Warning: Permanently added '10.128.10.11' (ED25519) to the list of known hosts. 2024/05/01 17:55:19 fuzzer started 2024/05/01 17:55:19 dialing manager at 10.128.0.163:30005 [ 22.537471][ T30] audit: type=1400 audit(1714586119.502:66): avc: denied { node_bind } for pid=283 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 22.558432][ T30] audit: type=1400 audit(1714586119.502:67): avc: denied { name_bind } for pid=283 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 22.591056][ T30] audit: type=1400 audit(1714586119.562:68): avc: denied { integrity } for pid=292 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 22.595205][ T292] cgroup: Unknown subsys name 'net' [ 22.613332][ T30] audit: type=1400 audit(1714586119.562:69): avc: denied { mounton } for pid=292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.640695][ T30] audit: type=1400 audit(1714586119.562:70): avc: denied { mount } for pid=292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.640958][ T292] cgroup: Unknown subsys name 'devices' [ 22.662799][ T30] audit: type=1400 audit(1714586119.592:71): avc: denied { unmount } for pid=292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.839979][ T292] cgroup: Unknown subsys name 'hugetlb' [ 22.845505][ T292] cgroup: Unknown subsys name 'rlimit' [ 23.029687][ T30] audit: type=1400 audit(1714586120.002:72): avc: denied { mounton } for pid=292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.054277][ T30] audit: type=1400 audit(1714586120.002:73): avc: denied { mount } for pid=292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.077426][ T30] audit: type=1400 audit(1714586120.002:74): avc: denied { setattr } for pid=292 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.104309][ T294] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.113146][ T30] audit: type=1400 audit(1714586120.082:75): avc: denied { relabelto } for pid=294 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/05/01 17:55:20 code coverage: enabled 2024/05/01 17:55:20 comparison tracing: enabled 2024/05/01 17:55:20 extra coverage: enabled 2024/05/01 17:55:20 delay kcov mmap: mmap returned an invalid pointer 2024/05/01 17:55:20 setuid sandbox: enabled 2024/05/01 17:55:20 namespace sandbox: enabled 2024/05/01 17:55:20 Android sandbox: enabled 2024/05/01 17:55:20 fault injection: enabled 2024/05/01 17:55:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/05/01 17:55:20 net packet injection: enabled 2024/05/01 17:55:20 net device setup: enabled 2024/05/01 17:55:20 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2024/05/01 17:55:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/05/01 17:55:20 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/05/01 17:55:20 USB emulation: enabled 2024/05/01 17:55:20 hci packet injection: /dev/vhci does not exist 2024/05/01 17:55:20 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/05/01 17:55:20 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2024/05/01 17:55:20 swap file: enabled 2024/05/01 17:55:20 starting 5 executor processes [ 23.179269][ T292] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.702943][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.709938][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.717132][ T302] device bridge_slave_0 entered promiscuous mode [ 23.725252][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.732191][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.739425][ T302] device bridge_slave_1 entered promiscuous mode [ 23.774919][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.781843][ T303] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.789140][ T303] device bridge_slave_0 entered promiscuous mode [ 23.808831][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.815697][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.823055][ T304] device bridge_slave_0 entered promiscuous mode [ 23.829598][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.836509][ T303] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.843910][ T303] device bridge_slave_1 entered promiscuous mode [ 23.860058][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.866911][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.874449][ T304] device bridge_slave_1 entered promiscuous mode [ 23.961072][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.967993][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.975207][ T306] device bridge_slave_0 entered promiscuous mode [ 23.982208][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.989088][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.996267][ T306] device bridge_slave_1 entered promiscuous mode [ 24.050906][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.058111][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.065243][ T305] device bridge_slave_0 entered promiscuous mode [ 24.085804][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.092825][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.100043][ T305] device bridge_slave_1 entered promiscuous mode [ 24.170902][ T303] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.177763][ T303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.185011][ T303] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.191774][ T303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.210039][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.216898][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.224097][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.230872][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.241491][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.248361][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.255436][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.262607][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.321558][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.328620][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.335782][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.342585][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.358860][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.366396][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.373769][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.381181][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.388380][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.396296][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.403428][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.410524][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.417783][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.438780][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.446033][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.453489][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.461502][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.468482][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.475629][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