[info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 14.397479][ T1667] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 14.519249][ C1] random: crng init done Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.32' (ECDSA) to the list of known hosts. 2019/09/03 13:00:13 fuzzer started 2019/09/03 13:00:14 dialing manager at 10.128.0.105:43075 2019/09/03 13:00:14 syscalls: 84 2019/09/03 13:00:14 code coverage: enabled 2019/09/03 13:00:14 comparison tracing: enabled 2019/09/03 13:00:14 extra coverage: enabled 2019/09/03 13:00:14 setuid sandbox: enabled 2019/09/03 13:00:14 namespace sandbox: enabled 2019/09/03 13:00:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/03 13:00:14 fault injection: enabled 2019/09/03 13:00:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/03 13:00:14 net packet injection: /dev/net/tun can't be opened (open /dev/net/tun: no such device) 2019/09/03 13:00:14 net device setup: enabled 13:00:14 executing program 0: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe5, 0xa7, 0x42, 0x40, 0xf671, 0xebe2, 0x1cbd, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x82, 0x0, 0x0, 0x1, 0x3, 0x88}}]}}]}}, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) 13:00:14 executing program 2: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x121000) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x9, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x8081) write$hidraw(r0, &(0x7f0000000080)="c7", 0x20000081) r1 = syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x12d43d) write$hidraw(r1, &(0x7f0000000600)="3aff0702cd00000000050000a349a8cf6bd8605cc6dd64", 0x10000015e) 13:00:14 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000002940)=ANY=[@ANYBLOB="12010000d84bf1203009270200000000000109021200010000000009040000008be8360046f54dd575fed3ccbd3cea62dcabad4756112eb9909c150ce8c8147b7304b836090031e8cbb3b2f30587f8d46b9628b57b539db904bb980eeebc1f50c90d875e4d8fde7dd47a50816fa00d3a703730c97bd1"], 0x0) syz_usb_control_io(r0, &(0x7f0000000400)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000bc0)={0xac, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, &(0x7f0000000cc0)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000012c0)={0xac, &(0x7f0000000d00), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, &(0x7f00000002c0)={0x2c, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0xf, 0x5, {0x5, 0xf, 0x5}}, &(0x7f0000000200)={0x20, 0x29, 0xf, {0xf, 0x29, 0x20, 0x0, 0x0, 0x0, "49f46b14", "b7b0428e"}}, &(0x7f0000000240)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x7fff, 0x80, 0x9}}}, &(0x7f0000000900)={0xac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x20, 0x84, 0x1, '}'}, 0x0, 0x0, &(0x7f0000000600)={0x20, 0x0, 0x4}, &(0x7f0000000640)={0x40, 0x7, 0x2}, &(0x7f0000000680)={0x40, 0x9, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={0x40, 0x1c, 0x1}, &(0x7f0000000880)={0x40, 0x1e, 0x1}, 0x0}) 13:00:14 executing program 3: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000aa3b9808110f2020c9480000000109022400010000000009041c00029126c90009050f1f000000000009058703a422020144"], 