Hello,
syzbot found the following issue on:
HEAD commit: 93741761e5e3 Linux 5.15.207
git tree: linux-5.15.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=15f9fa73980000
kernel config:
https://syzkaller.appspot.com/x/.config?x=353ae28c40b35af5
dashboard link:
https://syzkaller.appspot.com/bug?extid=f1bcd35639521f808d51
compiler: Debian clang version 21.1.8 (++20251221033036+2078da43e25a-1~exp1~20251221153213.50), Debian LLD 21.1.8
Unfortunately, I don't have any reproducer for this issue yet.
Downloadable assets:
disk image:
https://storage.googleapis.com/syzbot-assets/7087b65c18a1/disk-93741761.raw.xz
vmlinux:
https://storage.googleapis.com/syzbot-assets/5892df79f094/vmlinux-93741761.xz
kernel image:
https://storage.googleapis.com/syzbot-assets/4602fe2cead2/bzImage-93741761.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+f1bcd3...@syzkaller.appspotmail.com
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 0-...!: (19 ticks this GP) idle=cf1/1/0x4000000000000000 softirq=19250/19250 fqs=37
(detected by 1, t=10502 jiffies, g=27861, q=783)
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 8062 Comm: syz.1.1068 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
RIP: 0010:__lock_acquire+0x241/0x7d10 kernel/locking/lockdep.c:-1
Code: 0a 00 00 4f 8d 3c a4 41 83 fc 30 0f 87 13 66 00 00 4f 8d 74 fe f8 4c 89 f0 48 c1 e8 03 42 0f b6 04 00 84 c0 0f 85 83 66 00 00 <4c> 89 e0 48 83 7d 10 00 0f 84 fe 00 00 00 45 8b 3e 44 89 f9 81 e1
RSP: 0018:ffffc90000007900 EFLAGS: 00000046
RAX: 0000000000000000 RBX: ffff8880b902a258 RCX: ffffffff962dcf03
RDX: 000000000000005e RSI: 0000000000000000 RDI: ffff8880b902a258
RBP: ffffc90000007b50 R08: dffffc0000000000 R09: 0000000000000001
R10: dffffc0000000000 R11: fffffbfff1b13f06 R12: 0000000000000001
R13: 0000000000000000 R14: ffff88802bd16450 R15: 0000000000000005
FS: 0000555568949500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe6f53c1d58 CR3: 000000005914a000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
lock_acquire+0x19e/0x400 kernel/locking/lockdep.c:5623
__raw_spin_lock_irq include/linux/spinlock_api_smp.h:128 [inline]
_raw_spin_lock_irq+0xab/0xf0 kernel/locking/spinlock.c:170
__run_hrtimer kernel/time/hrtimer.c:1689 [inline]
__hrtimer_run_queues+0x5a9/0xb70 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x3bb/0x8d0 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1097 [inline]
__sysvec_apic_timer_interrupt+0x137/0x4a0 arch/x86/kernel/apic/apic.c:1114
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1108 [inline]
sysvec_apic_timer_interrupt+0x9b/0xc0 arch/x86/kernel/apic/apic.c:1108
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676
RIP: 0010:__sanitizer_cov_trace_pc+0x58/0x60 kernel/kcov.c:216
Code: 10 16 00 00 83 fa 02 75 21 48 8b 91 18 16 00 00 48 8b 32 48 8d 7e 01 8b 89 14 16 00 00 48 39 cf 73 08 48 89 44 f2 08 48 89 3a <c3> 0f 1f 80 00 00 00 00 48 8b 04 24 65 48 8b 0d 44 39 89 7e 65 8b
RSP: 0018:ffffc900032bfae0 EFLAGS: 00000293
RAX: ffffffff81b0a2be RBX: dffffc0000000000 RCX: ffff88802bd15940
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88805e3ead88 R08: ffff8880457e255f R09: ffff8880457e2550
R10: dffffc0000000000 R11: ffffed1008afc4ac R12: 00000040283eb000
R13: 0000000000000000 R14: ffff88805e3eab78 R15: ffff88805e3eab58
vma_compute_subtree_gap mm/mmap.c:324 [inline]
validate_mm_rb+0x19e/0x230 mm/mmap.c:386
vma_rb_insert mm/mmap.c:458 [inline]
__vma_link_rb+0x54b/0x570 mm/mmap.c:657
__vma_link mm/mmap.c:683 [inline]
__insert_vm_struct mm/mmap.c:719 [inline]
__vma_adjust+0xb44/0x1c10 mm/mmap.c:933
vma_adjust include/linux/mm.h:2567 [inline]
__split_vma+0x34b/0x410 mm/mmap.c:-1
mprotect_fixup+0x518/0x800 mm/mprotect.c:477