.483672][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.490530][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.498245][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.505998][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.519768][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.528003][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.534831][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.550983][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.573390][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.581707][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.589806][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.596641][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.603926][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.611746][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.619625][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.642759][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.651270][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.659636][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.666469][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.674133][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.682110][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.690542][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.697871][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.717932][ T302] device veth0_vlan entered promiscuous mode [ 24.729649][ T304] device veth0_vlan entered promiscuous mode [ 24.738080][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.745449][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.753214][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.761038][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.769050][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.776046][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.783395][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.791364][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.799467][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.806378][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.813616][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.821377][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.829229][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.836839][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.845268][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.852761][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.868611][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.876809][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.885150][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.893251][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.906259][ T302] device veth1_macvtap entered promiscuous mode [ 24.913746][ T304] device veth1_macvtap entered promiscuous mode [ 24.926511][ T303] device veth0_vlan entered promiscuous mode [ 24.934204][ T306] device veth0_vlan entered promiscuous mode [ 24.940336][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.948080][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.956021][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.964431][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.971935][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.980138][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.988432][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.996108][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.004011][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.011877][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.037086][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.044373][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.051989][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.059273][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.066457][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.074607][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.082720][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.090808][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.099356][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.106565][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.113996][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.122054][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.130294][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.138298][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.146373][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.154518][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.162505][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.169348][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.176730][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{r0}, &(0x7f0000000b40), &(0x7f0000000b80)='%+9llu \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, 0x0, &(0x7f00000007c0)='GPL\x00', 0x0, 0xfffffffffffffd3e, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r5) [ 25.195671][ T303] device veth1_macvtap entered promiscuous mode [ 25.218373][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.226821][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.237095][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.243992][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.251888][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.260020][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.268542][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.276043][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.284367][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x48}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_freezer_state(r1, &(0x7f0000000140), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r3, &(0x7f0000000400)='FROZEN\x00', 0x7) [ 25.305605][ T306] device veth1_macvtap entered promiscuous mode [ 25.343311][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.358144][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.366242][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.374447][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.382573][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.391518][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.399828][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.408337][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.416534][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.426268][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.435144][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.443727][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.452099][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.460725][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.469102][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.483689][ T305] device veth0_vlan entered promiscuous mode [ 25.496961][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9e}]}, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x5450, 0x20001412) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000100ffff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000340)='ext4_remove_blocks\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r2}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) [ 25.506949][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.517435][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.525310][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.543446][ T333] device pim6reg1 entered promiscuous mode executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x10, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1}, 0x1d) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000100ffff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000340)='ext4_remove_blocks\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xffd, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={@ifindex, 0xffffffffffffffff, 0x26, 0x0, 0x0, @prog_id}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) [ 25.560847][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.568987][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.589510][ T305] device veth1_macvtap entered promiscuous mode executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x541200, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x2000) (async) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) close(r0) executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x8, 0xfffffff8, 0x0, 0x1}, 0x34) perf_event_open(&(0x7f00000000c0)={0x2203, 0x80, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000014c0)={&(0x7f0000001200), &(0x7f0000001340)=""/204, &(0x7f0000001240), 0x0}, 0x38) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000840)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="310a16"], 0x31) [ 25.612870][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.625392][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.652772][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='ext4_ext_handle_unwritten_extents\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000b20850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='ext4_ext_handle_unwritten_extents\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x5421, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x0, 0xc2, 0x5}}) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001680)={0x0, 0x0, 0x52}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000900), &(0x7f0000001780)=""/174}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x27}]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000200)="9e36d448b388dd965f7a3312779a", 0x0, 0x2f00, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r1, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f0000000300)=r0}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x144000, 0x7fe2, 0x1}, 0x48) socketpair(0x1d, 0xa, 0x8, &(0x7f0000000980)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r6, &(0x7f0000000040), 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907119875f37538e486dd6317ce8102032908000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x10001}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x25, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa6c, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1f}, @jmp={0x5, 0x1, 0xb, 0x6, 0x1, 0xfffffffffffffffc, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @alu={0x4, 0x0, 0x3, 0x2, 0x3, 0x80, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000380)='syzkaller\x00', 0xff, 0x9e, &(0x7f00000006c0)=""/158, 0x41100, 0x8, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f00000003c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0xf, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[r1, r1, r9, r1, r1, r1, r1, r1, r1, r1], 0x0, 0x10, 0x9}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r1, 0x0, 0x0) executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r4}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x40086607, 0x20001412) executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000110020850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) executing program 1: bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x12) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x2, 0x80, 0xc2, 0xc}}) [ 25.664852][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x6, 0x0, 0x0, 0x18000000}, {0x85, 0x0, 0x0, 0x5}, {0x4}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0x3, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='block_split\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x248800) executing program 2: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d00)={&(0x7f0000000cc0)='mm_page_alloc\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x3, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x20000002) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x14, 0x9, 0x8, 0x3, 0x2190, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x21000000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r3, @ANYRES64=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="8500000089000000350000000000002085000000080000009500000000000000f4670880271e3503200ffa95b2c8c037c5a142c9a8d76287066c51adde96fcc309926fa3b4b87b3e0cc7444a2391511c97fabd5f9810e81ae0b737136ea6f7be39cd34d5ae35de38dde54704d25c79949c00a7c09cc28d7673294f42a5f0a8761b30d64b741a226de7bad76402320e13822c45c0f8612c10b1f3c075ff1ebb755a2dd5760903000000000000006c6386d7ec7209d031f40f3012e9576e51a7f578602f5807785b92e544fc46c744aeeee4418d6af3e4195cc03710212436a4ff3274cac948d85cec074c6949e1298901ebb39522f6649dd76d067a82f5fe47fe5f17f99ab1e394ab800f4104dbffff0000000000005c6d1d224b64be6c4d7f47ef21eb7e46f9aa4a9779f8555eaea768c1f2c221c410ef4b253d110ee282ab94de93d928cf95846be6277c04b4c5324812696aa89e393c941d9541c86238d0703394a90231ccca9c3499c9a4cd3cd8a4f8070000000b1b2d2747c45b0c52087b5efabf84960ba0e3c4c00356ffebfb19a34268335648e1f822de328c10752a42dca52fb98c1452b6518a6ef7297f7b2744419a2f238f173d0cd46daf2fcb5500f53e7309ec91d83cf40ad875d9c07d8d591a4d8c60ff000000b78863e629b3b200000000000000000000000000008b00000000449c810d3174c87ee545867a3126af7a8b20744ea9875b9cba735b9594aa904e5a4bb2c3dfa8ea63e3e7000860000000004a2147c1128c697d9966b3c9f0e9e203911a3fac929a4fc6e625247510bc24e20ad88d4fe6a3ae2f7967546c4aae83352106057ab9cd4b3442a5d10451b95e22f30a85f5681ca3000000000000000000000396e7b6e1aa007018f6d93e79fce95d405b809238cca421c82c96f10dfa978bee21f581d124216e8bd9b1855f77138e438bdc037865f0db98c068be4c6155ec27365410866059475714844a3ea4cbe37e0000000000ef6dc4bd63bb928ff58b3bd2a600089d172a884dcdb8b9f9050297815a371deec596838e38068b5e438cbcd585a8cf37c496a8d2dab79d4242a353917ebdf2dc7926d80260898d4e1ca5e3a833f8f65429845bc3c3092af2bc4ee7263d3cbd9cab24eafd969a2d0c7bbfca952475c7e6158bfbb32f187d18f977117101076bad4167d5559ac12ff1473fa0ac0c0e71925a25933bfe309a040034b0cc8f69074670efc8101b