[ 21.870971] audit: type=1800 audit(1566209692.908:26): pid=5853 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 21.890231] audit: type=1800 audit(1566209692.908:27): pid=5853 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 31.555060] IPVS: ftp: loaded support on port[0] = 21 [ 58.892292] can: request_module (can-proto-0) failed. [ 58.901692] can: request_module (can-proto-0) failed. Warning: Permanently added '10.128.15.201' (ECDSA) to the list of known hosts. 2019/08/19 10:15:38 parsed 1 programs 2019/08/19 10:15:39 executed programs: 0 [ 68.638343] IPVS: ftp: loaded support on port[0] = 21 [ 68.638346] IPVS: ftp: loaded support on port[0] = 21 [ 68.665878] IPVS: ftp: loaded support on port[0] = 21 [ 68.688834] IPVS: ftp: loaded support on port[0] = 21 [ 68.689478] IPVS: ftp: loaded support on port[0] = 21 [ 68.705783] IPVS: ftp: loaded support on port[0] = 21 [ 69.560945] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.571774] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.583041] device bridge_slave_0 entered promiscuous mode [ 69.599739] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.610030] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.618674] device bridge_slave_0 entered promiscuous mode [ 69.639229] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.651413] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.658782] device bridge_slave_0 entered promiscuous mode [ 69.666890] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.673269] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.680914] device bridge_slave_0 entered promiscuous mode [ 69.695166] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.701552] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.709139] device bridge_slave_1 entered promiscuous mode [ 69.718140] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.724513] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.733028] device bridge_slave_0 entered promiscuous mode [ 69.739958] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.746893] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.754098] device bridge_slave_1 entered promiscuous mode [ 69.762560] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.769456] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.776655] device bridge_slave_1 entered promiscuous mode [ 69.785157] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.791716] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.799339] device bridge_slave_1 entered promiscuous mode [ 69.807553] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.814107] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.821575] device bridge_slave_0 entered promiscuous mode [ 69.830614] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.838022] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.846455] device bridge_slave_1 entered promiscuous mode [ 69.878593] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.897440] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.904539] device bridge_slave_1 entered promiscuous mode [ 70.011035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.039369] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.062024] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.092273] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.117838] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.139660] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.152983] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.188997] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.200192] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.211988] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.229410] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.250903] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.306038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.326639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.360024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.378992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.403618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.440556] team0: Port device team_slave_0 added [ 70.466401] team0: Port device team_slave_0 added [ 70.497344] team0: Port device team_slave_0 added [ 70.507224] team0: Port device team_slave_0 added [ 70.530732] team0: Port device team_slave_1 added [ 70.549939] team0: Port device team_slave_0 added [ 70.559819] team0: Port device team_slave_1 added [ 70.579098] team0: Port device team_slave_0 added [ 70.593926] team0: Port device team_slave_1 added [ 70.603081] team0: Port device team_slave_1 added [ 70.612066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.634256] team0: Port device team_slave_1 added [ 70.650920] team0: Port device team_slave_1 added [ 70.666925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.678562] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.688302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.696279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.721033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.750095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.758530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.766729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.774825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.782787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.792523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.803462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.816066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.824531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.833077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.858240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.888193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.896759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.904811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.912702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.920659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.928643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.944743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.959841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.976180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.984294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.992614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.000772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.012977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.021657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.048864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.069892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.087716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.101591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.118332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.130970