[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 66.052687][ T27] audit: type=1800 audit(1558129147.815:25): pid=8720 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 66.098909][ T27] audit: type=1800 audit(1558129147.815:26): pid=8720 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 66.139561][ T27] audit: type=1800 audit(1558129147.825:27): pid=8720 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.144' (ECDSA) to the list of known hosts. 2019/05/17 21:39:18 fuzzer started 2019/05/17 21:39:21 dialing manager at 10.128.0.26:44889 2019/05/17 21:39:21 syscalls: 1006 2019/05/17 21:39:21 code coverage: enabled 2019/05/17 21:39:21 comparison tracing: enabled 2019/05/17 21:39:21 extra coverage: extra coverage is not supported by the kernel 2019/05/17 21:39:21 setuid sandbox: enabled 2019/05/17 21:39:21 namespace sandbox: enabled 2019/05/17 21:39:21 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/17 21:39:21 fault injection: enabled 2019/05/17 21:39:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/17 21:39:21 net packet injection: enabled 2019/05/17 21:39:21 net device setup: enabled 21:39:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000180)) syzkaller login: [ 82.638049][ T8887] IPVS: ftp: loaded support on port[0] = 21 [ 82.649513][ T8887] NET: Registered protocol family 30 [ 82.655060][ T8887] Failed to register TIPC socket type 21:39:24 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000), 0x2) 21:39:24 executing program 2: socketpair(0x4, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x4, 0x3, 0xfb) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockname(r0, &(0x7f00000008c0)=@xdp, &(0x7f0000000940)=0x80) accept4$packet(0xffffffffffffff9c, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14, 0x800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000bc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f00000013c0)) getsockname(r0, &(0x7f00000014c0)=@hci, &(0x7f0000001540)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000015c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001600)={'hsr0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001640), &(0x7f0000001680)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001b80)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000001bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003f00)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, &(0x7f0000003f80)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000040c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004100)={{{@in6=@empty, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000004200)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004240)={{{@in6=@local, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000004340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000004380)={'vcan0\x00'}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000043c0)={@initdev, @local}, &(0x7f0000004400)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000004440)={'vcan0\x00'}) clock_gettime(0x0, &(0x7f000000da00)) recvmmsg(r0, &(0x7f000000d880)=[{{&(0x7f00000057c0)=@l2, 0x80, &(0x7f0000005900)=[{&(0x7f0000005840)=""/85, 0x55}, {&(0x7f00000058c0)=""/48, 0x30}], 0x2, &(0x7f0000005940)=""/43, 0x2b}, 0x5}, {{0x0, 0x0, &(0x7f0000006a80)=[{&(0x7f0000005980)=""/190, 0xbe}, {&(0x7f0000005a40)=""/62, 0x3e}, {&(0x7f0000005a80)=""/4096, 0x1000}], 0x3, &(0x7f0000006ac0)=""/137, 0x89}, 0x4}, {{&(0x7f0000006b80)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000080c0)=[{&(0x7f0000006c00)=""/215, 0xd7}, {&(0x7f0000006d00)=""/150, 0x96}, {&(0x7f0000006dc0)=""/4096, 0x1000}, {&(0x7f0000007dc0)=""/111, 0x6f}, {&(0x7f0000007e40)=""/32, 0x20}, {&(0x7f0000007e80)=""/191, 0xbf}, {0x0}, {&(0x7f0000008040)=""/120, 0x78}], 0x8, &(0x7f0000008140)=""/120, 0x78}, 0x8}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000095c0)=@can, 0x80, 0x0}, 0x2}], 0x5, 0x10100, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000da80)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f000000db80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dbc0)={'team0\x00'}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000e640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f000000e600)={&(0x7f0000000140)=ANY=[@ANYBLOB="39c602000000000000000457d80661"], 