89477d23823605dfa8e5945c71a0225b50d18a010ecf3c349cbac4d5191c3d78726b9ab4bff5e05027ca5b338a62e955e514da8ca2846919b7b56c192bb43f7032e485cc664921b7f9133bdbc2ba3cd86a24f18c0f2be0b5a53ad0243624566e0dacfe4029ffbe59e7e7751b3a9e619107bde39bfa81791ff0e4577055528aef46891c3c49af060037d03cf6893db7b0f1fe95f8a096159869db71853b6bb5c08ce5fc61353f1e659d7ac53f54a7e2c94cba21994930a423ac7f84ed873a76b0ddc6006748002a280264a0c03bc2a7f08290ddf300b298de3fd9167fb8b9c2f26e27f97cf5e90586ea50b85eb5b420eebe171893782b8326148ef5f5174e7e1caa699e4a241291c2f43e9edbf44c0ffb8ee3aa18b6e8f0b61836146e2eab9a767800c2c91190c96c8379e7f8f775b4cf517dc5e39be99c4ab471f381c3915203cd2f27466c8943a80ba03150699c787696de272affa4e4940e59d8b7c69f804d6d3fa7543176a4df033532e5053d72521d097dda0c7a70bd1278c61513c1b87b01"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00', r6}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r8}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1803000000000000000000000000000018010000202070250000000000202020631af8ff00000000bfa100000000000807010000f8ffffffb709000008000000b70200000000000085000000990000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000015c0)={r9, 0xe0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001300)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001340), &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x34, &(0x7f00000013c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001400), &(0x7f0000001440), 0x8, 0x90, 0x8, 0x8, &(0x7f0000001480)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000018c0)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r4, @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000500)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd63"], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r12}, &(0x7f0000000200), &(0x7f0000000400)=r5}, 0x20) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="afdc89096085b58c53142e3b05760efb03560c4de293c5c05908d6fa6aca42b01feaedc389e59dd263fee3e01f0b8cea186c434ce0a88ac5d21b076a1c021ec724d36ad62ef3a59e0dca323913383328127f86c0", @ANYRES32=r7, @ANYRES16=r5, @ANYRES64=r7, @ANYRES8, @ANYRES16=0x0, @ANYRESDEC=0x0], &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00', r13}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14], 0x0}, 0x90) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='afs_send_data\x00', r15}, 0x10) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) syz_clone(0x96000007, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40144100, 0x0, 0x8000000, 0x0, 0x0, 0x0) executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0xe}]}}, 0x0, 0x26}, 0x20) executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0], 0x0, 0xe2, &(0x7f0000000580)=[{}, {}], 0x10, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0xab, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0x1, 0xfffffffd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r1}, &(0x7f0000000700), &(0x7f0000000740)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2000, 0x0, 0x0, 0x0, 0x69, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x5d) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, 0x0, &(0x7f0000000180)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) [ 126.017875][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 126.024419][ C0] rcu: 0-...!: (1 GPs behind) idle=1d3/1/0x4000000000000000 softirq=2718/2719 fqs=0 last_accelerate: 9437/bb4c dyntick_enabled: 1 [ 126.037761][ C0] (t=10000 jiffies g=1045 q=294) [ 126.042793][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 9999 jiffies! g1045 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 126.054762][ C0] rcu: Possible timer handling issue on cpu=1 timer-softirq=361 [ 126.062368][ C0] rcu: rcu_preempt kthread starved for 10000 jiffies! g1045 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 126.073420][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 126.083227][ C0] rcu: RCU grace-period kthread stack dump: [ 126.088961][ C0] task:rcu_preempt state:I stack:28328 pid: 14 ppid: 2 flags:0x00004000 [ 126.097990][ C0] Call Trace: [ 126.101107][ C0] [ 126.103887][ C0] __schedule+0xccc/0x1590 [ 126.108137][ C0] ? __sched_text_start+0x8/0x8 [ 126.112823][ C0] ? __kasan_check_write+0x14/0x20 [ 126.117769][ C0] schedule+0x11f/0x1e0 [ 126.121765][ C0] schedule_timeout+0x18c/0x370 [ 126.126448][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 126.131483][ C0] ? console_conditional_schedule+0x30/0x30 [ 126.137213][ C0] ? update_process_times+0x200/0x200 [ 126.142428][ C0] ? prepare_to_swait_event+0x308/0x320 [ 126.147803][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 126.152573][ C0] ? debug_smp_processor_id+0x17/0x20 [ 126.157778][ C0] ? __note_gp_changes+0x4ab/0x920 [ 126.162680][ C0] ? rcu_gp_init+0xc30/0xc30 [ 126.167106][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 126.172152][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 126.176569][ C0] rcu_gp_kthread+0xa4/0x350 [ 126.180993][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 126.185852][ C0] ? rcu_barrier_callback+0x50/0x50 [ 126.190890][ C0] ? __kasan_check_read+0x11/0x20 [ 126.195748][ C0] ? __kthread_parkme+0xb2/0x200 [ 126.200522][ C0] kthread+0x421/0x510 [ 126.204513][ C0] ? rcu_barrier_callback+0x50/0x50 [ 126.209662][ C0] ? kthread_blkcg+0xd0/0xd0 [ 126.214086][ C0] ret_from_fork+0x1f/0x30 [ 126.218343][ C0] [ 126.221235][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 126.227366][ C0] Sending NMI from CPU 0 to CPUs 1: [ 126.232482][ C1] NMI backtrace for cpu 1 [ 126.232496][ C1] CPU: 1 PID: 379 Comm: syz-executor.1 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 126.232516][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 126.232531][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 126.232571][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 5b 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 126.232585][ C1] RSP: 0018:ffffc900001d0780 EFLAGS: 00000246 [ 126.232603][ C1] RAX: 0000000000000001 RBX: 1ffff9200003a0f4 RCX: 1ffffffff0d1aa9c [ 126.232616][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7137ed4 [ 126.232634][ C1] RBP: ffffc900001d0830 R08: dffffc0000000000 R09: ffffed103ee26fdb [ 126.232647][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 126.232660][ C1] R13: ffff8881f7137ed4 R14: 0000000000000001 R15: 1ffff9200003a0f8 [ 126.232672][ C1] FS: 00007f978e0b26c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 126.232688][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 126.232700][ C1] CR2: 00007ffcd41b8c68 CR3: 0000000127f5e000 CR4: 00000000003506a0 [ 126.232717][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 126.232727][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 126.232738][ C1] Call Trace: [ 126.232744][ C1] [ 126.232752][ C1] ? show_regs+0x58/0x60 [ 126.232784][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 126.232825][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 126.232846][ C1] ? kvm_wait+0x147/0x180 [ 126.232860][ C1] ? kvm_wait+0x147/0x180 [ 126.232876][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 126.232899][ C1] ? nmi_handle+0xa8/0x280 [ 126.232917][ C1] ? kvm_wait+0x147/0x180 [ 126.232933][ C1] ? default_do_nmi+0x69/0x160 [ 126.232952][ C1] ? exc_nmi+0xaf/0x120 [ 126.232969][ C1] ? end_repeat_nmi+0x16/0x31 [ 126.232993][ C1] ? kvm_wait+0x147/0x180 [ 126.233009][ C1] ? kvm_wait+0x147/0x180 [ 126.233025][ C1] ? kvm_wait+0x147/0x180 [ 126.233041][ C1] [ 126.233046][ C1] [ 126.233051][ C1] ? asm_common_interrupt+0x27/0x40 [ 126.233067][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 126.233090][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 126.233133][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 126.233155][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 126.233174][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 126.233200][ C1] sock_map_delete_elem+0x99/0x130 [ 126.233243][ C1] bpf_prog_8a405b5ced52e191+0x42/0xb04 [ 126.233258][ C1] bpf_trace_run2+0x159/0x210 [ 126.233295][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 126.233313][ C1] ? ip6_dst_destroy+0x8d/0x450 [ 126.233349][ C1] ? reweight_entity+0x7a/0x4b0 [ 126.233368][ C1] ? ip6_dst_destroy+0x8d/0x450 [ 126.233388][ C1] __bpf_trace_kfree+0x6f/0x90 [ 126.233412][ C1] ? ip6_dst_destroy+0x8d/0x450 [ 126.233430][ C1] kfree+0x1f3/0x220 [ 126.233457][ C1] ip6_dst_destroy+0x8d/0x450 [ 126.233476][ C1] ? ip6_default_advmss+0xf0/0xf0 [ 126.233496][ C1] dst_destroy+0x14f/0x330 [ 126.233526][ C1] ? dst_release+0xe0/0xe0 [ 126.233542][ C1] dst_destroy_rcu+0x19/0x20 [ 126.233559][ C1] rcu_do_batch+0x57a/0xc10 [ 126.233581][ C1] ? local_bh_enable+0x20/0x20 [ 126.233599][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 126.233618][ C1] ? __hrtimer_run_queues+0x46b/0xad0 [ 126.233635][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 126.233655][ C1] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 126.233675][ C1] ? rcu_report_qs_rnp+0x2bf/0x390 [ 126.233694][ C1] rcu_core+0x517/0x1020 [ 126.233722][ C1] ? rcu_cpu_kthread_park+0x90/0x90 [ 126.233740][ C1] ? hrtimer_interrupt+0x867/0xaa0 [ 126.233757][ C1] ? irqtime_account_irq+0x79/0x3c0 [ 126.233783][ C1] rcu_core_si+0x9/0x10 [ 126.233799][ C1] __do_softirq+0x26d/0x5bf [ 126.233817][ C1] __irq_exit_rcu+0x50/0xf0 [ 126.233843][ C1] irq_exit_rcu+0x9/0x10 [ 126.233859][ C1] sysvec_apic_timer_interrupt+0x9a/0xc0 [ 126.233965][ C1] [ 126.233973][ C1] [ 126.234006][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 126.234030][ C1] RIP: 0010:clear_page_erms+0x7/0x10 [ 126.234077][ C1] Code: 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 b9 00 10 00 00 31 c0 aa c3 cc cc cc cc cc cc 55 48 89 e5 41 57 41 56 41 55 41 54 53 [ 126.234092][ C1] RSP: 0018:ffffc900055de408 EFLAGS: 00010246 [ 126.234109][ C1] RAX: 0000000000000000 RBX: 1ffff11021c61172 RCX: 0000000000001000 [ 126.234121][ C1] RDX: 0000000000000200 RSI: 0000000000000001 RDI: ffff888128c14000 [ 126.234133][ C1] RBP: ffffc900055de438 R08: dffffc0000000000 R09: ffffed1025182800 [ 126.234146][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 126.234159][ C1] R13: 0000000000000001 R14: ffff888128c14000 R15: ffff88810e308b90 [ 126.234175][ C1] ? kernel_init_free_pages+0x71/0xf0 [ 126.234200][ C1] post_alloc_hook+0x105/0x1b0 [ 126.234219][ C1] prep_new_page+0x1b/0x110 [ 126.234237][ C1] get_page_from_freelist+0x3550/0x35d0 [ 126.234254][ C1] ? __alloc_pages+0x3cb/0x8f0 [ 126.234275][ C1] ? __kasan_check_read+0x11/0x20 [ 126.234297][ C1] ? lruvec_init+0x150/0x150 [ 126.234317][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 126.234336][ C1] ? __alloc_pages_bulk+0xe40/0xe40 [ 126.234355][ C1] ? __mod_memcg_lruvec_state+0x11c/0x1b0 [ 126.234380][ C1] __alloc_pages+0x27e/0x8f0 [ 126.234398][ C1] ? prep_new_page+0x110/0x110 [ 126.234417][ C1] ? xas_start+0x32c/0x3f0 [ 126.234435][ C1] ? xas_load+0x2b7/0x2d0 [ 126.234453][ C1] pagecache_get_page+0xb18/0xeb0 [ 126.234478][ C1] ? page_cache_prev_miss+0x410/0x410 [ 126.234497][ C1] ? unlock_page_memcg+0x146/0x160 [ 126.234516][ C1] grab_cache_page_write_begin+0x5d/0xa0 [ 126.234535][ C1] ext4_da_write_begin+0x5ae/0xc30 [ 126.234574][ C1] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 126.234594][ C1] ? do_set_pmd+0x860/0x860 [ 126.234611][ C1] ? shmem_fault+0x1ee/0x6c0 [ 126.234628][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 126.234648][ C1] ? finish_fault+0x44d/0x960 [ 126.234664][ C1] ? ktime_get_coarse_real_ts64+0x117/0x130 [ 126.234685][ C1] ? current_time+0x1af/0x2f0 [ 126.234719][ C1] generic_perform_write+0x2bc/0x5a0 [ 126.234741][ C1] ? grab_cache_page_write_begin+0xa0/0xa0 [ 126.234761][ C1] ? generic_write_checks+0x3b9/0x470 [ 126.234786][ C1] ext4_buffered_write_iter+0x48a/0x610 [ 126.234802][ C1] ext4_file_write_iter+0x443/0x1c80 [ 126.234815][ C1] ? follow_page_pte+0x4b6/0xab0 [ 126.234829][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 126.234849][ C1] ? follow_page_pte+0x9c3/0xab0 [ 126.234865][ C1] ? numa_migrate_prep+0xe0/0xe0 [ 126.234885][ C1] ? put_page_refs+0xf0/0xf0 [ 126.234901][ C1] ? ext4_file_read_iter+0x4b0/0x4b0 [ 126.234918][ C1] ? follow_page_mask+0x900/0x10e0 [ 126.234938][ C1] ? iov_iter_kvec+0x53/0x190 [ 126.234966][ C1] __kernel_write+0x5ab/0xa60 [ 126.234985][ C1] ? vfs_read+0xd40/0xd40 [ 126.235004][ C1] ? cgroup_freezing+0x88/0xb0 [ 126.235033][ C1] ? freezing_slow_path+0x141/0x190 [ 126.235058][ C1] __dump_emit+0x261/0x3a0 [ 126.235087][ C1] ? wait_for_dump_helpers+0x3b0/0x3b0 [ 126.235108][ C1] ? fault_in_readable+0x2e0/0x2e0 [ 126.235129][ C1] dump_emit+0x381/0x3f0 [ 126.235150][ C1] dump_user_range+0x86/0x1c0 [ 126.235169][ C1] elf_core_dump+0x3663/0x3e80 [ 126.235192][ C1] ? load_elf_binary+0x2750/0x2750 [ 126.235211][ C1] ? __kasan_kmalloc+0x9/0x10 [ 126.235229][ C1] ? __kmalloc+0x13a/0x270 [ 126.235249][ C1] ? kvmalloc_node+0x1f0/0x4d0 [ 126.235277][ C1] ? freezing_slow_path+0x141/0x190 [ 126.235298][ C1] do_coredump+0x1834/0x3050 [ 126.235322][ C1] ? simple_acl_create+0x2c0/0x2c0 [ 126.235344][ C1] ? kmem_cache_free+0x116/0x2e0 [ 126.235364][ C1] ? ____kasan_slab_free+0x131/0x160 [ 126.235383][ C1] ? get_signal+0xd32/0x1630 [ 126.235403][ C1] ? kmem_cache_free+0x116/0x2e0 [ 126.235424][ C1] get_signal+0x4c8/0x1630 [ 126.235447][ C1] arch_do_signal_or_restart+0xbd/0x1680 [ 126.235475][ C1] ? force_sig_fault+0x127/0x1d0 [ 126.235494][ C1] ? get_sigframe_size+0x10/0x10 [ 126.235512][ C1] ? page_fault_oops+0xa90/0xa90 [ 126.235537][ C1] exit_to_user_mode_loop+0xa0/0xe0 [ 126.235555][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 126.235573][ C1] irqentry_exit_to_user_mode+0x9/0x20 [ 126.235594][ C1] irqentry_exit+0x12/0x40 [ 126.235611][ C1] exc_page_fault+0x47a/0x830 [ 126.235636][ C1] asm_exc_page_fault+0x27/0x30 [ 126.235652][ C1] RIP: 0033:0x7f978f33eeb1 [ 126.235673][ C1] Code: c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 126.235693][ C1] RSP: 002b:0000000008000000 