[ 19.361535] kauditd_printk_skb: 13 callbacks suppressed [ 19.361539] audit: type=1800 audit(1566179959.125:29): pid=5659 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 19.386568] random: crng init done [ 19.395697] audit: type=1800 audit(1566179959.125:30): pid=5659 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 27.388424] IPVS: ftp: loaded support on port[0] = 21 [ 51.902334] can: request_module (can-proto-0) failed. [ 51.911428] can: request_module (can-proto-0) failed. Warning: Permanently added '10.128.0.46' (ECDSA) to the list of known hosts. 2019/08/19 02:00:00 parsed 1 programs 2019/08/19 02:00:00 executed programs: 0 [ 61.059607] IPVS: ftp: loaded support on port[0] = 21 [ 61.061088] IPVS: ftp: loaded support on port[0] = 21 [ 61.082103] IPVS: ftp: loaded support on port[0] = 21 [ 61.091847] IPVS: ftp: loaded support on port[0] = 21 [ 61.101404] IPVS: ftp: loaded support on port[0] = 21 [ 61.118570] IPVS: ftp: loaded support on port[0] = 21 [ 61.853558] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.864400] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.872013] device bridge_slave_0 entered promiscuous mode [ 61.911682] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.920263] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.928714] device bridge_slave_1 entered promiscuous mode [ 61.945580] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.951948] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.967673] device bridge_slave_0 entered promiscuous mode [ 61.976594] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.983030] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.990720] device bridge_slave_0 entered promiscuous mode [ 61.998668] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.006857] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.013909] device bridge_slave_0 entered promiscuous mode [ 62.029651] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.040418] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.047671] device bridge_slave_1 entered promiscuous mode [ 62.056161] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.062547] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.069381] device bridge_slave_0 entered promiscuous mode [ 62.077519] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.083918] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.091298] device bridge_slave_1 entered promiscuous mode [ 62.100560] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.108740] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.117517] device bridge_slave_0 entered promiscuous mode [ 62.124677] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.131096] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.139812] device bridge_slave_1 entered promiscuous mode [ 62.148409] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.156213] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.163186] device bridge_slave_1 entered promiscuous mode [ 62.181944] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.199990] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.208532] device bridge_slave_1 entered promiscuous mode [ 62.268174] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.335200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.351744] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.381733] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.398976] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.411986] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.424280] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.467904] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.480088] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.496706] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.510985] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.589149] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.644739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.669939] team0: Port device team_slave_0 added [ 62.678884] team0: Port device team_slave_0 added [ 62.697917] team0: Port device team_slave_0 added [ 62.714293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.729123] team0: Port device team_slave_0 added [ 62.739097] team0: Port device team_slave_1 added [ 62.749476] team0: Port device team_slave_0 added [ 62.757169] team0: Port device team_slave_1 added [ 62.762894] team0: Port device team_slave_1 added [ 62.790407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.802085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.818308] team0: Port device team_slave_1 added [ 62.825603] team0: Port device team_slave_1 added [ 62.840431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.858240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.871264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.887714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.897799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.905900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.913231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.920811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.932309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.945227] team0: Port device team_slave_0 added [ 62.959523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.973562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.981368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.990251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.000175] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.011471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.020720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.031683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.053574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.063435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.077899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.085701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.093315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.100939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.108570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.116254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.126438] team0: Port device team_slave_1 added [ 