[ 38.737918][ T25] audit: type=1800 audit(1572468601.599:24): pid=7107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="sudo" dev="sda1" ino=2487 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 39.333905][ T25] audit: type=1800 audit(1572468602.289:25): pid=7107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 39.369205][ T25] audit: type=1800 audit(1572468602.289:26): pid=7107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.51' (ECDSA) to the list of known hosts. 2019/10/30 20:50:11 fuzzer started 2019/10/30 20:50:13 dialing manager at 10.128.0.105:37477 2019/10/30 20:50:13 syscalls: 2540 2019/10/30 20:50:13 code coverage: enabled 2019/10/30 20:50:13 comparison tracing: enabled 2019/10/30 20:50:13 extra coverage: extra coverage is not supported by the kernel 2019/10/30 20:50:13 setuid sandbox: enabled 2019/10/30 20:50:13 namespace sandbox: enabled 2019/10/30 20:50:13 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/30 20:50:13 fault injection: enabled 2019/10/30 20:50:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/30 20:50:13 net packet injection: enabled 2019/10/30 20:50:13 net device setup: enabled 2019/10/30 20:50:13 concurrency sanitizer: enabled 2019/10/30 20:50:18 adding functions to KCSAN blacklist: 'do_nanosleep' 'tcp_poll' '__hrtimer_run_queues' 'tomoyo_supervisor' 'tick_do_update_jiffies64' 'ktime_get_real_seconds' '__tcp_select_window' 'pid_update_inode' 'find_next_bit' 'ep_poll' 'mod_timer' 'tcp_add_backlog' '__nf_ct_refresh_acct' '__nf_conntrack_find_get' 'shmem_file_read_iter' 20:50:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb9c00a480e1807000000e8bd6efb120009000e000100030000ff050005001204", 0x2e}], 0x1}, 0x0) 20:50:21 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xb) clone(0x2, 0x0, 0x0, 0x0, 0x0) syzkaller login: [ 58.870298][ T7278] IPVS: ftp: loaded support on port[0] = 21 [ 59.002615][ T7278] chnl_net:caif_netlink_parms(): no params data found [ 59.060542][ T7278] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.067902][ T7278] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.090217][ T7278] device bridge_slave_0 entered promiscuous mode [ 59.099417][ T7278] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.106641][ T7278] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.116114][ T7278] device bridge_slave_1 entered promiscuous mode [ 59.140317][ T7278] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.144496][ T7281] IPVS: ftp: loaded support on port[0] = 21 [ 59.152059][ T7278] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.181300][ T7278] team0: Port device team_slave_0 added [ 59.191697][ T7278] team0: Port device team_slave_1 added 20:50:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r5 = accept$alg(r4, 0x0, 0x0) sendmmsg(r5, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x50, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 59.332327][ T7278] device hsr_slave_0 entered promiscuous mode [ 59.418819][ T7278] device hsr_slave_1 entered promiscuous mode [ 59.487711][ T7283] IPVS: ftp: loaded support on port[0] = 21 [ 59.598245][ T7281] chnl_net:caif_netlink_parms(): no params data found [ 59.632825][ T7278] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.640298][ T7278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.647724][ T7278] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.655569][ T7278] bridge0: port 1(bridge_slave_0) entered forwarding state 20:50:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x70}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) [ 59.925194][ T7281] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.932758][ T7281] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.960904][ T7281] device bridge_slave_0 entered promiscuous mode [ 60.014771][ T7281] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.029371][ T7281] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.069970][ T7281] device bridge_slave_1 entered promiscuous mode [ 60.151367][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.200392][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.235029][ T7278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.271931][ T7281] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.304666][ T7283] chnl_net:caif_netlink_parms(): no params data found [ 60.344575][ T7281] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.470255][ T7281] team0: Port device team_slave_0 added [ 60.477043][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.509306][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.519826][ T7278] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.547423][ T7281] team0: Port device team_slave_1 added [ 60.564897][ T7313] IPVS: ftp: loaded support on port[0] = 21 [ 60.572370][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.599154][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.607960][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.615308][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.733795][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.772524][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.791525][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.798723][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.839320][ T7283] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.846519][ T7283] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.879590][ T7283] device bridge_slave_0 entered promiscuous mode [ 60.911407][ T7283] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.938547][ T7283] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.970764][ T7283] device bridge_slave_1 entered promiscuous mode 20:50:24 executing program 4: close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x800000009, &(0x7f00000000c0)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000540)=0xc) r1 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x2}, 0x8) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) sched_setattr(0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r6, 0x0) setgid(0x0) getpid() io_uring_setup(0x69c, &(0x7f0000002000)={0x0, 0x0, 0x2, 0x1, 0x4b}) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x800000009, &(0x7f00000000c0)) openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) [ 61.031566][ T7281] device hsr_slave_0 entered promiscuous mode [ 61.068901][ T7281] device hsr_slave_1 entered promiscuous mode [ 61.138542][ T7281] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.150856][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.253107][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.278158][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.319699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.359502][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.523766][ T7283] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.562202][ T7283] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.686214][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.730196][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.817654][ T7278] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 61.870720][ T7278] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.965829][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.989458][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.018867][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.041817][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.092945][ T7335] IPVS: ftp: loaded support on port[0] = 21 [ 62.102804][ T7283] team0: Port device team_slave_0 added [ 62.128111][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.143233][ T7278] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 62.173744][ T7283] team0: Port device team_slave_1 added [ 62.313697][ T7281] 8021q: adding VLAN 0 to HW filter on device bond0 20:50:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b70300000000ebff6a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e40f088ca1fffffff0000000063a377fbac14140ce9", 0x0, 0x9}, 0x28) [ 62.381577][ T7283] device hsr_slave_0 entered promiscuous mode [ 62.431153][ T7283] device hsr_slave_1 entered promiscuous mode [ 62.458590][ T7283] debugfs: Directory 'hsr0' with parent '/' already present! [ 62.580174][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.619159][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.680780][ T7281] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.854268][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.886658][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.945437][ T3006] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.952799][ T3006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.019838][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.081365][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.141330][ T3006] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.148449][ T3006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.166548][ T7370] ================================================================== [ 63.174758][ T7370] BUG: KCSAN: data-race in task_dump_owner / task_dump_owner [ 63.182288][ T7370] [ 63.184707][ T7370] write to 0xffff888124cbd5ac of 4 bytes by task 7372 on cpu 0: [ 63.192339][ T7370] task_dump_owner+0x237/0x260 [ 63.197115][ T7370] pid_update_inode+0x3c/0x70 [ 63.201808][ T7370] pid_revalidate+0x91/0xd0 [ 63.206411][ T7370] lookup_fast+0x6f2/0x700 [ 63.210830][ T7370] walk_component+0x6d/0xe80 [ 63.215421][ T7370] link_path_walk.part.0+0x5d3/0xa90 [ 63.221054][ T7370] path_openat+0x14f/0x36e0 [ 63.226770][ T7370] do_filp_open+0x11e/0x1b0 [ 63.231561][ T7370] do_sys_open+0x3b3/0x4f0 [ 63.236169][ T7370] __x64_sys_open+0x55/0x70 [ 63.240763][ T7370] do_syscall_64+0xcc/0x370 [ 63.245264][ T7370] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.251234][ T7370] [ 63.253735][ T7370] write to 0xffff888124cbd5ac of 4 bytes by task 7370 on cpu 1: [ 63.261457][ T7370] task_dump_owner+0x237/0x260 [ 63.266312][ T7370] pid_update_inode+0x3c/0x70 [ 63.270984][ T7370] pid_revalidate+0x91/0xd0 [ 63.275919][ T7370] lookup_fast+0x6f2/0x700 [ 63.280536][ T7370] walk_component+0x6d/0xe80 [ 63.285133][ T7370] link_path_walk.part.0+0x5d3/0xa90 [ 63.290593][ T7370] path_openat+0x14f/0x36e0 [ 63.295177][ T7370] do_filp_open+0x11e/0x1b0 [ 63.299767][ T7370] do_sys_open+0x3b3/0x4f0 [ 63.304694][ T7370] __x64_sys_open+0x55/0x70 [ 63.309192][ T7370] do_syscall_64+0xcc/0x370 [ 63.313692][ T7370] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.319595][ T7370] [ 63.321916][ T7370] Reported by Kernel Concurrency Sanitizer on: [ 63.328067][ T7370] CPU: 1 PID: 7370 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 63.334994][ T7370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.345066][ T7370] ================================================================== [ 63.353350][ T7370] Kernel panic - not syncing: panic_on_warn set ... [ 63.360145][ T7370] CPU: 1 PID: 7370 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 63.367160][ T7370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.377216][ T7370] Call Trace: [ 63.380615][ T7370] dump_stack+0xf5/0x159 [ 63.384987][ T7370] panic+0x210/0x640 [ 63.388887][ T7370] ? do_sys_open+0x3b3/0x4f0 [ 63.393490][ T7370] ? vprintk_func+0x8d/0x140 [ 63.398409][ T7370] kcsan_report.cold+0xc/0x10 [ 63.403183][ T7370] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 63.408724][ T7370] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.414485][ T7370] __tsan_write4+0x32/0x40 [ 63.418904][ T7370] task_dump_owner+0x237/0x260 [ 63.423669][ T7370] ? __rcu_read_unlock+0x66/0x3c0 [ 63.428776][ T7370] pid_update_inode+0x3c/0x70 [ 63.433463][ T7370] pid_revalidate+0x91/0xd0 [ 63.438102][ T7370] lookup_fast+0x6f2/0x700 [ 63.442531][ T7370] walk_component+0x6d/0xe80 [ 63.447207][ T7370] ? __tsan_read8+0x2c/0x30 [ 63.451708][ T7370] ? security_inode_permission+0xa5/0xc0 [ 63.457437][ T7370] link_path_walk.part.0+0x5d3/0xa90 [ 63.463079][ T7370] path_openat+0x14f/0x36e0 [ 63.467699][ T7370] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.473363][ T7370] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.479170][ T7370] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.484891][ T7370] ? __tsan_write4+0x32/0x40 [ 63.489570][ T7370] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.495474][ T7370] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 63.501810][ T7370] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.507447][ T7370] do_filp_open+0x11e/0x1b0 [ 63.512226][ T7370] ? __alloc_fd+0x316/0x4c0 [ 63.516831][ T7370] do_sys_open+0x3b3/0x4f0 [ 63.521253][ T7370] __x64_sys_open+0x55/0x70 [ 63.526020][ T7370] do_syscall_64+0xcc/0x370 [ 63.530522][ T7370] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.536418][ T7370] RIP: 0033:0x7f16b720d120 [ 63.540927][ T7370] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 63.561242][ T7370] RSP: 002b:00007ffe9a80b708 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 63.569750][ T7370] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f16b720d120 [ 63.577909][ T7370] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f16b76dbd00 [ 63.586276][ T7370] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f16b74d5a10 [ 63.594244][ T7370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16b76dad00 [ 63.602216][ T7370] R13: 0000000000e141c0 R14: 0000000000000005 R15: 0000000000000000 [ 63.612764][ T7370] Kernel Offset: disabled [ 63.617122][ T7370] Rebooting in 86400 seconds..