[info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 14.419196][ C1] random: crng init done [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.44' (ECDSA) to the list of known hosts. 2019/09/03 13:39:13 fuzzer started 2019/09/03 13:39:14 dialing manager at 10.128.0.105:43075 2019/09/03 13:39:15 syscalls: 84 2019/09/03 13:39:15 code coverage: enabled 2019/09/03 13:39:15 comparison tracing: enabled 2019/09/03 13:39:15 extra coverage: enabled 2019/09/03 13:39:15 setuid sandbox: enabled 2019/09/03 13:39:15 namespace sandbox: enabled 2019/09/03 13:39:15 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/03 13:39:15 fault injection: enabled 2019/09/03 13:39:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/03 13:39:15 net packet injection: /dev/net/tun can't be opened (open /dev/net/tun: no such device) 2019/09/03 13:39:15 net device setup: enabled 13:39:15 executing program 0: r0 = syz_open_dev$hidraw(&(0x7f0000000080)='/dev/../raw#\x00', 0x0, 0x0) r1 = syz_open_dev$hidraw(0x0, 0x0, 0x4000) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000140)=""/89) syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x2, 0xc0) syz_open_dev$hidraw(&(0x7f0000000040)='/dev/hidraw#\x00', 0x3, 0x40000) r2 = syz_open_dev$hidraw(0x0, 0x0, 0x0) write$hidraw(r0, &(0x7f00000000c0), 0x0) r3 = syz_open_dev$hidraw(0x0, 0x0, 0x201) syz_open_dev$hidraw(0x0, 0x40, 0x0) write$hidraw(r3, &(0x7f0000001200)='\x00', 0xffffff45) read$hidraw(r2, &(0x7f0000003200)=""/4096, 0xffffffad) read$hidraw(r1, &(0x7f0000003200)=""/4096, 0xffffffad) 13:39:15 executing program 2: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) syz_open_dev$evdev(&(0x7f0000001100)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000300)={0x3, 0xcd, &(0x7f0000000200)="1dc6973e947881d60ee1556206ccad6d05e3eac43191c17a6ad01a2f0a5d026eac6a98f324dc96536e4fbcb9ea0f74cecfd3de1783372d282b5df89ef6edf10090cc992c4e9b17b3b59bb9b09eb49f21af62098145d2336bb18a1e571a6cd092cc0efefedc5cbaa7560ff6e05cef8acfdcc7d70da3a9bc02fd8d3c6b0fc0f4a55a5855a60e27544616f09659ad6703899eb96e3dcd1a715663b5cbdd42c6c913b0473dffffb823d1b6d1ceb9bf22c25e419a180760ea970ef124a79edcd093cabf8cf681bda200ca2c19099082"}) syz_open_dev$hidraw(&(0x7f00000012c0)='/dev/../raw#\x00', 0x0, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x4000) syz_open_dev$hidraw(0x0, 0x3, 0x0) r1 = syz_open_dev$hidraw(0x0, 0x0, 0x0) r2 = syz_open_dev$hidraw(0x0, 0x0, 0x201) write$hidraw(r2, &(0x7f0000001200)='\x00', 0xffffff45) r3 = syz_open_dev$hiddev(&(0x7f0000000040)='/dev/usb/hiddev#\x00', 0x12d, 0x0) ioctl$HIDIOCGDEVINFO(r3, 0x801c4803, &(0x7f0000000080)=""/53) write$hidraw(r1, &(0x7f0000002480)="2170159465d71ae22e368406f2e88d24eaabc009160ed27a7b238258c8381edaf3fcfed101e8c5541ea7edb91fa104e82ec6b99b6a1d7d553ad5174807b3366373b4a54e0161a8bb05c05d038f0aea804f235b9842806ca5d6cc7b26c449db6b1c2c08719924e6970a125a462e16efc22f0ea6f6c5a47e51c67764761afd07c7a1a7773ae7a89d30", 0x88) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000013c0)=""/4096) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, 0x0) read$hidraw(r1, &(0x7f0000003200)=""/4096, 0xffffffad) syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x0) read$hidraw(r0, &(0x7f0000003200)=""/4096, 0xffffffad) r4 = syz_open_dev$hidraw(0x0, 0xfffffffffffffffd, 0x200) read$hidraw(r4, &(0x7f0000000100)=""/68, 0x44) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x40000) ioctl$HIDIOCAPPLICATION(r3, 0x4802, 0x8d) 13:39:15 executing program 5: syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x8, 0xbd, 0xdf, 0x20, 0x41e, 0x400c, 0xb9b5, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x23, 