Warning: Permanently added '10.128.1.7' (ECDSA) to the list of known hosts. 2019/12/13 17:57:39 fuzzer started 2019/12/13 17:57:41 dialing manager at 10.128.0.105:45083 2019/12/13 17:57:41 checking machine... 2019/12/13 17:57:41 checking revisions... 2019/12/13 17:57:41 testing simple program... syzkaller login: [ 56.781066][ T7797] IPVS: ftp: loaded support on port[0] = 21 2019/12/13 17:57:41 building call list... [ 57.151814][ T7] tipc: TX() has been purged, node left! executing program [ 59.960115][ T7803] can: request_module (can-proto-0) failed. [ 59.971628][ T7803] can: request_module (can-proto-0) failed. [ 59.983081][ T7803] can: request_module (can-proto-0) failed. 2019/12/13 17:57:48 syscalls: 2686 2019/12/13 17:57:48 code coverage: enabled 2019/12/13 17:57:48 comparison tracing: enabled 2019/12/13 17:57:48 extra coverage: enabled 2019/12/13 17:57:48 setuid sandbox: enabled 2019/12/13 17:57:48 namespace sandbox: enabled 2019/12/13 17:57:48 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/13 17:57:48 fault injection: enabled 2019/12/13 17:57:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/13 17:57:48 net packet injection: enabled 2019/12/13 17:57:48 net device setup: enabled 2019/12/13 17:57:48 concurrency sanitizer: enabled 2019/12/13 17:57:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:57:49 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66696c65302053454736000a21875856187d984ade3d6a209c113b9b88b849c9e6f0d452ebf41f"], 0x2c) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) socket(0x2, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x3}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) setsockopt(0xffffffffffffffff, 0x10d, 0x1000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005700)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000780)="0f", 0x1}], 0x1}}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x2007ffe) ftruncate(0xffffffffffffffff, 0x2007ffe) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000240)={@remote, @loopback, 0x1, 0x4, [@broadcast, @broadcast, @local, @loopback]}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000001c0)={0x4, 0x3, 0x0, {}, 0x80, 0xfd5}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000040)={'mangle\x00', 0xa6, "e20792f1c86e8c4dcbf8e1fdc0301a344fef749a4edd9425c94824568891a8fec89dcd3a806c6f48237eda503d4a208b4826d2d5c27501bcd89cdbb080d939ac14323ba84c5e404f0892f9b2a3ac1c6b1bedae9d6373ed1f5dd8b9b4e4a8cefb1237cd6b35601cd153f713447dfbab93a7e32ab44ac4057045ee875e5137272bc05272679267f6add1b8d96e56a76ee9ed0536556d480391ece0206bd221745fd0970471c092"}, &(0x7f0000000180)=0xca) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{0x0, 0x29b, &(0x7f0000005640)=[{&(0x7f0000001900)="bf", 0xc}], 0x1, 0x0, 0xfffffffffffffec4, 0x1}}], 0x300, 0x10) 17:57:49 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a10, 0x1700) [ 64.595920][ T7844] IPVS: ftp: loaded support on port[0] = 21 [ 64.725471][ T7844] chnl_net:caif_netlink_parms(): no params data found 17:57:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x50}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000044a, 0x0) [ 64.767178][ T7847] IPVS: ftp: loaded support on port[0] = 21 [ 64.805865][ T7844] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.813057][ T7844] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.820809][ T7844] device bridge_slave_0 entered promiscuous mode [ 64.841694][ T7844] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.851491][ T7844] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.860139][ T7844] device bridge_slave_1 entered promiscuous mode [ 64.891519][ T7844] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.943098][ T7844] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.001850][ T7844] team0: Port device team_slave_0 added [ 65.019609][ T7844] team0: Port device team_slave_1 added [ 65.093372][ T7849] IPVS: ftp: loaded support on port[0] = 21 17:57:50 executing program 3: r0 = socket(0x2000000011, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@llc={0x1a, 0x100, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x5}, 0x80, 0x0}}], 0x2, 0x0) [ 65.154006][ T7844] device hsr_slave_0 entered promiscuous mode [ 65.192014][ T7844] device hsr_slave_1 entered promiscuous mode [ 65.315430][ T7847] chnl_net:caif_netlink_parms(): no params data found [ 65.338573][ T7852] IPVS: ftp: loaded support on port[0] = 21 17:57:50 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 65.379296][ T7844] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 