EFLAGS: 00010217 [ 126.235710][ C1] RAX: 0000000000000000 RBX: 00007f978f46cf80 RCX: 00007f978f33eea9 [ 126.235722][ C1] RDX: 0000000000000000 RSI: 0000000008000000 RDI: 0000000040144000 [ 126.235734][ C1] RBP: 00007f978f38b4a4 R08: 0000000000000000 R09: 0000000000000000 [ 126.235746][ C1] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 126.235757][ C1] R13: 000000000000000b R14: 00007f978f46cf80 R15: 00007fffed7dd728 [ 126.235774][ C1] [ 126.236482][ C0] NMI backtrace for cpu 0 [ 127.118652][ C0] CPU: 0 PID: 385 Comm: syz-executor.4 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 127.128639][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 127.138510][ C0] Call Trace: [ 127.141636][ C0] [ 127.144326][ C0] dump_stack_lvl+0x151/0x1b7 [ 127.148838][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 127.154306][ C0] ? ttwu_do_wakeup+0x187/0x430 [ 127.158993][ C0] dump_stack+0x15/0x17 [ 127.162983][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 127.167757][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 127.173746][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 127.179039][ C0] ? __kasan_check_write+0x14/0x20 [ 127.183987][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 127.188674][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 127.194576][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 127.200489][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 127.206380][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 127.212107][ C0] rcu_dump_cpu_stacks+0x1d8/0x330 [ 127.217061][ C0] print_cpu_stall+0x315/0x5f0 [ 127.221742][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 127.226775][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 127.232766][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 127.237803][ C0] update_process_times+0x198/0x200 [ 127.242847][ C0] tick_sched_timer+0x188/0x240 [ 127.247526][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 127.252999][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 127.258023][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 127.262975][ C0] ? clockevents_program_event+0x22f/0x300 [ 127.268615][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 127.274511][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 127.279288][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 127.285039][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 127.290539][ C0] [ 127.293257][ C0] [ 127.296035][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 127.301849][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 127.306631][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 5b 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 127.326064][ C0] RSP: 0018:ffffc900055ff2a0 EFLAGS: 00000246 [ 127.332098][ C0] RAX: 0000000000000003 RBX: 1ffff92000abfe58 RCX: ffffffff8154fa7f [ 127.339989][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88810c1d8d28 [ 127.347798][ C0] RBP: ffffc900055ff350 R08: dffffc0000000000 R09: ffffed102183b1a6 [ 127.355798][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 127.363566][ C0] R13: ffff88810c1d8d28 R14: 0000000000000003 R15: 1ffff92000abfe5c [ 127.371372][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 127.377445][ C0] ? __update_idle_core+0x2a0/0x2a0 [ 127.382479][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 127.387474][ C0] ? pv_hash+0x86/0x150 [ 127.391421][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 127.397322][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 127.403568][ C0] ? __sched_text_start+0x8/0x8 [ 127.408254][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 127.413028][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 127.418064][ C0] sock_map_delete_elem+0x99/0x130 [ 127.423013][ C0] bpf_prog_8a405b5ced52e191+0x42/0xb04 [ 127.428390][ C0] bpf_trace_run2+0x159/0x210 [ 127.432904][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 127.437590][ C0] ? try_to_wake_up+0x6ee/0x1160 [ 127.442451][ C0] ? sock_map_unref+0x352/0x4d0 [ 127.447139][ C0] ? sock_map_unref+0x352/0x4d0 [ 127.451911][ C0] __bpf_trace_kfree+0x6f/0x90 [ 127.456514][ C0] ? sock_map_unref+0x352/0x4d0 [ 127.461199][ C0] kfree+0x1f3/0x220 [ 127.464938][ C0] sock_map_unref+0x352/0x4d0 [ 127.469567][ C0] sock_map_delete_elem+0xc1/0x130 [ 127.474504][ C0] bpf_prog_8a405b5ced52e191+0x42/0xb04 [ 127.479910][ C0] bpf_trace_run2+0x159/0x210 [ 127.484399][ C0] ? context_to_sid+0x5a8/0x600 [ 127.489081][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 127.493768][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 127.499149][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 127.504553][ C0] __bpf_trace_kfree+0x6f/0x90 [ 127.509135][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 127.514513][ C0] kfree+0x1f3/0x220 [ 127.518245][ C0] ? policydb_context_isvalid+0x1de/0x430 [ 127.523798][ C0] security_compute_sid+0x1d7d/0x1f40 [ 127.529010][ C0] ? security_transition_sid+0x90/0x90 [ 127.534301][ C0] ? __mutex_lock_slowpath+0x10/0x10 [ 127.539421][ C0] ? tracepoint_add_func+0x77e/0x940 [ 127.544579][ C0] ? alloc_file_pseudo+0x280/0x2f0 [ 127.549490][ C0] ? preempt_count_add+0x92/0x1a0 [ 127.554349][ C0] ? fd_install+0x144/0x250 [ 127.558688][ C0] ? bpf_link_settle+0xc0/0x150 [ 127.563376][ C0] security_transition_sid+0x7d/0x90 [ 127.568496][ C0] selinux_socket_create+0x204/0x330 [ 127.573617][ C0] ? selinux_socket_unix_may_send+0x2f0/0x2f0 [ 127.579520][ C0] security_socket_create+0x77/0xb0 [ 127.584676][ C0] __sock_create+0xd6/0x760 [ 127.588994][ C0] __sys_socketpair+0x29f/0x6e0 [ 127.593680][ C0] ? __ia32_sys_socket+0x90/0x90 [ 127.598454][ C0] ? __bpf_trace_sys_enter+0x62/0x70 [ 127.603573][ C0] __x64_sys_socketpair+0x9b/0xb0 [ 127.608434][ C0] do_syscall_64+0x3d/0xb0 [ 127.612688][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 127.618415][ C0] RIP: 0033:0x7f32f0b6fea9 [ 127.622672][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 127.642112][ C0] RSP: 002b:00007f32ef8e30c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 127.650353][ C0] RAX: ffffffffffffffda RBX: 00007f32f0c9df80 RCX: 00007f32f0b6fea9 [ 127.658249][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 127.666062][ C0] RBP: 00007f32f0bbc4a4 R08: 0000000000000000 R09: 0000000000000000 [ 127.673873][ C0] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000000 [ 127.681685][ C0] R13: 000000000000000b R14: 00007f32f0c9df80 R15: 00007ffcd41b8a08 [ 127.689500][ C0] [ 266.165307][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 225s! [syz-executor.4:385] [ 266.173702][ C0] Modules linked in: [ 266.177373][ C0] CPU: 0 PID: 385 Comm: syz-executor.4 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 266.187611][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 266.197508][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 266.202274][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 5b 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 