do_mprotect_pkey+0x657/0x910 mm/mprotect.c:636
__do_sys_mprotect mm/mprotect.c:662 [inline]
__se_sys_mprotect mm/mprotect.c:659 [inline]
__x64_sys_mprotect+0x7c/0x90 mm/mprotect.c:659
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7fbf41f67c57
Code: 89 38 eb 84 0f 1f 80 00 00 00 00 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff e9 7a ff ff ff b8 0a 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff6b223848 EFLAGS: 00000206 ORIG_RAX: 000000000000000a
RAX: ffffffffffffffda RBX: 00007fbf401a06c0 RCX: 00007fbf41f67c57
RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00007fbf40181000
RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000
R10: 0000000000021000 R11: 0000000000000206 R12: 00007fff6b2239a0
R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000
</TASK>
rcu: rcu_preempt kthread starved for 10391 jiffies! g27861 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:27632 pid: 15 ppid: 2 flags:0x00004000
Call Trace:
<TASK>
context_switch kernel/sched/core.c:5049 [inline]
__schedule+0x11ef/0x43c0 kernel/sched/core.c:6395
schedule+0x11b/0x1e0 kernel/sched/core.c:6478
schedule_timeout+0x184/0x2d0 kernel/time/timer.c:2117
rcu_gp_fqs_loop+0x2be/0x11d0 kernel/rcu/tree.c:1972
rcu_gp_kthread+0x9b/0x370 kernel/rcu/tree.c:2145
kthread+0x436/0x520 kernel/kthread.c:334
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
</TASK>
rcu: Stack dump where RCU GP kthread last ran:
NMI backtrace for cpu 1
CPU: 1 PID: 8081 Comm: syz.7.1073 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
Call Trace:
<IRQ>
dump_stack_lvl+0x188/0x250 lib/dump_stack.c:106
nmi_cpu_backtrace+0x3a2/0x3d0 lib/nmi_backtrace.c:111
nmi_trigger_cpumask_backtrace+0x163/0x280 lib/nmi_backtrace.c:62
trigger_single_cpu_backtrace include/linux/nmi.h:166 [inline]
rcu_check_gp_kthread_starvation+0x1cd/0x250 kernel/rcu/tree_stall.h:487
print_other_cpu_stall+0x1110/0x1270 kernel/rcu/tree_stall.h:592
check_cpu_stall kernel/rcu/tree_stall.h:745 [inline]
rcu_pending kernel/rcu/tree.c:3936 [inline]
rcu_sched_clock_irq+0x843/0x1120 kernel/rcu/tree.c:2619
update_process_times+0x193/0x200 kernel/time/timer.c:2021
tick_sched_handle kernel/time/tick-sched.c:254 [inline]
tick_sched_timer+0x37d/0x560 kernel/time/tick-sched.c:1473
__run_hrtimer kernel/time/hrtimer.c:1685 [inline]
__hrtimer_run_queues+0x4b4/0xb70 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x3bb/0x8d0 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1097 [inline]
__sysvec_apic_timer_interrupt+0x137/0x4a0 arch/x86/kernel/apic/apic.c:1114
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1108 [inline]
sysvec_apic_timer_interrupt+0x9b/0xc0 arch/x86/kernel/apic/apic.c:1108
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676
RIP: 0010:csd_lock_wait kernel/smp.c:440 [inline]
RIP: 0010:smp_call_function_many_cond+0xbb5/0xd90 kernel/smp.c:969
Code: b6 44 05 00 84 c0 0f 85 9d 00 00 00 41 8b 1c 24 89 de 83 e6 01 31 ff e8 d9 62 0b 00 83 e3 01 75 07 e8 6f 5f 0b 00 eb 43 f3 90 <48> b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 00 84 c0 75 11 41 f7
RSP: 0018:ffffc9000419faa0 EFLAGS: 00000246
RAX: ffffffff816dd6c8 RBX: 0000000000000001 RCX: 0000000000080000
RDX: ffffc90011193000 RSI: 000000000007ffff RDI: 0000000000080000
RBP: ffffc9000419fbe0 R08: ffffffff901d60c7 R09: 1ffffffff203ac18
R10: dffffc0000000000 R11: fffffbfff203ac19 R12: ffff8880b9042848
R13: 1ffff11017208509 R14: ffff8880b913b3c0 R15: 0000000000000000
on_each_cpu_cond_mask+0x3b/0x80 kernel/smp.c:1134
on_each_cpu include/linux/smp.h:71 [inline]
text_poke_sync arch/x86/kernel/alternative.c:1442 [inline]
text_poke_bp_batch+0x2b0/0x830 arch/x86/kernel/alternative.c:1642
text_poke_flush arch/x86/kernel/alternative.c:1833 [inline]