65.439447][ T7844] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 65.494339][ T7844] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 65.565507][ T7844] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 65.629953][ T7847] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.637433][ T7847] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.646546][ T7847] device bridge_slave_0 entered promiscuous mode 17:57:50 executing program 5: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffa000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shmget(0x0, 0x1000, 0xc5a7939cef5172e9, &(0x7f0000ffa000/0x1000)=nil) shmget(0x0, 0x1000, 0x0, &(0x7f0000ffa000/0x1000)=nil) [ 65.676995][ T7854] IPVS: ftp: loaded support on port[0] = 21 [ 65.688166][ T7847] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.699440][ T7847] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.707594][ T7847] device bridge_slave_1 entered promiscuous mode [ 65.726283][ T7844] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.733370][ T7844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.740652][ T7844] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.747710][ T7844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.787959][ T7847] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.804777][ T7847] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.819060][ T7802] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.832920][ T7802] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.884753][ T7847] team0: Port device team_slave_0 added [ 65.890546][ T7852] chnl_net:caif_netlink_parms(): no params data found [ 65.925236][ T7847] team0: Port device team_slave_1 added [ 65.931124][ T7849] chnl_net:caif_netlink_parms(): no params data found [ 65.933202][ T7859] IPVS: ftp: loaded support on port[0] = 21 [ 65.961636][ T7852] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.968978][ T7852] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.976862][ T7852] device bridge_slave_0 entered promiscuous mode [ 66.043938][ T7847] device hsr_slave_0 entered promiscuous mode [ 66.092206][ T7847] device hsr_slave_1 entered promiscuous mode [ 66.151923][ T7847] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.169001][ T7852] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.176151][ T7852] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.184157][ T7852] device bridge_slave_1 entered promiscuous mode [ 66.225401][ T7852] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.237421][ T7852] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.246549][ T7849] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.253814][ T7849] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.261363][ T7849] device bridge_slave_0 entered promiscuous mode [ 66.270856][ T7849] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.277908][ T7849] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.285407][ T7849] device bridge_slave_1 entered promiscuous mode [ 66.331324][ T7847] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 66.398817][ T7852] team0: Port device team_slave_0 added [ 66.411451][ T7849] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.421973][ T7849] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.432482][ T7847] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 66.474093][ T7852] team0: Port device team_slave_1 added [ 66.479809][ T7847] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 66.538275][ T7849] team0: Port device team_slave_0 added [ 66.544017][ T7847] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 66.607299][ T7854] chnl_net:caif_netlink_parms(): no params data found [ 66.624126][ T7849] team0: Port device team_slave_1 added [ 66.635731][ T7844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.723629][ T7852] device hsr_slave_0 entered promiscuous mode [ 66.762154][ T7852] device hsr_slave_1 entered promiscuous mode [ 66.821880][ T7852] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.883955][ T7849] device hsr_slave_0 entered promiscuous mode [ 66.932041][ T7849] device hsr_slave_1 entered promiscuous mode [ 66.971951][ T7849] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.999238][ T7859] chnl_net:caif_netlink_parms(): no params data found [ 67.014814][ T7854] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.021990][ T7854] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.029504][ T7854] device bridge_slave_0 entered promiscuous mode [ 