63.132211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.143522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.161886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.183951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.192379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.200163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.207931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.215692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.227504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.240340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.250225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.273972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.305614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.316007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.346977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.368806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.629676] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.636166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.643301] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.649684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.666187] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.716679] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.723061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.729679] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.736037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.767717] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.774086] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.780697] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.787159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.802553] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.808923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.815549] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.821890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.840200] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.846589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.853169] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.859551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.902376] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.908772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.915457] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.921809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.714644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.723749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.735602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.742634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.750303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.427415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.467179] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.480568] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.542092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.634638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.747141] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.767223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.775231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.818868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.828582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.845352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.852258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.877653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.893012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.961404] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.005782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.013954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.026092] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.036004] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.049242] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.092198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.101733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.178030] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.219801] 8021q: adding VLAN 0 to HW filter on device team0 2019/08/19 02:00:06 executed programs: 6 2019/08/19 02:00:11 executed programs: 380 2019/08/19 02:00:16 executed programs: 776 2019/08/19 02:00:21 executed programs: 1171 2019/08/19 02:00:26 executed programs: 1559 2019/08/19 02:00:31 executed programs: 1953 2019/08/19 02:00:36 executed programs: 2337 2019/08/19 02:00:41 executed programs: 2715 2019/08/19 02:00:46 executed programs: 3094 2019/08/19 02:00:51 executed programs: 3479 2019/08/19 02:00:56 executed programs: 3857 2019/08/19 02:01:01 executed programs: 4226 2019/08/19 02:01:06 executed programs: 4598 2019/08/19 02:01:11 executed programs: 4975 2019/08/19 02:01:16 executed programs: 5339 2019/08/19 02:01:22 executed programs: 5712 2019/08/19 02:01:27 executed programs: 6086 2019/08/19 02:01:32 executed programs: 6449 2019/08/19 02:01:37 executed programs: 6814 2019/08/19 02:01:42 executed programs: 7176 [ 165.261822] ================================================================== [ 165.269428] BUG: KASAN: use-after-free in rb_insert_color+0x7ae/0xca0 [ 165.275996] Read of size 8 at addr ffff8881d82d67b8 by task syz-executor0/5583 [ 165.283329] [ 165.284937] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 165.292016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.301703] Call Trace: [ 165.304274] dump_stack+0x113/0x167 [ 165.307885] print_address_description.cold.8+0x9/0x318 [ 165.313235] ? rb_insert_color+0x7ae/0xca0 [ 165.317459] __kasan_report.cold.9+0x1b/0x3f [ 165.321843] ? rb_insert_color+0x7ae/0xca0 [ 165.326051] ? rb_insert_color+0x7ae/0xca0 [ 165.330264] kasan_report+0x12/0x17 [ 165.333887] __asan_report_load8_noabort+0x14/0x20 [ 165.338811] rb_insert_color+0x7ae/0xca0 [ 165.342854] bpf_prog_kallsyms_add+0x3bc/0x7a0 [ 165.347412] ? anon_inode_getfd+0x49/0x70 [ 165.351550] bpf_prog_load+0xbf5/0x1230 [ 165.355594] ? bpf_prog_new_fd+0x30/0x30 [ 165.360162] ? lock_downgrade+0x900/0x900 [ 165.364285] ? lock_acquire+0x194/0x410 [ 165.368341] ? __kasan_check_write+0x14/0x20 [ 165.372723] __do_sys_bpf+0x807/0x3460 [ 165.376585] ? __lock_acquire+0x100f/0x4b70 [ 165.380901] ? bpf_prog_load+0x1230/0x1230 [ 165.385200] ? find_held_lock+0x36/0x1d0 [ 165.389239] ? __might_fault+0xf1/0x1b0 [ 165.393201] ? lock_downgrade+0x900/0x900 [ 165.397325] ? lock_acquire+0x194/0x410 [ 165.402831] ? __kasan_check_read+0x11/0x20 [ 165.407136] ? _copy_to_user+0xcb/0xf0 [ 165.411007] ? put_timespec64+0xa9/0x100 [ 165.415044] ? nsecs_to_jiffies+0x20/0x20 [ 165.419173] ? do_syscall_64+0x21/0x550 [ 165.423126] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.428468] __x64_sys_bpf+0x6e/0xb0 [ 165.432161] do_syscall_64+0xd6/0x550 [ 165.435953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.441118] RIP: 0033:0x4576b9 [ 165.444305] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 165.463358] RSP: 002b:00007f4548eccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 165.471049] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004576b9 [ 165.478297] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 165.485551] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 165.492796] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4548ecd6d4 [ 165.500479] R13: 00000000004bda1c R14: 00000000004cc728 R15: 00000000ffffffff [ 165.507846] BUG: unable to handle page fault for address: ffffc900006b8030 [ 165.514846] #PF: supervisor read access in kernel mode [ 165.520092] #PF: error_code(0x0000) - not-present page [ 165.525352] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 165.532270] Oops: 0000 [#1] PREEMPT SMP KASAN [ 165.536738] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 165.543721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.553053] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 165.558668] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 165.577631] RSP: 0018:ffff8881c24076e0 EFLAGS: 00010046 [ 165.583065] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 165.590394] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 165.597660] RBP: ffff8881c2407720 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 165.604916] R10: ffffed103b626c4b R11: ffff8881db13625b R12: ffff8881d82d67d0 [ 165.612516] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 165.619764] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 165.627961] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.633911] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 165.641252] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 165.648668] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 165.655911] Call Trace: [ 165.658497] BUG: unable to handle page fault for address: ffffc900006b8030 [ 165.665566] #PF: supervisor read access in kernel mode [ 165.670817] #PF: error_code(0x0000) - not-present page [ 165.676077] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 165.683065] Oops: 0000 [#2] PREEMPT SMP KASAN [ 165.687531] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 165.694533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.703865] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 165.709207] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 165.728783] RSP: 0018:ffff8881c24071b0 EFLAGS: 00010046 [ 165.734115] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 165.741446] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 165.748699] RBP: ffff8881c24071f0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 165.755952] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 165.763202] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 165.770449] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 165.778648] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.784500] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 165.791833] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 165.799078] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 165.806334] Call Trace: [ 165.808983] BUG: unable to handle page fault for address: ffffc900006b8030 [ 165.816057] #PF: supervisor read access in kernel mode [ 165.821316] #PF: error_code(0x0000) - not-present page [ 165.826583] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 165.833485] Oops: 0000 [#3] PREEMPT SMP KASAN [ 165.837954] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 165.844944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.854364] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 165.859698] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 165.878578] RSP: 0018:ffff8881c2406c80 EFLAGS: 00010046 [ 165.883918] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 165.891168] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 165.898424] RBP: ffff8881c2406cc0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 165.905667] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 165.912923] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 165.920179] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 165.928391] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.934257] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 165.941501] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 165.948742] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 165.955986] Call Trace: [ 165.958557] BUG: unable to handle page fault for address: ffffc900006b8030 [ 165.965547] #PF: supervisor read access in kernel mode [ 165.970884] #PF: error_code(0x0000) - not-present page [ 165.976132] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 165.983030] Oops: 0000 [#4] PREEMPT SMP KASAN [ 165.987498] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 165.994654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.004073] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 166.009411] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 166.028289] RSP: 0018:ffff8881c2406750 EFLAGS: 00010046 [ 166.033624] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 166.040865] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 166.048125] RBP: ffff8881c2406790 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 166.055541] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 166.062787] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 166.070041] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 166.078246] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.084109] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 166.091363] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 166.098606] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 166.106044] Call Trace: [ 166.108616] BUG: unable to handle page fault for address: ffffc900006b8030 [ 166.115611] #PF: supervisor read access in kernel mode [ 166.120863] #PF: error_code(0x0000) - not-present page [ 166.126108] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 166.133284] Oops: 0000 [#5] PREEMPT SMP KASAN [ 166.138014] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 166.145345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.154686] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 166.160108] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 166.178986] RSP: 0018:ffff8881c2406220 EFLAGS: 00010046 [ 166.184333] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 166.191575] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 166.198915] RBP: ffff8881c2406260 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 166.206179] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 166.219987] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 166.227232] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 166.235431] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.241286] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 166.248530] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 166.255778] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 166.263024] Call Trace: [ 166.265598] BUG: unable to handle page fault for address: ffffc900006b8030 [ 166.273021] #PF: supervisor read access in kernel mode [ 166.278283] #PF: error_code(0x0000) - not-present page [ 166.283529] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 166.290434] Oops: 0000 [#6] PREEMPT SMP KASAN [ 166.294906] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 166.301891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.311318] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 166.316656] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 166.335532] RSP: 0018:ffff8881c2405cf0 EFLAGS: 00010046 [ 166.340958] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 166.348201] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 166.355462] RBP: ffff8881c2405d30 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 166.363121] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 166.370363] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 166.377607] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 166.385816] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.391669] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 166.399173] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 166.406501] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 166.413755] Call Trace: [ 166.416424] BUG: unable to handle page fault for address: ffffc900006b8030 [ 166.423494] #PF: supervisor read access in kernel mode [ 166.428739] #PF: error_code(0x0000) - not-present page [ 166.434002] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 166.440913] Oops: 0000 [#7] PREEMPT SMP KASAN [ 166.445381] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 166.452364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.461695] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 166.467042] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 166.485918] RSP: 0018:ffff8881c24057c0 EFLAGS: 00010046 [ 166.491257] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 166.498765] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 166.506006] RBP: ffff8881c2405800 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 166.513250] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 166.520593] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 166.527848] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 166.536045] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.541986] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 166.549239] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 166.556484] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 166.563738] Call Trace: [ 166.566309] BUG: unable to handle page fault for address: ffffc900006b8030 [ 166.573297] #PF: supervisor read access in kernel mode [ 166.578542] #PF: error_code(0x0000) - not-present page [ 166.583786] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 166.590684] Oops: 0000 [#8] PREEMPT SMP KASAN [ 166.595159] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 166.602326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.611671] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 166.617006] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 166.635893] RSP: 0018:ffff8881c2405290 EFLAGS: 00010046 [ 166.641270] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 166.648527] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 166.655771] RBP: ffff8881c24052d0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 166.663011] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 166.670254] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 166.677498] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 166.685694] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.691547] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 166.698792] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 166.706038] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 166.713282] Call Trace: [ 166.715859] BUG: unable to handle page fault for address: ffffc900006b8030 [ 166.722966] #PF: supervisor read access in kernel mode [ 166.728211] #PF: error_code(0x0000) - not-present page [ 166.733457] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 166.740380] Oops: 0000 [#9] PREEMPT SMP KASAN [ 166.745044] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 166.752037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.761372] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 166.766713] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 166.785760] RSP: 0018:ffff8881c2404d60 EFLAGS: 00010046 [ 166.791098] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 166.798528] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 166.805784] RBP: ffff8881c2404da0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 166.813028] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 166.820288] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 166.827531] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 166.835755] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.841610] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 166.848862] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 166.856106] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 166.863363] Call Trace: [ 166.865934] BUG: unable to handle page fault for address: ffffc900006b8030 [ 166.873114] #PF: supervisor read access in kernel mode [ 166.878360] #PF: error_code(0x0000) - not-present page [ 166.883618] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 166.890546] Oops: 0000 [#10] PREEMPT SMP KASAN [ 166.895117] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 166.902104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.911436] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 166.916771] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 166.935647] RSP: 0018:ffff8881c2404830 EFLAGS: 00010046 [ 166.940982] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 166.948418] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 166.955673] RBP: ffff8881c2404870 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 166.962917] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 166.970247] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 166.977492] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 166.985705] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.991558] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 166.998985] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 167.006317] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 167.013581] Call Trace: [ 167.016151] BUG: unable to handle page fault for address: ffffc900006b8030 [ 167.023137] #PF: supervisor read access in kernel mode [ 167.028572] #PF: error_code(0x0000) - not-present page [ 167.033831] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 167.040740] Oops: 0000 [#11] PREEMPT SMP KASAN [ 167.045299] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 167.052285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.061616] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 167.066951] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 167.085835] RSP: 0018:ffff8881c2404300 EFLAGS: 00010046 [ 167.091171] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 167.098428] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 167.105670] RBP: ffff8881c2404340 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 167.112914] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 167.120158] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 167.127401] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 167.135872] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 167.141736] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 167.148979] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 167.156575] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 167.163817] Call Trace: [ 167.166390] BUG: unable to handle page fault for address: ffffc900006b8030 [ 167.173371] #PF: supervisor read access in kernel mode [ 167.178637] #PF: error_code(0x0000) - not-present page [ 167.183900] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 167.190897] Oops: 0000 [#12] PREEMPT SMP KASAN [ 167.195454] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 167.202448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.211777] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 167.217111] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 167.237440] RSP: 0018:ffff8881c2403dd0 EFLAGS: 00010046 [ 167.242776] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 167.250023] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 167.257267] RBP: ffff8881c2403e10 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 167.264509] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 167.271840] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 167.279098] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 167.287310] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 167.293164] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 167.300419] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 167.307664] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 167.314914] Call Trace: [ 167.317498] BUG: unable to handle page fault for address: ffffc900006b8030 [ 167.324486] #PF: supervisor read access in kernel mode [ 167.329733] #PF: error_code(0x0000) - not-present page [ 167.334991] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 167.341900] Oops: 0000 [#13] PREEMPT SMP KASAN [ 167.346469] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 167.353475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.362822] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 167.368160] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 167.387384] RSP: 0018:ffff8881c24038a0 EFLAGS: 00010046 [ 167.392735] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 167.401447] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 167.408696] RBP: ffff8881c24038e0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 167.415950] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 167.423200] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 167.430475] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 167.438904] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 167.444762] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 167.452018] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 167.459260] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 167.466511] Call Trace: [ 167.469096] BUG: unable to handle page fault for address: ffffc900006b8030 [ 167.476081] #PF: supervisor read access in kernel mode [ 167.481333] #PF: error_code(0x0000) - not-present page [ 167.486668] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 167.494006] Oops: 0000 [#14] PREEMPT SMP KASAN [ 167.498650] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 167.505644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.515088] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 167.520442] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 167.539342] RSP: 0018:ffff8881c2403370 EFLAGS: 00010046 [ 167.544677] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 167.551919] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 167.559599] RBP: ffff8881c24033b0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 167.566851] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 167.574192] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 167.581437] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 