text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1840
arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146
static_key_slow_inc_cpuslocked+0x121/0x210 kernel/jump_label.c:144
static_key_slow_inc+0x16/0x20 kernel/jump_label.c:159
bpf_enable_runtime_stats kernel/bpf/syscall.c:4504 [inline]
bpf_enable_stats+0x101/0x140 kernel/bpf/syscall.c:4523
__sys_bpf+0x5e1/0x6f0 kernel/bpf/syscall.c:4740
__do_sys_bpf kernel/bpf/syscall.c:4761 [inline]
__se_sys_bpf kernel/bpf/syscall.c:4759 [inline]
__x64_sys_bpf+0x78/0x90 kernel/bpf/syscall.c:4759
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f0ce8d77e59
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f0ce6fd1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f0ce8ff0fa0 RCX: 00007f0ce8d77e59
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000020
RBP: 00007f0ce8e0dd6f R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f0ce8ff1038 R14: 00007f0ce8ff0fa0 R15: 00007ffd3aeeef98
</TASK>
watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [syz.7.1073:8081]
Modules linked in:
irq event stamp: 78490
hardirqs last enabled at (78489): [<ffffffff89e00d06>] asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676
hardirqs last disabled at (78490): [<ffffffff89bcc30a>] sysvec_apic_timer_interrupt+0xa/0xc0 arch/x86/kernel/apic/apic.c:1108
softirqs last enabled at (488): [<ffffffff81495b1b>] __do_softirq kernel/softirq.c:610 [inline]
softirqs last enabled at (488): [<ffffffff81495b1b>] invoke_softirq kernel/softirq.c:450 [inline]
softirqs last enabled at (488): [<ffffffff81495b1b>] __irq_exit_rcu+0x13b/0x230 kernel/softirq.c:659
softirqs last disabled at (447): [<ffffffff81495b1b>] __do_softirq kernel/softirq.c:610 [inline]
softirqs last disabled at (447): [<ffffffff81495b1b>] invoke_softirq kernel/softirq.c:450 [inline]
softirqs last disabled at (447): [<ffffffff81495b1b>] __irq_exit_rcu+0x13b/0x230 kernel/softirq.c:659
CPU: 1 PID: 8081 Comm: syz.7.1073 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
RIP: 0010:csd_lock_wait kernel/smp.c:440 [inline]
RIP: 0010:smp_call_function_many_cond+0xbb5/0xd90 kernel/smp.c:969
Code: b6 44 05 00 84 c0 0f 85 9d 00 00 00 41 8b 1c 24 89 de 83 e6 01 31 ff e8 d9 62 0b 00 83 e3 01 75 07 e8 6f 5f 0b 00 eb 43 f3 90 <48> b8 00 00 00 00 00 fc ff df 41 0f b6 44 05 00 84 c0 75 11 41 f7
RSP: 0018:ffffc9000419faa0 EFLAGS: 00000246
RAX: ffffffff816dd6c8 RBX: 0000000000000001 RCX: 0000000000080000
RDX: ffffc90011193000 RSI: 000000000007ffff RDI: 0000000000080000
RBP: ffffc9000419fbe0 R08: ffffffff901d60c7 R09: 1ffffffff203ac18
R10: dffffc0000000000 R11: fffffbfff203ac19 R12: ffff8880b9042848
R13: 1ffff11017208509 R14: ffff8880b913b3c0 R15: 0000000000000000
FS: 00007f0ce6fd16c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000020000057f000 CR3: 000000005915c000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
on_each_cpu_cond_mask+0x3b/0x80 kernel/smp.c:1134
on_each_cpu include/linux/smp.h:71 [inline]
text_poke_sync arch/x86/kernel/alternative.c:1442 [inline]
text_poke_bp_batch+0x2b0/0x830 arch/x86/kernel/alternative.c:1642
text_poke_flush arch/x86/kernel/alternative.c:1833 [inline]
text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1840
arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146
static_key_slow_inc_cpuslocked+0x121/0x210 kernel/jump_label.c:144
static_key_slow_inc+0x16/0x20 kernel/jump_label.c:159
bpf_enable_runtime_stats kernel/bpf/syscall.c:4504 [inline]
bpf_enable_stats+0x101/0x140 kernel/bpf/syscall.c:4523
__sys_bpf+0x5e1/0x6f0 kernel/bpf/syscall.c:4740
__do_sys_bpf kernel/bpf/syscall.c:4761 [inline]
__se_sys_bpf kernel/bpf/syscall.c:4759 [inline]
__x64_sys_bpf+0x78/0x90 kernel/bpf/syscall.c:4759
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f0ce8d77e59
