Warning: Permanently added '10.128.0.100' (ED25519) to the list of known hosts. 2024/04/25 23:07:31 fuzzer started 2024/04/25 23:07:31 dialing manager at 10.128.0.163:30005 [ 21.911160][ T30] audit: type=1400 audit(1714086451.251:66): avc: denied { node_bind } for pid=284 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.931421][ T30] audit: type=1400 audit(1714086451.251:67): avc: denied { name_bind } for pid=284 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 21.955809][ T30] audit: type=1400 audit(1714086451.301:68): avc: denied { integrity } for pid=293 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 21.959387][ T293] cgroup: Unknown subsys name 'net' [ 21.977887][ T30] audit: type=1400 audit(1714086451.301:69): avc: denied { mounton } for pid=293 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.005369][ T30] audit: type=1400 audit(1714086451.301:70): avc: denied { mount } for pid=293 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.005566][ T293] cgroup: Unknown subsys name 'devices' [ 22.032558][ T30] audit: type=1400 audit(1714086451.331:71): avc: denied { unmount } for pid=293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.134664][ T293] cgroup: Unknown subsys name 'hugetlb' [ 22.140108][ T293] cgroup: Unknown subsys name 'rlimit' [ 22.354836][ T30] audit: type=1400 audit(1714086451.701:72): avc: denied { mounton } for pid=293 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.379364][ T30] audit: type=1400 audit(1714086451.701:73): avc: denied { mount } for pid=293 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.402378][ T30] audit: type=1400 audit(1714086451.701:74): avc: denied { setattr } for pid=293 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.435916][ T294] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.444696][ T30] audit: type=1400 audit(1714086451.801:75): avc: denied { relabelto } for pid=294 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.470897][ T293] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/04/25 23:07:31 code coverage: enabled 2024/04/25 23:07:31 comparison tracing: enabled 2024/04/25 23:07:31 extra coverage: enabled 2024/04/25 23:07:31 delay kcov mmap: mmap returned an invalid pointer 2024/04/25 23:07:31 setuid sandbox: enabled 2024/04/25 23:07:31 namespace sandbox: enabled 2024/04/25 23:07:31 Android sandbox: enabled 2024/04/25 23:07:31 fault injection: enabled 2024/04/25 23:07:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/04/25 23:07:31 net packet injection: enabled 2024/04/25 23:07:31 net device setup: enabled 2024/04/25 23:07:31 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2024/04/25 23:07:31 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/04/25 23:07:31 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/04/25 23:07:31 USB emulation: enabled 2024/04/25 23:07:31 hci packet injection: /dev/vhci does not exist 2024/04/25 23:07:31 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/04/25 23:07:31 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2024/04/25 23:07:31 swap file: enabled 2024/04/25 23:07:32 starting 5 executor processes [ 22.835851][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.842704][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.850204][ T303] device bridge_slave_0 entered promiscuous mode [ 22.857851][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.864748][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.871852][ T303] device bridge_slave_1 entered promiscuous mode [ 22.974627][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.981480][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.988811][ T304] device bridge_slave_0 entered promiscuous mode [ 23.000702][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.007648][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.014710][ T305] device bridge_slave_0 entered promiscuous mode [ 23.021100][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.027995][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.035064][ T304] device bridge_slave_1 entered promiscuous mode [ 23.049527][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.056412][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.063581][ T305] device bridge_slave_1 entered promiscuous mode [ 23.081453][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.088335][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.095584][ T307] device bridge_slave_0 