[ 43.497899][ T26] audit: type=1800 audit(1574871534.810:21): pid=7521 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 43.547661][ T26] audit: type=1800 audit(1574871534.810:22): pid=7521 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 44.843088][ T7586] sshd (7586) used greatest stack depth: 10128 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.246' (ECDSA) to the list of known hosts. 2019/11/27 16:19:05 fuzzer started 2019/11/27 16:19:07 dialing manager at 10.128.0.105:36065 2019/11/27 16:19:08 syscalls: 2567 2019/11/27 16:19:08 code coverage: enabled 2019/11/27 16:19:08 comparison tracing: enabled 2019/11/27 16:19:08 extra coverage: extra coverage is not supported by the kernel 2019/11/27 16:19:08 setuid sandbox: enabled 2019/11/27 16:19:08 namespace sandbox: enabled 2019/11/27 16:19:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/27 16:19:08 fault injection: enabled 2019/11/27 16:19:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/27 16:19:08 net packet injection: enabled 2019/11/27 16:19:08 net device setup: enabled 2019/11/27 16:19:08 concurrency sanitizer: enabled 2019/11/27 16:19:08 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/27 16:19:10 adding functions to KCSAN blacklist: 'ep_poll' 'rcu_gp_fqs_check_wake' 'find_get_pages_range_tag' 'find_next_bit' 'icmp_global_allow' 'pipe_poll' 'tomoyo_supervisor' 'tcp_add_backlog' '__hrtimer_run_queues' 'tick_nohz_idle_stop_tick' 'blk_mq_run_hw_queue' 'blk_mq_get_request' 16:19:17 executing program 0: sysfs$1(0x1, &(0x7f0000000080)='#\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{0x77359400}, 0x5, 0x5, 0x5}], 0x18) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) r2 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r2, &(0x7f0000000240)={0x800}, 0x0) syzkaller login: [ 66.123615][ T7695] IPVS: ftp: loaded support on port[0] = 21 16:19:17 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000240)='h', 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xa5776b) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 66.196110][ T7695] chnl_net:caif_netlink_parms(): no params data found [ 66.251342][ T7695] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.267492][ T7695] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.287396][ T7695] device bridge_slave_0 entered promiscuous mode [ 66.298453][ T7695] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.305625][ T7695] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.327926][ T7695] device bridge_slave_1 entered promiscuous mode [ 66.365351][ T7695] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.388726][ T7695] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 16:19:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00'}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 66.410333][ T7695] team0: Port device team_slave_0 added [ 66.417141][ T7695] team0: Port device team_slave_1 added [ 66.459942][ T7695] device hsr_slave_0 entered promiscuous mode [ 66.507531][ T7695] device hsr_slave_1 entered promiscuous mode [ 66.593718][ T7698] IPVS: ftp: loaded support on port[0] = 21 [ 66.594061][ T7700] IPVS: ftp: loaded support on port[0] = 21 [ 66.639149][ T7695] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.650410][ T7695] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.657713][ T7695] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.664780][ T7695] bridge0: port 1(bridge_slave_0) entered forwarding state 16:19:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x1, 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x4000000032, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x24a, 0x0) [ 66.929593][ T7695] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.014348][ T7695] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.053827][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.068444][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.097707][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.129145][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 67.205898][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.237528][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.244632][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.277842][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.308221][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.315313][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.390262][ T7698] chnl_net:caif_netlink_parms(): no params data found [ 67.401337][ T7730] IPVS: ftp: loaded support on port[0] = 21 [ 67.411009][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.439201][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.468531][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.497588][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.506436][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.558126][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.567173][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.598085][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 16:19:18 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x10004000000002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000004c0)="f21d8385ff", 0x5) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@local, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000880)="3ced01712ebbbbb101f33c4ca2403832096d9ae11ceb2e42972c9b06e8a891d536cc267d1fc23e84a952f0eb9a6f940f75c4c42924d310fcecb6ff62d3525f4df1e21b32dd753a953affdc61c026982d62f44cb2c62db352d941181b368a8819658531d1595c8cb3f71ddaea75e1d8000aabc16a090196514732ad05fef9d554", 0x80}, {&(0x7f0000000940)}], 0x2}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)={{0x0, 0x0, 0xee00, 0x0, 0xee01}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 67.610860][ T7700] chnl_net:caif_netlink_parms(): no params data found [ 67.632282][ T7695] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.658178][ T7695] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.687579][ T7726] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.695949][ T7726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.748789][ T7726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.810323][ T7695] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.892965][ T7698] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.947358][ T7698] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.955279][ T7698] device bridge_slave_0 entered promiscuous mode [ 68.000212][ T7698] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.034949][ T7698] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.059730][ T7698] device bridge_slave_1 entered promiscuous mode [ 68.091838][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.118054][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 68.154335][ T7734] IPVS: ftp: loaded support on port[0] = 21 [ 68.172118][ T7700] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.204385][ T7700] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.218027][ T7700] device bridge_slave_0 entered promiscuous mode [ 68.235317][ T7700] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.254430][ T7700] bridge0: port 2(bridge_slave_1) entered disabled state 16:19:19 executing program 5: mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$setstatus(r0, 0x4, 0x42000) r1 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0}) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x1) r2 = socket(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r2) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x1ffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, 0x0) [ 68.277995][ T7700] device bridge_slave_1 entered promiscuous mode [ 68.302182][ T7698] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.316198][ T7698] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.349545][ T7700] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.393763][ T7700] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.404782][ T7698] team0: Port device team_slave_0 added [ 68.433704][ T7698] team0: Port device team_slave_1 added 16:19:19 executing program 0: sysfs$1(0x1, &(0x7f0000000080)='#\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{0x77359400}, 0x5, 0x5, 0x5}], 0x18) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) r2 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r2, &(0x7f0000000240)={0x800}, 0x0) [ 68.497864][ T7700] team0: Port device team_slave_0 added [ 68.504607][ T7700] team0: Port device team_slave_1 added 16:19:19 executing program 0: sysfs$1(0x1, &(0x7f0000000080)='#\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{0x77359400}, 0x5, 0x5, 0x5}], 0x18) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) r2 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r2, &(0x7f0000000240)={0x800}, 0x0) [ 68.561410][ T7698] device hsr_slave_0 entered promiscuous mode 16:19:19 executing program 0: sysfs$1(0x1, &(0x7f0000000080)='#\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{0x77359400}, 0x5, 0x5, 0x5}], 0x18) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) r2 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r2, &(0x7f0000000240)={0x800}, 0x0) [ 68.627600][ T7698] device hsr_slave_1 entered promiscuous mode [ 68.647363][ T7698] debugfs: Directory 'hsr0' with parent '/' already present! [ 68.696590][ T7748] IPVS: ftp: loaded support on port[0] = 21 16:19:20 executing program 0: sysfs$1(0x1, &(0x7f0000000080)='#\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{0x77359400}, 0x5, 0x5, 0x5}], 0x18) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) r2 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r2, &(0x7f0000000240)={0x800}, 0x0) [ 68.748059][ T7730] chnl_net:caif_netlink_parms(): no params data found [ 68.799479][ T7700] device hsr_slave_0 entered promiscuous mode [ 68.827651][ T7700] device hsr_slave_1 entered promiscuous mode [ 68.857294][ T7700] debugfs: Directory 'hsr0' with parent '/' already present! 16:19:20 executing program 0: sysfs$1(0x1, &(0x7f0000000080)='#\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{0x77359400}, 0x5, 0x5, 0x5}], 0x18) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) r2 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r2, &(0x7f0000000240)={0x800}, 0x0) [ 68.981847][ T7734] chnl_net:caif_netlink_parms(): no params data found [ 69.139802][ T7730] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.146897][ T7730] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.218761][ T7730] device bridge_slave_0 entered promiscuous mode 16:19:20 executing program 0: sysfs$1(0x1, &(0x7f0000000080)='#\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{0x77359400}, 0x5, 0x5, 0x5}], 0x18) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) r2 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r2, &(0x7f0000000240)={0x800}, 0x0) [ 69.317443][ T7730] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.325470][ T7730] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.397454][ T7730] device bridge_slave_1 entered promiscuous mode [ 69.449395][ T7698] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.515237][ T7734] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.540740][ T7734] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.578104][ T7734] device bridge_slave_0 entered promiscuous mode [ 69.626600][ T7698] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.686364][ T7700] 8021q: adding VLAN 0 to HW filter on device bond0 16:19:21 executing program 0: sysfs$1(0x1, &(0x7f0000000080)='#\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{0x77359400}, 0x5, 0x5, 0x5}], 0x18) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) r2 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r2, &(0x7f0000000240)={0x800}, 0x0) [ 69.727976][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.735883][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.792489][ T7734] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.809900][ T7734] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.868085][ T7734] device bridge_slave_1 entered promiscuous mode [ 69.925399][ T7700] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.952612][ T7730] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.977608][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.998066][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.110405][ T2870] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.117638][ T2870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.137853][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.190215][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.230331][ T2870] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.237495][ T2870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.267941][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.320569][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.370654][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.417990][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.460596][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.500859][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.540600][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.577876][ T2870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.627941][ T7748] chnl_net:caif_netlink_parms(): no params data found [ 70.699585][ T7730] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.717716][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.725754][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.778241][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.827521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.871193][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.918017][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.968095][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.020445][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.047647][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.055057][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.147874][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.190562][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.229921][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.237014][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.300122][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.355957][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.378735][ T7772] ================================================================== [ 71.386899][ T7772] BUG: KCSAN: data-race in vm_area_dup / vma_interval_tree_augment_rotate [ 71.395390][ T7772] [ 71.397744][ T7772] write to 0xffff888122db9cf0 of 8 bytes by task 7822 on cpu 0: [ 71.405381][ T7772] vma_interval_tree_augment_rotate+0xde/0x100 [ 71.411545][ T7772] __rb_insert_augmented+0x115/0x370 [ 71.416832][ T7772] vma_interval_tree_insert_after+0x14b/0x170 [ 71.422915][ T7772] dup_mm+0x53e/0xba0 [ 71.426904][ T7772] copy_process+0x36f3/0x3b50 [ 71.431578][ T7772] _do_fork+0xfe/0x6e0 [ 71.435652][ T7772] __x64_sys_clone+0x12b/0x160 [ 71.440421][ T7772] do_syscall_64+0xcc/0x370 [ 71.444935][ T7772] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.450822][ T7772] [ 71.453156][ T7772] read to 0xffff888122db9c80 of 200 bytes by task 7772 on cpu 1: [ 71.460879][ T7772] vm_area_dup+0x70/0xf0 [ 71.465136][ T7772] dup_mm+0x330/0xba0 [ 71.469117][ T7772] copy_process+0x36f3/0x3b50 [ 71.473804][ T7772] _do_fork+0xfe/0x6e0 [ 71.477881][ T7772] __x64_sys_clone+0x12b/0x160 [ 71.482655][ T7772] do_syscall_64+0xcc/0x370 [ 71.487178][ T7772] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.493429][ T7772] [ 71.495868][ T7772] Reported by Kernel Concurrency Sanitizer on: [ 71.502033][ T7772] CPU: 1 PID: 7772 Comm: net.agent Not tainted 5.4.0-syzkaller #0 [ 71.510273][ T7772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.520335][ T7772] ================================================================== [ 71.528505][ T7772] Kernel panic - not syncing: panic_on_warn set ... [ 71.535543][ T7772] CPU: 1 PID: 7772 Comm: net.agent Not tainted 5.4.0-syzkaller #0 [ 71.543374][ T7772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.553526][ T7772] Call Trace: [ 71.556828][ T7772] dump_stack+0x11d/0x181 [ 71.561175][ T7772] panic+0x210/0x640 [ 71.565087][ T7772] ? vprintk_func+0x8d/0x140 [ 71.569692][ T7772] kcsan_report.cold+0xc/0xd [ 71.574297][ T7772] kcsan_setup_watchpoint+0x3fe/0x460 [ 71.579687][ T7772] __tsan_read_range+0xc4/0x100 [ 71.584813][ T7772] vm_area_dup+0x70/0xf0 [ 71.589402][ T7772] dup_mm+0x330/0xba0 [ 71.593402][ T7772] copy_process+0x36f3/0x3b50 [ 71.598709][ T7772] ? apparmor_file_alloc_security+0x1c9/0x4a0 [ 71.604881][ T7772] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 71.610921][ T7772] _do_fork+0xfe/0x6e0 [ 71.615020][ T7772] ? __write_once_size+0x41/0xe0 [ 71.620119][ T7772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 71.626536][ T7772] ? __fd_install+0x117/0x230 [ 71.631199][ T7772] ? get_unused_fd_flags+0x93/0xc0 [ 71.636453][ T7772] __x64_sys_clone+0x12b/0x160 [ 71.641229][ T7772] do_syscall_64+0xcc/0x370 [ 71.646114][ T7772] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.652080][ T7772] RIP: 0033:0x7f3453254f46 [ 71.656483][ T7772] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 14 25 10 00 00 00 31 d2 49 81 c2 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 31 01 00 00 85 c0 41 89 c4 0f 85 3b 01 00 [ 71.676429][ T7772] RSP: 002b:00007ffdde443c70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 71.686158][ T7772] RAX: ffffffffffffffda RBX: 00007ffdde443c70 RCX: 00007f3453254f46 [ 71.694552][ T7772] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 71.702763][ T7772] RBP: 00007ffdde443cb0 R08: 0000000000001e5c R09: 0000000000001e5c [ 71.710911][ T7772] R10: 00007f345374b9d0 R11: 0000000000000246 R12: 0000000000000000 [ 71.719300][ T7772] R13: 0000000000000000 R14: 0000000000415c42 R15: 0000000000000101 [ 71.728611][ T7772] Kernel Offset: disabled [ 71.732955][ T7772] Rebooting in 86400 seconds..