67.042295][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.049896][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.060069][ T7852] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 67.106272][ T7852] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 67.163614][ T7854] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.170675][ T7854] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.179892][ T7854] device bridge_slave_1 entered promiscuous mode [ 67.189613][ T7844] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.207153][ T7852] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 67.243837][ T7852] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 67.261968][ C1] ================================================================== [ 67.270075][ C1] BUG: KCSAN: data-race in add_timer / run_timer_softirq [ 67.277069][ C1] [ 67.279381][ C1] read to 0xffff88812c11da88 of 8 bytes by task 43 on cpu 0: [ 67.286758][ C1] add_timer+0x16f/0x550 [ 67.290977][ C1] __queue_delayed_work+0x13b/0x1d0 [ 67.296154][ C1] queue_delayed_work_on+0xf3/0x110 [ 67.301332][ C1] bond_netdev_notify_work+0x150/0x160 [ 67.306766][ C1] process_one_work+0x3d4/0x890 [ 67.311631][ C1] worker_thread+0xa0/0x800 [ 67.316112][ C1] kthread+0x1d4/0x200 [ 67.320191][ C1] ret_from_fork+0x1f/0x30 [ 67.324578][ C1] [ 67.326888][ C1] write to 0xffff88812c11da88 of 8 bytes by interrupt on cpu 1: [ 67.334991][ C1] run_timer_softirq+0x496/0xcd0 [ 67.339909][ C1] __do_softirq+0x115/0x33f [ 67.344514][ C1] irq_exit+0xbb/0xe0 [ 67.348477][ C1] smp_apic_timer_interrupt+0xe6/0x280 [ 67.353928][ C1] apic_timer_interrupt+0xf/0x20 [ 67.358860][ C1] native_safe_halt+0xe/0x10 [ 67.363432][ C1] arch_cpu_idle+0xa/0x10 [ 67.367744][ C1] default_idle_call+0x1e/0x40 [ 67.372493][ C1] do_idle+0x1c2/0x290 [ 67.376547][ C1] cpu_startup_entry+0x1b/0x20 [ 67.381289][ C1] start_secondary+0x168/0x1b0 [ 67.386031][ C1] secondary_startup_64+0xa4/0xb0 [ 67.391026][ C1] [ 67.393333][ C1] Reported by Kernel Concurrency Sanitizer on: [ 67.399482][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.5.0-rc1-syzkaller #0 [ 67.407362][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.417401][ C1] ================================================================== [ 67.425442][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 67.432028][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.5.0-rc1-syzkaller #0 [ 67.439910][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.449949][ C1] Call Trace: [ 67.453221][ C1] [ 67.456065][ C1] dump_stack+0x11d/0x181 [ 67.460379][ C1] panic+0x210/0x640 [ 67.464258][ C1] ? vprintk_func+0x8d/0x140 [ 67.468836][ C1] kcsan_report.cold+0xc/0xd [ 67.473418][ C1] kcsan_setup_watchpoint+0x3fe/0x460 [ 67.478874][ C1] ? __queue_work+0x910/0x910 [ 67.483535][ C1] __tsan_unaligned_write8+0xc7/0x110 [ 67.488889][ C1] run_timer_softirq+0x496/0xcd0 [ 67.493813][ C1] ? kvm_sched_clock_read+0x9/0x20 [ 67.498910][ C1] ? sched_clock+0x13/0x20 [ 67.503308][ C1] ? sched_clock_cpu+0x15/0xe0 [ 67.508053][ C1] __do_softirq+0x115/0x33f [ 67.512554][ C1] irq_exit+0xbb/0xe0 [ 67.516536][ C1] smp_apic_timer_interrupt+0xe6/0x280 [ 67.521979][ C1] apic_timer_interrupt+0xf/0x20 [ 67.526901][ C1] [ 67.529824][ C1] RIP: 0010:native_safe_halt+0xe/0x10 [ 67.535178][ C1] Code: cc cc cc cc cc cc cc cc cc cc cc cc e9 07 00 00 00 0f 00 2d 4c b6 59 00 f4 c3 66 90 e9 07 00 00 00 0f 00 2d 3c b6 59 00 fb f4 cc 55 48 89 e5 41 55 41 54 53 e8 22 2b 91 fc e8 3d ae ab fd 0f [ 67.554772][ C1] RSP: 0018:ffffc90000cd3e70 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 67.563162][ C1] RAX: 0000000000000001 RBX: ffff88812b785040 RCX: ffffffff82546f95 [ 67.571119][ C1] RDX: 0000000000000000 RSI: ffffffff82546f9e RDI: 0000000000000005 [ 67.579070][ C1] RBP: ffffc90000cd3e90 R08: ffff88812b785040 R09: 0000ffff85a2f168 [ 67.587023][ C1] R10: 0000c90000cd3e80 R11: 0000ffff85a2f16f R12: 0000000000000001 [ 67.594972][ C1] R13: ffff88812b785040 R14: 0000000000000000 R15: 0000000000000000 [ 67.602934][ C1] ? debug_smp_processor_id+0x35/0x137 [ 67.608372][ C1] ? debug_smp_processor_id+0x3e/0x137 [ 67.613821][ C1] ? default_idle+0x26/0x180 [ 67.618398][ C1] arch_cpu_idle+0xa/0x10 [ 67.622708][ C1] default_idle_call+0x1e/0x40 [ 67.627450][ C1] do_idle+0x1c2/0x290 [ 67.631497][ C1] ? complete+0x44/0x50 [ 67.635642][ C1] cpu_startup_entry+0x1b/0x20 [ 67.640384][ C1] start_secondary+0x168/0x1b0 [ 67.645138][ C1] secondary_startup_64+0xa4/0xb0 [ 67.651507][ C1] Kernel Offset: disabled [ 67.655852][ C1] Rebooting in 86400 seconds..