Warning: Permanently added '10.128.1.3' (ECDSA) to the list of known hosts. 2019/12/05 15:03:39 fuzzer started 2019/12/05 15:03:41 dialing manager at 10.128.0.105:33795 2019/12/05 15:03:52 syscalls: 2684 2019/12/05 15:03:52 code coverage: enabled 2019/12/05 15:03:52 comparison tracing: enabled 2019/12/05 15:03:52 extra coverage: extra coverage is not supported by the kernel 2019/12/05 15:03:52 setuid sandbox: enabled 2019/12/05 15:03:52 namespace sandbox: enabled 2019/12/05 15:03:52 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/05 15:03:52 fault injection: enabled 2019/12/05 15:03:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/05 15:03:52 net packet injection: enabled 2019/12/05 15:03:52 net device setup: enabled 2019/12/05 15:03:52 concurrency sanitizer: enabled 2019/12/05 15:03:52 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 70.022043][ T7536] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/05 15:04:02 adding functions to KCSAN blacklist: 'pcpu_alloc' 'page_counter_try_charge' 'do_exit' 'find_next_bit' 'lruvec_lru_size' 'exit_signals' 'pipe_wait' '__snd_rawmidi_transmit_ack' '__ext4_new_inode' 'ext4_free_inode' 'tcp_add_backlog' 'ext4_free_inodes_count' 'mem_cgroup_select_victim_node' 'dput' '__tty_hangup' 'mod_timer' 'copy_process' 'xas_clear_mark' 'blk_mq_run_hw_queue' 'common_perm_cond' 'find_get_pages_range_tag' 'add_timer' '__fput' 'taskstats_exit' 'ext4_nonda_switch' 'poll_schedule_timeout' 'kauditd_thread' 'fasync_remove_entry' 'ep_poll' 'tick_do_update_jiffies64' 'blk_mq_sched_dispatch_requests' 'run_timer_softirq' 'wbt_done' 'tick_sched_do_timer' 'timer_clear_idle' 'ext4_mark_iloc_dirty' '__hrtimer_run_queues' 'do_signal_stop' 'rcu_gp_fqs_loop' '__rb_rotate_set_parents' 'audit_log_start' 'rcu_gp_fqs_check_wake' 'tick_nohz_idle_stop_tick' 'wbt_issue' 'vm_area_dup' 'list_lru_count_one' 'do_syslog' 'attach_to_pi_owner' 'blk_stat_add' 'ktime_get_real_seconds' 'pipe_poll' 'xas_find_marked' 'echo_char' '__mark_inode_dirty' 'do_fcntl' 'dd_has_work' 'p9_poll_workfn' 'futex_wait_queue_me' 'do_nanosleep' 'generic_write_end' 'generic_fillattr' 'tomoyo_supervisor' 'ext4_has_free_clusters' 'blk_mq_dispatch_rq_list' 'n_tty_receive_buf_common' '__perf_event_overflow' 'commit_echoes' 'queue_access_lock' 'blk_mq_get_request' 15:06:35 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:06:35 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x3b7, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x33, 0x119, 0x0, 0x0, {0x4}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x6, 0x6, @u32=0x608}]}]}, 0x24}}, 0x0) [ 229.644534][ T7538] IPVS: ftp: loaded support on port[0] = 21 [ 229.736030][ T7538] chnl_net:caif_netlink_parms(): no params data found [ 229.790479][ T7541] IPVS: ftp: loaded support on port[0] = 21 [ 229.794270][ T7538] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.804767][ T7538] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.813399][ T7538] device bridge_slave_0 entered promiscuous mode [ 229.830805][ T7538] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.837912][ T7538] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.846054][ T7538] device bridge_slave_1 entered promiscuous mode [ 229.875031][ T7538] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.891810][ T7538] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:06:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000), 0x8) [ 229.933179][ T7538] team0: Port device team_slave_0 added [ 229.940990][ T7538] team0: Port device team_slave_1 added [ 229.957440][ T7541] chnl_net:caif_netlink_parms(): no params data found [ 230.022971][ T7538] device hsr_slave_0 entered promiscuous mode [ 230.060468][ T7538] device hsr_slave_1 entered promiscuous mode [ 230.120995][ T7544] IPVS: ftp: loaded support on port[0] = 21 [ 230.148517][ T7538] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.155612][ T7538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.162973][ T7538] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.170084][ T7538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.287526][ T7541] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.320236][ T7541] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.330982][ T7541] device bridge_slave_0 entered promiscuous mode [ 230.384124][ T7541] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.410692][ T7541] bridge0: port 2(bridge_slave_1) entered disabled state 15:06:36 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x14, 0x20a201) clock_gettime(0x0, &(0x7f0000000080)={0x0}) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0245720, &(0x7f0000000300)={0x11, {r2, r3+30000000}, 0x9, 0x42}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x8c, 0x0, 0x20000010000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x124) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000640)=""/148, 0x94}], 0x100000000000026e, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r6, &(0x7f0000000100), 