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.437651] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.444294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.451758] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.458358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.557136] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.563696] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.570496] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.576904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.600447] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.607044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.613922] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.620614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.663586] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.670331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.677511] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.683940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.699688] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.706674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.714062] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.720755] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.735571] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.741949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.748931] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.755482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.356473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.373764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.386203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.393485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.401119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.409027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.494424] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.591130] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.607440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.691106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.743573] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.755857] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.817542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.827795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.974857] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.990450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.002767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.027734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.039982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.118916] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.134923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.141955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.171808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.184000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.205479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.218982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.233299] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.360486] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.371611] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.395301] 8021q: adding VLAN 0 to HW filter on device team0 2019/08/19 10:15:46 executed programs: 6 2019/08/19 10:15:51 executed programs: 321 2019/08/19 10:15:56 executed programs: 657 2019/08/19 10:16:01 executed programs: 990 2019/08/19 10:16:06 executed programs: 1323 2019/08/19 10:16:11 executed programs: 1657 2019/08/19 10:16:16 executed programs: 1989 2019/08/19 10:16:21 executed programs: 2316 2019/08/19 10:16:26 executed programs: 2644 2019/08/19 10:16:31 executed programs: 2976 2019/08/19 10:16:36 executed programs: 3303 2019/08/19 10:16:41 executed programs: 3624 2019/08/19 10:16:46 executed programs: 3943 2019/08/19 10:16:51 executed programs: 4260 2019/08/19 10:16:56 executed programs: 4579 [ 148.161723] BUG: unable to handle page fault for address: ffffc900006da030 [ 148.168795] #PF: supervisor read access in kernel mode [ 148.174049] #PF: error_code(0x0000) - not-present page [ 148.179306] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 148.186237] Oops: 0000 [#1] PREEMPT SMP KASAN [ 148.190719] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 148.197702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.207054] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 148.215032] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 148.233920] RSP: 0018:ffff8881b8d46ec8 EFLAGS: 00010046 [ 148.239266] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 148.246514] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 148.253770] RBP: ffff8881b8d46f08 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 148.261015] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 148.268259] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 148.275505] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 148.283706] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 148.289561] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 148.296822] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 148.304069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 148.311650] Call Trace: [ 148.314240] BUG: unable to handle page fault for address: ffffc900006da030 [ 148.321225] #PF: supervisor read access in kernel mode [ 148.326477] #PF: error_code(0x0000) - not-present page [ 148.331727] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 148.338628] Oops: 0000 [#2] PREEMPT SMP KASAN [ 148.343185] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 148.350170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.359598] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 148.364938] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 148.383815] RSP: 0018:ffff8881b8d46990 EFLAGS: 00010046 [ 148.389162] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 148.396409] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 148.403654] RBP: ffff8881b8d469d0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 148.410910] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 148.418153] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 148.425400] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 148.433616] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 148.439477] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 148.446723] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 148.453988] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 148.461234] Call Trace: [ 148.463803] BUG: unable to handle page fault for address: ffffc900006da030 [ 148.470797] #PF: supervisor read access in kernel mode [ 148.476131] #PF: error_code(0x0000) - not-present page [ 148.481381] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 148.488385] Oops: 0000 [#3] PREEMPT SMP KASAN [ 148.492857] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 