syzbot


INFO: task hung in get_info

Status: auto-closed as invalid on 2020/06/06 08:06
Reported-by: syzbot+82bf2360f43a492298df@syzkaller.appspotmail.com
First crash: 884d, last: 881d
similar bugs (9):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-49 INFO: task hung in get_info 1 1395d 1395d 0/3 auto-closed as invalid on 2019/03/10 04:11
linux-4.19 INFO: task hung in get_info C error 13 470d 532d 0/1 upstream: reported C repro on 2021/01/21 06:12
android-414 INFO: task hung in get_info 14 975d 1180d 0/1 auto-closed as invalid on 2020/03/04 07:49
upstream INFO: task hung in get_info (3) 5 495d 542d 0/22 auto-closed as invalid on 2021/05/27 19:05
upstream INFO: task hung in get_info (4) 4 175d 199d 0/22 closed as invalid on 2022/02/08 09:50
upstream INFO: task hung in get_info (2) 2 1054d 1058d 0/22 auto-closed as invalid on 2019/11/15 17:14
android-44 INFO: task hung in get_info 3 999d 1150d 0/2 auto-closed as invalid on 2020/02/09 04:02
android-49 INFO: task hung in get_info (2) 1 1075d 1075d 0/3 auto-closed as invalid on 2019/11/25 07:20
upstream INFO: task hung in get_info 8 1587d 1585d 0/22 auto-closed as invalid on 2019/02/22 10:34

