Warning: Permanently added '10.128.0.161' (ECDSA) to the list of known hosts. 2019/11/29 13:32:18 fuzzer started 2019/11/29 13:32:20 dialing manager at 10.128.0.105:40749 2019/11/29 13:32:25 syscalls: 2589 2019/11/29 13:32:25 code coverage: enabled 2019/11/29 13:32:25 comparison tracing: enabled 2019/11/29 13:32:25 extra coverage: extra coverage is not supported by the kernel 2019/11/29 13:32:25 setuid sandbox: enabled 2019/11/29 13:32:25 namespace sandbox: enabled 2019/11/29 13:32:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/29 13:32:25 fault injection: enabled 2019/11/29 13:32:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/29 13:32:25 net packet injection: enabled 2019/11/29 13:32:25 net device setup: enabled 2019/11/29 13:32:25 concurrency sanitizer: enabled 2019/11/29 13:32:25 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 66.907499][ T7681] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/29 13:32:34 adding functions to KCSAN blacklist: 'dd_has_work' 'ext4_nonda_switch' 'watchdog' 'mm_update_next_owner' 'copy_process' 'hrtimer_wakeup' 'find_next_bit' 'generic_fillattr' 'find_get_pages_range_tag' 'ext4_free_inode' 'vm_area_dup' 'blk_mq_dispatch_rq_list' 'blk_mq_get_request' 'poll_schedule_timeout' 'wbt_issue' 'do_signal_stop' 'pcpu_alloc' 'do_nanosleep' 'generic_write_end' 'rcu_gp_fqs_check_wake' '__hrtimer_run_queues' 'ext4_has_free_clusters' 'echo_char' 'tick_do_update_jiffies64' 'tick_nohz_idle_stop_tick' 'process_srcu' 'ext4_free_inodes_count' 'tcp_add_backlog' '__rb_erase_color' 'generic_permission' 'add_timer' 'xas_clear_mark' 'list_lru_count_one' 'snd_timer_pause' 'ktime_get_real_seconds' 'wbt_wait' 'tick_sched_do_timer' 'kauditd_thread' 'blk_mq_sched_dispatch_requests' 'mod_timer' 'xas_find_marked' 'run_timer_softirq' 'taskstats_exit' 'sit_tunnel_xmit' 'lruvec_lru_size' 'snd_seq_check_queue' 'tomoyo_supervisor' 'n_tty_receive_buf_common' '__dev_queue_xmit' 'audit_log_start' 'do_readlinkat' 'pipe_poll' 'ep_poll' '__ext4_new_inode' 13:34:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000580)=""/197, 0xc5, 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x3600000000000000, 0xe80, 0x3af, &(0x7f0000000280)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522d545fe2687c2c84e7e277dbeec093d28e628e0deeb87dfb97e2cf537f8a290ef8dfd470f07d7f7e18902313db58fceda21", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000100)}, 0x28) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6, 0xdfd2b4178286dd15) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000000c0)={0x0, "88862b0fd8415dcdbee924ba9a4cf98fe1bdd9c5291e65a744b435719e1123dd", 0x144, 0x80000, 0x0, 0x8, 0x3}) 13:34:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f00000003c0)="cee3f87a611a530000002a0d614f", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 187.978142][ T7684] IPVS: ftp: loaded support on port[0] = 21 [ 188.064325][ T7684] chnl_net:caif_netlink_parms(): no params data found [ 188.125332][ T7684] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.142360][ T7684] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.150343][ T7684] device bridge_slave_0 entered promiscuous mode [ 188.163920][ T7684] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.171128][ T7684] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.179421][ T7684] device bridge_slave_1 entered promiscuous mode [ 188.192150][ T7687] IPVS: ftp: loaded support on port[0] = 21 [ 188.213657][ T7684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 13:34:29 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000001040)) [ 188.234829][ T7684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.272765][ T7684] team0: Port device team_slave_0 added [ 188.293945][ T7684] team0: Port device team_slave_1 added [ 188.394480][ T7684] device hsr_slave_0 entered promiscuous mode [ 188.433239][ T7684] device hsr_slave_1 entered promiscuous mode 13:34:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) socket$inet6_sctp(0xa, 0x801, 0x84) sendmsg$tipc(r3, &(0x7f0000000500)={&(0x7f0000000280), 0x10, 0x0}, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 188.525733][ T7687] chnl_net:caif_netlink_parms(): no params data found [ 188.579195][ T7690] IPVS: ftp: loaded support on port[0] = 21 [ 188.657817][ T7687] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.692583][ T7687] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.717430][ T7687] device bridge_slave_0 entered promiscuous mode [ 188.745697][ T7684] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.752871][ T7684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.760182][ T7684] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.767409][ T7684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.839394][ T7687] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.852383][ T7687] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.883656][ T7687] device bridge_slave_1 entered promiscuous mode [ 188.910067][ T7715] IPVS: ftp: loaded support on port[0] = 21 [ 188.976661][ T7687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.032008][ T7687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.064987][ T7684] 8021q: adding VLAN 0 to HW filter on device bond0 13:34:29 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x9c) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) read(r1, &(0x7f0000000240)=""/143, 0x8f) [ 189.098314][ T3019] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.123881][ T3019] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.143158][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 189.213248][ T7684] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.230022][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.252951][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.303660][ T7690] chnl_net:caif_netlink_parms(): no params data found [ 189.325290][ T7687] team0: Port device team_slave_0 added [ 189.334912][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.353235][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.392540][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.399888][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.443955][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.463962][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.485524][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.493150][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.533190][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.587592][ T7687] team0: Port device team_slave_1 added [ 189.600033][ T7719] IPVS: ftp: loaded support on port[0] = 21 [ 189.608453][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.623987][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.648690][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.684644][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.704647][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.733418][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.762819][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.792945][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.813087][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.848732][ T7684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 13:34:30 executing program 5: r0 = epoll_create1(0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) [ 189.957851][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.996944][ T7687] device hsr_slave_0 entered promiscuous mode [ 190.052647][ T7687] device hsr_slave_1 entered promiscuous mode [ 190.093981][ T7687] debugfs: Directory 'hsr0' with parent '/' already present! [ 190.117663][ T7690] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.130040][ T7690] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.140530][ T7690] device bridge_slave_0 entered promiscuous mode [ 190.160530][ T7690] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.167895][ T7690] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.175882][ T7690] device bridge_slave_1 entered promiscuous mode [ 190.198265][ T7715] chnl_net:caif_netlink_parms(): no params data found [ 190.223301][ T7730] IPVS: ftp: loaded support on port[0] = 21 [ 190.284195][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.291622][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.375387][ T7684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.399319][ T7690] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.451704][ T7690] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 190.511363][ T7715] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.544625][ T7715] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.565062][ T7715] device bridge_slave_0 entered promiscuous mode [ 190.619018][ T7715] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.632317][ T7715] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.640212][ T7715] device bridge_slave_1 entered promiscuous mode [ 190.708597][ T7690] team0: Port device team_slave_0 added [ 190.733678][ T7690] team0: Port device team_slave_1 added [ 190.771713][ T7719] chnl_net:caif_netlink_parms(): no params data found [ 190.802033][ T7715] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.864736][ T7690] device hsr_slave_0 entered promiscuous mode [ 190.882614][ T7690] device hsr_slave_1 entered promiscuous mode [ 190.922331][ T7690] debugfs: Directory 'hsr0' with parent '/' already present! [ 190.947984][ T7715] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.027466][ T7687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.086003][ T7687] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.098024][ C1] hrtimer: interrupt took 26560 ns [ 191.147095][ T7715] team0: Port device team_slave_0 added [ 191.217125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.243278][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:34:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000580)=""/197, 0xc5, 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333aadaf2f76f162100b389420dc017983451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfb540ebec677d6ac14c2c794f72cbf5fe71789e70233bfd8115efd90b0c48278f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d3e73c164e461e808181259a33c96707280fd13eb31cadac89062402d3af53d2ed2ae8222ac8284cde8eb251f612c93611f917cfaa5378532ecb7e89963d515d3cf4d6c0a7d972fce27e1e1c071ea25764d9d3861ff41cc125316f845e9297360d483b97a54169c0ed8971b1dadbfb76f893ce7cd06f867ef285ebfb4fc52c98d302643d74931fe57ef693d455c2cb045a52252c8f60a350f7bcd3afb721ae464e124d91d8d7f165e94da93e425c3ada6cfd3001eb940ff488796cc2113de6477d100753e14ad8f63748f9e7fe71d4ddf00286b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x3600000000000000, 0xe80, 0x3af, &(0x7f0000000280)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522d545fe2687c2c84e7e277dbeec093d28e628e0deeb87dfb97e2cf537f8a290ef8dfd470f07d7f7e18902313db58fceda21", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000100)}, 0x28) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6, 0xdfd2b4178286dd15) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000000c0)={0x0, "88862b0fd8415dcdbee924ba9a4cf98fe1bdd9c5291e65a744b435719e1123dd", 0x144, 0x80000, 0x0, 0x8, 0x3}) [ 191.324518][ T7715] team0: Port device team_slave_1 added [ 191.396423][ T7730] chnl_net:caif_netlink_parms(): no params data found [ 191.457319][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.478667][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.549840][ T7755] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.557018][ T7755] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.630187][ T7719] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.655398][ T7719] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.703576][ T7719] device bridge_slave_0 entered promiscuous mode [ 191.782528][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.825041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.873329][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.881774][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.888868][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.012561][ T7719] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.019838][ T7719] bridge0: port 2(bridge_slave_1) entered disabled state 13:34:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000580)=""/197, 0xc5, 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x3600000000000000, 0xe80, 0x3af, &(0x7f0000000280)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522d545fe2687c2c84e7e277dbeec093d28e628e0deeb87dfb97e2cf537f8a290ef8dfd470f07d7f7e18902313db58fceda21", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000100)}, 0x28) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6, 0xdfd2b4178286dd15) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000000c0)={0x0, "88862b0fd8415dcdbee924ba9a4cf98fe1bdd9c5291e65a744b435719e1123dd", 0x144, 0x80000, 0x0, 0x8, 0x3}) [ 192.103064][ T7719] device bridge_slave_1 entered promiscuous mode [ 192.174826][ T7715] device hsr_slave_0 entered promiscuous mode [ 192.212806][ T7715] device hsr_slave_1 entered promiscuous mode [ 192.248767][ T7715] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.326957][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.364787][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.425675][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.482949][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.510499][ T7719] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.586370][ T7719] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.656214][ T7730] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.685713][ T7730] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.732559][ T7730] device bridge_slave_0 entered promiscuous mode [ 192.740661][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.785749][ T7730] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.798296][ T7730] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.843158][ T7730] device bridge_slave_1 entered promiscuous mode [ 192.852899][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.871763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.885855][ T7687] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 13:34:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000580)=""/197, 0xc5, 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x3600000000000000, 0xe80, 0x3af, &(0x7f0000000280)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522d545fe2687c2c84e7e277dbeec093d28e628e0deeb87dfb97e2cf537f8a290ef8dfd470f07d7f7e18902313db58fceda21", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000100)}, 0x28) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6, 0xdfd2b4178286dd15) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000000c0)={0x0, "88862b0fd8415dcdbee924ba9a4cf98fe1bdd9c5291e65a744b435719e1123dd", 0x144, 0x80000, 0x0, 0x8, 0x3}) [ 192.937467][ T7687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.037496][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.076594][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.121122][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.175741][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.221393][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.293196][ T7719] team0: Port device team_slave_0 added [ 193.326276][ T7690] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.351071][ T7719] team0: Port device team_slave_1 added [ 193.361978][ T7730] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.405293][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 193.435459][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 193.507808][ T7687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.560974][ T7690] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.597435][ T7730] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.636545][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.648340][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.730294][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.752921][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.809719][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.817068][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.934870][ T7719] device hsr_slave_0 entered promiscuous mode [ 193.972689][ T7719] device hsr_slave_1 entered promiscuous mode [ 194.005444][ T7719] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.047842][ T7730] team0: Port device team_slave_0 added [ 194.063192][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.071102][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.109288][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.142665][ T3019] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.149752][ T3019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.192841][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.202108][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.263315][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.285715][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.313313][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.352993][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.401054][ T7690] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 194.460544][ T7690] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.525178][ T7730] team0: Port device team_slave_1 added [ 194.584480][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.603000][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.611476][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.693294][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.717810][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.783398][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.801536][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 194.855560][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 194.965804][ T7690] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.045278][ T7730] device hsr_slave_0 entered promiscuous mode [ 195.095287][ T7730] device hsr_slave_1 entered promiscuous mode [ 195.114643][ T7730] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.126902][ T7715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.207413][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.224117][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.266014][ T7715] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.300305][ T7719] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.349267][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.374122][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.404396][ T7791] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.411538][ T7791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.480831][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.513881][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.565234][ T7791] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.572534][ T7791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.641224][ T7791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.712218][ T7719] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.759917][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.780630][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.864338][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.923230][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.982310][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.025319][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.053275][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.105663][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.136452][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.165601][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.208624][ T7715] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.239781][ T7715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.309421][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.321866][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.355511][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.385356][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.415740][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.436367][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.443500][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.472051][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.494813][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.508908][ T12] bridge0: port 2(bridge_slave_1) entered blocking state 13:34:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000580)=""/197, 0xc5, 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x3600000000000000, 0xe80, 0x3af, &(0x7f0000000280)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522d545fe2687c2c84e7e277dbeec093d28e628e0deeb87dfb97e2cf537f8a290ef8dfd470f07d7f7e18902313db58fceda21", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000100)}, 0x28) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6, 0xdfd2b4178286dd15) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000000c0)={0x0, "88862b0fd8415dcdbee924ba9a4cf98fe1bdd9c5291e65a744b435719e1123dd", 0x144, 0x80000, 0x0, 0x8, 0x3}) 13:34:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f00000003c0)="cee3f87a611a530000002a0d614f", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 