148.499932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.509281] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 148.514615] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 148.533493] RSP: 0018:ffff8881b8d46460 EFLAGS: 00010046 [ 148.538832] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 148.546083] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 148.553346] RBP: ffff8881b8d464a0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 148.560678] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 148.567923] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 148.575169] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 148.583454] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 148.589313] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 148.596559] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 148.603811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 148.611067] Call Trace: [ 148.613636] BUG: unable to handle page fault for address: ffffc900006da030 [ 148.620718] #PF: supervisor read access in kernel mode [ 148.625966] #PF: error_code(0x0000) - not-present page [ 148.631216] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 148.638129] Oops: 0000 [#4] PREEMPT SMP KASAN [ 148.642600] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 148.649584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.658934] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 148.664279] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 148.683157] RSP: 0018:ffff8881b8d45f30 EFLAGS: 00010046 [ 148.688496] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 148.695752] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 148.702997] RBP: ffff8881b8d45f70 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 148.710255] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 148.717501] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 148.724748] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 148.732947] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 148.738805] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 148.746062] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 148.753305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 148.760547] Call Trace: [ 148.763117] BUG: unable to handle page fault for address: ffffc900006da030 [ 148.770112] #PF: supervisor read access in kernel mode [ 148.775368] #PF: error_code(0x0000) - not-present page [ 148.780626] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 148.787966] Oops: 0000 [#5] PREEMPT SMP KASAN [ 148.792443] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 148.799426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.808782] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 148.814219] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 148.833196] RSP: 0018:ffff8881b8d45a00 EFLAGS: 00010046 [ 148.838560] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 148.845805] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 148.853049] RBP: ffff8881b8d45a40 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 148.860294] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 148.867629] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 148.874887] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 148.883087] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 148.888953] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 148.896199] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 148.903443] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 148.910694] Call Trace: [ 148.913267] BUG: unable to handle page fault for address: ffffc900006da030 [ 148.920264] #PF: supervisor read access in kernel mode [ 148.925514] #PF: error_code(0x0000) - not-present page [ 148.930773] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 148.937686] Oops: 0000 [#6] PREEMPT SMP KASAN [ 148.942164] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 148.949166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.958513] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 148.963864] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 148.982919] RSP: 0018:ffff8881b8d454d0 EFLAGS: 00010046 [ 148.988258] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 148.995503] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 149.002748] RBP: ffff8881b8d45510 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 149.009992] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 149.017618] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 149.024862] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 149.033062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 149.038917] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 149.049730] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 149.056978] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 149.064229] Call Trace: [ 149.066803] BUG: unable to handle page fault for address: ffffc900006da030 [ 149.073786] #PF: supervisor read access in kernel mode [ 149.079038] #PF: error_code(0x0000) - not-present page [ 149.084285] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 149.091188] Oops: 0000 [#7] PREEMPT SMP KASAN [ 149.095654] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 149.102770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.112121] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 149.117457] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 149.136348] RSP: 0018:ffff8881b8d44fa0 EFLAGS: 00010046 [ 149.141697] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 149.148955] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 149.156210] RBP: ffff8881b8d44fe0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 149.163458] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 149.170890] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 149.178142] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 149.186358] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 149.192300] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 149.199546] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 149.206802] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 149.214047] Call Trace: [ 149.216618] BUG: unable to handle page fault for address: ffffc900006da030 [ 149.223603] #PF: supervisor read access in kernel mode [ 149.228859] #PF: error_code(0x0000) - not-present page [ 149.234109] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 149.241010] Oops: 0000 [#8] PREEMPT SMP KASAN [ 149.245477] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 149.252461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.261796] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 149.267132] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 149.286008] RSP: 0018:ffff8881b8d44a70 EFLAGS: 00010046 [ 149.291343] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 