syzkaller login: [ 28.403231] kauditd_printk_skb: 4 callbacks suppressed [ 28.403237] audit: type=1400 audit(1566178517.163:35): avc: denied { map } for pid=5971 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 34.583299] audit: type=1400 audit(1566178523.343:36): avc: denied { map } for pid=5982 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 35.919614] IPVS: ftp: loaded support on port[0] = 21 [ 35.943472] audit: type=1400 audit(1566178524.703:37): avc: denied { associate } for pid=5997 comm="syz-executor0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 63.986279] can: request_module (can-proto-0) failed. [ 63.996107] can: request_module (can-proto-0) failed. [ 64.167617] audit: type=1400 audit(1566178552.923:38): avc: denied { create } for pid=5982 comm="syz-fuzzer" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 64.192496] audit: type=1400 audit(1566178552.923:39): avc: denied { create } for pid=5982 comm="syz-fuzzer" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 64.217864] audit: type=1400 audit(1566178552.923:40): avc: denied { create } for pid=5982 comm="syz-fuzzer" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 Warning: Permanently added '10.128.0.68' (ECDSA) to the list of known hosts. 2019/08/19 01:36:01 parsed 1 programs 2019/08/19 01:36:02 executed programs: 0 [ 73.755069] IPVS: ftp: loaded support on port[0] = 21 [ 73.778272] IPVS: ftp: loaded support on port[0] = 21 [ 73.801037] IPVS: ftp: loaded support on port[0] = 21 [ 73.811601] IPVS: ftp: loaded support on port[0] = 21 [ 73.834910] IPVS: ftp: loaded support on port[0] = 21 [ 73.835065] IPVS: ftp: loaded support on port[0] = 21 [ 74.638554] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.653255] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.660837] device bridge_slave_0 entered promiscuous mode [ 74.735862] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.745382] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.753626] device bridge_slave_1 entered promiscuous mode [ 74.762452] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.768890] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.776869] device bridge_slave_0 entered promiscuous mode [ 74.802905] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.812727] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.820762] device bridge_slave_0 entered promiscuous mode [ 74.832830] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.839289] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.848033] device bridge_slave_1 entered promiscuous mode [ 74.860491] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.866839] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.874861] device bridge_slave_0 entered promiscuous mode [ 74.883890] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.891466] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.898795] device bridge_slave_1 entered promiscuous mode [ 74.905772] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.913648] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.921029] device bridge_slave_0 entered promiscuous mode [ 74.929340] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.937011] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.944697] device bridge_slave_0 entered promiscuous mode [ 74.953265] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.962793] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.970553] device bridge_slave_1 entered promiscuous mode [ 74.981972] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.988361] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.001515] device bridge_slave_1 entered promiscuous mode [ 75.016203] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.023953] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.031907] device bridge_slave_1 entered promiscuous mode [ 75.090845] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.162172] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.181475] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.212780] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.231676] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.262269] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.275707] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.293593] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.310907] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.356951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.377936] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.394907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.411654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.425497] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.439024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 75.466931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 75.496864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.510950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 75.525353] team0: Port device team_slave_0 added [ 75.547062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.584435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.602270] team0: Port device team_slave_1 added [ 75.608053] team0: Port device team_slave_0 added [ 75.629595] team0: Port device team_slave_0 added [ 75.647051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.672378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.693382] team0: Port device team_slave_0 added [ 75.705919] team0: Port device team_slave_1 added [ 75.721555] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.732300] team0: Port device team_slave_1 added [ 75.751301] team0: Port device team_slave_0 added [ 75.764144] team0: Port device team_slave_1 added [ 75.785700] team0: Port device team_slave_0 added [ 75.802905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.812325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.825745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.834543] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.851002] team0: Port device team_slave_1 added [ 75.859765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.867769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.885441] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.895605] team0: Port device team_slave_1 added [ 