_mm_memcg_path+0x370/0x370
[ 71.947124][ T4372] ? __init_rwsem+0x160/0x160
[ 71.951840][ T4372] ? stack_map_get_build_id_offset+0x99e/0x9c0
[ 71.958408][ T4372] ? __lock_acquire+0x125b/0x1f80
[ 71.963465][ T4372] ? __bpf_get_stackid+0x910/0x910
[ 71.968646][ T4372] ? __bpf_get_stack+0x495/0x570
[ 71.973617][ T4372] ? stack_map_get_build_id_offset+0x9c0/0x9c0
[ 71.979826][ T4372] ? lockdep_hardirqs_on+0x94/0x130
[ 71.985117][ T4372] ? __cant_sleep+0x270/0x270
[ 71.989814][ T4372] ? bpf_get_stack_raw_tp+0x1b2/0x220
[ 71.995292][ T4372] ? bpf_trace_run4+0x16a/0x470
[ 72.000361][ T4372] ? bpf_trace_run4+0x253/0x470
[ 72.005270][ T4372] ? bpf_trace_run3+0x440/0x440
[ 72.010238][ T4372] ? get_mem_cgroup_from_mm+0x34/0x290
[ 72.015756][ T4372] ? __bpf_trace_mmap_lock+0x30/0x30
[ 72.021062][ T4372] ? __traceiter_mmap_lock_acquire_returned+0x8c/0xe0
[ 72.027903][ T4372] ? __mmap_lock_do_trace_acquire_returned+0x2c0/0x360
[ 72.034814][ T4372] ? get_mm_memcg_path+0x370/0x370
[ 72.039958][ T4372] ? __init_rwsem+0x160/0x160
[ 72.044695][ T4372] ? print_irqtrace_events+0x210/0x210
[ 72.050195][ T4372] ? lock_mm_and_find_vma+0x219/0x2e0
[ 72.055645][ T4372] ? exc_page_fault+0x169/0x620
[ 72.060530][ T4372] ? __might_sleep+0xb0/0xb0
[ 72.065301][ T4372] ? asm_exc_page_fault+0x22/0x30
[ 72.070372][ T4372] ? __check_object_size+0x73/0xa30
[ 72.075637][ T4372] ? strncpy_from_user+0x131/0x360
[ 72.080861][ T4372] ? strncpy_from_user+0x159/0x360
[ 72.086038][ T4372] ? strncpy_from_user+0x131/0x360
[ 72.091180][ T4372] ? bpf_prog_load+0x188/0x1bb0
[ 72.096102][ T4372] ? map_freeze+0x390/0x390
[ 72.100643][ T4372] ? __might_fault+0xa1/0x110
[ 72.105387][ T4372] ? __might_fault+0xbd/0x110
[ 72.110090][ T4372] ? bpf_lsm_bpf+0x5/0x10
[ 72.114481][ T4372] ? security_bpf+0x7d/0xa0
[ 72.119014][ T4372] ? __sys_bpf+0x382/0x6c0
[ 72.123437][ T4372] ? bpf_link_show_fdinfo+0x2d0/0x2d0
[ 72.128878][ T4372] ? print_irqtrace_events+0x210/0x210
[ 72.134413][ T4372] ? print_irqtrace_events+0x210/0x210
[ 72.139894][ T4372] ? syscall_enter_from_user_mode+0x2e/0x230
[ 72.146021][ T4372] ? lockdep_hardirqs_on+0x94/0x130
[ 72.151267][ T4372] ? __x64_sys_bpf+0x78/0x90
[ 72.155918][ T4372] ? do_syscall_64+0x3b/0xb0
[ 72.160544][ T4372] ? clear_bhb_loop+0x45/0xa0
[ 72.165279][ T4372] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 72.171387][ T4372]
[ 72.174461][ T4372] Kernel panic - not syncing: kernel: panic_on_warn set ...