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f0ce6fd1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f0ce8ff0fa0 RCX: 00007f0ce8d77e59
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000020
RBP: 00007f0ce8e0dd6f R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f0ce8ff1038 R14: 00007f0ce8ff0fa0 R15: 00007ffd3aeeef98
</TASK>
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 8062 Comm: syz.1.1068 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
RIP: 0010:advance_sched+0xc6/0x940 net/sched/sch_taprio.c:719
Code: 00 74 08 48 89 df e8 89 4d a7 f9 48 89 5c 24 60 4c 8b 3b e8 fc c7 a5 01 89 c3 31 ff 89 c6 e8 01 32 62 f9 85 db 4c 89 64 24 30 <74> 28 48 8d 7d c0 be ff ff ff ff e8 8a c4 a5 01 89 c3 31 ff 89 c6
RSP: 0018:ffffc90000007ca0 EFLAGS: 00000002
RAX: ffffffff8817076f RBX: 0000000000000001 RCX: ffff88802bd15940
RDX: 0000000000010000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffff8880625bbb40 R08: 0000000000000003 R09: 0000000000000004
R10: dffffc0000000000 R11: fffff52000000f84 R12: ffff8880625bbae8
R13: dffffc0000000000 R14: ffff8880625bb800 R15: ffff88801fdced00
FS: 0000555568949500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe6f53c1d58 CR3: 000000005914a000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
__run_hrtimer kernel/time/hrtimer.c:1685 [inline]
__hrtimer_run_queues+0x4f2/0xb70 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x3bb/0x8d0 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1097 [inline]
__sysvec_apic_timer_interrupt+0x137/0x4a0 arch/x86/kernel/apic/apic.c:1114
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1108 [inline]
sysvec_apic_timer_interrupt+0x9b/0xc0 arch/x86/kernel/apic/apic.c:1108
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676
RIP: 0010:__sanitizer_cov_trace_pc+0x58/0x60 kernel/kcov.c:216
Code: 10 16 00 00 83 fa 02 75 21 48 8b 91 18 16 00 00 48 8b 32 48 8d 7e 01 8b 89 14 16 00 00 48 39 cf 73 08 48 89 44 f2 08 48 89 3a <c3> 0f 1f 80 00 00 00 00 48 8b 04 24 65 48 8b 0d 44 39 89 7e 65 8b
RSP: 0018:ffffc900032bfae0 EFLAGS: 00000293
RAX: ffffffff81b0a2be RBX: dffffc0000000000 RCX: ffff88802bd15940
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88805e3ead88 R08: ffff8880457e255f R09: ffff8880457e2550
R10: dffffc0000000000 R11: ffffed1008afc4ac R12: 00000040283eb000
R13: 0000000000000000 R14: ffff88805e3eab78 R15: ffff88805e3eab58
vma_compute_subtree_gap mm/mmap.c:324 [inline]
validate_mm_rb+0x19e/0x230 mm/mmap.c:386
vma_rb_insert mm/mmap.c:458 [inline]
__vma_link_rb+0x54b/0x570 mm/mmap.c:657
__vma_link mm/mmap.c:683 [inline]
__insert_vm_struct mm/mmap.c:719 [inline]
__vma_adjust+0xb44/0x1c10 mm/mmap.c:933
vma_adjust include/linux/mm.h:2567 [inline]
__split_vma+0x34b/0x410 mm/mmap.c:-1
mprotect_fixup+0x518/0x800 mm/mprotect.c:477
do_mprotect_pkey+0x657/0x910 mm/mprotect.c:636
__do_sys_mprotect mm/mprotect.c:662 [inline]
__se_sys_mprotect mm/mprotect.c:659 [inline]
__x64_sys_mprotect+0x7c/0x90 mm/mprotect.c:659
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7fbf41f67c57
Code: 89 38 eb 84 0f 1f 80 00 00 00 00 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff e9 7a ff ff ff b8 0a 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff6b223848 EFLAGS: 00000206 ORIG_RAX: 000000000000000a
RAX: ffffffffffffffda RBX: 00007fbf401a06c0 RCX: 00007fbf41f67c57
RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00007fbf40181000
RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000
R10: 0000000000021000 R11: 0000000000000206 R12: 00007fff6b2239a0
R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000
</TASK>
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup