Warning: Permanently added '10.128.15.206' (ECDSA) to the list of known hosts. 2019/12/10 21:20:05 fuzzer started 2019/12/10 21:20:07 dialing manager at 10.128.0.105:37821 2019/12/10 21:20:07 syscalls: 2689 2019/12/10 21:20:07 code coverage: enabled 2019/12/10 21:20:07 comparison tracing: enabled 2019/12/10 21:20:07 extra coverage: extra coverage is not supported by the kernel 2019/12/10 21:20:07 setuid sandbox: enabled 2019/12/10 21:20:07 namespace sandbox: enabled 2019/12/10 21:20:07 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/10 21:20:07 fault injection: enabled 2019/12/10 21:20:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/10 21:20:07 net packet injection: enabled 2019/12/10 21:20:07 net device setup: enabled 2019/12/10 21:20:07 concurrency sanitizer: enabled 2019/12/10 21:20:07 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 58.021191][ T7625] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/10 21:20:10 adding functions to KCSAN blacklist: 'mm_update_next_owner' 'ext4_nonda_switch' 'find_next_bit' 'ep_poll' 'lruvec_lru_size' 'tcp_add_backlog' 'pipe_poll' 'rcu_gp_fqs_check_wake' 'poll_schedule_timeout' 'find_get_pages_range_tag' '__hrtimer_run_queues' 'taskstats_exit' 'ext4_free_inode' 'tick_nohz_idle_stop_tick' 'mod_timer' 'xas_clear_mark' 'pcpu_alloc' 'tick_sched_do_timer' 'do_syslog' 'run_timer_softirq' 'ktime_get_real_seconds' 'tomoyo_supervisor' 'vm_area_dup' 'pipe_wait' 21:20:25 executing program 0: capset(&(0x7f0000000040)={0x19980330}, &(0x7f00000000c0)) syz_read_part_table(0x0, 0x0, 0x0) 21:20:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_cancel(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)="93cf0feca3bb059f53e86ba3ef5c531c869625364f7d7f0c6a4cbd19327521a23325c636786780750abde4d96e277aceb8b87db31757b12a0f71dfb3dc30efccdac509697ef093", 0x47}, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffd, 0x0, 0x0, 0x100000009b4b62b}) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000100)={0x17}) [ 74.293305][ T7630] IPVS: ftp: loaded support on port[0] = 21 [ 74.397565][ T7630] chnl_net:caif_netlink_parms(): no params data found [ 74.475094][ T7633] IPVS: ftp: loaded support on port[0] = 21 [ 74.481979][ T7630] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.489321][ T7630] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.501267][ T7630] device bridge_slave_0 entered promiscuous mode [ 74.509077][ T7630] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.516640][ T7630] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.525581][ T7630] device bridge_slave_1 entered promiscuous mode [ 74.552535][ T7630] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.572240][ T7630] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:20:26 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @empty}, 0x10) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x11c) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="0f289532c97dfb3ef3ff00000000000034954cb0ab076174c78c2c46e87f198df011ca16f37133c93ad8040000010000000000189095329db6a5d8b535a764ced72814"], 0x43}}, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000380), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002c40)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000180)=0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000bfcffc), &(0x7f0000000100)=0x83) getpeername(0xffffffffffffffff, &(0x7f0000000400)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x80) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000300)) r1 = syz_open_dev$vcsn(0x0, 0x0, 0x4000) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000340), &(0x7f00000004c0)=0xc) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 74.598754][ T7630] team0: Port device team_slave_0 added [ 74.608087][ T7630] team0: Port device team_slave_1 added [ 74.669843][ T7630] device hsr_slave_0 entered promiscuous mode [ 74.728031][ T7630] device hsr_slave_1 entered promiscuous mode [ 74.805784][ T7635] IPVS: ftp: loaded support on port[0] = 21 [ 74.926006][ T7633] chnl_net:caif_netlink_parms(): no params data found [ 74.959502][ T7630] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.966579][ T7630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.974078][ T7630] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.981130][ T7630] bridge0: port 1(bridge_slave_0) entered