149.298597] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 149.305841] RBP: ffff8881b8d44ab0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 149.313087] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 149.320335] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 149.327595] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 149.335794] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 149.341650] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 149.348896] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 149.356143] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 149.363397] Call Trace: [ 149.365967] BUG: unable to handle page fault for address: ffffc900006da030 [ 149.372960] #PF: supervisor read access in kernel mode [ 149.378214] #PF: error_code(0x0000) - not-present page [ 149.383467] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 149.390381] Oops: 0000 [#9] PREEMPT SMP KASAN [ 149.394851] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 149.401846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.411180] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 149.416522] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 149.435572] RSP: 0018:ffff8881b8d44540 EFLAGS: 00010046 [ 149.440911] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 149.448160] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 149.455425] RBP: ffff8881b8d44580 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 149.462931] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 149.470264] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 149.477599] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 149.485814] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 149.491678] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 149.499114] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 149.506370] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 149.513624] Call Trace: [ 149.516212] BUG: unable to handle page fault for address: ffffc900006da030 [ 149.523199] #PF: supervisor read access in kernel mode [ 149.528447] #PF: error_code(0x0000) - not-present page [ 149.533695] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 149.540608] Oops: 0000 [#10] PREEMPT SMP KASAN [ 149.545222] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 149.552222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.561566] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 149.566902] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 149.585781] RSP: 0018:ffff8881b8d44010 EFLAGS: 00010046 [ 149.591118] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 149.598375] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 149.605627] RBP: ffff8881b8d44050 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 149.612874] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 149.620120] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 149.627366] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 149.635577] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 149.641436] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 149.648684] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 149.655940] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 149.663194] Call Trace: [ 149.665778] BUG: unable to handle page fault for address: ffffc900006da030 [ 149.672762] #PF: supervisor read access in kernel mode [ 149.678012] #PF: error_code(0x0000) - not-present page [ 149.683267] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 149.690170] Oops: 0000 [#11] PREEMPT SMP KASAN [ 149.694731] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 149.701804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.711144] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 149.716492] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 149.735635] RSP: 0018:ffff8881b8d43ae0 EFLAGS: 00010046 [ 149.740974] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 149.748309] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 149.755564] RBP: ffff8881b8d43b20 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 149.762986] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 149.770231] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 149.777483] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 149.785695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 149.791562] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 149.798910] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 149.806155] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 149.813402] Call Trace: [ 149.815973] BUG: unable to handle page fault for address: ffffc900006da030 [ 149.822968] #PF: supervisor read access in kernel mode [ 149.828218] #PF: error_code(0x0000) - not-present page [ 149.833554] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 149.840482] Oops: 0000 [#12] PREEMPT SMP KASAN [ 149.845042] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 149.852026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.861361] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 149.866698] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 149.885575] RSP: 0018:ffff8881b8d435b0 EFLAGS: 00010046 [ 149.891002] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 149.898256] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 149.905500] RBP: ffff8881b8d435f0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 149.912755] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 149.919997] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 149.927242] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 149.935439] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 149.941292] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 149.948537] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 149.955796] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 149.963040] Call Trace: [ 149.965612] BUG: unable to handle page fault for address: ffffc900006da030 [ 149.972606] #PF: supervisor read access in kernel mode [ 149.977868] #PF: error_code(0x0000) - not-present page [ 149.983115] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 149.990188] Oops: 0000 [#13] PREEMPT SMP KASAN [ 149.994760] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 150.001743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.011181] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 150.016614] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 150.035492] RSP: 0018:ffff8881b8d43080 EFLAGS: 00010046 [ 150.041322] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 150.048578] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 150.055819] RBP: ffff8881b8d430c0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 150.063078] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 150.070321] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 150.077664] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 