0x41, 0x7}}]}}]}}, 0x0) 13:39:15 executing program 3: syz_usb_connect(0x1, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000012091f08c0070115a0740000000109021b0003000000000904ec0001506d30000705818a7c2984638956d32d01d3b0f0965885fcec09ba0e3654bba649d12ba0070e3eea572e1075edf8d547ec1b7159b2291fdb699f0cbf95710333a172e5e16ffffbe216719387fa3613785b2824000000000000000000000000000000000000007fd902942aa42a2d0acaf3b843fd3cebb0284c6804e1003b25bb666204f728d22c4ccf6bbc17073a1f000000aeb15ef1bee16019d7dca8fb7ddc0725c668242c2a18a90568729810efb8524a3b5143e56673c427e14c0ab0be41f16c9d547cfe7ca76b3ba1ffc07e1c3cd993fc4f13348c42e1b2080000003b52e212f459a4cab3a1190b8a944a07c4ba5c3d2def055f97cefbe16fedbfbea5c1920e96efb4cf8b932ad971fd3f429cdd7595a476c772544ba8a5f20d14f66a079d94ed3844c73604bd09b02fe19475b8aa899dfbe1a200000000000000196711eae7478665f086b265f30e571efadff0d160ba67df4cc3b221212535eecb6ac618f2d204b7acec54cd67a0062a1446f8ffffff57e1f615a3af4e388923783f707e639aa3eec3129634910bf309b69bb5df6c2ef42017be56da6844908549746ce4be41ecce5d576457a1b18add7fc17e5aab45ea89b3cfdffcb625e112dae95115cc3c10c33daeacacde3d2babcf10b1f67a1c8db1715318d4b650caff540664e1679c535549bbc1bf82a3b601b554ba0612c1909771fdf4557ee4a538b1a2e50e3221309ac982d779b96a6ab15d5d35b5d7889cfa4ff5e47196281432563ba3881dfd4bb6517d917df83435f0086eb47b1c275ae46ab3c361b60f2906252c7d280c95db704eb6081fdbead5ea5033711adcc788a05a897461c956a19e5b18d321648f34bb6a26a961e53a151f149ea07a4b066eca420b338835df8aae0c1c3e869f3775c69bd103ff9a0f85fb97e02f81a17d157a6a403481d51a01542b94a9136d7c9350ad810487eb5719acb943392e4f2479dcacc22afaea578cc8d1230474771e94f3cf48016efac7afa2d98064163a1a3d40f32d042d7254d7d92c060d0f368e52a06248cf40cb836b266127211a3139ece38a7a28b69e4ee28fa8154c436c6dda8b469653c7769f49b9ab616618c04ea012cce0301006e9a3f307800ea62c33a001577468ac1e5e5d900abcf0271f41be55e2fdace538ffd30dd4e57f2b459122cd68f6ff4d24dfe91b1f5bc6c6f6c4d802e5e2567b265c0a231a318ef5a99ea00090495bd7aa3f252d8daab563eab7633b2c6590081281902bb2478bf814c6925960ac07fc2eee021f746e46419e76f59ee4"], 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, 0x0) 13:39:15 executing program 4: syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3ffffe, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x200000000002401) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x49, 0x400000000000002}, @ramp}) write$hidraw(r0, &(0x7f0000000040)="06", 0x117) 13:39:15 executing program 1: syz_open_dev$evdev(&(0x7f0000000040)='//../input/event#\x00', 0x0, 0x0) syzkaller login: [ 29.175652][ T1734] cgroup1: Unknown subsys name 'perf_event' [ 29.194474][ T1735] cgroup1: Unknown subsys name 'perf_event' [ 29.201048][ T1735] cgroup1: Unknown subsys name 'net_cls' [ 29.202540][ T1734] cgroup1: Unknown subsys name 'net_cls' [ 29.213552][ T1736] cgroup1: Unknown subsys name 'perf_event' [ 29.219865][ T1736] cgroup1: Unknown subsys name 'net_cls' [ 29.228666][ T1738] cgroup1: Unknown subsys name 'perf_event' [ 29.234961][ T1738] cgroup1: Unknown subsys name 'net_cls' [ 29.277695][ T1748] cgroup1: Unknown subsys name 'perf_event' [ 29.284514][ T1748] cgroup1: Unknown subsys name 'net_cls' [ 29.307373][ T1753] cgroup1: Unknown subsys name 'perf_event' [ 29.327582][ T1753] cgroup1: Unknown subsys name 'net_cls' 13:39:18 executing program 1: syz_open_dev$evdev(&(0x7f0000000040)='//../input/event#\x00', 0x0, 0x0) 13:39:19 executing program 1: syz_open_dev$evdev(&(0x7f0000000040)='//../input/event#\x00', 0x0, 0x0) 13:39:19 executing program 2: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) syz_open_dev$evdev(&(0x7f0000001100)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000300)={0x3, 