75.906742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.924487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.939235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.957156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.966003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.978549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.990289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.007195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.020920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.042063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.064620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.076191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.084858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.093701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.103014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.124241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.144072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.156389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.164870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.176943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.188684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.197350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.205911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.223333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.240319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.259178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.272027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.319046] ip (6566) used greatest stack depth: 23592 bytes left [ 76.574899] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.581392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.588632] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.595238] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.687946] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.694363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.701231] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.707700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.718021] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.724781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.731678] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.738106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.787526] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.794023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.800759] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.807112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.833103] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.839561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.846518] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.853296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.910822] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.917374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.924269] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.930898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.405733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.427673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.435677] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.452528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.460982] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.468045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.495721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.620529] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.755790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.764582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.790672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.835686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.861087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.913200] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.966839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.018069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.033742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.147590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.160322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.202246] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.231000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.238252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.261363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.272772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.355809] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.371504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.379444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.455683] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.475489] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.577010] 8021q: adding VLAN 0 to HW filter on device team0 2019/08/19 01:36:08 executed programs: 6 [ 80.042438] audit: type=1400 audit(1566178568.803:41): avc: denied { prog_load } for pid=7545 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 80.130649] audit: type=1400 audit(1566178568.823:42): avc: denied { prog_run } for pid=7545 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 2019/08/19 01:36:13 executed programs: 298 2019/08/19 01:36:18 executed programs: 618 2019/08/19 01:36:23 executed programs: 940 2019/08/19 01:36:28 executed programs: 1260 2019/08/19 01:36:33 executed programs: 1579 2019/08/19 01:36:38 executed programs: 1898 2019/08/19 01:36:43 executed programs: 2211 2019/08/19 01:36:48 executed programs: 2530 2019/08/19 01:36:53 executed programs: 2839 2019/08/19 01:36:58 executed programs: 3153 2019/08/19 01:37:03 executed programs: 3464 2019/08/19 01:37:08 executed programs: 3772 2019/08/19 01:37:14 executed programs: 4074 2019/08/19 01:37:19 executed programs: 4382 2019/08/19 01:37:24 executed programs: 4689 2019/08/19 01:37:29 executed programs: 4993 [ 161.763435] ================================================================== [ 161.770923] BUG: KASAN: use-after-free in bpf_prog_kallsyms_find+0x1d1/0x2e0 [ 161.778096] Read of size 8 at addr ffff8881cd616d08 by task syz-executor4/6117 [ 161.785587] [ 161.787196] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 161.794100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.803791] Call Trace: [ 161.806693] BUG: unable to handle page fault for address: ffffc900006d8030 [ 161.814116] #PF: supervisor read access in kernel mode [ 161.819590] #PF: error_code(0x0000) - not-present page [ 161.825208] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 161.832113] Oops: 0000 [#1] PREEMPT SMP KASAN [ 161.836720] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 161.843791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.853567] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 161.858992] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 161.878243] RSP: 0018:ffff8881b0def280 EFLAGS: 00010046 [ 161.883736] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 161.891106] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 161.898611] RBP: ffff8881b0def2c0 R08: ffffffff8820dbc0 R09: ffffed103b606c4c [ 161.905859] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881cd616cb8 [ 161.913282] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 161.920701] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 161.929296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.935153] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 161.942488] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 161.949838] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 161.957093] Call Trace: [ 161.959671] BUG: unable to handle page fault for address: ffffc900006d8030 [ 161.966744] #PF: supervisor read access in kernel mode [ 161.972089] #PF: error_code(0x0000) - not-present page [ 161.977527] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 161.984779] Oops: 0000 [#2] PREEMPT SMP KASAN [ 161.989260] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 161.996247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.005772] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 162.011557] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 162.031061] RSP: 0018:ffff8881b0deed50 EFLAGS: 00010046 [ 162.036400] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 162.043662] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 162.050997] RBP: ffff8881b0deed90 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 162.058332] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 162.065600] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 162.072936] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 162.081527] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.087607] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 162.095172] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 162.102606] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 162.109952] Call Trace: [ 162.112602] BUG: unable to handle page fault for address: ffffc900006d8030 [ 162.119848] #PF: supervisor read access in kernel mode [ 162.125272] #PF: error_code(0x0000) - not-present page [ 162.130709] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 162.137788] Oops: 0000 [#3] PREEMPT SMP KASAN [ 162.142401] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 162.149301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.158829] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 162.164252] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 162.184082] RSP: 0018:ffff8881b0dee820 EFLAGS: 00010046 [ 162.189769] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 162.197108] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 162.204513] RBP: ffff8881b0dee860 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 162.211939] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 162.219530] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 162.227486] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 162.235861] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.241893] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 162.249325] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 162.256833] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 162.264166] Call Trace: [ 162.266930] BUG: unable to handle page fault for address: ffffc900006d8030 [ 162.282536] #PF: supervisor read access in kernel mode [ 162.288092] #PF: error_code(0x0000) - not-present page [ 162.293430] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 162.300430] Oops: 0000 [#4] PREEMPT SMP KASAN [ 162.305255] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 162.312240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.321780] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 162.327216] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 162.346378] RSP: 0018:ffff8881b0dee2f0 EFLAGS: 00010046 [ 162.351805] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 162.359332] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 162.367379] RBP: ffff8881b0dee330 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 162.374892] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 162.382268] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 162.389773] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 162.398290] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.404319] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 162.411845] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 162.419197] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 162.426706] Call Trace: [ 162.429386] BUG: unable to handle page fault for address: ffffc900006d8030 [ 162.437083] #PF: supervisor read access in kernel mode [ 162.442776] #PF: error_code(0x0000) - not-present page [ 162.448303] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 162.455441] Oops: 0000 [#5] PREEMPT SMP KASAN [ 162.460198] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 162.467291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.476897] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 162.482257] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 162.501470] RSP: 0018:ffff8881b0deddc0 EFLAGS: 00010046 [ 162.506987] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 162.514233] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 162.521586] RBP: ffff8881b0dede00 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 162.529064] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 162.536628] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 162.544421] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 162.552705] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.558827] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 162.566533] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 162.574042] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 162.581928] Call Trace: [ 162.584590] BUG: unable to handle page fault for address: ffffc900006d8030 [ 162.592014] #PF: supervisor read access in kernel mode [ 162.597260] #PF: error_code(0x0000) - not-present page [ 162.602536] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 162.609453] Oops: 0000 [#6] PREEMPT SMP KASAN [ 162.613924] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 162.621425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.630952] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 162.636728] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 162.656441] RSP: 0018:ffff8881b0ded890 EFLAGS: 00010046 [ 162.662222] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 162.669671] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 162.677448] RBP: ffff8881b0ded8d0 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 162.684954] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 162.692710] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 