150.085864] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 150.091745] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 150.098993] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 150.106325] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 150.113580] Call Trace: [ 150.116155] BUG: unable to handle page fault for address: ffffc900006da030 [ 150.123138] #PF: supervisor read access in kernel mode [ 150.128483] #PF: error_code(0x0000) - not-present page [ 150.133731] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 150.140636] Oops: 0000 [#14] PREEMPT SMP KASAN [ 150.145194] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 150.152178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.161601] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 150.166936] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 150.185822] RSP: 0018:ffff8881b8d42b50 EFLAGS: 00010046 [ 150.191254] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 150.198496] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 150.205750] RBP: ffff8881b8d42b90 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 150.215293] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 150.222540] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 150.229796] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 150.237994] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 150.243938] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 150.251186] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 150.258506] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 150.265750] Call Trace: [ 150.268326] BUG: unable to handle page fault for address: ffffc900006da030 [ 150.275311] #PF: supervisor read access in kernel mode [ 150.280560] #PF: error_code(0x0000) - not-present page [ 150.285812] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 150.292713] Oops: 0000 [#15] PREEMPT SMP KASAN [ 150.297268] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 150.304265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.313598] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 150.318945] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 150.337819] RSP: 0018:ffff8881b8d42620 EFLAGS: 00010046 [ 150.343161] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 150.350404] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 150.357650] RBP: ffff8881b8d42660 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 150.364993] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 150.372237] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 150.379483] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 150.387680] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 150.393535] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 150.400781] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 150.408032] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 150.415289] Call Trace: [ 150.417877] BUG: unable to handle page fault for address: ffffc900006da030 [ 150.424864] #PF: supervisor read access in kernel mode [ 150.430110] #PF: error_code(0x0000) - not-present page [ 150.435358] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 150.442270] Oops: 0000 [#16] PREEMPT SMP KASAN [ 150.446828] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 150.453812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.463149] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 150.468575] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 150.487624] RSP: 0018:ffff8881b8d420f0 EFLAGS: 00010046 [ 150.493048] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 150.500292] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 150.507545] RBP: ffff8881b8d42130 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 150.514788] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 150.522028] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 150.529361] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 150.537560] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 150.543415] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 150.550663] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 150.557911] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 150.565165] Call Trace: [ 150.567740] BUG: unable to handle page fault for address: ffffc900006da030 [ 150.574730] #PF: supervisor read access in kernel mode [ 150.579980] #PF: error_code(0x0000) - not-present page [ 150.585228] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 150.592134] Oops: 0000 [#17] PREEMPT SMP KASAN [ 150.596687] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 150.603670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.613005] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 150.618352] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 150.637228] RSP: 0018:ffff8881b8d41bc0 EFLAGS: 00010046 [ 150.642572] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 150.649817] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 150.657147] RBP: ffff8881b8d41c00 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 150.664394] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 150.671649] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 150.678894] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 150.687093] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 150.692965] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 150.700212] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 150.707460] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 150.714705] Call Trace: [ 150.717279] BUG: unable to handle page fault for address: ffffc900006da030 [ 150.724268] #PF: supervisor read access in kernel mode [ 150.729525] #PF: error_code(0x0000) - not-present page [ 150.734770] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 150.741677] Oops: 0000 [#18] PREEMPT SMP KASAN [ 150.746252] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 150.753248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.762593] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 150.767932] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 150.786819] RSP: 0018:ffff8881b8d41690 EFLAGS: 00010046 [ 150.792155] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 150.799401] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 150.806646] RBP: ffff8881b8d416d0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 150.813986] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 150.821280] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 150.828532] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 150.836729] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 150.842600] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 150.849847] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 150.857094] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 150.864345] Call Trace: [ 150.866922] BUG: unable to handle page fault for address: ffffc900006da030 [ 150.873907] #PF: supervisor read access in kernel mode [ 150.879171] #PF: error_code(0x0000) - not-present page [ 150.884417] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 150.891318] Oops: 0000 [#19] PREEMPT SMP KASAN [ 150.895887] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 150.902875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.912223] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 150.917559] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 150.936553] RSP: 0018:ffff8881b8d41160 EFLAGS: 00010046 [ 150.941890] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 150.949229] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 150.956474] RBP: ffff8881b8d411a0 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 150.963716] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 150.970959] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 150.978206] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 150.986405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 150.992272] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 150.999517] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 151.006762] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 151.014012] Call Trace: [ 151.016580] BUG: unable to handle page fault for address: ffffc900006da030 [ 151.023567] #PF: supervisor read access in kernel mode [ 151.028815] #PF: error_code(0x0000) - not-present page [ 151.034060] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 151.044481] Oops: 0000 [#20] PREEMPT SMP KASAN [ 151.049039] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 151.056022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.065358] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 151.070692] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 151.089569] RSP: 0018:ffff8881b8d40c30 EFLAGS: 00010046 [ 151.094905] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 151.102148] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 151.109391] RBP: ffff8881b8d40c70 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 151.116648] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 151.123897] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 151.131144] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 151.139344] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 151.145199] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 151.152449] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 151.159693] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 151.166950] Call Trace: [ 151.169522] BUG: unable to handle page fault for address: ffffc900006da030 [ 151.176505] #PF: supervisor read access in kernel mode [ 151.181764] #PF: error_code(0x0000) - not-present page [ 151.187011] PGD 1da13c067 P4D 1da13c067 PUD 1da13d067 PMD 1d3e85067 PTE 0 [ 151.193910] Thread overran stack, or stack corrupted [ 151.198997] Oops: 0000 [#21] PREEMPT SMP KASAN [ 151.203555] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 151.210549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.219882] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 151.225237] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 151.244312] RSP: 0018:ffff8881b8d40700 EFLAGS: 00010046 [ 151.249734] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 151.256975] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 151.264233] RBP: ffff8881b8d40740 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 151.271478] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 151.278720] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 151.285967] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 151.294177] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 151.300032] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 151.307279] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 151.314524] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 151.321768] Call Trace: [ 151.324478] usercopy: Kernel memory overwrite attempt detected to SLAB object 'kmalloc-32k' (offset 33592, size 2)! [ 151.335026] usercopy: Kernel memory overwrite attempt detected to SLAB object 'kmalloc-32k' (offset 32936, size 2)! [ 151.345599] ------------[ cut here ]------------ [ 151.350328] kernel BUG at mm/usercopy.c:98! [ 151.354628] invalid opcode: 0000 [#22] PREEMPT SMP KASAN [ 151.360050] CPU: 0 PID: 27419 Comm: syz-executor2 Not tainted 5.3.0-rc5 #1 [ 151.367043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.376380] RIP: 0010:usercopy_abort+0x75/0x77 [ 151.380963] Code: 0f 45 c6 48 c7 c2 60 83 14 87 48 c7 c6 e0 82 14 87 51 48 0f 45 f2 48 89 f9 41 52 48 89 c2 48 c7 c7 80 84 14 87 e8 70 45 b3 ff <0f> 0b e8 ca 77 f9 ff 4d 89 e0 31 c9 44 89 ea 31 f6 48 c7 c7 80 85 [ 151.399838] RSP: 0018:ffff8881b8d38a88 EFLAGS: 00010082 [ 151.405174] RAX: 0000000000000067 RBX: ffff8881b8d38b68 RCX: 0000000000000015 [ 151.412417] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff89d47080 [ 151.419658] RBP: ffff8881b8d38aa0 R08: ffffed103b604101 R09: ffffed103b604101 [ 151.426900] R10: ffffed103b604100 R11: ffff8881db020807 R12: 0000000000000002 [ 151.434244] R13: 0000000000000000 R14: ffffea0006e34c00 R15: ffff8881b8d38b6a [ 151.441508] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 151.449716] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 151.455573] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 151.462822] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 151.470076] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 151.477320] Call Trace: [ 151.479876] Modules linked in: [ 151.483052] ---[ end trace 0495a177b8e4175f ]--- [ 151.487789] RIP: 0010:bpf_prog_kallsyms_find+0xc3/0x2e0 [ 151.493126] Code: 03 42 80 3c 30 00 0f 85 1c 01 00 00 4d 8b 6f 50 49 8d 7d 30 48 89 f8 48 c1 e8 03 42 80 3c 30 00 0f 85 50 01 00 00 49 8d 7d 02 <49> 8b 5d 30 48 89 f8 49 89 f9 48 c1 e8 03 41 83 e1 07 42 0f b6 04 [ 151.512001] RSP: 0018:ffff8881b8d46ec8 EFLAGS: 00010046 [ 151.517337] RAX: 1ffff920000db406 RBX: ffffffffa00b8000 RCX: 0000000000000000 [ 151.524599] RDX: 0000000000000000 RSI: 0000000000017f14 RDI: ffffc900006da002 [ 151.531860] RBP: ffff8881b8d46f08 R08: ffffffff8820dbc0 R09: 0000000000000002 [ 151.539102] R10: ffffed103b606c4b R11: ffff8881db03625b R12: ffff8881d8f340f8 [ 151.546347] R13: ffffc900006da000 R14: dffffc0000000000 R15: ffff8881d8f340f8 [ 151.553606] FS: 00007f0fec0b4700(0000) GS:ffff8881db000000(0000) knlGS:0000000000000000 [ 151.561804] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 151.567660] CR2: ffffc900006da030 CR3: 00000001b8fb5000 CR4: 00000000001406f0 [ 151.574905] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 151.582149] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 151.589398] Kernel panic - not syncing: Fatal exception [ 151.596522] Kernel Offset: disabled [ 151.600145] Rebooting in 86400 seconds..