0x1}, 0x1, 0x0, 0x0, 0x8804}, 0x800) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x4557434d) setsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000180), 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) socket$kcm(0x29, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000100), 0x20000000009) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000200)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f00001ae000/0x4000)=nil, 0x4000, 0x0, 0x8012, r4, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x1032, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) [ 82.930625][ T8889] IPVS: ftp: loaded support on port[0] = 21 [ 82.955762][ T8889] NET: Registered protocol family 30 [ 82.961095][ T8889] Failed to register TIPC socket type [ 83.190587][ T8891] IPVS: ftp: loaded support on port[0] = 21 [ 83.216731][ T8891] NET: Registered protocol family 30 [ 83.231928][ T8891] Failed to register TIPC socket type 21:39:25 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xe388694f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) [ 83.701047][ T8893] IPVS: ftp: loaded support on port[0] = 21 [ 83.725892][ T8893] NET: Registered protocol family 30 [ 83.731230][ T8893] Failed to register TIPC socket type 21:39:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") [ 84.389025][ T8895] IPVS: ftp: loaded support on port[0] = 21 [ 84.426314][ T8895] NET: Registered protocol family 30 [ 84.451570][ T8895] Failed to register TIPC socket type 21:39:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x1000000000005}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r2, &(0x7f0000000200), 0x42000, 0x0, 0x0, 0x3f00) [ 85.071449][ T8897] IPVS: ftp: loaded support on port[0] = 21 [ 85.095831][ T8897] NET: Registered protocol family 30 [ 85.101188][ T8897] Failed to register TIPC socket type [ 85.690389][ T8887] chnl_net:caif_netlink_parms(): no params data found [ 86.111575][ T8887] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.119341][ T8887] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.194215][ T8887] device bridge_slave_0 entered promiscuous mode [ 86.277187][ T8887] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.401268][ T8887] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.493624][ T8887] device bridge_slave_1 entered promiscuous mode [ 87.005109][ T8887] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 87.433960][ T8887] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 88.126391][ T8887] team0: Port device team_slave_0 added [ 88.489237][ T8887] team0: Port device team_slave_1 added [ 89.714143][ T8887] device hsr_slave_0 entered promiscuous mode [ 90.145217][ T8887] device hsr_slave_1 entered promiscuous mode [ 92.345432][ T8887] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.739727][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.773172][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.130544][ T8887] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.523414][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.572976][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.783127][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.790387][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.134565][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 94.173189][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.345140][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.502121][ T9088] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.509307][ T9088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.929386][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 94.972661][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.192508][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.244095][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.485990][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.532471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.692238][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.044599][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.080675][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.262325][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.402651][ T9088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.562963][ T8887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.995008][ T8887] 8021q: adding VLAN 0 to HW filter on device batadv0 21:39:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000180)) 21:39:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000180)) 21:39:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000180)) 21:39:47 executing program 0: r0 = socket(0x1e, 0x5, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000100)=0x3, 0x4) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) connect$llc(r0, &(0x7f00000000c0)={0x1e, 0x302}, 0x10) [ 106.888560][ T9385] IPVS: ftp: loaded support on port[0] = 21 [ 106.910605][ T9388] IPVS: ftp: loaded support on port[0] = 21 [ 107.158675][ T9389] IPVS: ftp: loaded support on port[0] = 21 [ 107.171346][ T9386] IPVS: ftp: loaded support on port[0] = 21 [ 107.514486][ T9385] NET: Registered protocol family 30 [ 107.520324][ T9388] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. [ 107.692331][ T9390] IPVS: ftp: loaded support on port[0] = 21 [ 107.721963][ C1] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2k [ 107.731756][ C1] WARNING: CPU: 1 PID: 16 at mm/slab.h:376 kmem_cache_free.cold+0x1c/0x23 [ 107.741084][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 107.748328][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.1.0+ #18 [ 107.755908][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.766136][ C1] Call Trace: [ 107.769882][ C1] dump_stack+0x172/0x1f0 [ 107.774296][ C1] ? __check_heap_object+0x50/0xb3 [ 107.779441][ C1] panic+0x2cb/0x65c [ 107.783462][ C1] ? __warn_printk+0xf3/0xf3 [ 107.788198][ C1] ? kmem_cache_free.cold+0x1c/0x23 [ 107.794541][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.801521][ C1] ? __warn.cold+0x5/0x45 [ 107.806058][ C1] ? __warn+0xe8/0x1d0 [ 107.810249][ C1] ? kmem_cache_free.cold+0x1c/0x23 [ 107.815570][ C1] __warn.cold+0x20/0x45 [ 107.819840][ C1] ? wake_up_klogd+0x99/0xd0 [ 107.824456][ C1] ? kmem_cache_free.cold+0x1c/0x23 [ 107.829704][ C1] report_bug+0x263/0x2b0 [ 107.834922][ C1] do_error_trap+0x11b/0x200 [ 107.840195][ C1] do_invalid_op+0x37/0x50 [ 107.841707][ T9385] Failed to register TIPC socket type [ 107.845704][ C1] ? kmem_cache_free.cold+0x1c/0x23 [ 107.845726][ C1] invalid_op+0x14/0x20 [ 107.845738][ C1] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 107.845760][ C1] Code: e8 a5 ae 6e 05 44 8b 6d c4 e9 04 a6 ff ff 48 8b 48 58 48 c7 c6 80 42 74 87 48 c7 c7 f0 a9 5c 88 49 8b 54 24 58 e8 e4 9d b1 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 80 42 74 87 48 c7 c7 f0 [ 107.876794][ T9388] ------------[ cut here ]------------ [ 107.889012][ C1] RSP: 0018:ffff8880a990fbc0 EFLAGS: 00010286 [ 107.894489][ T9388] kernel BUG at lib/list_debug.c:29! [ 107.901203][ C1] RAX: 0000000000000044 RBX: ffff888072136900 RCX: 0000000000000000 [ 107.916245][ C1] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed1015321f6a [ 107.924870][ C1] RBP: ffff8880a990fbe0 R08: 0000000000000044 R09: ffffed1015d26011 [ 107.933005][ C1] R10: ffffed1015d26010 R11: ffff8880ae930087 R12: ffff8880953e7940 [ 107.943917][ C1] R13: 0000000000000000 R14: ffff8880953e7940 R15: ffff888072136c28 [ 107.957833][ C1] ? vprintk_func+0x86/0x189 [ 107.963076][ C1] __sk_destruct+0x4be/0x6e0 [ 107.968157][ C1] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 107.974344][ C1] sk_destruct+0x7b/0x90 [ 107.978661][ C1] __sk_free+0xce/0x300 [ 107.982877][ C1] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 107.989058][ C1] sk_free+0x42/0x50 [ 107.992988][ C1] tipc_sk_callback+0x48/0x60 [ 107.998037][ C1] rcu_core+0x973/0x1430 [ 108.002416][ C1] ? rcu_note_context_switch+0x1760/0x1760 [ 108.008343][ C1] ? sched_clock+0x2e/0x50 [ 108.012890][ C1] __do_softirq+0x266/0x95a [ 108.017443][ C1] ? takeover_tasklets+0x7b0/0x7b0 [ 108.023067][ C1] run_ksoftirqd+0x8e/0x110 [ 108.027603][ C1] smpboot_thread_fn+0x6ab/0xa40 [ 108.032740][ C1] ? sort_range+0x30/0x30 [ 108.037198][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 108.044721][ C1] ? __kthread_parkme+0xfb/0x1b0 [ 108.049827][ C1] kthread+0x357/0x430 [ 108.054115][ C1] ? sort_range+0x30/0x30 [ 108.058471][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 108.064746][ C1] ret_from_fork+0x3a/0x50 [ 108.070772][ C1] Kernel Offset: disabled [ 108.075275][ C1] Rebooting in 86400 seconds..