167.589771] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 167.595714] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 167.602961] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 167.610206] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 167.617451] Call Trace: [ 167.620039] BUG: unable to handle page fault for address: ffffc900006b8030 [ 167.627031] #PF: supervisor read access in kernel mode [ 167.632291] #PF: error_code(0x0000) - not-present page [ 167.637565] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 167.644469] Oops: 0000 [#15] PREEMPT SMP KASAN [ 167.649024] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 167.656027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.665360] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 167.670703] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 167.689666] RSP: 0018:ffff8881c2402e40 EFLAGS: 00010046 [ 167.695363] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 167.702632] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 167.709885] RBP: ffff8881c2402e80 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 167.717130] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 167.724370] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 167.731640] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 167.740083] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 167.745940] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 167.753188] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 167.760792] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 167.768221] Call Trace: [ 167.770895] BUG: unable to handle page fault for address: ffffc900006b8030 [ 167.777885] #PF: supervisor read access in kernel mode [ 167.783131] #PF: error_code(0x0000) - not-present page [ 167.788377] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 167.795288] Oops: 0000 [#16] PREEMPT SMP KASAN [ 167.799844] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 167.806836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.816166] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 167.821850] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 167.840725] RSP: 0018:ffff8881c2402910 EFLAGS: 00010046 [ 167.846155] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 167.853572] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 167.861075] RBP: ffff8881c2402950 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 167.868319] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 167.875572] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 167.882817] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 167.891026] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 167.896879] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 167.904136] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 167.911381] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 167.918713] Call Trace: [ 167.921287] BUG: unable to handle page fault for address: ffffc900006b8030 [ 167.928291] #PF: supervisor read access in kernel mode [ 167.933537] #PF: error_code(0x0000) - not-present page [ 167.938782] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 167.945692] Oops: 0000 [#17] PREEMPT SMP KASAN [ 167.950248] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 167.957230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.971770] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 167.977108] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 167.996425] RSP: 0018:ffff8881c24023e0 EFLAGS: 00010046 [ 168.001782] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 168.009042] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 168.016304] RBP: ffff8881c2402420 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 168.023559] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 168.030804] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 168.038047] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 168.046282] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.052138] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 168.059383] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 168.066627] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 168.073879] Call Trace: [ 168.076456] BUG: unable to handle page fault for address: ffffc900006b8030 [ 168.083650] #PF: supervisor read access in kernel mode [ 168.088907] #PF: error_code(0x0000) - not-present page [ 168.094179] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 168.101088] Oops: 0000 [#18] PREEMPT SMP KASAN [ 168.105909] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 168.112902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.122250] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 168.127666] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 168.146546] RSP: 0018:ffff8881c2401eb0 EFLAGS: 00010046 [ 168.151882] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 168.159565] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 168.166809] RBP: ffff8881c2401ef0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 168.174066] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 168.181312] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 168.188578] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 168.196791] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.202646] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 168.209895] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 168.217153] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 168.224407] Call Trace: [ 168.226986] BUG: unable to handle page fault for address: ffffc900006b8030 [ 168.233976] #PF: supervisor read access in kernel mode [ 168.239224] #PF: error_code(0x0000) - not-present page [ 168.244472] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 168.251382] Oops: 0000 [#19] PREEMPT SMP KASAN [ 168.255942] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 168.262926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.272272] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 168.278582] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 168.297455] RSP: 0018:ffff8881c2401980 EFLAGS: 00010046 [ 168.302789] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 168.310031] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 168.317532] RBP: ffff8881c24019c0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 