0x18d, 0x6c00) pipe(0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) r7 = socket$inet(0x2, 0x6000000000000001, 0x0) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x8000000000000002, 0x0) ioctl$UFFDIO_WAKE(r8, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) getsockopt$EBT_SO_GET_ENTRIES(r7, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\xb9\xd9\xd3q\xa1h\x00', 0x0, 0x0, 0x28d, [], 0x0, 0x0, &(0x7f0000000100)=""/5}, &(0x7f00000002c0)=0x78) getpgid(0xffffffffffffffff) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) r9 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'gretap0\x00'}, 0xffffffffffffff3d) ioctl(r10, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9f5, 0x0, 0xffff, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x101}, 0x0, 0x0, 0x3f}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r11 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) r12 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r13 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'\xf4\xff\x96', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, r12, r13) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000d40)="46ac5128da09124899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12f7ffffff04445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca751152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf922a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5cdd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd5863e542bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69f3a2bbe3385fc2bc5e8391628d076c1ac197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf108339402958400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503e89b27f55c47460b8e4b906908834c343ea240c4ef4aff813f8db8ae9dd5483b15284de0273df043cb6c0673a8e898eeb4b13d36f0350c67", 0x352, r12) r14 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r14, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000fe8000/0x4000)=nil, 0x4000, 0x1, 0x11, r14, 0x0) ioctl$KVM_REINJECT_CONTROL(r14, 0xae71, &(0x7f0000000380)={0x7f}) r15 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r11, 0x5452, &(0x7f0000000000)=0x8) mmap$binder(&(0x7f0000fe8000/0x4000)=nil, 0x4000, 0x1, 0x11, r15, 0x0) ioctl$KVM_REINJECT_CONTROL(r15, 0xae71, &(0x7f0000000380)={0x7f}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r9, 0x84, 0x1a, &(0x7f0000000500)=ANY=[@ANYBLOB="4ff8266803e516b8e857481a20e31a9c8860c388cf7e62b06d382086babb54316c5b1776d440bd86af8f5e043af827b1183be763faed5c46c9a32e0d000000000000005a", @ANYRESHEX=r12, @ANYRESOCT, @ANYRESHEX=r1, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESHEX=r15, @ANYPTR64]], 0x0) [ 230.439876][ T7541] device bridge_slave_1 entered promiscuous mode [ 230.513555][ T7541] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.561866][ T7541] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 230.660243][ T7541] team0: Port device team_slave_0 added [ 230.667614][ T7541] team0: Port device team_slave_1 added [ 230.754366][ T2939] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.776817][ T2939] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.881924][ T7541] device hsr_slave_0 entered promiscuous mode [ 230.911072][ T7541] device hsr_slave_1 entered promiscuous mode [ 230.930674][ T7541] debugfs: Directory 'hsr0' with parent '/' already present! [ 230.949031][ T7538] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.032527][ T7570] IPVS: ftp: loaded support on port[0] = 21 [ 231.055916][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.065211][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.094304][ T7538] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.149840][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.190880][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.240935][ T2939] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.248147][ T2939] bridge0: port 1(bridge_slave_0) entered forwarding state 15:06:37 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000001aff4)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)) [ 231.330375][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.338979][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.400165][ T2939] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.407358][ T2939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.521347][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.619617][ T7538] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 231.699701][ T7538] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 231.740072][ T7544] chnl_net:caif_netlink_parms(): no params data found [ 231.812849][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.850573][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.859232][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.930697][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.979736][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.988698][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.050352][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.058991][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.110412][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.160361][ T7541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.181184][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.200450][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.246789][ T7595] IPVS: ftp: loaded support on port[0] = 21 [ 232.247876][ T7538] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.315526][ T7541] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.352109][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 232.359534][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.381559][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 15:06:38 executing program 5: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setitimer(0x2, &(0x7f0000000080)={{0x77359400}, {0x500000000000}}, 0x0) getitimer(0x2, &(0x7f0000000000)) [ 232.410134][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.447516][ T7544] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.455268][ T7544] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.470668][ T7544] device bridge_slave_0 entered promiscuous mode [ 232.508893][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.520162][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.544185][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.551273][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.609707][ T7544] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.616803][ T7544] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.640406][ T7544] device bridge_slave_1 entered promiscuous mode [ 232.666048][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.686845][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.730257][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.738837][ T2939] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.745905][ T2939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.800332][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.818567][ T7541] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 232.855580][ T7541] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 232.900851][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.941626][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.950666][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.959223][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.968030][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.976692][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.985199][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.993703][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.002219][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.010662][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.018991][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.051601][ T7610] IPVS: ftp: loaded support on port[0] = 21 [ 233.088862][ T7544] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.089237][ T7622] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 233.107454][ T7541] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.136939][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 233.144567][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.153145][ T7544] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.206732][ T7570] chnl_net:caif_netlink_parms(): no params data found [ 233.223238][ T7544] team0: Port device team_slave_0 added 15:06:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 233.258800][ T7544] team0: Port device team_slave_1 added [ 233.361820][ T7544] device hsr_slave_0 entered promiscuous mode 15:06:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 233.409968][ T7544] device hsr_slave_1 entered promiscuous mode [ 233.449866][ T7544] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.475517][ T7570] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.482786][ T7570] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.490733][ T7570] device bridge_slave_0 entered promiscuous mode 15:06:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 233.546328][ T7570] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.558394][ T7570] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.587270][ T7570] device bridge_slave_1 entered promiscuous mode [ 233.620906][ T7610] chnl_net:caif_netlink_parms(): no params data found [ 233.638277][ T7595] chnl_net:caif_netlink_parms(): no params data found [ 233.739340][ T7570] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.819963][ T7667] openvswitch: netlink: Missing key (keys=40, expected=2000) [ 233.880849][ T7570] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.906172][ T7595] bridge0: port 1(bridge_slave_0) entered blocking state 15:06:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff01c}, {0x80000006}]}, 0x10) [ 233.929721][ T7595] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.937642][ T7595] device bridge_slave_0 entered promiscuous mode 15:06:40 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = epoll_create1(0x0) epoll_pwait(r3, &(0x7f0000000140)=[{}], 0x1, 0x4710, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000016) [ 234.011537][ T7595] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.018592][ T7595] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.056691][ T7595] device bridge_slave_1 entered promiscuous mode [ 234.094097][ T7610] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.113001][ T7610] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.137054][ T7610] device bridge_slave_0 entered promiscuous mode [ 234.194414][ T7544] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.234392][ T7610] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.246136][ T7610] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.276163][ T7610] device bridge_slave_1 entered promiscuous mode [ 234.300737][ T7570] team0: Port device team_slave_0 added [ 234.312933][ T7544] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.336791][ T7595] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:06:40 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = semget$private(0x0, 0x1, 0x90) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000140)=""/227) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000540)=""/13, 0xd) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x67, 0x2, {0x4, 0x2, 0x8}}, 0x14) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000200)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000040)=@builtin='builtin_trusted\x00') keyctl$KEYCTL_MOVE(0x1e, r4, r3, r4, 0x0) r5 = request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='%wlan1bdevmd5sumcgroupGPL\x00', r4) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000300)={r5, 0xae, 0x8a}, &(0x7f0000000340)={'enc=', 'raw', ' hash=', {'sha3-384\x00'}}, &(0x7f00000003c0)="e5917e2c15b7acb308dfd42f40e881fc205b9403e7a4595bb7683c8efcea87da4659721a5cc144cd5af698fcf226c8c3f618b6d7cb367dc30f46c9fade9a3f439a611d7f970ba5fd9b41c6200a4c2ec680b3040fb0be9662469cd9ddd2a6ecb4df6c463013b0c6655da62fcec36cde6b18c0d278ad77a493aa043574baaa85dc4ab8270f4b3021523090310c8282f967701179a4d8c98c456866d24fb7df4caf34cad97ddef97edcfb81ecda64a8", &(0x7f0000000480)=""/138) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3ff, 0x20c0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 234.369016][ T7595] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.463343][ T7570] team0: Port device team_slave_1 added [ 234.472939][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.480837][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.536262][ C1] hrtimer: interrupt took 34273 ns [ 234.572367][ T7570] device hsr_slave_0 entered promiscuous mode [ 234.610000][ T7570] device hsr_slave_1 entered promiscuous mode [ 234.649722][ T7570] debugfs: Directory 'hsr0' with parent '/' already present! [ 234.664872][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.683679][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.712584][ T2416] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.719708][ T2416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.729698][ T7684] IPVS: ftp: loaded support on port[0] = 21 [ 234.788291][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.846868][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.857440][ T2416] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.864554][ T2416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.875428][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.884637][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.897070][ T7595] team0: Port device team_slave_0 added [ 234.904983][ T7610] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.014487][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.035634][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.056537][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.085136][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.105689][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.138227][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.166782][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.200533][ T7623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.215726][ T7595] team0: Port device team_slave_1 added [ 235.223840][ T7610] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:06:41 executing program 1: r0 = epoll_create(0x4) r1 = syz_open_dev$dri(&(0x7f0000000400)='/dev/dri/card#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) [ 235.248672][ T7544] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.340645][ T7695] IPVS: ftp: loaded support on port[0] = 21 [ 235.413577][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.430333][ T2416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:06:41 executing program 1: r0 = epoll_create(0x4) r1 = syz_open_dev$dri(&(0x7f0000000400)='/dev/dri/card#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) [ 