Sample crash report:
NOHZ: local_softirq_pending 08
NOHZ: local_softirq_pending 08
NOHZ: local_softirq_pending 08
NOHZ: local_softirq_pending 08
NOHZ: local_softirq_pending 08
INFO: task syz-executor.0:7339 blocked for more than 140 seconds.
      Not tainted 4.14.170-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.0  D24992  7339      1 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:2808 [inline]
 __schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
 schedule+0x92/0x1c0 kernel/sched/core.c:3428
 schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
 __mutex_lock_common kernel/locking/mutex.c:833 [inline]
 __mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
 xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
 get_info+0x116/0x560 net/ipv6/netfilter/ip6_tables.c:983
 do_ipt_get_ctl+0x148/0x7e0 net/ipv4/netfilter/ip_tables.c:1698
 nf_sockopt net/netfilter/nf_sockopt.c:104 [inline]
 nf_getsockopt+0x6a/0xc0 net/netfilter/nf_sockopt.c:122
 ip_getsockopt net/ipv4/ip_sockglue.c:1566 [inline]
 ip_getsockopt+0x10d/0x150 net/ipv4/ip_sockglue.c:1551
 tcp_getsockopt net/ipv4/tcp.c:3249 [inline]
 tcp_getsockopt+0x84/0xd0 net/ipv4/tcp.c:3243
 sock_common_getsockopt+0x94/0xd0 net/core/sock.c:2927
 SYSC_getsockopt net/socket.c:1896 [inline]
 SyS_getsockopt+0x126/0x1e0 net/socket.c:1878
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45deaa
RSP: 002b:00007ffda0c893c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037
RAX: ffffffffffffffda RBX: 00007ffda0c893f0 RCX: 000000000045deaa
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000071de80 R08: 00007ffda0c893ec R09: 0000000000004000
R10: 00007ffda0c893f0 R11: 0000000000000246 R12: 0000000000000003
R13: 0000000000000000 R14: 0000000000000000 R15: 000000000071bcc0
INFO: task syz-executor.3:7341 blocked for more than 140 seconds.
      Not tainted 4.14.170-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.3  D24992  7341      1 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:2808 [inline]
 __schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
 schedule+0x92/0x1c0 kernel/sched/core.c:3428
 schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
 __mutex_lock_common kernel/locking/mutex.c:833 [inline]
 __mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
 xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
 get_info+0x116/0x560 net/ipv6/netfilter/ip6_tables.c:983
 do_ipt_get_ctl+0x148/0x7e0 net/ipv4/netfilter/ip_tables.c:1698
 nf_sockopt net/netfilter/nf_sockopt.c:104 [inline]
 nf_getsockopt+0x6a/0xc0 net/netfilter/nf_sockopt.c:122
 ip_getsockopt net/ipv4/ip_sockglue.c:1566 [inline]
 ip_getsockopt+0x10d/0x150 net/ipv4/ip_sockglue.c:1551
 tcp_getsockopt net/ipv4/tcp.c:3249 [inline]
 tcp_getsockopt+0x84/0xd0 net/ipv4/tcp.c:3243
 sock_common_getsockopt+0x94/0xd0 net/core/sock.c:2927
 SYSC_getsockopt net/socket.c:1896 [inline]
 SyS_getsockopt+0x126/0x1e0 net/socket.c:1878
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45deaa
RSP: 002b:00007ffedd5f3428 EFLAGS: 00000246 ORIG_RAX: 0000000000000037
RAX: ffffffffffffffda RBX: 00007ffedd5f3450 RCX: 000000000045deaa
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000071de80 R08: 00007ffedd5f344c R09: 0000000000004000
R10: 00007ffedd5f3450 R11: 0000000000000246 R12: 0000000000000003
R13: 0000000000000000 R14: 0000000000000000 R15: 000000000071bcc0
INFO: task syz-executor.2:11577 blocked for more than 140 seconds.
      Not tainted 4.14.170-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.2  D25232 11577      1 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:2808 [inline]
 __schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
 schedule+0x92/0x1c0 kernel/sched/core.c:3428
 schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
 __mutex_lock_common kernel/locking/mutex.c:833 [inline]
 __mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
 xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
 get_info+0x116/0x560 net/ipv6/netfilter/ip6_tables.c:983
 do_ipt_get_ctl+0x148/0x7e0 net/ipv4/netfilter/ip_tables.c:1698
 nf_sockopt net/netfilter/nf_sockopt.c:104 [inline]
 nf_getsockopt+0x6a/0xc0 net/netfilter/nf_sockopt.c:122
 ip_getsockopt net/ipv4/ip_sockglue.c:1566 [inline]
 ip_getsockopt+0x10d/0x150 net/ipv4/ip_sockglue.c:1551
 tcp_getsockopt net/ipv4/tcp.c:3249 [inline]
 tcp_getsockopt+0x84/0xd0 net/ipv4/tcp.c:3243
 sock_common_getsockopt+0x94/0xd0 net/core/sock.c:2927
 SYSC_getsockopt net/socket.c:1896 [inline]
 SyS_getsockopt+0x126/0x1e0 net/socket.c:1878
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45deaa
RSP: 002b:00007fff7a059ee8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037
RAX: ffffffffffffffda RBX: 00007fff7a059f10 RCX: 000000000045deaa
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000071de80 R08: 00007fff7a059f0c R09: 0000000000004000
R10: 00007fff7a059f10 R11: 0000000000000246 R12: 0000000000000003
R13: 0000000000000000 R14: 0000000000000000 R15: 000000000071bcc0
INFO: task syz-executor.5:12123 blocked for more than 140 seconds.
      Not tainted 4.14.170-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.5  D28944 12123  10175 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:2808 [inline]
 __schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
 schedule+0x92/0x1c0 kernel/sched/core.c:3428
 schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
 __mutex_lock_common kernel/locking/mutex.c:833 [inline]
 __mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
 xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
 __do_replace+0xa2/0x5b0 net/ipv4/netfilter/ip_tables.c:1056
 do_replace net/ipv4/netfilter/ip_tables.c:1142 [inline]
 do_ipt_set_ctl+0x296/0x3ee net/ipv4/netfilter/ip_tables.c:1674
 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
 nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115
 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline]
 ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1240
 udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2451
 ipv6_setsockopt+0x9e/0x130 net/ipv6/ipv6_sockglue.c:920
 tcp_setsockopt net/ipv4/tcp.c:2820 [inline]
 tcp_setsockopt+0x84/0xd0 net/ipv4/tcp.c:2814
 sock_common_setsockopt+0x94/0xd0 net/core/sock.c:2968
 SYSC_setsockopt net/socket.c:1865 [inline]
 SyS_setsockopt+0x13c/0x210 net/socket.c:1844
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45b399
RSP: 002b:00007fe455e70c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fe455e716d4 RCX: 000000000045b399
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000004
RBP: 000000000075bf20 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000580 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000a06 R14: 00000000004cb681 R15: 000000000075bf2c
INFO: task syz-executor.4:12149 blocked for more than 140 seconds.
      Not tainted 4.14.170-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.4  D29344 12149   7340 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:2808 [inline]
 __schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
 schedule+0x92/0x1c0 kernel/sched/core.c:3428
 schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
 __mutex_lock_common kernel/locking/mutex.c:833 [inline]
 __mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
 xt_find_match+0x3e/0x1e0 net/netfilter/x_tables.c:186
 xt_request_find_match net/netfilter/x_tables.c:216 [inline]
 xt_request_find_match+0x74/0xe0 net/netfilter/x_tables.c:209
 find_check_match net/ipv4/netfilter/ip_tables.c:495 [inline]
 find_check_entry.isra.0+0x22b/0x920 net/ipv4/netfilter/ip_tables.c:551
 translate_table+0xb3f/0x15a0 net/ipv4/netfilter/ip_tables.c:737
 do_replace net/ipv4/netfilter/ip_tables.c:1138 [inline]
 do_ipt_set_ctl+0x268/0x3ee net/ipv4/netfilter/ip_tables.c:1674
 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
 nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115
 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline]
 ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1240
 udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2451
 ipv6_setsockopt+0x9e/0x130 net/ipv6/ipv6_sockglue.c:920
 tcp_setsockopt net/ipv4/tcp.c:2820 [inline]
 tcp_setsockopt+0x84/0xd0 net/ipv4/tcp.c:2814
 sock_common_setsockopt+0x94/0xd0 net/core/sock.c:2968
 SYSC_setsockopt net/socket.c:1865 [inline]
 SyS_setsockopt+0x13c/0x210 net/socket.c:1844
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45b399
RSP: 002b:00007fe1b3139c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fe1b313a6d4 RCX: 000000000045b399
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000020000580 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000a06 R14: 00000000004cb681 R15: 000000000075bfd4

