Warning: Permanently added '10.128.0.110' (ECDSA) to the list of known hosts. 2019/06/03 19:27:08 fuzzer started [ 49.353737] audit: type=1400 audit(1559590027.978:36): avc: denied { map } for pid=7631 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/03 19:27:11 dialing manager at 10.128.0.105:46883 2019/06/03 19:27:11 syscalls: 2456 2019/06/03 19:27:11 code coverage: enabled 2019/06/03 19:27:11 comparison tracing: enabled 2019/06/03 19:27:11 extra coverage: extra coverage is not supported by the kernel 2019/06/03 19:27:11 setuid sandbox: enabled 2019/06/03 19:27:11 namespace sandbox: enabled 2019/06/03 19:27:11 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/03 19:27:11 fault injection: enabled 2019/06/03 19:27:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/03 19:27:11 net packet injection: enabled 2019/06/03 19:27:11 net device setup: enabled 19:27:15 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000140)=0x370) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x2f1}], 0x1038) sendmmsg(r0, &(0x7f0000000080), 0x400000000000010, 0x0) [ 56.990886] audit: type=1400 audit(1559590035.608:37): avc: denied { map } for pid=7648 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1097 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 57.082751] IPVS: ftp: loaded support on port[0] = 21 [ 57.092606] NET: Registered protocol family 30 [ 57.097237] Failed to register TIPC socket type 19:27:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='rdma.current\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'gretap0\x00', 0x200}) r1 = socket$kcm(0x11, 0xa, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) close(r1) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140), 0x4) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) recvmsg(r1, &(0x7f00000006c0)={&(0x7f0000000280)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/92, 0x5c}, {&(0x7f00000003c0)=""/246, 0xf6}, {&(0x7f00000004c0)=""/17, 0x11}, {&(0x7f0000000500)=""/56, 0x38}, {&(0x7f0000000800)=""/4096, 0x1000}], 0x5, &(0x7f00000005c0)=""/242, 0xf2}, 0x10023) [ 57.359202] IPVS: ftp: loaded support on port[0] = 21 [ 57.386421] NET: Registered protocol family 30 [ 57.391063] Failed to register TIPC socket type 19:27:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f000000a300)=[{{0x0, 0x0, &(0x7f0000004580)=[{&(0x7f0000000ec0)=""/92, 0x5c}, {&(0x7f0000000f40)=""/168, 0xa8}, {&(0x7f0000001000)=""/253, 0xfd}, {&(0x7f0000001100)=""/231, 0xe7}, {&(0x7f00000012c0)=""/90, 0x5a}], 0x5}}], 0x1, 0x0, 0x0) [ 57.679762] IPVS: ftp: loaded support on port[0] = 21 [ 57.706268] NET: Registered protocol family 30 [ 57.712679] Failed to register TIPC socket type 19:27:16 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600000000000a00000000000000000007997f6699000000000000d6dbb905d1f86beb0000000d000800e0020000b89c0fa2997da12ba71996d8ee000000809ac1ec3d95c9a0af6fff0f0000000000e455b088c2a08594e391798e4fd4959ba9b5a7b0588736060000000d463ea43084dc1840039649673b733890eb3db522d9e73a871a9fcc8c8dda870000000002000100000000000000080000ffffff05000500000000000a000001def7bd3e10c05ce000000000fe800000200000003692daa992ee1466"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400024c, 0x0) [ 58.129458] IPVS: ftp: loaded support on port[0] = 21 [ 58.147121] NET: Registered protocol family 30 [ 58.151738] Failed to register TIPC socket type 19:27:17 executing program 4: ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x82) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000780)='./file0\x00', 0x101) io_setup(0x3, &(0x7f0000000240)=0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) io_cancel(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000800)={0x400, 0x0, {0x1, 0x0, 0x0, 0x1, 0x7}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x7}, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x9e, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=0x1f}}, 0x10) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000002c0)}, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, 0x0, 0x1b3) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000880)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f00000007c0)=0xe8) ioprio_get$uid(0x3, r6) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r5, 0x641f) userfaultfd(0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000080)={0xc53, 0x0, 0x9}, 0x0) times(&(0x7f0000000980)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000180)={0x0, 0x7, 0x1}, 0x8) sendfile(r0, r0, 0x0, 0x2000005) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r7, 0x800000c0045002, &(0x7f0000000080)) ioctl$int_in(r7, 0x800000c0045002, &(0x7f0000000040)=0x400000) [ 58.675071] IPVS: ftp: loaded support on port[0] = 21 [ 58.696345] NET: Registered protocol family 30 [ 58.700984] Failed to register TIPC socket type 19:27:17 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12001000ac14141d40d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 59.367021] IPVS: ftp: loaded support on port[0] = 21 [ 59.397058] NET: Registered protocol family 30 [ 59.401689] Failed to register TIPC socket type [ 59.720006] chnl_net:caif_netlink_parms(): no params data found [ 60.154806] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.161545] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.223383] device bridge_slave_0 entered promiscuous mode [ 60.303011] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.309478] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.354116] device bridge_slave_1 entered promiscuous mode [ 60.730670] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.099763] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.626634] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.790023] team0: Port device team_slave_0 added [ 61.965444] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.133881] team0: Port device team_slave_1 added [ 62.387479] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.615496] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.123959] device hsr_slave_0 entered promiscuous mode [ 63.357852] device hsr_slave_1 entered promiscuous mode [ 63.457239] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 63.628138] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 63.909444] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.564896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.733227] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.880673] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.015425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.044463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.158306] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 65.250754] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.434305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 65.441866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.470922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.569125] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.575756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.750652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 65.820828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.833660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.910065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.958596] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.965125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.071269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 66.150962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.239328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 66.302211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.418478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 66.474184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.483050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.553250] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.619335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.662293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.670420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.748941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 66.817292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.832683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.920936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 67.022262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.030287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.125389] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 67.192167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.333208] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 67.444322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.568183] audit: type=1400 audit(1559590046.188:38): avc: denied { associate } for pid=7649 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 19:27:29 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000140)=0x370) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x2f1}], 0x1038) sendmmsg(r0, &(0x7f0000000080), 0x400000000000010, 0x0) 19:27:30 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000140)=0x370) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x2f1}], 0x1038) sendmmsg(r0, &(0x7f0000000080), 0x400000000000010, 0x0) 19:27:31 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000140)=0x370) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x2f1}], 0x1038) sendmmsg(r0, &(0x7f0000000080), 0x400000000000010, 0x0) 19:27:31 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000140)=0x370) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x2f1}], 0x1038) sendmmsg(r0, &(0x7f0000000080), 0x400000000000010, 0x0) 19:27:31 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000140)=0x370) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x2f1}], 0x1038) sendmmsg(r0, &(0x7f0000000080), 0x400000000000010, 0x0) [ 73.368934] IPVS: ftp: loaded support on port[0] = 21 [ 73.416244] NET: Registered protocol family 30 [ 73.453123] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 73.461193] WARNING: CPU: 0 PID: 9 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 73.464117] Failed to register TIPC socket type [ 73.468910] Kernel panic - not syncing: panic_on_warn set ... [ 73.468910] [ 73.468926] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 4.19.47 #19 [ 73.468939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.474890] IPVS: ftp: loaded support on port[0] = 21 [ 73.480965] Call Trace: [ 73.480991] dump_stack+0x172/0x1f0 [ 73.481011] panic+0x263/0x507 [ 73.511330] ? __warn_printk+0xf3/0xf3 [ 73.515303] ? kmem_cache_free.cold+0x1c/0x23 [ 73.519892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 73.525680] ? __warn.cold+0x5/0x4a [ 73.529301] ? __warn+0xe8/0x1d0 [ 73.532669] ? kmem_cache_free.cold+0x1c/0x23 [ 73.537221] __warn.cold+0x20/0x4a [ 73.542131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 73.547667] ? kmem_cache_free.cold+0x1c/0x23 [ 73.552163] report_bug+0x263/0x2b0 [ 73.555794] do_error_trap+0x204/0x360 [ 73.559680] ? math_error+0x340/0x340 [ 73.563607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 73.569136] ? wake_up_klogd+0x99/0xd0 [ 73.573020] ? error_entry+0x76/0xd0 [ 73.576734] ? trace_hardirqs_off_caller+0x65/0x220 [ 73.581743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 73.586603] do_invalid_op+0x1b/0x20 [ 73.590306] invalid_op+0x14/0x20 [ 73.593764] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 73.598862] Code: e8 95 ab 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 66 38 88 49 8b 54 24 58 e8 44 3d b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 c0 44 54 87 48 c7 c7 78 [ 73.617953] RSP: 0018:ffff8880aa237ba8 EFLAGS: 00010286 [ 73.623305] RAX: 0000000000000046 RBX: ffff8880729eb300 RCX: 0000000000000000 [ 73.630567] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed1015446f67 [ 73.637840] RBP: ffff8880aa237bc8 R08: 0000000000000046 R09: ffffed1015d04fe9 [ 73.645112] R10: ffffed1015d04fe8 R11: ffff8880ae827f47 R12: ffff88808e0fe0c0 [ 73.652394] R13: 0000000000000000 R14: ffff88808e0fe0c0 R15: ffff8880729eb610 [ 73.659674] ? vprintk_func+0x86/0x189 [ 73.663560] ? kmem_cache_free.cold+0x1c/0x23 [ 73.668064] __sk_destruct+0x4b4/0x6d0 [ 73.671942] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 73.677324] sk_destruct+0x7b/0x90 [ 73.680859] __sk_free+0xce/0x300 [ 73.684307] sk_free+0x42/0x50 [ 73.687490] tipc_sk_callback+0x48/0x60 [ 73.691469] rcu_process_callbacks+0xba0/0x1a30 [ 73.696155] ? __rcu_read_unlock+0x170/0x170 [ 73.700566] ? sched_clock+0x2e/0x50 [ 73.704280] __do_softirq+0x25c/0x921 [ 73.709823] ? pci_mmcfg_check_reserved+0x170/0x170 [ 73.716310] ? takeover_tasklets+0x7b0/0x7b0 [ 73.720712] run_ksoftirqd+0x8e/0x110 [ 73.724506] smpboot_thread_fn+0x6a3/0xa30 [ 73.728732] ? sort_range+0x30/0x30 [ 73.732358] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 73.737973] ? __kthread_parkme+0xfb/0x1b0 [ 73.742197] kthread+0x354/0x420 [ 73.745557] ? sort_range+0x30/0x30 [ 73.749171] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 73.754614] ret_from_fork+0x24/0x30 [ 73.759891] Kernel Offset: disabled [ 73.763589] Rebooting in 86400 seconds..