266.222323][ C0] RSP: 0018:ffffc900055ff2a0 EFLAGS: 00000246 [ 266.228229][ C0] RAX: 0000000000000003 RBX: 1ffff92000abfe58 RCX: ffffffff8154fa7f [ 266.236033][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88810c1d8d28 [ 266.243845][ C0] RBP: ffffc900055ff350 R08: dffffc0000000000 R09: ffffed102183b1a6 [ 266.251656][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 266.259582][ C0] R13: ffff88810c1d8d28 R14: 0000000000000003 R15: 1ffff92000abfe5c [ 266.267388][ C0] FS: 00007f32ef8e36c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 266.276154][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 266.282576][ C0] CR2: 0000001b2e723000 CR3: 000000010ddaa000 CR4: 00000000003506b0 [ 266.290561][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 266.298451][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 266.306260][ C0] Call Trace: [ 266.309386][ C0] [ 266.312080][ C0] ? show_regs+0x58/0x60 [ 266.316157][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 266.321113][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 266.326228][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 266.331431][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 266.336375][ C0] ? clockevents_program_event+0x22f/0x300 [ 266.342019][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 266.347922][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 266.352872][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 266.358773][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 266.364412][ C0] [ 266.367186][ C0] [ 266.369965][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 266.375954][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 266.382029][ C0] ? kvm_wait+0x147/0x180 [ 266.386198][ C0] ? __update_idle_core+0x2a0/0x2a0 [ 266.391232][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 266.396175][ C0] ? pv_hash+0x86/0x150 [ 266.400168][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 266.406073][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 266.412322][ C0] ? __sched_text_start+0x8/0x8 [ 266.417010][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 266.421937][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 266.426964][ C0] sock_map_delete_elem+0x99/0x130 [ 266.431904][ C0] bpf_prog_8a405b5ced52e191+0x42/0xb04 [ 266.437370][ C0] bpf_trace_run2+0x159/0x210 [ 266.441886][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 266.446570][ C0] ? try_to_wake_up+0x6ee/0x1160 [ 266.451343][ C0] ? sock_map_unref+0x352/0x4d0 [ 266.456030][ C0] ? sock_map_unref+0x352/0x4d0 [ 266.460810][ C0] __bpf_trace_kfree+0x6f/0x90 [ 266.465412][ C0] ? sock_map_unref+0x352/0x4d0 [ 266.470096][ C0] kfree+0x1f3/0x220 [ 266.473831][ C0] sock_map_unref+0x352/0x4d0 [ 266.478727][ C0] sock_map_delete_elem+0xc1/0x130 [ 266.483674][ C0] bpf_prog_8a405b5ced52e191+0x42/0xb04 [ 266.489041][ C0] bpf_trace_run2+0x159/0x210 [ 266.493555][ C0] ? context_to_sid+0x5a8/0x600 [ 266.498242][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 266.502926][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 266.508311][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 266.513689][ C0] __bpf_trace_kfree+0x6f/0x90 [ 266.518293][ C0] ? security_compute_sid+0x1d7d/0x1f40 [ 266.523673][ C0] kfree+0x1f3/0x220 [ 266.527401][ C0] ? policydb_context_isvalid+0x1de/0x430 [ 266.532960][ C0] security_compute_sid+0x1d7d/0x1f40 [ 266.538178][ C0] ? security_transition_sid+0x90/0x90 [ 266.543509][ C0] ? __mutex_lock_slowpath+0x10/0x10 [ 266.548779][ C0] ? tracepoint_add_func+0x77e/0x940 [ 266.553989][ C0] ? alloc_file_pseudo+0x280/0x2f0 [ 266.558976][ C0] ? preempt_count_add+0x92/0x1a0 [ 266.563794][ C0] ? fd_install+0x144/0x250 [ 266.568131][ C0] ? bpf_link_settle+0xc0/0x150 [ 266.572818][ C0] security_transition_sid+0x7d/0x90 [ 266.577938][ C0] selinux_socket_create+0x204/0x330 [ 266.583058][ C0] ? selinux_socket_unix_may_send+0x2f0/0x2f0 [ 266.588960][ C0] security_socket_create+0x77/0xb0 [ 266.593996][ C0] __sock_create+0xd6/0x760 [ 266.598334][ C0] __sys_socketpair+0x29f/0x6e0 [ 266.603024][ C0] ? __ia32_sys_socket+0x90/0x90 [ 266.607796][ C0] ? __bpf_trace_sys_enter+0x62/0x70 [ 266.613001][ C0] __x64_sys_socketpair+0x9b/0xb0 [ 266.618035][ C0] do_syscall_64+0x3d/0xb0 [ 266.622286][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 266.628017][ C0] RIP: 0033:0x7f32f0b6fea9 [ 266.632274][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 266.651802][ C0] RSP: 002b:00007f32ef8e30c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 266.660041][ C0] RAX: ffffffffffffffda RBX: 00007f32f0c9df80 RCX: 00007f32f0b6fea9 [ 266.667853][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 266.675666][ C0] RBP: 00007f32f0bbc4a4 R08: 0000000000000000 R09: 0000000000000000 [ 266.683476][ C0] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000000 [ 266.691287][ C0] R13: 000000000000000b R14: 00007f32f0c9df80 R15: 00007ffcd41b8a08 [ 266.699103][ C0] [ 266.701965][ C0] Sending NMI from CPU 0 to CPUs 1: [ 266.707020][ C1] NMI backtrace for cpu 1 [ 266.707031][ C1] CPU: 1 PID: 379 Comm: syz-executor.1 Not tainted 5.15.149-syzkaller-00490-g5d96939590c0 #0 [ 266.707050][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 266.707061][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 266.707086][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 5b 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 266.707100][ C1] RSP: 0018:ffffc900001d0780 EFLAGS: 00000246 [ 266.707126][ C1] RAX: 0000000000000001 RBX: 1ffff9200003a0f4 RCX: 1ffffffff0d1aa9c [ 266.707139][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7137ed4 [ 266.707210][ C1] RBP: ffffc900001d0830 R08: dffffc0000000000 R09: ffffed103ee26fdb [ 266.707223][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 266.707235][ C1] R13: ffff8881f7137ed4 R14: 0000000000000001 R15: 1ffff9200003a0f8 [ 266.707247][ C1] FS: 00007f978e0b26c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 266.707263][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 266.707276][ C1] CR2: 00007ffcd41b8c68 CR3: 0000000127f5e000 CR4: 00000000003506a0 [ 266.707312][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 266.707322][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 266.707333][ C1] Call Trace: [ 266.707338][ C1] [ 266.707345][ C1] ? show_regs+0x58/0x60 [ 266.707365][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 266.707408][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 266.707430][ C1] ? kvm_wait+0x147/0x180 [ 266.707445][ C1] ? kvm_wait+0x147/0x180 [ 266.707461][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 266.707480][ C1] ? nmi_handle+0xa8/0x280 [ 266.707498][ C1] ? kvm_wait+0x147/0x180 [ 266.707513][ C1] ? kvm_wait+0x147/0x180 [ 266.707528][ C1] ? default_do_nmi+0x69/0x160 [ 266.707547][ C1] ? exc_nmi+0xaf/0x120 [ 266.707563][ C1] ? end_repeat_nmi+0x16/0x31 [ 266.707583][ C1] ? kvm_wait+0x147/0x180 [ 266.707598][ C1] ? kvm_wait+0x147/0x180 [ 266.707614][ C1] ? kvm_wait+0x147/0x180 [ 266.707630][ C1] [ 266.707634][ C1] [ 266.707639][ C1] ? asm_common_interrupt+0x27/0x40 [ 266.707655][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 266.707674][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 266.707698][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 266.707723][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 266.707743][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 266.707764][ C1] sock_map_delete_elem+0x99/0x130 [ 266.707785][ C1] bpf_prog_8a405b5ced52e191+0x42/0xb04 [ 266.707799][ C1] bpf_trace_run2+0x159/0x210 [ 266.707820][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 266.707838][ C1] ? ip6_dst_destroy+0x8d/0x450 [ 266.707860][ C1] ? reweight_entity+0x7a/0x4b0 [ 266.707878][ C1] ? ip6_dst_destroy+0x8d/0x450 [ 266.707898][ C1] __bpf_trace_kfree+0x6f/0x90 [ 266.707914][ C1] ? ip6_dst_destroy+0x8d/0x450 [ 266.707933][ C1] kfree+0x1f3/0x220 [ 266.707953][ C1] ip6_dst_destroy+0x8d/0x450 [ 266.707972][ C1] ? ip6_default_advmss+0xf0/0xf0 [ 266.708003][ C1] dst_destroy+0x14f/0x330 [ 266.708031][ C1] ? dst_release+0xe0/0xe0 [ 266.708047][ C1] dst_destroy_rcu+0x19/0x20 [ 266.708064][ C1] rcu_do_batch+0x57a/0xc10 [ 266.708087][ C1] ? local_bh_enable+0x20/0x20 [ 266.708104][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 266.708123][ C1] ? __hrtimer_run_queues+0x46b/0xad0 [ 266.708141][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 266.708160][ C1] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 266.708180][ C1] ? rcu_report_qs_rnp+0x2bf/0x390 [ 266.708199][ C1] rcu_core+0x517/0x1020 [ 266.708220][ C1] ? rcu_cpu_kthread_park+0x90/0x90 [ 266.708238][ C1] ? hrtimer_interrupt+0x867/0xaa0 [ 266.708255][ C1] ? irqtime_account_irq+0x79/0x3c0 [ 266.708273][ C1] rcu_core_si+0x9/0x10 [ 266.708290][ C1] __do_softirq+0x26d/0x5bf [ 266.708308][ C1] __irq_exit_rcu+0x50/0xf0 [ 266.708327][ C1] irq_exit_rcu+0x9/0x10 [ 266.708344][ C1] sysvec_apic_timer_interrupt+0x9a/0xc0 [ 266.708363][ C1] [ 266.708368][ C1] [ 266.708373][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 266.708390][ C1] RIP: 0010:clear_page_erms+0x7/0x10 [ 266.708410][ C1] Code: 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 b9 00 10 00 00 31 c0 aa c3 cc cc cc cc cc cc 55 48 89 e5 41 57 41 56 41 55 41 54 53 [ 266.708423][ C1] RSP: 0018:ffffc900055de408 EFLAGS: 00010246 [ 266.708437][ C1] RAX: 0000000000000000 RBX: 1ffff11021c61172 RCX: 0000000000001000 [ 266.708449][ C1] RDX: 0000000000000200 RSI: 0000000000000001 RDI: ffff888128c14000 [ 266.708460][ C1] RBP: ffffc900055de438 R08: dffffc0000000000 R09: ffffed1025182800 [ 266.708473][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 266.708485][ C1] R13: 0000000000000001 R14: ffff888128c14000 R15: ffff88810e308b90 [ 266.708501][ C1] ? kernel_init_free_pages+0x71/0xf0 [ 266.708521][ C1] post_alloc_hook+0x105/0x1b0 [ 266.708539][ C1] prep_new_page+0x1b/0x110 [ 266.708556][ C1] get_page_from_freelist+0x3550/0x35d0 [ 266.708576][ C1] ? __alloc_pages+0x3cb/0x8f0 [ 266.708596][ C1] ? __kasan_check_read+0x11/0x20 [ 266.708617][ C1] ? lruvec_init+0x150/0x150 [ 266.708637][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 266.708656][ C1] ? __alloc_pages_bulk+0xe40/0xe40 [ 266.708674][ C1] ? __mod_memcg_lruvec_state+0x11c/0x1b0 [ 266.708694][ C1] __alloc_pages+0x27e/0x8f0 [ 266.708712][ C1] ? prep_new_page+0x110/0x110 [ 266.708730][ C1] ? xas_start+0x32c/0x3f0 [ 266.708747][ C1] ? xas_load+0x2b7/0x2d0 [ 266.708765][ C1] pagecache_get_page+0xb18/0xeb0 [ 266.708785][ C1] ? page_cache_prev_miss+0x410/0x410 [ 266.708804][ C1] ? unlock_page_memcg+0x146/0x160 [ 266.708835][ C1] grab_cache_page_write_begin+0x5d/0xa0 [ 266.708862][ C1] ext4_da_write_begin+0x5ae/0xc30 [ 266.708886][ C1] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 266.708906][ C1] ? do_set_pmd+0x860/0x860 [ 266.708921][ C1] ? shmem_fault+0x1ee/0x6c0 [ 266.708938][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 266.708956][ C1] ? finish_fault+0x44d/0x960 [ 266.708972][ C1] ? ktime_get_coarse_real_ts64+0x117/0x130 [ 266.708995][ C1] ? current_time+0x1af/0x2f0 [ 266.709016][ C1] generic_perform_write+0x2bc/0x5a0 [ 266.709037][ C1] ? grab_cache_page_write_begin+0xa0/0xa0 [ 266.709056][ C1] ? generic_write_checks+0x3b9/0x470 [ 266.709075][ C1] ext4_buffered_write_iter+0x48a/0x610 [ 266.709093][ C1] ext4_file_write_iter+0x443/0x1c80 [ 266.709108][ C1] ? follow_page_pte+0x4b6/0xab0 [ 266.709124][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 266.709142][ C1] ? follow_page_pte+0x9c3/0xab0 [ 266.709157][ C1] ? numa_migrate_prep+0xe0/0xe0 [ 266.709176][ C1] ? put_page_refs+0xf0/0xf0 [ 266.709191][ C1] ? ext4_file_read_iter+0x4b0/0x4b0 [ 266.709207][ C1] ? follow_page_mask+0x900/0x10e0 [ 266.709227][ C1] ? iov_iter_kvec+0x53/0x190 [ 266.709246][ C1] __kernel_write+0x5ab/0xa60 [ 266.709264][ C1] ? vfs_read+0xd40/0xd40 [ 266.709282][ C1] ? cgroup_freezing+0x88/0xb0 [ 266.709301][ C1] ? freezing_slow_path+0x141/0x190 [ 266.709319][ C1] __dump_emit+0x261/0x3a0 [ 266.709340][ C1] ? wait_for_dump_helpers+0x3b0/0x3b0 [ 266.709359][ C1] ? fault_in_readable+0x2e0/0x2e0 [ 266.709379][ C1] dump_emit+0x381/0x3f0 [ 266.709398][ C1] dump_user_range+0x86/0x1c0 [ 266.709416][ C1] elf_core_dump+0x3663/0x3e80 [ 266.709438][ C1] ? load_elf_binary+0x2750/0x2750 [ 266.709455][ C1] ? __kasan_kmalloc+0x9/0x10 [ 266.709470][ C1] ? __kmalloc+0x13a/0x270 [ 266.709487][ C1] ? kvmalloc_node+0x1f0/0x4d0 [ 266.709514][ C1] ? freezing_slow_path+0x141/0x190 [ 266.709532][ C1] do_coredump+0x1834/0x3050 [ 266.709555][ C1] ? simple_acl_create+0x2c0/0x2c0 [ 266.709575][ C1] ? kmem_cache_free+0x116/0x2e0 [ 266.709593][ C1] ? ____kasan_slab_free+0x131/0x160 [ 266.709611][ C1] ? get_signal+0xd32/0x1630 [ 266.709629][ C1] ? kmem_cache_free+0x116/0x2e0 [ 266.709649][ C1] get_signal+0x4c8/0x1630 [ 266.709669][ C1] arch_do_signal_or_restart+0xbd/0x1680 [ 266.709690][ C1] ? force_sig_fault+0x127/0x1d0 [ 266.709708][ C1] ? get_sigframe_size+0x10/0x10 [ 266.709724][ C1] ? page_fault_oops+0xa90/0xa90 [ 266.709815][ C1] exit_to_user_mode_loop+0xa0/0xe0 [ 266.709832][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 266.709850][ C1] irqentry_exit_to_user_mode+0x9/0x20 [ 266.709868][ C1] irqentry_exit+0x12/0x40 [ 266.709885][ C1] exc_page_fault+0x47a/0x830 [ 266.709909][ C1] asm_exc_page_fault+0x27/0x30 [ 266.709924][ C1] RIP: 0033:0x7f978f33eeb1 [ 266.709939][ C1] Code: c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 266.709952][ C1] RSP: 002b:0000000008000000 EFLAGS: 00010217 [ 266.709965][ C1] RAX: 0000000000000000 RBX: 00007f978f46cf80 RCX: 00007f978f33eea9 [ 266.709977][ C1] RDX: 0000000000000000 RSI: 0000000008000000 RDI: 0000000040144000 [ 266.709988][ C1] RBP: 00007f978f38b4a4 R08: 0000000000000000 R09: 0000000000000000 [ 266.710002][ C1] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 266.710013][ C1] R13: 000000000000000b R14: 00007f978f46cf80 R15: 00007fffed7dd728 [ 266.710028][ C1]