168.324775] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 168.332017] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 168.339264] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 168.347462] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.353319] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 168.360574] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 168.367839] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 168.375353] Call Trace: [ 168.377923] BUG: unable to handle page fault for address: ffffc900006b8030 [ 168.384906] #PF: supervisor read access in kernel mode [ 168.390159] #PF: error_code(0x0000) - not-present page [ 168.395507] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 168.402879] Oops: 0000 [#20] PREEMPT SMP KASAN [ 168.407442] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 168.414426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.423770] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 168.429108] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 168.448166] RSP: 0018:ffff8881c2401450 EFLAGS: 00010046 [ 168.453509] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 168.460857] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 168.468120] RBP: ffff8881c2401490 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 168.475373] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 168.482623] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 168.489867] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 168.498075] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.503933] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 168.511181] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 168.518424] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 168.525687] Call Trace: [ 168.528279] BUG: unable to handle page fault for address: ffffc900006b8030 [ 168.535262] #PF: supervisor read access in kernel mode [ 168.540609] #PF: error_code(0x0000) - not-present page [ 168.545855] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 168.552758] Oops: 0000 [#21] PREEMPT SMP KASAN [ 168.557314] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 168.564305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.573640] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 168.578973] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 168.598366] RSP: 0018:ffff8881c2400f20 EFLAGS: 00010046 [ 168.603712] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 168.610957] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 168.618204] RBP: ffff8881c2400f60 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 168.625450] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 168.632691] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 168.640117] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 168.648409] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.654264] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 168.661519] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 168.668788] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 168.676034] Call Trace: [ 168.678612] BUG: unable to handle page fault for address: ffffc900006b8030 [ 168.685681] #PF: supervisor read access in kernel mode [ 168.690946] #PF: error_code(0x0000) - not-present page [ 168.696193] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 168.703092] Oops: 0000 [#22] PREEMPT SMP KASAN [ 168.707666] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 168.714652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.723999] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 168.729335] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 168.748210] RSP: 0018:ffff8881c24009f0 EFLAGS: 00010046 [ 168.753716] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 168.761134] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 168.768382] RBP: ffff8881c2400a30 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 168.775629] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 168.783069] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 168.790321] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 168.798521] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.804387] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 168.811630] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 168.819224] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 168.826469] Call Trace: [ 168.829043] BUG: unable to handle page fault for address: ffffc900006b8030 [ 168.836030] #PF: supervisor read access in kernel mode [ 168.841278] #PF: error_code(0x0000) - not-present page [ 168.846982] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 168.853881] Thread overran stack, or stack corrupted [ 168.858963] Oops: 0000 [#23] PREEMPT SMP KASAN [ 168.863517] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 168.870602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.880385] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 168.885815] usercopy: Kernel memory overwrite attempt detected to process stack (offset 0, size 64)! [ 168.895104] ------------[ cut here ]------------ [ 168.899845] kernel BUG at mm/slab.c:4179! [ 168.904240] invalid opcode: 0000 [#24] PREEMPT SMP KASAN [ 168.909661] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 168.916647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.925983] RIP: 0010:__check_heap_object+0xa7/0xb5 [ 168.930974] Code: 48 c7 c7 bd ec ef 87 e8 47 a1 06 00 5d c3 41 8b 91 3c 01 00 00 48 29 c7 48 39 d7 77 be 48 01 d0 48 29 c8 48 39 f0 72 b3 5d c3 <0f> 0b 48 c7 c7 bd ec ef 87 e8 c7 a4 06 00 44 89 e9 48 c7 c7 f8 ed [ 168.949858] RSP: 0018:ffff8881c23ff5d0 EFLAGS: 00010046 [ 168.955214] RAX: 0000000000000001 RBX: ffff8881c23ff688 RCX: 000000000000000c [ 168.962556] RDX: ffff8881c23fe480 RSI: 0000000000000002 RDI: ffff8881c23ff688 [ 168.969886] RBP: ffff8881c23ff5d0 R08: fffff94000e11ff1 R09: ffff8881da18ca80 [ 168.977222] R10: 0000000000000fe8 R11: 0000000000000000 R12: 0000000000000002 [ 168.984464] R13: 0000000000000000 R14: ffffea000708ff80 R15: ffff8881c23ff68a [ 168.991717] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 168.999928] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 169.005784] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 169.013232] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 169.020476] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 