Showing all locks held in the system:
1 lock held by khungtaskd/1057:
 #0:  (tasklist_lock){.+.+}, at: [<ffffffff81488cf8>] debug_show_all_locks+0x7f/0x21f kernel/locking/lockdep.c:4544
2 locks held by getty/7298:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff866928d3>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c38d6>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7299:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff866928d3>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c38d6>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7300:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff866928d3>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c38d6>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7301:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff866928d3>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c38d6>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7302:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff866928d3>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c38d6>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7303:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff866928d3>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c38d6>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7304:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff866928d3>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c38d6>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
1 lock held by syz-executor.0/7339:
 #0:  (&xt[i].mutex){+.+.}, at: [<ffffffff854cf62c>] xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
1 lock held by syz-executor.3/7341:
 #0:  (&xt[i].mutex){+.+.}, at: [<ffffffff854cf62c>] xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
1 lock held by syz-executor.2/11577:
 #0:  (&xt[i].mutex){+.+.}, at: [<ffffffff854cf62c>] xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
1 lock held by syz-executor.5/12123:
 #0:  (&xt[i].mutex){+.+.}, at: [<ffffffff854cf62c>] xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
1 lock held by syz-executor.4/12149:
 #0:  (&xt[i].mutex){+.+.}, at: [<ffffffff854ce37e>] xt_find_match+0x3e/0x1e0 net/netfilter/x_tables.c:186

=============================================

NMI backtrace for cpu 0
CPU: 0 PID: 1057 Comm: khungtaskd Not tainted 4.14.170-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x142/0x197 lib/dump_stack.c:58
 nmi_cpu_backtrace.cold+0x57/0x94 lib/nmi_backtrace.c:101
 nmi_trigger_cpumask_backtrace+0x141/0x189 lib/nmi_backtrace.c:62
 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38
 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline]
 watchdog+0x5e7/0xb90 kernel/hung_task.c:274
 kthread+0x319/0x430 kernel/kthread.c:232
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 7343 Comm: syz-executor.1 Not tainted 4.14.170-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff88805f00c500 task.stack: ffff88805f010000
RIP: 0010:arch_local_save_flags arch/x86/include/asm/paravirt.h:774 [inline]
RIP: 0010:trace_softirqs_on+0x2a0/0x3c0 kernel/locking/lockdep.c:2989
RSP: 0018:ffff88805f017960 EFLAGS: 00000046
RAX: 1ffffffff0fe2ce0 RBX: ffffffff854fb684 RCX: 1ffffffff134f760
RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88805f017978 R08: 0000000000000001 R09: 0000000000000002
R10: 0000000000000000 R11: ffff88805f00c500 R12: ffff88805f00c500
R13: ffff88805f00c500 R14: ffffc90016711000 R15: ffffffff854f9a60
FS:  0000000001109940(0000) GS:ffff8880aed00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c430164848 CR3: 000000005f000000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 __local_bh_enable_ip+0x123/0x1a0 kernel/softirq.c:173
 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:176 [inline]
 _raw_spin_unlock_bh+0x31/0x40 kernel/locking/spinlock.c:208
 spin_unlock_bh include/linux/spinlock.h:362 [inline]
 htable_selective_cleanup+0x204/0x300 net/netfilter/xt_hashlimit.c:381
 htable_destroy net/netfilter/xt_hashlimit.c:416 [inline]
 htable_put+0x164/0x210 net/netfilter/xt_hashlimit.c:443
 hashlimit_mt_destroy_v1+0x50/0x70 net/netfilter/xt_hashlimit.c:971
 cleanup_match+0xc2/0x140 net/ipv6/netfilter/ip6_tables.c:491
 cleanup_entry+0xbf/0x230 net/ipv4/netfilter/ip_tables.c:658
 __do_replace+0x3c5/0x5b0 net/ipv4/netfilter/ip_tables.c:1086
 do_replace net/ipv4/netfilter/ip_tables.c:1142 [inline]
 do_ipt_set_ctl+0x296/0x3ee net/ipv4/netfilter/ip_tables.c:1674
 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
 nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115
 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline]
 ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1240
 tcp_setsockopt net/ipv4/tcp.c:2820 [inline]
 tcp_setsockopt+0x84/0xd0 net/ipv4/tcp.c:2814
 sock_common_setsockopt+0x94/0xd0 net/core/sock.c:2968
 SYSC_setsockopt net/socket.c:1865 [inline]
 SyS_setsockopt+0x13c/0x210 net/socket.c:1844
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45deca
RSP: 002b:00007ffc3cfedcf8 EFLAGS: 00000202 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007ffc3cfedd20 RCX: 000000000045deca
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000071de80 R08: 0000000000000240 R09: 0000000000004000
R10: 000000000071d160 R11: 0000000000000202 R12: 0000000000000003
R13: 0000000000000000 R14: 0000000000000000 R15: 000000000071d100
Code: 00 c7 83 7c 08 00 00 00 00 00 00 5b 41 5c 41 5d 5d c3 48 c7 c0 00 67 f1 87 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 <0f> 85 ee 00 00 00 48 83 3d 72 f9 a8 06 00 0f 84 d4 00 00 00 9c 

Crashes (2):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci2-linux-4-14 2020/02/07 08:05 linux-4.14.y e0f8b8a65a47 06150bf1 .config log report
ci2-linux-4-14 2020/02/03 22:11 linux-4.14.y 9fa690a2a016 93e5e335 .config log report