0xcd, &(0x7f0000000200)="1dc6973e947881d60ee1556206ccad6d05e3eac43191c17a6ad01a2f0a5d026eac6a98f324dc96536e4fbcb9ea0f74cecfd3de1783372d282b5df89ef6edf10090cc992c4e9b17b3b59bb9b09eb49f21af62098145d2336bb18a1e571a6cd092cc0efefedc5cbaa7560ff6e05cef8acfdcc7d70da3a9bc02fd8d3c6b0fc0f4a55a5855a60e27544616f09659ad6703899eb96e3dcd1a715663b5cbdd42c6c913b0473dffffb823d1b6d1ceb9bf22c25e419a180760ea970ef124a79edcd093cabf8cf681bda200ca2c19099082"}) syz_open_dev$hidraw(&(0x7f00000012c0)='/dev/../raw#\x00', 0x0, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x4000) syz_open_dev$hidraw(0x0, 0x3, 0x0) r1 = syz_open_dev$hidraw(0x0, 0x0, 0x0) r2 = syz_open_dev$hidraw(0x0, 0x0, 0x201) write$hidraw(r2, &(0x7f0000001200)='\x00', 0xffffff45) r3 = syz_open_dev$hiddev(&(0x7f0000000040)='/dev/usb/hiddev#\x00', 0x12d, 0x0) ioctl$HIDIOCGDEVINFO(r3, 0x801c4803, &(0x7f0000000080)=""/53) write$hidraw(r1, &(0x7f0000002480)="2170159465d71ae22e368406f2e88d24eaabc009160ed27a7b238258c8381edaf3fcfed101e8c5541ea7edb91fa104e82ec6b99b6a1d7d553ad5174807b3366373b4a54e0161a8bb05c05d038f0aea804f235b9842806ca5d6cc7b26c449db6b1c2c08719924e6970a125a462e16efc22f0ea6f6c5a47e51c67764761afd07c7a1a7773ae7a89d30", 0x88) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000013c0)=""/4096) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, 0x0) read$hidraw(r1, &(0x7f0000003200)=""/4096, 0xffffffad) syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x0) read$hidraw(r0, &(0x7f0000003200)=""/4096, 0xffffffad) r4 = syz_open_dev$hidraw(0x0, 0xfffffffffffffffd, 0x200) read$hidraw(r4, &(0x7f0000000100)=""/68, 0x44) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x40000) ioctl$HIDIOCAPPLICATION(r3, 0x4802, 0x8d) 13:39:19 executing program 0: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000003c0)={0x24, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000006c0)={0x2c, &(0x7f0000000400)={0x0, 0x0, 0x1, "dc"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) 13:39:19 executing program 1: syz_open_dev$evdev(&(0x7f0000000040)='//../input/event#\x00', 0x0, 0x0) 13:39:19 executing program 1: syz_open_dev$hidraw(&(0x7f00000012c0)='/dev/../raw#\x00', 0x0, 0x204) syz_open_dev$hidraw(0x0, 0x0, 0x4000) syz_open_dev$hidraw(0x0, 0x0, 0x0) r0 = syz_open_dev$hiddev(&(0x7f0000000180)='/dev/usb/hiddev#\x00', 0x0, 0x0) ioctl$HIDIOCGNAME(r0, 0x80404806, &(0x7f0000000340)) write$hidraw(0xffffffffffffffff, &(0x7f0000001200)='\x00', 0xffffff45) syz_open_dev$hidraw(0x0, 0x0, 0x0) read$hidraw(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) write$char_usb(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$hidraw(&(0x7f0000000080)='/dev/hidraw#\x00', 0x8, 0x467d357b05e7d304) 13:39:19 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xdd, 0xa7, 0xf8, 0x0, 0x2ca3, 0x31, 0x8b53, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x10, 0x0, 0x0, 0x80, 0x8d, 0xd9}}]}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x0, 0x53, &(0x7f00000005c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x41, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x12, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}]}}]}}, 0x0) 13:39:19 executing program 2: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) syz_open_dev$evdev(&(0x7f0000001100)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000300)={0x3, 