196.516161][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.527768][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.576156][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.641999][ T7719] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 196.802288][ T7719] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 13:34:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f00000003c0)="cee3f87a611a530000002a0d614f", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 13:34:37 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000001040)) [ 196.897940][ T7715] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.921475][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.961373][ T7851] ================================================================== [ 196.969515][ T7851] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 196.970782][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.977132][ T7851] [ 196.977148][ T7851] read to 0xffff8880bb047588 of 2 bytes by task 7824 on cpu 0: [ 196.977167][ T7851] pid_update_inode+0x25/0x70 [ 196.977180][ T7851] pid_revalidate+0x91/0xd0 [ 196.977195][ T7851] lookup_fast+0x6f2/0x700 [ 196.977208][ T7851] walk_component+0x6d/0xe70 [ 196.977224][ T7851] link_path_walk.part.0+0x5d3/0xa90 [ 196.977238][ T7851] path_openat+0x14f/0x36e0 [ 196.977254][ T7851] do_filp_open+0x11e/0x1b0 [ 196.977270][ T7851] do_sys_open+0x3b3/0x4f0 [ 196.977293][ T7851] __x64_sys_open+0x55/0x70 [ 197.037350][ T7851] do_syscall_64+0xcc/0x370 [ 197.041859][ T7851] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 197.047846][ T7851] [ 197.050208][ T7851] write to 0xffff8880bb047588 of 2 bytes by task 7851 on cpu 1: [ 197.057931][ T7851] pid_update_inode+0x51/0x70 [ 197.062615][ T7851] pid_revalidate+0x91/0xd0 [ 197.067227][ T7851] lookup_fast+0x6f2/0x700 [ 197.071647][ T7851] walk_component+0x6d/0xe70 [ 197.076239][ T7851] link_path_walk.part.0+0x5d3/0xa90 [ 197.081531][ T7851] path_openat+0x14f/0x36e0 [ 197.086048][ T7851] do_filp_open+0x11e/0x1b0 [ 197.090555][ T7851] do_sys_open+0x3b3/0x4f0 [ 197.094982][ T7851] __x64_sys_open+0x55/0x70 [ 197.099492][ T7851] do_syscall_64+0xcc/0x370 [ 197.104019][ T7851] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 197.109909][ T7851] [ 197.112431][ T7851] Reported by Kernel Concurrency Sanitizer on: [ 197.118593][ T7851] CPU: 1 PID: 7851 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 197.124331][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.125867][ T7851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.125873][ T7851] ================================================================== [ 197.125888][ T7851] Kernel panic - not syncing: panic_on_warn set ... [ 197.158462][ T7851] CPU: 1 PID: 7851 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 197.165654][ T7851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.175808][ T7851] Call Trace: [ 197.179109][ T7851] dump_stack+0x11d/0x181 [ 197.183463][ T7851] panic+0x210/0x640 [ 197.187444][ T7851] ? vprintk_func+0x8d/0x140 [ 197.192061][ T7851] kcsan_report.cold+0xc/0xd [ 197.196697][ T7851] kcsan_setup_watchpoint+0x3fe/0x460 [ 197.202103][ T7851] __tsan_unaligned_write2+0xc4/0x100 [ 197.207492][ T7851] pid_update_inode+0x51/0x70 [ 197.212285][ T7851] pid_revalidate+0x91/0xd0 [ 197.214838][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.216973][ T7851] lookup_fast+0x6f2/0x700 [ 197.229286][ T7851] walk_component+0x6d/0xe70 [ 197.233893][ T7851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.240143][ T7851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.246390][ T7851] ? security_inode_permission+0xa5/0xc0 [ 197.252038][ T7851] ? inode_permission+0xa0/0x3c0 [ 197.257005][ T7851] link_path_walk.part.0+0x5d3/0xa90 [ 197.262718][ T7851] path_openat+0x14f/0x36e0 [ 197.267246][ T7851] ? __read_once_size.constprop.0+0x12/0x20 [ 197.273153][ T7851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.279400][ T7851] ? __virt_addr_valid+0x126/0x190 [ 197.284518][ T7851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.290851][ T7851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.297480][ T7851] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 197.303401][ T7851] ? __read_once_size+0x41/0xe0 [ 197.308267][ T7851] do_filp_open+0x11e/0x1b0 [ 197.312789][ T7851] ? __alloc_fd+0x2ef/0x3b0 [ 197.317404][ T7851] do_sys_open+0x3b3/0x4f0 [ 197.319757][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.321838][ T7851] __x64_sys_open+0x55/0x70 [ 197.321879][ T7851] do_syscall_64+0xcc/0x370 [ 197.338679][ T7851] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 197.344574][ T7851] RIP: 0033:0x7f940c7cd120 [ 197.349371][ T7851] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 197.369151][ T7851] RSP: 002b:00007ffd658ea078 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 197.377566][ T7851] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f940c7cd120 [ 197.385549][ T7851] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f940cc9bd00 [ 197.393552][ T7851] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f940ca9557b [ 197.401530][ T7851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f940cc9ad00 [ 197.409510][ T7851] R13: 0000000000000020 R14: 0000000000000005 R15: 0000000000000000 [ 197.419198][ T7851] Kernel Offset: disabled [ 197.424401][ T7851] Rebooting in 86400 seconds..