[ 72.181752][ T4372] CPU: 0 PID: 4372 Comm: syz-executor142 Not tainted 6.1.115-syzkaller #0
[ 72.190257][ T4372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 72.200311][ T4372] Call Trace:
[ 72.203591][ T4372]
[ 72.206521][ T4372] dump_stack_lvl+0x1e3/0x2cb
[ 72.211206][ T4372] ? nf_tcp_handle_invalid+0x642/0x642
[ 72.216688][ T4372] ? panic+0x764/0x764
[ 72.220767][ T4372] ? vscnprintf+0x59/0x80
[ 72.225104][ T4372] panic+0x318/0x764
[ 72.229002][ T4372] ? __warn+0x169/0x520
[ 72.233165][ T4372] ? memcpy_page_flushcache+0xfc/0xfc
[ 72.238556][ T4372] __warn+0x348/0x520
[ 72.242539][ T4372] ? bpf_get_stack_raw_tp+0x1d3/0x220
[ 72.247918][ T4372] report_bug+0x2af/0x500
[ 72.252247][ T4372] ? bpf_get_stack_raw_tp+0x1d3/0x220
[ 72.257645][ T4372] handle_bug+0x3d/0x70
[ 72.261802][ T4372] exc_invalid_op+0x16/0x40
[ 72.266310][ T4372] asm_exc_invalid_op+0x16/0x20
[ 72.271177][ T4372] RIP: 0010:bpf_get_stack_raw_tp+0x1d3/0x220
[ 72.277165][ T4372] Code: f1 45 31 c0 e8 7e b9 17 00 65 ff 0d 37 5b 6e 7e 4c 63 e8 4c 89 e8 48 83 c4 18 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 bd ae f5 ff <0f> 0b 65 ff 0d 14 5b 6e 7e 49 c7 c5 f0 ff ff ff eb d7 e8 a6 ae f5
[ 72.296785][ T4372] RSP: 0018:ffffc90003c2e610 EFLAGS: 00010293
[ 72.302854][ T4372] RAX: ffffffff8194e493 RBX: 0000000000000003 RCX: ffff88807e6f3b80
[ 72.310827][ T4372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000fffffffc
[ 72.318796][ T4372] RBP: ffffc90003c2e650 R08: ffffffff8194e353 R09: fffffbfff224604d
[ 72.326768][ T4372] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90003c2e668
[ 72.334739][ T4372] R13: 0000000000000000 R14: 0000000000000900 R15: ffff8880b8e33db8
[ 72.342717][ T4372] ? bpf_get_stack_raw_tp+0x93/0x220
[ 72.348004][ T4372] ? bpf_get_stack_raw_tp+0x1d3/0x220
[ 72.353388][ T4372] ? strscpy+0x89/0x220
[ 72.357553][ T4372] bpf_prog_ec3b2eefa702d8d3+0x3a/0x3e
[ 72.363015][ T4372] ? bpf_trace_run4+0x16a/0x470
[ 72.367871][ T4372] bpf_trace_run4+0x253/0x470
[ 72.372553][ T4372] ? bpf_trace_run3+0x440/0x440
[ 72.377411][ T4372] ? get_mem_cgroup_from_mm+0x34/0x290
[ 72.382904][ T4372] ? __bpf_trace_mmap_lock+0x30/0x30
[ 72.388201][ T4372] __traceiter_mmap_lock_acquire_returned+0x8c/0xe0
[ 72.394804][ T4372] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360
[ 72.401490][ T4372] ? get_mm_memcg_path+0x370/0x370
[ 72.406630][ T4372] ? __init_rwsem+0x160/0x160
[ 72.411344][ T4372] stack_map_get_build_id_offset+0x99e/0x9c0
[ 72.417359][ T4372] ? __lock_acquire+0x125b/0x1f80
[ 72.422407][ T4372] ? __bpf_get_stackid+0x910/0x910
[ 72.427536][ T4372] __bpf_get_stack+0x495/0x570
[ 72.432313][ T4372] ? stack_map_get_build_id_offset+0x9c0/0x9c0
[ 72.438476][ T4372] ? lockdep_hardirqs_on+0x94/0x130
[ 72.443694][ T4372] ? __cant_sleep+0x270/0x270
[ 72.448378][ T4372] bpf_get_stack_raw_tp+0x1b2/0x220
[ 72.453594][ T4372] bpf_prog_ec3b2eefa702d8d3+0x3a/0x3e
[ 72.459057][ T4372] ? bpf_trace_run4+0x16a/0x470
[ 72.463913][ T4372] bpf_trace_run4+0x253/0x470
[ 72.468596][ T4372] ? bpf_trace_run3+0x440/0x440
[ 72.473463][ T4372] ? get_mem_cgroup_from_mm+0x34/0x290
[ 72.478936][ T4372] ? __bpf_trace_mmap_lock+0x30/0x30
[ 72.484227][ T4372] __traceiter_mmap_lock_acquire_returned+0x8c/0xe0
[ 72.490822][ T4372] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360
[ 72.497507][ T4372] ? get_mm_memcg_path+0x370/0x370
[ 72.502645][ T4372] ? __init_rwsem+0x160/0x160
[ 72.507370][ T4372] stack_map_get_build_id_offset+0x99e/0x9c0
[ 72.513382][ T4372] ? __lock_acquire+0x125b/0x1f80
[ 72.518420][ T4372] ? __bpf_get_stackid+0x910/0x910
[ 72.523547][ T4372] __bpf_get_stack+0x495/0x570
[ 72.528326][ T4372] ? stack_map_get_build_id_offset+0x9c0/0x9c0
[ 72.534492][ T4372] ? lockdep_hardirqs_on+0x94/0x130
[ 72.539702][ T4372] ? __cant_sleep+0x270/0x270
[ 72.544388][ T4372] bpf_get_stack_raw_tp+0x1b2/0x220
[ 72.549608][ T4372] ? bpf_trace_run4+0x16a/0x470
[ 72.554459][ T4372] ? bpf_trace_run4+0x253/0x470
[ 72.559314][ T4372] ? bpf_trace_run3+0x440/0x440
[ 72.564172][ T4372] ? get_mem_cgroup_from_mm+0x34/0x290
[ 72.569641][ T4372] ? __bpf_trace_mmap_lock+0x30/0x30
[ 72.574927][ T4372] ? __traceiter_mmap_lock_acquire_returned+0x8c/0xe0
[ 72.581698][ T4372] ? __mmap_lock_do_trace_acquire_returned+0x2c0/0x360
[ 72.588637][ T4372] ? get_mm_memcg_path+0x370/0x370
[ 72.593770][ T4372] ? __init_rwsem+0x160/0x160
[ 72.598485][ T4372] ? stack_map_get_build_id_offset+0x99e/0x9c0
[ 72.604741][ T4372] ? __lock_acquire+0x125b/0x1f80
[ 72.609777][ T4372] ? __bpf_get_stackid+0x910/0x910
[ 72.614912][ T4372] ? __bpf_get_stack+0x495/0x570
[ 72.619864][ T4372] ? stack_map_get_build_id_offset+0x9c0/0x9c0
[ 72.626129][ T4372] ? lockdep_hardirqs_on+0x94/0x130
[ 72.631334][ T4372] ? __cant_sleep+0x270/0x270
[ 72.636039][ T4372] ? bpf_get_stack_raw_tp+0x1b2/0x220
[ 72.641420][ T4372] ? bpf_trace_run4+0x16a/0x470
[ 72.646273][ T4372] ? bpf_trace_run4+0x253/0x470
[ 72.651131][ T4372] ? bpf_trace_run3+0x440/0x440
[ 72.655998][ T4372] ? get_mem_cgroup_from_mm+0x34/0x290
[ 72.661468][ T4372] ? __bpf_trace_mmap_lock+0x30/0x30
[ 72.666759][ T4372] ? __traceiter_mmap_lock_acquire_returned+0x8c/0xe0
[ 72.673527][ T4372] ? __mmap_lock_do_trace_acquire_returned+0x2c0/0x360
[ 72.680383][ T4372] ? get_mm_memcg_path+0x370/0x370
[ 72.685521][ T4372] ? __init_rwsem+0x160/0x160
[ 72.690205][ T4372] ? print_irqtrace_events+0x210/0x210
[ 72.695684][ T4372] ? lock_mm_and_find_vma+0x219/0x2e0
[ 72.701092][ T4372] ? exc_page_fault+0x169/0x620
[ 72.705966][ T4372] ? __might_sleep+0xb0/0xb0
[ 72.710578][ T4372] ? asm_exc_page_fault+0x22/0x30
[ 72.715630][ T4372] ? __check_object_size+0x73/0xa30
[ 72.721013][ T4372] ? strncpy_from_user+0x131/0x360
[ 72.726137][ T4372] ? strncpy_from_user+0x159/0x360
[ 72.731257][ T4372] ? strncpy_from_user+0x131/0x360
[ 72.736381][ T4372] ? bpf_prog_load+0x188/0x1bb0
[ 72.741267][ T4372] ? map_freeze+0x390/0x390
[ 72.745872][ T4372] ? __might_fault+0xa1/0x110
[ 72.750601][ T4372] ? __might_fault+0xbd/0x110
[ 72.755287][ T4372] ? bpf_lsm_bpf+0x5/0x10
[ 72.759636][ T4372] ? security_bpf+0x7d/0xa0
[ 72.764163][ T4372] ? __sys_bpf+0x382/0x6c0
[ 72.768593][ T4372] ? bpf_link_show_fdinfo+0x2d0/0x2d0
[ 72.773991][ T4372] ? print_irqtrace_events+0x210/0x210
[ 72.779466][ T4372] ? print_irqtrace_events+0x210/0x210
[ 72.784939][ T4372] ? syscall_enter_from_user_mode+0x2e/0x230
[ 72.790926][ T4372] ? lockdep_hardirqs_on+0x94/0x130
[ 72.796144][ T4372] ? __x64_sys_bpf+0x78/0x90
[ 72.800751][ T4372] ? do_syscall_64+0x3b/0xb0
[ 72.805344][ T4372] ? clear_bhb_loop+0x45/0xa0
[ 72.810025][ T4372] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 72.816122][ T4372]
[ 72.819689][ T4372] Kernel Offset: disabled
[ 72.824077][ T4372] Rebooting in 86400 seconds..