169.027823] Call Trace: [ 169.030392] ? bpf_prog_kallsyms_find+0xc3/0x2e0 [ 169.035123] ? show_ip+0x31/0x36 [ 169.038549] ? show_iret_regs+0x14/0x38 [ 169.042494] ? __show_regs+0x1c/0x60 [ 169.046198] ? dump_stack_print_info+0xca/0xf0 [ 169.050770] ? show_regs+0x2c/0x40 [ 169.054284] ? __die+0x6a/0xc0 [ 169.057453] ? no_context+0x33f/0x7a0 [ 169.061329] ? pgtable_bad+0x80/0x80 [ 169.065102] ? _raw_spin_unlock_irqrestore+0x63/0xd0 [ 169.070184] ? trace_hardirqs_off+0x41/0x1a0 [ 169.074565] ? __kasan_check_read+0x11/0x20 [ 169.078857] ? __kasan_check_read+0x11/0x20 [ 169.083161] ? serial8250_console_write+0x6a7/0x860 [ 169.088151] ? __kasan_check_read+0x11/0x20 [ 169.092628] ? do_raw_spin_lock+0x123/0x2d0 [ 169.097097] ? console_unlock+0x55f/0xbe0 [ 169.101302] ? __bad_area_nosemaphore+0x70/0x310 [ 169.106113] ? rwlock_bug.part.2+0x90/0x90 [ 169.110327] ? lock_acquire+0x194/0x410 [ 169.114287] ? console_unlock+0x545/0xbe0 [ 169.118931] ? bad_area_nosemaphore+0x11/0x20 [ 169.123405] ? __do_page_fault+0x53c/0xa50 [ 169.127626] ? trace_hardirqs_off_caller+0x49/0x1a0 [ 169.132620] ? do_page_fault+0x2d/0x3c8 [ 169.136564] ? page_fault+0x39/0x40 [ 169.140222] BUG: unable to handle page fault for address: ffffc900006b8030 [ 169.147374] #PF: supervisor read access in kernel mode [ 169.152618] #PF: error_code(0x0000) - not-present page [ 169.157869] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 169.164802] Thread overran stack, or stack corrupted [ 169.169885] Oops: 0000 [#25] PREEMPT SMP KASAN [ 169.174437] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 169.181418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.190748] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 169.196088] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 169.215056] RSP: 0018:ffff8881c23ff258 EFLAGS: 00010046 [ 169.220609] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 169.229242] RDX: ffffffffa0011000 RSI: 00000000000256cb RDI: ffffc900006b8002 [ 169.236749] RBP: ffff8881c23ff298 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 169.244024] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 169.251269] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 169.258521] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 169.266725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 169.272666] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 169.279912] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 169.287153] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 169.294395] Call Trace: [ 169.298009] ? bpf_prog_kallsyms_find+0xc3/0x2e0 [ 169.302826] ? show_ip+0x31/0x36 [ 169.306165] ? show_iret_regs+0x14/0x38 [ 169.310126] ? __show_regs+0x1c/0x60 [ 169.313811] ? dump_stack_print_info+0xca/0xf0 [ 169.318363] ? show_regs+0x2c/0x40 [ 169.321882] ? __die+0x6a/0xc0 [ 169.325047] ? no_context+0x33f/0x7a0 [ 169.328819] ? pgtable_bad+0x80/0x80 [ 169.332619] ? _raw_spin_unlock_irqrestore+0x63/0xd0 [ 169.337697] ? trace_hardirqs_off+0x41/0x1a0 [ 169.342090] ? __kasan_check_read+0x11/0x20 [ 169.346383] ? __kasan_check_read+0x11/0x20 [ 169.350681] ? serial8250_console_write+0x6a7/0x860 [ 169.355677] ? __kasan_check_read+0x11/0x20 [ 169.359972] ? do_raw_spin_lock+0x123/0x2d0 [ 169.364269] ? console_unlock+0x55f/0xbe0 [ 169.368389] ? __bad_area_nosemaphore+0x70/0x310 [ 169.373114] ? rwlock_bug.part.2+0x90/0x90 [ 169.377332] ? lock_acquire+0x194/0x410 [ 169.381452] ? console_unlock+0x545/0xbe0 [ 169.385570] ? bad_area_nosemaphore+0x11/0x20 [ 169.390042] ? __do_page_fault+0x53c/0xa50 [ 169.394251] ? trace_hardirqs_off_caller+0x49/0x1a0 [ 169.400707] ? do_page_fault+0x2d/0x3c8 [ 169.404656] ? page_fault+0x39/0x40 [ 169.408273] BUG: unable to handle page fault for address: ffffc900006b8030 [ 169.415429] #PF: supervisor read access in kernel mode [ 169.420760] #PF: error_code(0x0000) - not-present page [ 169.426012] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d41c8067 PTE 0 [ 169.432915] Thread overran stack, or stack corrupted [ 169.437987] Oops: 0000 [#26] PREEMPT SMP KASAN [ 169.442541] CPU: 1 PID: 5583 Comm: syz-executor0 Not tainted 5.3.0-rc3+ #1 [ 169.449525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.459130] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 169.464473] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 169.483347] RSP: 0018:ffff8881c23fed20 EFLAGS: 00010046 [ 169.488691] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 169.495939] RDX: ffffffffa0011000 RSI: 00000000000256cb RDI: ffffc900006b8002 [ 169.503191] RBP: ffff8881c23fed60 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 169.510434] R10: fffffbfff11ebd7f R11: ffff8881c1ff6280 R12: ffff8881d82d67d0 [ 169.517764] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 169.525124] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 169.533495] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 169.539348] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 169.546688] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 169.554298] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 169.561631] Call Trace: [ 169.564274] Modules linked in: [ 169.567438] CR2: ffffc900006b8030 [ 169.570885] ---[ end trace 40830856286a033e ]--- [ 169.575614] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 169.580949] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 169.599908] RSP: 0018:ffff8881c24076e0 EFLAGS: 00010046 [ 169.605242] RAX: 1ffff920000d7006 RBX: ffffffffa0011000 RCX: ffffffffffffffe8 [ 169.612526] RDX: ffffffffffffffda RSI: 00000000000256cb RDI: ffffc900006b8002 [ 169.619767] RBP: ffff8881c2407720 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 169.627005] R10: ffffed103b626c4b R11: ffff8881db13625b R12: ffff8881d82d67d0 [ 169.634503] R13: ffffc900006b8000 R14: dffffc0000000000 R15: ffff8881d82d67b8 [ 169.642180] FS: 00007f4548ecd700(0000) GS:ffff8881db100000(0000) knlGS:0000000000000000 [ 169.650373] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 169.656225] CR2: ffffc900006b8030 CR3: 00000001cea46000 CR4: 00000000001406e0 [ 169.663469] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 169.670708] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 169.678038] Kernel panic - not syncing: Fatal exception in interrupt [ 169.685928] Kernel Offset: disabled [ 169.689543] Rebooting in 86400 seconds..