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000080)=""/73, 0x49) write$char_usb(r1, &(0x7f0000000100)="8c", 0x1) syz_usb_disconnect(r0) syz_open_dev$hiddev(0x0, 0x0, 0x0) 13:00:14 executing program 4: ioctl$HIDIOCSUSAGES(0xffffffffffffffff, 0x501c4814, &(0x7f0000001580)={{}, 0x0, [0x1, 0xffffffffffffffff, 0x8000, 0x80000000, 0x200, 0x80000001, 0x3b, 0x4, 0xba3, 0x4, 0xffffffff, 0x5, 0x0, 0xa65, 0x2, 0x20, 0x8, 0xff, 0x0, 0x9, 0x1, 0x7a, 0x100000001, 0x100000001, 0x5683, 0x0, 0x2, 0x10001, 0x6, 0x2, 0x1, 0x0, 0x33d1, 0x6, 0x40, 0x1, 0x2, 0x20, 0x2, 0x7, 0x8, 0x6802, 0x5, 0x2, 0x3, 0x4, 0xca76, 0xff, 0x1, 0x2, 0x8, 0xc1, 0xffff, 0x6, 0x4, 0x559a, 0x3, 0x1, 0x10000, 0x9, 0x2, 0x77c, 0x40, 0x3, 0x10001, 0x7, 0x40, 0x100, 0x4, 0x101, 0x1, 0x8001, 0x100000000, 0x7, 0xf, 0x9, 0x1, 0x1c49, 0x3ff, 0x3, 0x9, 0x0, 0x6, 0x800, 0x8, 0x5, 0x3ff, 0x9e, 0x401, 0x7, 0x5, 0x712, 0xffffffffffff77ae, 0x3f, 0x1, 0xaa, 0x7fff, 0x6, 0x2b, 0x270e, 0x10000, 0x0, 0x5, 0x7f, 0x7, 0x8, 0x9, 0x6, 0x9, 0x7, 0x6, 0x3ff, 0x8, 0x5, 0x9661, 0x20, 0x2, 0x7fff, 0xa273, 0x0, 0x5, 0x4, 0x8000, 0x3, 0xa5, 0x3, 0x2, 0xff, 0x38, 0x96a1, 0x6000, 0x0, 0x2, 0x3000000000, 0x0, 0x68912758, 0x101, 0x8001, 0x6, 0x401, 0x9, 0x4, 0x7fff, 0x80000000, 0x2, 0x6, 0x33f6, 0x1, 0x42c, 0x1ff, 0x3ff, 0x6, 0x200000000000, 0x2, 0x3, 0x2, 0xe42b, 0x6, 0x8000, 0xaf6c, 0xff, 0x9, 0x3, 0x10000, 0x7, 0x81d, 0x1c6, 0x9, 0x1, 0x1, 0x5c1, 0x8, 0x1f, 0x971, 0x3b6b, 0x101, 0xffffffffffffff7f, 0x3, 0x2, 0xffffffffffffffff, 0x7540a94c, 0xfffffffffffffff7, 0x100000001, 0xd273, 0x5, 0xfffffffffffffff9, 0x6, 0x7, 0x80000001, 0x2, 0x100, 0x6, 0x4, 0x8, 0x2, 0x70241b49, 0x40000, 0x1000, 0xfffffffffffffffa, 0x100000001, 0xd6, 0x5, 0x7fffffff, 0x1, 0x1ff, 0x7fff, 0x5, 0x5, 0xd62, 0x28c, 0x401, 0x4, 0xffff, 0xbbc, 0x8, 0x100000000, 0x80, 0x7, 0x7, 0x3, 0x200000, 0x6, 0x9, 0x1, 0x2, 0x3, 0x8, 0x7, 0x1000, 0x9268, 0x0, 0x200, 0x4, 0x8, 0x7, 0x3, 0x9, 0x4, 0xa880, 0x3, 0x0, 0x8, 0x1, 0x9, 0x2, 0x381, 0xae4, 0x1, 0x0, 0x88, 0x85a9, 0xfffffffffffffff8, 0x577, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}) r0 = syz_open_dev$evdev(&(0x7f0000001380)='/dev/input/event#\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000001440)='/dev/input/event#\x00', 0x2, 0x0) r1 = syz_open_dev$hidraw(0x0, 0x0, 0x200000000002401) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000080)=""/179) write$hidraw(r1, &(0x7f0000000040)="06", 0xff68) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000140)=""/136) 13:00:14 executing program 1: r0 = syz_open_dev$hidraw(&(0x7f0000000180)='/dev/../raw#\x00', 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0xed, 0x5d, 0x9b, 0x0, 0x1b3d, 0x105, 0x7aca, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xea, 0x0, 0x0, 0x1e, 0xb4, 0x2c}}]}}]}}, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCAPPLICATION(r0, 0xc0c0583b, 0x20000000) syzkaller login: [ 30.912247][ T1740] cgroup1: Unknown subsys name 'perf_event' [ 30.918864][ T1740] cgroup1: Unknown subsys name 'net_cls' [ 30.960781][ T1743] cgroup1: Unknown subsys name 'perf_event' [ 30.968438][ T1743] cgroup1: Unknown subsys name 'net_cls' [ 30.978136][ T1741] cgroup1: Unknown subsys name 'perf_event' [ 31.003930][ T1741] cgroup1: Unknown subsys name 'net_cls' [ 31.008771][ T1748] cgroup1: Unknown subsys name 'perf_event' [ 31.016404][ T1748] cgroup1: Unknown subsys name 'net_cls' [ 31.018807][ T1752] cgroup1: Unknown subsys name 'perf_event' [ 31.029151][ T1752] cgroup1: Unknown subsys name 'net_cls' [ 31.038314][ T1751] cgroup1: Unknown subsys name 'perf_event' [ 31.056510][ T1751] cgroup1: Unknown subsys name 'net_cls' 13:00:18 executing program 2: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x121000) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x9, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x8081) write$hidraw(r0, &(0x7f0000000080)="c7", 0x20000081) r1 = syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x12d43d) write$hidraw(r1, &(0x7f0000000600)="3aff0702cd00000000050000a349a8cf6bd8605cc6dd64", 0x10000015e) 13:00:18 executing program 2: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x121000) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x9, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x8081) write$hidraw(r0, &(0x7f0000000080)="c7", 0x20000081) r1 = syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x12d43d) write$hidraw(r1, &(0x7f0000000600)="3aff0702cd00000000050000a349a8cf6bd8605cc6dd64", 0x10000015e) 13:00:18 executing program 2: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x4, 0x121000) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x9, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x8081) write$hidraw(r0, &(0x7f0000000080)="c7", 0x20000081) r1 = syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x12d43d) write$hidraw(r1, &(0x7f0000000600)="3aff0702cd00000000050000a349a8cf6bd8605cc6dd64", 0x10000015e) 13:00:18 executing program 2: syz_usb_connect$cdc_ethernet(0x0, 0x4d, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x100010140, 0x525, 0xa4a1, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x12, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) [ 34.189139][ T22] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 34.229303][ C1] ------------[ cut here ]------------ [ 34.234900][ C1] WARNING: CPU: 1 PID: 0 at kernel/kcov.c:684 kcov_remote_start.cold+0xc/0x26 [ 34.243721][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 34.250283][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.3.0-rc7+ #0 [ 34.257391][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.268019][ C1] Call Trace: [ 34.271282][ C1] [ 34.274127][ C1] dump_stack+0xca/0x13e [ 34.278349][ C1] ? kcov_remote_stop+0x110/0x1bc [ 34.283356][ C1] panic+0x2a3/0x6da [ 34.287228][ C1] ? add_taint.cold+0x16/0x16 [ 34.291885][ C1] ? __probe_kernel_read+0x188/0x1d0 [ 34.297145][ C1] ? __warn.cold+0x5/0x4a [ 34.301451][ C1] ? __warn+0xe3/0x1e0 [ 34.305514][ C1] ? kcov_remote_start.cold+0xc/0x26 [ 34.310774][ C1] __warn.cold+0x20/0x4a [ 34.315017][ C1] ? __irq_work_queue_local+0xa3/0xe0 [ 34.320376][ C1] ? kcov_remote_start.cold+0xc/0x26 [ 34.325649][ C1] report_bug+0x262/0x2a0 [ 34.330048][ C1] do_error_trap+0x12b/0x1e0 [ 34.334617][ C1] ? kcov_remote_start.cold+0xc/0x26 [ 34.339880][ C1] do_invalid_op+0x32/0x40 [ 34.363821][ C1] ? kcov_remote_start.cold+0xc/0x26 [ 34.369093][ C1] invalid_op+0x23/0x30 [ 34.373230][ C1] RIP: 0010:kcov_remote_start.cold+0xc/0x26 [ 34.379104][ C1] Code: b0 f8 ff ff 48 c7 c7 d8 dd a4 86 e8 54 93 ea ff 0f 0b 5b 4c 89 e7 5d 41 5c e9 9d e7 2f 04 48 c7 c7 d8 dd a4 86 e8 3a 93 ea ff <0f> 0b e9 93 fd ff ff 48 c7 c7 d8 dd a4 86 e8 27 93 ea ff 0f 0b e9 [ 34.398703][ C1] RSP: 0018:ffff8881db309ae8 EFLAGS: 00010082 [ 34.404755][ C1] RAX: 0000000000000024 RBX: ffff8881d56c3300 RCX: 0000000000000000 [ 34.412721][ C1] RDX: 0000000000000000 RSI: ffffffff81288ddd RDI: ffffed103b66134f [ 34.420668][ C1] RBP: ffff8881d56c3300 R08: 0000000000000024 R09: ffffed103b665d58 [ 34.429224][ C1] R10: ffffed103b665d57 R11: ffff8881db32eabf R12: ffff8881c9033488 [ 34.437174][ C1] R13: ffff8881d5602138 R14: dffffc0000000000 R15: ffff8881c8451700 [ 34.445574][ C1] ? vprintk_func+0x7d/0x113 [ 34.450148][ C1] ? kcov_remote_start.cold+0xc/0x26 [ 34.455410][ C1] dummy_timer+0x125f/0x301a [ 34.459988][ C1] ? lock_acquire+0x127/0x320 [ 34.464639][ C1] ? dummy_udc_probe+0x930/0x930 [ 34.469553][ C1] call_timer_fn+0x179/0x650 [ 34.474157][ C1] ? dummy_udc_probe+0x930/0x930 [ 34.479079][ C1] ? msleep_interruptible+0x130/0x130 [ 34.484427][ C1] ? do_raw_spin_lock+0x11a/0x280 [ 34.489441][ C1] ? _raw_spin_unlock_irq+0x24/0x30 [ 34.494625][ C1] ? dummy_udc_probe+0x930/0x930 [ 34.499540][ C1] run_timer_softirq+0x5cc/0x14b0 [ 34.504559][ C1] ? add_timer+0x7a0/0x7a0 [ 34.508958][ C1] ? ktime_get+0x162/0x1c0 [ 34.513354][ C1] ? lapic_next_event+0x4d/0x80 [ 34.518178][ C1] __do_softirq+0x221/0x912 [ 34.522655][ C1] irq_exit+0x178/0x1a0 [ 34.526812][ C1] smp_apic_timer_interrupt+0x12f/0x500 [ 34.532339][ C1] apic_timer_interrupt+0xf/0x20 [ 34.537246][ C1] [ 34.540163][ C1] RIP: 0010:default_idle+0x28/0x2e0 [ 34.545351][ C1] Code: 90 90 41 56 41 55 65 44 8b 2d 54 d8 93 7a 41 54 55 53 0f 1f 44 00 00 e8 46 49 d5 fb e9 07 00 00 00 0f 00 2d ea 7d 54 00 fb f4 <65> 44 8b 2d 30 d8 93 7a 0f 1f 44 00 00 5b 5d 41 5c 41 5d 41 5e c3 [ 34.564933][ C1] RSP: 0018:ffff8881da217dc8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 34.573319][ C1] RAX: 0000000000000007 RBX: ffff8881da1fb000 RCX: 0000000000000000 [ 34.581439][ C1] RDX: 0000000000000000 RSI: 0000000000000006 RDI: ffff8881da1fb844 [ 34.589433][ C1] RBP: ffffed103b43f600 R08: ffff8881da1fb000 R09: 0000000000000000 [ 34.597547][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 34.605500][ C1] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000000 [ 34.613458][ C1] ? default_idle+0x1a/0x2e0 [ 34.618026][ C1] do_idle+0x3c2/0x4f0 [ 34.622071][ C1] ? __wake_up_common+0x147/0x640 [ 34.627068][ C1] ? arch_cpu_idle_exit+0x40/0x40 [ 34.632118][ C1] ? _raw_spin_unlock_irqrestore+0x3e/0x50 [ 34.637913][ C1] ? lockdep_hardirqs_on+0x379/0x580 [ 34.643181][ C1] cpu_startup_entry+0x14/0x20 [ 34.647929][ C1] start_secondary+0x297/0x340 [ 34.652666][ C1] ? set_cpu_sibling_map+0x1ff0/0x1ff0 [ 34.658100][ C1] secondary_startup_64+0xa4/0xb0 [ 34.663822][ C1] Kernel Offset: disabled [ 34.668173][ C1] Rebooting in 86400 seconds..