entered promiscuous mode [ 23.112844][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.119726][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.127044][ T307] device bridge_slave_1 entered promiscuous mode [ 23.152019][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.158884][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.184522][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.191369][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.198770][ T306] device bridge_slave_0 entered promiscuous mode [ 23.205618][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.212450][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.219821][ T306] device bridge_slave_1 entered promiscuous mode [ 23.332370][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.339252][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.346353][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.353301][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.370100][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.376981][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.384177][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.390945][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.407139][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.414088][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.421302][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.428079][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.437187][ T61] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.444708][ T61] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.451621][ T61] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.458823][ T61] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.465853][ T61] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.473067][ T61] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.480017][ T61] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.487451][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.494699][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.524059][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.532099][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.540671][ T61] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.547549][ T61] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.554721][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.562714][ T61] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.569558][ T61] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.576742][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.584729][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.624598][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.632814][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.640239][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.649029][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.657138][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.664065][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.671214][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.679344][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.686266][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.693566][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.701342][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.709152][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.717069][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.723906][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.731035][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.739004][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.745839][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.763200][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.771020][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.779362][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.786209][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.793507][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.801495][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.809060][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.816205][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.836530][ T303] device veth0_vlan entered promiscuous mode [ 23.843977][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.851729][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.859017][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.866601][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.874539][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.882054][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.890230][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.898249][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.905116][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.912279][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.920255][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.927183][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.934391][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.942149][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.954036][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.962625][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.970457][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.978125][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.986723][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.994094][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.001236][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.009123][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.023126][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.031134][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.039478][ T305] device veth0_vlan entered promiscuous mode [ 24.059662][ T306] device veth0_vlan entered promiscuous mode [ 24.070116][ T303] device veth1_macvtap entered promiscuous mode [ 24.077447][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.085630][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.093873][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.102154][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.110510][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.118590][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.126721][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.134370][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.142129][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.149856][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.157642][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.165576][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.173653][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.182875][ T304] device veth0_vlan entered promiscuous mode [ 24.189485][ T307] device veth0_vlan entered promiscuous mode [ 24.196117][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.203504][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.210648][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.217991][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.225473][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.233175][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.241098][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.248602][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.260330][ T306] device veth1_macvtap entered promiscuous mode [ 24.268948][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.285290][ T305] device veth1_macvtap entered promiscuous mode [ 24.297785][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.305909][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.314298][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.322451][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.330740][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.339354][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.347422][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.354816][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.362806][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.370928][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.378928][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_journal_start\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='ext4_fc_track_range\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={r3}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x3, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x11, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@generic={0x0, r8}, 0x18) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r11}, 0x10) write$cgroup_type(r10, &(0x7f0000000180), 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="0e000000000000000000000008000000189100002e5abc7a585cbfcb0500000069d87f5381ffd78b7c8d24ba0fe966be4a57e9322541c46eb311febb61aa38c4a062d56275d199efce50c2c64502eb350727c3e366437c35d75e98caadff037a569e835f03e641dcb37544133a41747831e839a87028881ef202f9bfef5ea5a1aa73109a19d561b7385b606cf8edb0419cd69b0fef110d8c98dd568fb964fa4de4cde6487efdbe25e9c8f46b27d5ab039700f2acb06578f2392e0e8b537722670ad680c41712f12f97abc676cdd0904c6849b2f428e04c75f97404c6", @ANYRES32=r12, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x3, 0x8, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 24.390741][ T304] device veth1_macvtap entered promiscuous mode [ 24.397475][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.405830][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.414019][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.432386][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.445074][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.458079][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.466641][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.475123][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.483409][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.492760][ T307] device veth1_macvtap entered promiscuous mode [ 24.511455][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.519751][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.528161][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.537071][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)=@generic={0x0, r1}, 0x18) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000009c0)="ec663189d3348bf13f872a468352b72482b5b2b364a29c6f0f2c4e741bf6457d1418455e157253231681a3889f39b3da6b60dbe404cb9a145d0d49cfd1668a32b96ff302975748993a8a534144d211c681ff3d91ffa436d40b9afe648ec8bde2f7553fb5d3f3b8423873903abd024284bfd01511c149b6101851f7aae4675df76e7d32d7b91659e4adcc14ddfff8a2b49d1393de72b9d970ee7f45a755c1d9f7b4d43e37e17d6eaff5fe352d507eb0424ab937980ae8fae8a9062b651a53b6543733e259ee3083a308a78ac50f0972629b74e6aadefedf2352d024d8f27d4bc8703493b08bbe75e34ee5796d0d275cae3d3c0eba179e145feee0c8acc98af7888a374dbe705e058fc565e40677890a39e6999ae47202a9237803e9eee30f368725ca8571a8f6a8ba396905f4f023a60acb644bab6b0b8964aa514c37f23509c685648d6adb0e230aca690c91e664bc49fa30ae42a2c71abc7517181d4157ef996628b3624f367519970366acca85d399e2c7703930e2abd4bdbac076230ad16368ccb350357d57626ea47a15f0fa16bd5efa8233fa3ea1183da730204a455a673c783c10a26411c5de816699f7af3401b9f38592a4cd9f3f0b7de18cd69f831eee87a3d2edb64ecf517d201f32f86b80fcd3287330f286465260370527e6116df0651001405563622e14af715f6c3dd10e1986e3b95ebf618ff42bdd7a74f0d0cc2cc8dab1048eb5fdbfb72cb16f9e2a196b512720cbfbb4696f291200a153c383cc441091c62649a88ef173a42eced93a374e4f0a078244e56c14b3c4cc9625b3e9e1853839ecb00d6cfc2d2398634935aedd9a545e4b13895a3b8b05c8fca9af2bba82762db85a449f5d9c6ff87b724f19dc1805eca58445e67782a30f03e7b1272685ab8306c255604360b0d6e53cc443b0b81bcf92b470b8734b7b7b2ccf2d51fc1a8b43d8dba290e875f35b0bdb66790a3bb4d8391c5fdde5f461b5922c56f8a858865c0fd8b39cb79e8e182342ef0398641ca3c76620482705878ff0d9fe2eaae18a8ad73313663e36feca9bae81834482bb19c651e273bc04333963f2a64d516761280db45fc4217b5c2ab73a8a04c5d2c2aced37bb2825d17f68c4d65dfcc54057a46f045bf435391b7304ee376977220e71e97919cd67e3f0f0f63e0dcee8d90d80ead12a5eda22db217bd362c1a4f9244c99da91d618c6b71b21ed80826d4df95aee10786e61b3141002e342490f2d842051305d2e8d41aca580a13cd48a850eada7dfee4bda67a5491acf4cfdd3919135e7b113a1973595b99d6ba152ae8cc63fd95c1d7d4a59b038c426ffdb949fe1a6004df2bbae2acce3f5720419dc597229f2d120c689b07a344e75f4c631d83b3130cc927412daa9607c8c0fa254cde27306360a9a5d18ff9d4d4ed38162a5202ba214db4486887b5831d727bd93e6e7cddfa4d3480cb3b4683b1de52bdff534016719324051f81bdf49a5c12dd7b389107b3eb5dc4858caebe8c0a9866ff632deebc16492f95d202ce0f454476ab77871d3188ec83fc74f2ec1055893b2a138cce27ac5553c5496cbf147002a9c55fdb202969a4802ca3556453a58d2aa8e19f40e577fa280625468d385af8659a0f3ab69fabf4fa1326f7a7ebad98a23958c91f28c4b03ff9f343b6ecdb82e820bcb7de6f51d0fcfbbcef902d21a7eed03ea125363b758085022ade27451ba5e0acd9a0044ec50571d234855448be132e14517ae38b798482cc07e1c009c1a4cdd5c42f3862dd6d4c3b18f9c41d0bf5b709d742877ef7ee6d9932c6d7a9fd09bede9f80645a5c4b97ae48734985131f948bf20e93f82b93d6e69479491158d83655244d91bb5e9dfdf103e2238a95a92f35750769b87dce1d0e8bac4e6ee5467f9800a12fe27a2c8f727bbda617899ca26d13ec3b68b4acd7200b3206852aafb13c94681413ee7d0987f4d067b4bc5fc5e01ebe9bdbfc0198232f92da3371d12023388f86a4bb4db9bd559570aef27a96812dd2583c72732922266b98c89c264311577621ceb2625dac0af0fd08f5c27a658645777cb36d687d6f0e6835587cbe65ed922cbd1190b1d60259024be61e7e32b1ecb5e72799103c3a3ea91191667418fedf79d839200ee75da4d68fd6facdd1243f30727c40c6a7c4ffa3d937f4c21b076d146f439d8961258526d56336f7d94e945f90053ef865dd9f939b12d8b6b72b1f20a050b69b8a3b8bc88584766bf9783116c8fc8c4883f8dca31dbfd2775675d868136e5f5e16e3508986750fa8825231fed43ae2b444f5992011f0b80b1f3b0e397ff98fe81da3bd00593329f3014315fb4828fdfec77c8f3c8a92278866f7d299f9a0818e36d1bbad629a61345e01e495dfc4412fcc8b64eac5259de21dae5f5b34c06ee81c0e46b12203b639cfef7f12871287abca6b2f70ffa2cb225585bfbf2c0cd010bdd1b2b3f560016e4db6c30a26e517b608633aa40ab1802da8e94188bad14ab007e415ec41c3dabf4d2817a43a082313529e4a80596807b785af9391117f780db637f2214bb8082373303da889ffd89fa43f4cca427b43e3c17942d314a577112cfb31e841ae40fd18220e9aaa24e382936c0b859a3a425c2018b093e42648b7517dcce9af1366dc5ea8fd575001cbe880ddbb0a768033ee3802c68c4b2fc290fcb84f1e33318543fd2ddf065503c0767c86fcde6931797f275ee4c149d616ff02a9a019c223c16cfd6e618b07c7bd8009d3201a92b91a0944ff21d71ffc53c39b7a318c6451d80b05f9d9c81fd1a78ef35e14cbebc1b4e2de28039301042c0fa09ad2e43d5f78ab4104218bab2da5034050bbf625c6803496dd3d77b574aed51badd3e9967548014b8b318dfb2e0a6ce6637cee786806ec06b359d6569c65df2e538b43862be27d4ddb2710447ed7e56cb4a02779c8767e11056cfaca1ab1aea20d4198a050e98695ae3f2a0aadb5b34b6b945379b81259ebe7abe6d3ca23cae048429b6c850813706f59231034fce07c4111961193d581e3bbbd6c9afd8b3d1e0604807dbd880d2ccc5266818a18287e8c4bda311be83c6f1c5e7f571b9f5ab1f84f8252df9d62f75865adcdd61eaaf7df4cbdd994ab17d2d5d684f95715d4636a6cb69fa2619c6b76ee060202a0a8c934aa537d2c5cf736142349b19fb9b532b05e6dff05c4c635f4134bcc0ef2e38c3fd75d8664d7dfa3139e1b2c2cbbdbe4fc0e2e80870ade368b730d4c06946b608088991f346765afaad6765e5a16267b2d249ee22ea1c6cb85d5d0f8ee48204a5dc48ae6415e3802fd8a431d249f95c72f6895978b36c424e40f83dfe1d0ca01dca14c4a308e926fe726ea0b456dcd976147e61744675f81f38bd5ef06ed76692ac8ac03744c8dc313f06aa28832a3286e626d5e29c748c21164475c739d3f6c6ad046fbb1a149867faf770c089b3513a0649d787208f06e7db6f8a44a9e32c6bd8dd9cca53bcd8ba7ec49d4068d7018b4c8fbd13070f9b0d02d3686b54f96a21e74e346c380a99f21f33925d4a39d510842ed84f2605a15051a784d8216364c2f8ec79f7884ec151ac56d11e30e058d2c49998147c1d54e04aea5d2e9bcc5bf051690d7aa905fdd68528309afda3fd5920cecfae73f6d5f8962e647f5e909748ff9105097118feecf28d6d514ede8cb2d4201da6efc9f3c24893570b227dfe673158e6c17bfcd91625bc4f87eb6fc67e5b647b18231d", 0xa53}], 0x1}, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000007740)={0x0, 0x0, 0x0}, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) (async) recvmsg(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000009c0)=""/244, 0xf4}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) syz_clone(0x660694c0, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_evict_inode\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='ext4_evict_inode\x00', r3}, 0x10) unlink(&(0x7f0000000000)='./cgroup\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000a50000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r7}, 0x10) write$cgroup_type(r5, &(0x7f0000000000), 0x9) [ 24.545621][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.576344][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\xff\xd3r\xa3\xc81U\x8ez.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcd\x01t\r=\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="00000000000000b7080000004000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000950000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001000)={&(0x7f0000001040)='ext4_mballoc_prealloc\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r5}, 0xd) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r7}, 0x10) syz_clone(0x17061500, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_es_remove_extent\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/44, 0x2c}], 0x1}, 0x0) r6 = openat$cgroup_int(r1, &(0x7f0000001180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000940)={&(0x7f0000000740)=@abs, 0x6e, &(0x7f00000008c0), 0x0, &(0x7f0000000900)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x10040) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='-', @ANYRESDEC], 0x27) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180100006ca6946e000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='ext4_es_remove_extent\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a25, 0x1700) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r11}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000200000000000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000540)={r10, &(0x7f0000000380)="c1985d536050570b7748c5209db368d7675238dc4d59e598d4757b24dc2734dbb9fdd3b3d5a49d24373ff23b79b7c182cf0bbf693e8608957b66d1f5ceeea51b6b527d16939e85d88f9a9c081da87b0469257ece59821e3408992a", &(0x7f00000004c0)=""/86}, 0x20) r12 = gettid() perf_event_open(&(0x7f00000006c0)={0x3, 0x80, 0x4, 0x7, 0xa0, 0x3f, 0x0, 0xfff, 0x4, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={&(0x7f00000005c0), 0x6}, 0x400, 0x5, 0x2, 0x0, 0x6, 0x1000, 0x7, 0x0, 0x3, 0x0, 0xda6}, r12, 0xf, r9, 0x0) [ 24.589223][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.598342][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.607454][ T61] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.708667][ T335] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100000000200000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x40fd) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x3, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_allocate_blocks\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) [ 155.122169][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz-executor.4:358] [ 155.130539][ C1] Modules linked in: [ 155.134288][ C1] CPU: 1 PID: 358 Comm: syz-executor.4 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 155.144255][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 155.154149][ C1] RIP: 0010:smp_call_function_many_cond+0x843/0x9b0 [ 155.160563][ C1] Code: 45 8b 7d 00 44 89 fe 83 e6 01 31 ff e8 76 a8 0a 00 41 83 e7 01 49 bf 00 00 00 00 00 fc ff df 75 07 e8 b1 a4 0a 00 eb 38 f3 90 <42> 0f b6 04 3b 84 c0 75 11 41 f7 45 00 01 00 00 00 74 1e e8 95 a4 [ 155.180870][ C1] RSP: 0018:ffffc90005437200 EFLAGS: 00000246 [ 155.186770][ C1] RAX: ffffffff8165819b RBX: 1ffff1103ee07971 RCX: 0000000000040000 [ 155.194581][ C1] RDX: ffffc90000b49000 RSI: 000000000003ffff RDI: 0000000000040000 [ 155.202394][ C1] RBP: ffffc90005437308 R08: ffffffff8165816a R09: ffffc90005437140 [ 155.210206][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 155.218025][ C1] R13: ffff8881f703cb88 R14: ffff8881f7138280 R15: dffffc0000000000 [ 155.225829][ C1] FS: 00007fee57e976c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 155.234595][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 155.241023][ C1] CR2: 0000000000000000 CR3: 00000001288a2000 CR4: 00000000003506a0 [ 155.248837][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 155.256647][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 155.264538][ C1] Call Trace: [ 155.267672][ C1] [ 155.270354][ C1] ? show_regs+0x58/0x60 [ 155.274434][ C1] ? watchdog_timer_fn+0x4b1/0x5f0 [ 155.279383][ C1] ? proc_watchdog_cpumask+0xd0/0xd0 [ 155.284499][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 155.289709][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 155.294664][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 155.300559][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 155.305508][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 155.311492][ C1] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 155.317135][ C1] [ 155.319914][ C1] [ 155.323450][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 155.329419][ C1] ? smp_call_function_many_cond+0x82a/0x9b0 [ 155.335324][ C1] ? smp_call_function_many_cond+0x85b/0x9b0 [ 155.341135][ C1] ? smp_call_function_many_cond+0x843/0x9b0 [ 155.346977][ C1] ? flush_tlb_all+0x30/0x30 [ 155.351385][ C1] ? smp_call_function_many+0x40/0x40 [ 155.356584][ C1] ? __kasan_check_write+0x14/0x20 [ 155.361535][ C1] ? _raw_spin_lock+0xa4/0x1b0 [ 155.366131][ C1] ? flush_tlb_all+0x30/0x30 [ 155.370557][ C1] on_each_cpu_cond_mask+0x40/0x80 [ 155.375508][ C1] flush_tlb_kernel_range+0x49/0x210 [ 155.380627][ C1] __purge_vmap_area_lazy+0x230/0x1690 [ 155.385927][ C1] ? cpumask_next+0x8a/0xb0 [ 155.390263][ C1] ? purge_fragmented_blocks_allcpus+0x80b/0x920 [ 155.396424][ C1] ? purge_fragmented_blocks_allcpus+0x89b/0x920 [ 155.402850][ C1] ? mutex_lock+0xb6/0x1e0 [ 155.407098][ C1] ? purge_fragmented_blocks_allcpus+0x920/0x920 [ 155.413261][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 155.417863][ C1] _vm_unmap_aliases+0x339/0x3b0 [ 155.422635][ C1] vm_unmap_aliases+0x19/0x20 [ 155.427148][ C1] change_page_attr_set_clr+0x308/0x1050 [ 155.432618][ C1] ? debug_smp_processor_id+0x17/0x20 [ 155.437867][ C1] ? get_random_u32+0x368/0x660 [ 155.442512][ C1] ? __set_memory_prot+0x100/0x100 [ 155.447458][ C1] ? get_random_u64+0x5c0/0x5c0 [ 155.452143][ C1] ? __kmalloc+0x13a/0x270 [ 155.456395][ C1] ? __vmalloc_node_range+0x2d6/0x8d0 [ 155.461604][ C1] ? is_vmalloc_or_module_addr+0xd/0x50 [ 155.466985][ C1] ? __kasan_unpoison_vmalloc+0x6a/0x90 [ 155.472375][ C1] ? emit_insn_suffix+0xdb/0x350 [ 155.477141][ C1] ? __kasan_check_write+0x14/0x20 [ 155.482177][ C1] ? _raw_spin_lock+0xa4/0x1b0 [ 155.486774][ C1] set_memory_ro+0xa1/0xe0 [ 155.491027][ C1] ? set_memory_nx+0x130/0x130 [ 155.495628][ C1] ? bpf_int_jit_compile+0x611c/0xc6d0 [ 155.501007][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 155.505694][ C1] bpf_int_jit_compile+0xbf42/0xc6d0 [ 155.510906][ C1] ? emit_bpf_dispatcher+0xd90/0xd90 [ 155.516026][ C1] bpf_prog_select_runtime+0x706/0x9e0 [ 155.521428][ C1] ? memset+0x35/0x40 [ 155.525245][ C1] ? bpf_obj_name_cpy+0x196/0x1e0 [ 155.530104][ C1] bpf_prog_load+0x1315/0x1b50 [ 155.534706][ C1] ? map_freeze+0x370/0x370 [ 155.539047][ C1] ? selinux_bpf+0xcb/0x100 [ 155.543393][ C1] ? security_bpf+0x82/0xb0 [ 155.547728][ C1] __sys_bpf+0x4bc/0x760 [ 155.551808][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 155.557014][ C1] ? __kasan_check_read+0x11/0x20 [ 155.561873][ C1] __x64_sys_bpf+0x7c/0x90 [ 155.566125][ C1] do_syscall_64+0x3d/0xb0 [ 155.570386][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 155.576424][ C1] RIP: 0033:0x7fee59123ea9 [ 155.580685][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 155.600117][ C1] RSP: 002b:00007fee57e970c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 155.608557][ C1] RAX: ffffffffffffffda RBX: 00007fee59251f80 RCX: 00007fee59123ea9 [ 155.616367][ C1] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 155.624179][ C1] RBP: 00007fee591704a4 R08: 0000000000000000 R09: 0000000000000000 [ 155.631991][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 155.639802][ C1] R13: 000000000000000b R14: 00007fee59251f80 R15: 00007fffe8593d88 [ 155.647720][ C1] [ 155.650652][ C1] Sending NMI from CPU 1 to CPUs 0: [ 155.655746][ C0] NMI backtrace for cpu 0 [ 155.655757][ C0] CPU: 0 PID: 285 Comm: syz-fuzzer Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 155.655776][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 155.655786][ C0] RIP: 0010:kvm_wait+0x117/0x180 [ 155.655810][ C0] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d 8a 03 f3 03 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 155.655824][ C0] RSP: 0018:ffffc900000079a0 EFLAGS: 00000046 [ 155.655839][ C0] RAX: 0000000000000003 RBX: 1ffff92000000f38 RCX: ffffffff8154fa7f [ 155.655852][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88811067bd40 [ 155.655864][ C0] RBP: ffffc90000007a50 R08: dffffc0000000000 R09: ffffed10220cf7a9 [ 155.655877][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 155.655889][ C0] R13: ffff88811067bd40 R14: 0000000000000003 R15: 1ffff92000000f3c [ 155.655902][ C0] FS: 000000c00005a090(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 155.655917][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 155.655930][ C0] CR2: 00007fee59253988 CR3: 00000001207a9000 CR4: 00000000003506b0 [ 155.655946][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 155.655956][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 155.655967][ C0] Call Trace: [ 155.655973][ C0] [ 155.655979][ C0] ? show_regs+0x58/0x60 [ 155.656015][ C0] ? nmi_cpu_backtrace+0x29f/0x300 [ 155.656057][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 155.656099][ C0] ? kvm_wait+0x117/0x180 [ 155.656115][ C0] ? kvm_wait+0x117/0x180 [ 155.656130][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 155.656149][ C0] ? nmi_handle+0xa8/0x280 [ 155.656167][ C0] ? kvm_wait+0x117/0x180 [ 155.656183][ C0] ? default_do_nmi+0x69/0x160 [ 155.656201][ C0] ? exc_nmi+0xaf/0x120 [ 155.656218][ C0] ? end_repeat_nmi+0x16/0x31 [ 155.656235][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 155.656257][ C0] ? kvm_wait+0x117/0x180 [ 155.656272][ C0] ? kvm_wait+0x117/0x180 [ 155.656289][ C0] ? kvm_wait+0x117/0x180 [ 155.656304][ C0] [ 155.656309][ C0] [ 155.656314][ C0] ? trace_raw_output_bpf_trace_printk+0xd0/0xd0 [ 155.656336][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 155.656354][ C0] ? pv_hash+0x86/0x150 [ 155.656372][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 155.656394][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 155.656416][ C0] _raw_spin_lock_irqsave+0x1a0/0x210 [ 155.656437][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 155.656457][ C0] ? sched_group_set_idle+0x640/0x640 [ 155.656476][ C0] ? sched_clock_cpu+0x18/0x3b0 [ 155.656494][ C0] do_send_sig_info+0x7e/0x230 [ 155.656513][ C0] group_send_sig_info+0x113/0x460 [ 155.656530][ C0] ? __kasan_check_read+0x11/0x20 [ 155.656549][ C0] ? __lock_task_sighand+0x100/0x100 [ 155.656568][ C0] do_bpf_send_signal+0x8c/0x150 [ 155.656594][ C0] irq_work_run_list+0x1c2/0x290 [ 155.656614][ C0] ? irq_work_run+0xf0/0xf0 [ 155.656633][ C0] irq_work_run+0x69/0xf0 [ 155.656650][ C0] __sysvec_irq_work+0x63/0x1b0 [ 155.656670][ C0] sysvec_irq_work+0x41/0xb0 [ 155.656686][ C0] asm_sysvec_irq_work+0x1b/0x20 [ 155.656702][ C0] RIP: 0010:__do_softirq+0x10e/0x5bf [ 155.656719][ C0] Code: a0 21 28 85 e8 83 ed c2 ff 65 66 c7 05 09 63 03 7b 00 00 48 c7 c7 a0 21 28 85 e8 6d ed c2 ff 65 89 1d ee 70 02 7b fb 89 5d b8 ff ff ff ff 0f bc 45 b8 41 89 c4 41 ff c4 0f 85 c5 00 00 00 48 [ 155.656733][ C0] RSP: 0018:ffffc90000007f70 EFLAGS: 00000286 [ 155.656746][ C0] RAX: 0000000000000000 RBX: 0000000000000200 RCX: ffff8881208a62c0 [ 155.656757][ C0] RDX: 1ffffffff0e52000 RSI: ffffffff852821a0 RDI: ffffffff85830520 [ 155.656770][ C0] RBP: ffffc90000007fe8 R08: ffffffff87290000 R09: ffffffff87290008 [ 155.656783][ C0] R10: ffffffff87290018 R11: ffffffff87290010 R12: ffff8881208a62c0 [ 155.656796][ C0] R13: ffff888128849d00 R14: 0000000000400040 R15: dffffc0000000000 [ 155.656815][ C0] do_softirq+0xf6/0x150 [ 155.656834][ C0] [ 155.656838][ C0] [ 155.656844][ C0] ? __local_bh_enable_ip+0x80/0x80 [ 155.656861][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 155.656880][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 155.656899][ C0] ? bpf_send_signal_common+0x2ba/0x420 [ 155.656920][ C0] __local_bh_enable_ip+0x75/0x80 [ 155.656938][ C0] _raw_spin_unlock_bh+0x51/0x60 [ 155.656957][ C0] sock_map_delete_elem+0xcb/0x130 [ 155.656977][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x794 [ 155.656991][ C0] bpf_trace_run3+0x11e/0x250 [ 155.657010][ C0] ? bpf_trace_run2+0x210/0x210 [ 155.657028][ C0] ? __dequeue_signal+0x4f8/0x600 [ 155.657045][ C0] ? debug_smp_processor_id+0x17/0x20 [ 155.657064][ C0] ? kasan_quarantine_put+0x34/0x1a0 [ 155.657083][ C0] ? kmem_cache_free+0x116/0x2e0 [ 155.657107][ C0] ? __dequeue_signal+0x4f8/0x600 [ 155.657123][ C0] ? __dequeue_signal+0x4f8/0x600 [ 155.657140][ C0] __bpf_trace_kmem_cache_free+0x99/0xc0 [ 155.657158][ C0] ? __dequeue_signal+0x4f8/0x600 [ 155.657175][ C0] __traceiter_kmem_cache_free+0x32/0x50 [ 155.657192][ C0] kmem_cache_free+0x2c3/0x2e0 [ 155.657212][ C0] __dequeue_signal+0x4f8/0x600 [ 155.657231][ C0] dequeue_signal+0x10c/0x520 [ 155.657247][ C0] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 155.657266][ C0] ? unhandled_signal+0x150/0x150 [ 155.657283][ C0] ? __schedule+0xcd4/0x1590 [ 155.657301][ C0] get_signal+0x7cf/0x1630 [ 155.657322][ C0] arch_do_signal_or_restart+0xbd/0x1680 [ 155.657339][ C0] ? _copy_from_user+0x96/0xd0 [ 155.657356][ C0] ? usleep_range_state+0x160/0x160 [ 155.657375][ C0] ? hrtimer_init_sleeper+0x3b/0x1a0 [ 155.657392][ C0] ? __se_sys_nanosleep+0x2ab/0x5e0 [ 155.657408][ C0] ? get_sigframe_size+0x10/0x10 [ 155.657423][ C0] ? __se_sys_nanosleep+0x4d7/0x5e0 [ 155.657439][ C0] ? __kasan_check_write+0x14/0x20 [ 155.657460][ C0] ? fpu_flush_thread+0xf0/0xf0 [ 155.657479][ C0] exit_to_user_mode_loop+0xa0/0xe0 [ 155.657497][ C0] exit_to_user_mode_prepare+0x5a/0xa0 [ 155.657515][ C0] syscall_exit_to_user_mode+0x26/0x160 [ 155.657533][ C0] do_syscall_64+0x49/0xb0 [ 155.657550][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 155.657570][ C0] RIP: 0033:0x472757 [ 155.657583][ C0] Code: 8b 44 24 20 b9 40 42 0f 00 f7 f1 48 89 04 24 b8 e8 03 00 00 f7 e2 48 89 44 24 08 48 89 e7 be 00 00 00 00 b8 23 00 00 00 0f 05 <48> 83 c4 10 5d c3 cc cc cc b8 ba 00 00 00 0f 05 89 44 24 08 c3 cc [ 155.657596][ C0] RSP: 002b:000000c00006bf18 EFLAGS: 00000206 ORIG_RAX: 0000000000000023 [ 155.657613][ C0] RAX: 0000000000000000 RBX: 0000000000000a00 RCX: 0000000000472757 [ 155.657623][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000c00006bf18 [ 155.657634][ C0] RBP: 000000c00006bf28 R08: 00007ffd905f4080 R09: 00007ffd905f40b0 [ 155.657646][ C0] R10: 000000000000091e R11: 0000000000000206 R12: 000000c00006bf18 [ 155.657657][ C0] R13: 000000c00005b000 R14: 000000c0000064e0 R15: 000000000000000f [ 155.657672][ C0]