forwarding state 21:20:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0xe6) shutdown(r0, 0x0) [ 75.150334][ T7633] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.162038][ T7633] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.198335][ T7633] device bridge_slave_0 entered promiscuous mode [ 75.251203][ T7633] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.261167][ T7633] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.308581][ T7633] device bridge_slave_1 entered promiscuous mode [ 75.361398][ T7630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.387122][ T7635] chnl_net:caif_netlink_parms(): no params data found [ 75.425345][ T7630] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.449374][ T7633] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.465606][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.478614][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.508263][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.528386][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 75.570614][ T7633] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.665279][ T7662] IPVS: ftp: loaded support on port[0] = 21 [ 75.671542][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.682321][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.719997][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.727067][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.768282][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.800164][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.828414][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.835493][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state 21:20:27 executing program 4: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$apparmor_exec(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x26d) [ 75.892767][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 75.920689][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.960085][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.999824][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.021995][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.068666][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.116936][ T7630] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 76.149268][ T7630] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 76.197320][ T7633] team0: Port device team_slave_0 added [ 76.210285][ T7659] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.219657][ T7659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.253291][ T7659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.285886][ T7659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.300264][ T7659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.318621][ T7635] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.325838][ T7635] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.335993][ T7635] device bridge_slave_0 entered promiscuous mode 21:20:27 executing program 5: set_mempolicy(0x2, &(0x7f00000000c0)=0xfffffffffffffffe, 0x8) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000100)) [ 76.358884][ T7633] team0: Port device team_slave_1 added [ 76.439856][ T7633] device hsr_slave_0 entered promiscuous mode [ 76.488001][ T7633] device hsr_slave_1 entered promiscuous mode [ 76.517814][ T7633] debugfs: Directory 'hsr0' with parent '/' already present! [ 76.529338][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.537148][ T7635] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.544435][ T7635] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.552371][ T7635] device bridge_slave_1 entered promiscuous mode [ 76.574115][ T7669] IPVS: ftp: loaded support on port[0] = 21 [ 76.577139][ T7675] IPVS: ftp: loaded support on port[0] = 21 [ 76.612346][ T7635] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.644305][ T7630] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.676947][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 76.685131][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 76.706740][ T7635] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.825548][ T7635] team0: Port device team_slave_0 added [ 76.852953][ T7662] chnl_net:caif_netlink_parms(): no params data found [ 76.884981][ T7635] team0: Port device team_slave_1 added [ 76.893121][ T7688] ================================================================== [ 76.901240][ T7688] BUG: KCSAN: data-race in generic_fillattr / task_dump_owner [ 76.908702][ T7688] [ 76.911036][ T7688] read to 0xffff8881288bf050 of 4 bytes by task 7701 on cpu 1: [ 76.918587][ T7688] generic_fillattr+0xc7/0x1e0 [ 76.923351][ T7688] pid_getattr+0x74/0x1a0 [ 76.927860][ T7688] vfs_getattr_nosec+0x12e/0x170 [ 76.932815][ T7688] vfs_getattr+0x54/0x70 [ 76.937076][ T7688] vfs_statx+0x102/0x190 [ 76.941327][ T7688] __do_sys_newstat+0x51/0xb0 [ 76.947507][ T7688] __x64_sys_newstat+0x3a/0x50 [ 76.952299][ T7688] do_syscall_64+0xcc/0x370 [ 76.956802][ T7688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 76.962680][ T7688] [ 76.965017][ T7688] write to 0xffff8881288bf050 of 4 bytes by task 7688 on cpu 0: [ 76.972836][ T7688] task_dump_owner+0x246/0x260 [ 76.977720][ T7688] pid_update_inode+0x3c/0x70 [ 76.982396][ T7688] pid_revalidate+0x91/0xd0 [ 76.986897][ T7688] lookup_fast+0x6f2/0x700 [ 76.991314][ T7688] walk_component+0x6d/0xe70 [ 76.995900][ T7688] link_path_walk.part.0+0x5d3/0xa90 [ 77.001180][ T7688] path_openat+0x14f/0x36e0 [ 77.005690][ T7688] do_filp_open+0x11e/0x1b0 [ 77.010222][ T7688] do_sys_open+0x3b3/0x4f0 [ 77.014655][ T7688] __x64_sys_open+0x55/0x70 [ 77.019159][ T7688] do_syscall_64+0xcc/0x370 [ 77.023665][ T7688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.029543][ T7688] [ 77.031892][ T7688] Reported by Kernel Concurrency Sanitizer on: [ 77.038149][ T7688] CPU: 0 PID: 7688 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 77.045341][ T7688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.055386][ T7688] ================================================================== [ 77.063441][ T7688] Kernel panic - not syncing: panic_on_warn set ... [ 77.070461][ T7688] CPU: 0 PID: 7688 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 77.077644][ T7688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.087711][ T7688] Call Trace: [ 77.091010][ T7688] dump_stack+0x11d/0x181 [ 77.095893][ T7688] panic+0x210/0x640 [ 77.099793][ T7688] ? vprintk_func+0x8d/0x140 [ 77.106490][ T7688] kcsan_report.cold+0xc/0xd [ 77.111196][ T7688] kcsan_setup_watchpoint+0x3fe/0x460 [ 77.116609][ T7688] __tsan_unaligned_write4+0xc4/0x100 [ 77.121983][ T7688] task_dump_owner+0x246/0x260 [ 77.126744][ T7688] ? __rcu_read_unlock+0x66/0x3c0 [ 77.131789][ T7688] pid_update_inode+0x3c/0x70 [ 77.136487][ T7688] pid_revalidate+0x91/0xd0 [ 77.140997][ T7688] lookup_fast+0x6f2/0x700 [ 77.145423][ T7688] walk_component+0x6d/0xe70 [ 77.150018][ T7688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 77.156262][ T7688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 77.162502][ T7688] ? security_inode_permission+0xa5/0xc0 [ 77.168138][ T7688] ? inode_permission+0xa0/0x3c0 [ 77.173083][ T7688] link_path_walk.part.0+0x5d3/0xa90 [ 77.178380][ T7688] path_openat+0x14f/0x36e0 [ 77.182894][ T7688] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 77.188873][ T7688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 77.195111][ T7688] ? __rcu_read_unlock+0x66/0x3c0 [ 77.200157][ T7688] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 77.206054][ T7688] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 77.212048][ T7688] ? __read_once_size+0x41/0xe0 [ 77.216902][ T7688] do_filp_open+0x11e/0x1b0 [ 77.221423][ T7688] ? __alloc_fd+0x2ef/0x3b0 [ 77.227081][ T7688] do_sys_open+0x3b3/0x4f0 [ 77.232709][ T7688] __x64_sys_open+0x55/0x70 [ 77.238096][ T7688] do_syscall_64+0xcc/0x370 [ 77.242608][ T7688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.248497][ T7688] RIP: 0033:0x7f35f25bd120 [ 77.252915][ T7688] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 77.273234][ T7688] RSP: 002b:00007ffe027199c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 77.281663][ T7688] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f35f25bd120 [ 77.289756][ T7688] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f35f2a8bd00 [ 77.297916][ T7688] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f35f2885a10 [ 77.305886][ T7688] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35f2a8ad00 [ 77.314048][ T7688] R13: 00000000009821c0 R14: 0000000000000005 R15: 0000000000000000 [ 77.323158][ T7688] Kernel Offset: disabled [ 77.327501][ T7688] Rebooting in 86400 seconds..