162.700133] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 162.709043] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.715432] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 162.722952] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 162.730513] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 162.738107] Call Trace: [ 162.740796] BUG: unable to handle page fault for address: ffffc900006d8030 [ 162.747871] #PF: supervisor read access in kernel mode [ 162.753118] #PF: error_code(0x0000) - not-present page [ 162.758466] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 162.765462] Oops: 0000 [#7] PREEMPT SMP KASAN [ 162.770194] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 162.777090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.786598] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 162.792022] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 162.811777] RSP: 0018:ffff8881b0ded360 EFLAGS: 00010046 [ 162.817551] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 162.825327] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 162.833104] RBP: ffff8881b0ded3a0 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 162.840709] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 162.848272] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 162.855614] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 162.863947] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.869822] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 162.877155] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 162.884660] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 162.891955] Call Trace: [ 162.894537] BUG: unable to handle page fault for address: ffffc900006d8030 [ 162.902045] #PF: supervisor read access in kernel mode [ 162.907545] #PF: error_code(0x0000) - not-present page [ 162.912798] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 162.919703] Oops: 0000 [#8] PREEMPT SMP KASAN [ 162.924258] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 162.931588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.941272] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 162.946875] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 162.966972] RSP: 0018:ffff8881b0dece30 EFLAGS: 00010046 [ 162.972499] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 162.979928] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 162.987446] RBP: ffff8881b0dece70 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 162.995127] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 163.002827] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 163.010771] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 163.020142] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.026549] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 163.033973] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 163.041349] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 163.048868] Call Trace: [ 163.051556] BUG: unable to handle page fault for address: ffffc900006d8030 [ 163.059256] #PF: supervisor read access in kernel mode [ 163.064939] #PF: error_code(0x0000) - not-present page [ 163.070361] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 163.077697] Oops: 0000 [#9] PREEMPT SMP KASAN [ 163.082254] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 163.089873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.099614] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 163.105126] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 163.124795] RSP: 0018:ffff8881b0dec900 EFLAGS: 00010046 [ 163.130553] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 163.138233] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 163.145681] RBP: ffff8881b0dec940 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 163.153100] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 163.161172] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 163.168848] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 163.177318] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.183436] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 163.190862] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 163.198380] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 163.206340] Call Trace: [ 163.209282] BUG: unable to handle page fault for address: ffffc900006d8030 [ 163.216530] #PF: supervisor read access in kernel mode [ 163.222048] #PF: error_code(0x0000) - not-present page [ 163.227539] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 163.234882] Oops: 0000 [#10] PREEMPT SMP KASAN [ 163.239526] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 163.246731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.256471] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 163.262067] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 163.283239] RSP: 0018:ffff8881b0dec3d0 EFLAGS: 00010046 [ 163.288926] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 163.296642] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 163.304393] RBP: ffff8881b0dec410 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 163.311820] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 163.320021] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 163.327978] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 163.337318] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.343577] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 163.351204] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 163.359508] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 163.366928] Call Trace: [ 163.369598] BUG: unable to handle page fault for address: ffffc900006d8030 [ 163.377373] #PF: supervisor read access in kernel mode [ 163.383067] #PF: error_code(0x0000) - not-present page [ 163.388936] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 163.397522] Oops: 0000 [#11] PREEMPT SMP KASAN [ 163.402429] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 163.410430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.420651] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 163.426250] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 163.453662] RSP: 0018:ffff8881b0debea0 EFLAGS: 00010046 [ 163.459267] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 163.466861] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 163.474650] RBP: ffff8881b0debee0 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 163.482075] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 163.489888] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 163.497536] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 163.505826] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.512143] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 163.519692] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 163.527202] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 163.534985] Call Trace: [ 163.537824] BUG: unable to handle page fault for address: ffffc900006d8030 [ 163.545156] #PF: supervisor read access in kernel mode [ 163.551055] #PF: error_code(0x0000) - not-present page [ 163.556485] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 163.563493] Oops: 0000 [#12] PREEMPT SMP KASAN [ 163.568324] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 163.575484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.585014] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 163.590605] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 163.609944] RSP: 0018:ffff8881b0deb970 EFLAGS: 00010046 [ 163.615532] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 163.622957] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 163.630380] RBP: ffff8881b0deb9b0 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 163.637800] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 163.645136] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 163.653014] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 163.661737] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.667596] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 163.675016] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 163.682374] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 163.689889] Call Trace: [ 163.692720] BUG: unable to handle page fault for address: ffffc900006d8030 [ 163.699718] #PF: supervisor read access in kernel mode [ 163.705142] #PF: error_code(0x0000) - not-present page [ 163.710650] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 163.717552] Oops: 0000 [#13] PREEMPT SMP KASAN [ 163.722111] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 163.729365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.738795] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 163.744564] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 163.765312] RSP: 0018:ffff8881b0deb440 EFLAGS: 00010046 [ 163.770842] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 163.778271] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 163.785701] RBP: ffff8881b0deb480 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 163.793075] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 163.800601] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 163.808291] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 163.816764] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.822886] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 163.830485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 163.837819] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 163.845155] Call Trace: [ 163.847726] BUG: unable to handle page fault for address: ffffc900006d8030 [ 163.854713] #PF: supervisor read access in kernel mode [ 163.860230] #PF: error_code(0x0000) - not-present page [ 163.865479] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 163.872552] Oops: 0000 [#14] PREEMPT SMP KASAN [ 163.877115] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 163.884100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.893959] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 163.899340] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 163.918575] RSP: 0018:ffff8881b0deaf10 EFLAGS: 00010046 [ 163.924005] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 163.932051] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 163.939815] RBP: ffff8881b0deaf50 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 163.947852] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 163.955463] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 163.962882] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 163.971096] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.977066] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 163.984491] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 163.991745] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 163.999228] Call Trace: [ 164.001907] BUG: unable to handle page fault for address: ffffc900006d8030 [ 164.009522] #PF: supervisor read access in kernel mode [ 164.015184] #PF: error_code(0x0000) - not-present page [ 164.020735] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 164.027931] Oops: 0000 [#15] PREEMPT SMP KASAN [ 164.032584] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 164.039857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.049545] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 164.055583] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 164.074850] RSP: 0018:ffff8881b0dea9e0 EFLAGS: 00010046 [ 164.080275] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 164.087693] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 164.095401] RBP: ffff8881b0deaa20 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 164.103005] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 164.110529] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 164.117950] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 164.127042] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.133420] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 164.140840] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 164.148115] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 164.155449] Call Trace: [ 164.158110] BUG: unable to handle page fault for address: ffffc900006d8030 [ 164.165476] #PF: supervisor read access in kernel mode [ 164.170906] #PF: error_code(0x0000) - not-present page [ 164.176297] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 164.183373] Oops: 0000 [#16] PREEMPT SMP KASAN [ 164.188263] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 164.195168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.204681] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 164.210387] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 164.230196] RSP: 0018:ffff8881b0dea4b0 EFLAGS: 00010046 [ 164.235537] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 164.242868] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 164.250659] RBP: ffff8881b0dea4f0 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 164.258254] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 164.265584] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 164.281554] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 164.290018] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.296507] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 164.303851] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 164.311189] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 164.319059] Call Trace: [ 164.321809] BUG: unable to handle page fault for address: ffffc900006d8030 [ 164.328970] #PF: supervisor read access in kernel mode [ 164.334653] #PF: error_code(0x0000) - not-present page [ 164.340076] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 164.347092] Oops: 0000 [#17] PREEMPT SMP KASAN [ 164.351649] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 164.358848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.368580] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 164.373930] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 164.393185] RSP: 0018:ffff8881b0de9f80 EFLAGS: 00010046 [ 164.398537] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 164.405799] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 164.413063] RBP: ffff8881b0de9fc0 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 164.422067] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 164.429679] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 164.436929] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 164.445323] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.451368] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 164.458879] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 164.466220] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 164.473641] Call Trace: [ 164.476215] BUG: unable to handle page fault for address: ffffc900006d8030 [ 164.483555] #PF: supervisor read access in kernel mode [ 164.488809] #PF: error_code(0x0000) - not-present page [ 164.494066] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 164.501188] Oops: 0000 [#18] PREEMPT SMP KASAN [ 164.505846] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 164.513218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.522826] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 164.528689] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 164.547962] RSP: 0018:ffff8881b0de9a50 EFLAGS: 00010046 [ 164.553478] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 164.560898] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 164.568320] RBP: ffff8881b0de9a90 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 164.575989] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 164.583585] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 164.591268] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 164.599736] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.605683] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 164.613301] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 164.621114] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 164.628361] Call Trace: [ 164.630937] BUG: unable to handle page fault for address: ffffc900006d8030 [ 164.638222] #PF: supervisor read access in kernel mode [ 164.643472] #PF: error_code(0x0000) - not-present page [ 164.649720] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 164.656738] Oops: 0000 [#19] PREEMPT SMP KASAN [ 164.661299] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 164.668213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.677618] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 164.683047] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 164.702570] RSP: 0018:ffff8881b0de9520 EFLAGS: 00010046 [ 164.708002] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 164.715265] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 164.722601] RBP: ffff8881b0de9560 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 164.729938] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 164.737199] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 164.744901] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 164.753193] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.759243] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 164.767076] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 164.774418] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 164.781663] Call Trace: [ 164.784239] BUG: unable to handle page fault for address: ffffc900006d8030 [ 164.791224] #PF: supervisor read access in kernel mode [ 164.796821] #PF: error_code(0x0000) - not-present page [ 164.802254] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 164.809507] Oops: 0000 [#20] PREEMPT SMP KASAN [ 164.814068] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 164.821351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.830828] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 164.836170] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 164.855337] RSP: 0018:ffff8881b0de8ff0 EFLAGS: 00010046 [ 164.860860] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 164.868108] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 164.875449] RBP: ffff8881b0de9030 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 164.882696] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 164.890378] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 164.897805] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 164.906005] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.912036] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 164.919911] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 164.927244] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 164.934662] Call Trace: [ 164.937242] BUG: unable to handle page fault for address: ffffc900006d8030 [ 164.944228] #PF: supervisor read access in kernel mode [ 164.949537] #PF: error_code(0x0000) - not-present page [ 164.954799] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 164.961980] Oops: 0000 [#21] PREEMPT SMP KASAN [ 164.966564] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 164.973462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.982796] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 164.988137] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 165.007016] RSP: 0018:ffff8881b0de8ac0 EFLAGS: 00010046 [ 165.012371] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 165.019705] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 165.027458] RBP: ffff8881b0de8b00 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 165.034827] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 165.042161] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 165.049407] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 165.057606] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.063481] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 165.070747] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 165.078099] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 165.085707] Call Trace: [ 165.088283] BUG: unable to handle page fault for address: ffffc900006d8030 [ 165.095278] #PF: supervisor read access in kernel mode [ 165.100700] #PF: error_code(0x0000) - not-present page [ 165.106145] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 165.113317] Thread overran stack, or stack corrupted [ 165.118664] Oops: 0000 [#22] PREEMPT SMP KASAN [ 165.123235] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 165.130226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.139759] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 165.145184] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 165.164552] RSP: 0018:ffff8881b0de8590 EFLAGS: 00010046 [ 165.170107] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 165.177357] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 165.184603] RBP: ffff8881b0de85d0 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 165.192022] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 165.199389] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 165.206731] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 165.215357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.221217] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 165.228555] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 165.236020] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 165.243442] Call Trace: [ 165.246044] usercopy: Kernel memory overwrite attempt detected to SLAB object 'names_cache' (offset 4328, size 2)! [ 165.256634] ------------[ cut here ]------------ [ 165.261387] kernel BUG at mm/usercopy.c:98! [ 165.265697] invalid opcode: 0000 [#23] PREEMPT SMP KASAN [ 165.271805] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 165.278835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.288269] RIP: 0010:usercopy_abort+0x75/0x77 [ 165.292916] Code: 0f 45 c6 48 c7 c2 60 83 14 87 48 c7 c6 e0 82 14 87 51 48 0f 45 f2 48 89 f9 41 52 48 89 c2 48 c7 c7 80 84 14 87 e8 70 45 b3 ff <0f> 0b e8 ca 77 f9 ff 4d 89 e0 31 c9 44 89 ea 31 f6 48 c7 c7 80 85 [ 165.312991] RSP: 0018:ffff8881b0de7688 EFLAGS: 00010082 [ 165.318636] RAX: 0000000000000066 RBX: ffff8881b0de7768 RCX: 0000000000000016 [ 165.325887] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff89d47080 [ 165.333325] RBP: ffff8881b0de76a0 R08: ffffed103b604101 R09: ffffed103b604101 [ 165.340731] R10: ffffed103b604100 R11: ffff8881db020807 R12: 0000000000000002 [ 165.348593] R13: 0000000000000000 R14: ffffea0006c37980 R15: ffff8881b0de776a [ 165.356032] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 165.364685] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.370545] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 165.377908] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 165.385157] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 165.392636] Call Trace: [ 165.395216] BUG: unable to handle page fault for address: ffffc900006d8030 [ 165.402204] #PF: supervisor read access in kernel mode [ 165.407771] #PF: error_code(0x0000) - not-present page [ 165.413124] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 165.420112] Thread overran stack, or stack corrupted [ 165.425192] Oops: 0000 [#24] PREEMPT SMP KASAN [ 165.430103] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 165.445083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.454466] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 165.459809] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 165.479208] RSP: 0018:ffff8881b0de7308 EFLAGS: 00010046 [ 165.484723] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 165.492241] RDX: ffffffff8820dbc0 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 165.499591] RBP: ffff8881b0de7348 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 165.507317] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 165.514655] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 165.522272] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 165.530561] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.536705] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 165.544143] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 165.551580] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 165.559163] Call Trace: [ 165.561912] BUG: unable to handle page fault for address: ffffc900006d8030 [ 165.569357] #PF: supervisor read access in kernel mode [ 165.574607] #PF: error_code(0x0000) - not-present page [ 165.580135] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3cb1067 PTE 0 [ 165.587400] Thread overran stack, or stack corrupted [ 165.592478] Oops: 0000 [#25] PREEMPT SMP KASAN [ 165.597492] CPU: 0 PID: 6117 Comm: syz-executor4 Not tainted 5.3.0-rc5 #1 [ 165.604656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.614106] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 165.619630] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 165.638600] RSP: 0018:ffff8881b0de6dd0 EFLAGS: 00010046 [ 165.644117] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 165.651539] RDX: ffffffff8820dbc0 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 165.658793] RBP: ffff8881b0de6e10 R08: ffffffff8820dbc0 R09: 0000000000000001 [ 165.666258] R10: fffffbfff11ebc07 R11: ffff8881ce158080 R12: ffff8881cd616cb8 [ 165.673789] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 165.681210] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 165.689683] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.695542] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 165.702966] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 165.710408] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 165.718089] Call Trace: [ 165.720650] Modules linked in: [ 165.723907] CR2: ffffc900006d8030 [ 165.727756] ---[ end trace 7736a6acbbe83718 ]--- [ 165.732585] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 165.738098] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 165.757760] RSP: 0018:ffff8881b0def280 EFLAGS: 00010046 [ 165.763271] RAX: 1ffff920000db006 RBX: 0000000000000000 RCX: 0000000000000000 [ 165.770607] RDX: ffff8881b0def448 RSI: 0000000000019852 RDI: ffffc900006d8002 [ 165.777853] RBP: ffff8881b0def2c0 R08: ffffffff8820dbc0 R09: ffffed103b606c4c [ 165.785270] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881cd616cb8 [ 165.792777] R13: ffffc900006d8000 R14: dffffc0000000000 R15: ffff8881cd616cb8 [ 165.800038] FS: 0000555555c0c940(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 165.808667] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.814785] CR2: ffffc900006d8030 CR3: 00000001d18ad000 CR4: 00000000001406f0 [ 165.822142] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 165.829563] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 165.837180] Kernel panic - not syncing: Fatal exception [ 165.845228] Kernel Offset: disabled [ 165.849150] Rebooting in 86400 seconds..