235.511810][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 235.528087][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 235.597514][ T7544] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.633977][ T7610] team0: Port device team_slave_0 added [ 235.682165][ T7595] device hsr_slave_0 entered promiscuous mode [ 235.729966][ T7595] device hsr_slave_1 entered promiscuous mode [ 235.762084][ T7595] debugfs: Directory 'hsr0' with parent '/' already present! [ 235.775464][ T7610] team0: Port device team_slave_1 added [ 235.882276][ T7610] device hsr_slave_0 entered promiscuous mode [ 235.920081][ T7610] device hsr_slave_1 entered promiscuous mode [ 235.949793][ T7610] debugfs: Directory 'hsr0' with parent '/' already present! [ 236.123085][ T7570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.266908][ T7570] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.365522][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.390425][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.582407][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.608721][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.700075][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.707142][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.723795][ T7761] ================================================================== [ 236.731927][ T7761] BUG: KCSAN: data-race in pid_update_inode / security_file_open [ 236.739634][ T7761] [ 236.741966][ T7761] read to 0xffff888125232ac8 of 2 bytes by task 7764 on cpu 0: [ 236.749508][ T7761] security_file_open+0x11c/0x210 [ 236.754536][ T7761] do_dentry_open+0x211/0x970 [ 236.759228][ T7761] vfs_open+0x62/0x80 [ 236.763225][ T7761] path_openat+0xf73/0x36e0 [ 236.767730][ T7761] do_filp_open+0x11e/0x1b0 [ 236.772234][ T7761] do_sys_open+0x3b3/0x4f0 [ 236.776645][ T7761] __x64_sys_open+0x55/0x70 [ 236.781147][ T7761] do_syscall_64+0xcc/0x370 [ 236.785652][ T7761] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 236.791561][ T7761] [ 236.793912][ T7761] write to 0xffff888125232ac8 of 2 bytes by task 7761 on cpu 1: [ 236.801549][ T7761] pid_update_inode+0x51/0x70 [ 236.806237][ T7761] pid_revalidate+0x91/0xd0 [ 236.810760][ T7761] lookup_fast+0x618/0x700 [ 236.815177][ T7761] path_openat+0x2ac/0x36e0 [ 236.819680][ T7761] do_filp_open+0x11e/0x1b0 [ 236.824188][ T7761] do_sys_open+0x3b3/0x4f0 [ 236.828613][ T7761] __x64_sys_open+0x55/0x70 [ 236.833165][ T7761] do_syscall_64+0xcc/0x370 [ 236.837665][ T7761] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 236.843548][ T7761] [ 236.845873][ T7761] Reported by Kernel Concurrency Sanitizer on: [ 236.852028][ T7761] CPU: 1 PID: 7761 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 236.859225][ T7761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.869289][ T7761] ================================================================== [ 236.877350][ T7761] Kernel panic - not syncing: panic_on_warn set ... [ 236.883947][ T7761] CPU: 1 PID: 7761 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 236.891163][ T7761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.901302][ T7761] Call Trace: [ 236.904618][ T7761] dump_stack+0x11d/0x181 [ 236.908960][ T7761] panic+0x210/0x640 [ 236.912880][ T7761] ? vprintk_func+0x8d/0x140 [ 236.917469][ T7761] kcsan_report.cold+0xc/0xd [ 236.922069][ T7761] kcsan_setup_watchpoint+0x3fe/0x460 [ 236.927451][ T7761] __tsan_unaligned_write2+0xc4/0x100 [ 236.932839][ T7761] pid_update_inode+0x51/0x70 [ 236.937518][ T7761] pid_revalidate+0x91/0xd0 [ 236.942022][ T7761] lookup_fast+0x618/0x700 [ 236.946454][ T7761] path_openat+0x2ac/0x36e0 [ 236.951927][ T7761] ? proc_pid_status+0xee1/0x1000 [ 236.956961][ T7761] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.963202][ T7761] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 236.969094][ T7761] ? __read_once_size+0x41/0xe0 [ 236.973959][ T7761] do_filp_open+0x11e/0x1b0 [ 236.978484][ T7761] ? __alloc_fd+0x2ef/0x3b0 [ 236.982999][ T7761] do_sys_open+0x3b3/0x4f0 [ 236.987425][ T7761] __x64_sys_open+0x55/0x70 [ 236.991941][ T7761] do_syscall_64+0xcc/0x370 [ 236.996449][ T7761] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 237.002347][ T7761] RIP: 0033:0x7f8147331120 [ 237.006770][ T7761] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 237.026391][ T7761] RSP: 002b:00007ffd65351208 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 237.034800][ T7761] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f8147331120 [ 237.042772][ T7761] RDX: 00007ffd65351242 RSI: 0000000000000000 RDI: 00007ffd65351230 [ 237.050745][ T7761] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007f81475f955f [ 237.058795][ T7761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000d10220 [ 237.066770][ T7761] R13: 0000000000000020 R14: 00007f81479e6010 R15: 0000000000000000 [ 237.076174][ T7761] Kernel Offset: disabled [ 237.081000][ T7761] Rebooting in 86400 seconds..