0xcd, &(0x7f0000000200)="1dc6973e947881d60ee1556206ccad6d05e3eac43191c17a6ad01a2f0a5d026eac6a98f324dc96536e4fbcb9ea0f74cecfd3de1783372d282b5df89ef6edf10090cc992c4e9b17b3b59bb9b09eb49f21af62098145d2336bb18a1e571a6cd092cc0efefedc5cbaa7560ff6e05cef8acfdcc7d70da3a9bc02fd8d3c6b0fc0f4a55a5855a60e27544616f09659ad6703899eb96e3dcd1a715663b5cbdd42c6c913b0473dffffb823d1b6d1ceb9bf22c25e419a180760ea970ef124a79edcd093cabf8cf681bda200ca2c19099082"}) syz_open_dev$hidraw(&(0x7f00000012c0)='/dev/../raw#\x00', 0x0, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x4000) syz_open_dev$hidraw(0x0, 0x3, 0x0) r1 = syz_open_dev$hidraw(0x0, 0x0, 0x0) r2 = syz_open_dev$hidraw(0x0, 0x0, 0x201) write$hidraw(r2, &(0x7f0000001200)='\x00', 0xffffff45) r3 = syz_open_dev$hiddev(&(0x7f0000000040)='/dev/usb/hiddev#\x00', 0x12d, 0x0) ioctl$HIDIOCGDEVINFO(r3, 0x801c4803, &(0x7f0000000080)=""/53) write$hidraw(r1, &(0x7f0000002480)="2170159465d71ae22e368406f2e88d24eaabc009160ed27a7b238258c8381edaf3fcfed101e8c5541ea7edb91fa104e82ec6b99b6a1d7d553ad5174807b3366373b4a54e0161a8bb05c05d038f0aea804f235b9842806ca5d6cc7b26c449db6b1c2c08719924e6970a125a462e16efc22f0ea6f6c5a47e51c67764761afd07c7a1a7773ae7a89d30", 0x88) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000013c0)=""/4096) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, 0x0) read$hidraw(r1, &(0x7f0000003200)=""/4096, 0xffffffad) syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x0) read$hidraw(r0, &(0x7f0000003200)=""/4096, 0xffffffad) r4 = syz_open_dev$hidraw(0x0, 0xfffffffffffffffd, 0x200) read$hidraw(r4, &(0x7f0000000100)=""/68, 0x44) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x40000) ioctl$HIDIOCAPPLICATION(r3, 0x4802, 0x8d) [ 32.451795][ T12] usb 4-1: new low-speed USB device number 2 using dummy_hcd [ 32.501798][ C0] ------------[ cut here ]------------ [ 32.507389][ C0] WARNING: CPU: 0 PID: 0 at kernel/kcov.c:684 kcov_remote_start.cold+0xc/0x26 [ 32.516331][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 32.522903][ C0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.3.0-rc7+ #0 [ 32.529998][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.540146][ C0] Call Trace: [ 32.543418][ C0] [ 32.546256][ C0] dump_stack+0xca/0x13e [ 32.550484][ C0] ? kcov_remote_stop+0x110/0x1bc [ 32.555490][ C0] panic+0x2a3/0x6da [ 32.559375][ C0] ? add_taint.cold+0x16/0x16 [ 32.564275][ C0] ? __probe_kernel_read+0x188/0x1d0 [ 32.569555][ C0] ? __warn.cold+0x5/0x4a [ 32.573897][ C0] ? __warn+0xe3/0x1e0 [ 32.577956][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 32.583351][ C0] __warn.cold+0x20/0x4a [ 32.587585][ C0] ? __irq_work_queue_local+0xa3/0xe0 [ 32.593033][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 32.598319][ C0] report_bug+0x262/0x2a0 [ 32.602703][ C0] do_error_trap+0x12b/0x1e0 [ 32.607278][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 32.612548][ C0] do_invalid_op+0x32/0x40 [ 32.616948][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 32.622218][ C0] invalid_op+0x23/0x30 [ 32.626485][ C0] RIP: 0010:kcov_remote_start.cold+0xc/0x26 [ 32.632446][ C0] Code: b0 f8 ff ff 48 c7 c7 d8 dd a4 86 e8 54 93 ea ff 0f 0b 5b 4c 89 e7 5d 41 5c e9 9d e7 2f 04 48 c7 c7 d8 dd a4 86 e8 3a 93 ea ff <0f> 0b e9 93 fd ff ff 48 c7 c7 d8 dd a4 86 e8 27 93 ea ff 0f 0b e9 [ 32.652032][ C0] RSP: 0018:ffff8881db209ae8 EFLAGS: 00010082 [ 32.658082][ C0] RAX: 0000000000000024 RBX: ffff8881d5646600 RCX: 0000000000000000 [ 32.666038][ C0] RDX: 0000000000000000 RSI: ffffffff81288ddd RDI: ffffed103b64134f [ 32.673994][ C0] RBP: ffff8881d5646600 R08: 0000000000000024 R09: ffffed103b645d58 [ 32.682000][ C0] R10: ffffed103b645d57 R11: ffff8881db22eabf R12: ffff8881c92eb608 [ 32.689969][ C0] R13: ffff8881d55fc238 R14: dffffc0000000000 R15: ffff8881c8e08a00 [ 32.698064][ C0] ? vprintk_func+0x7d/0x113 [ 32.702666][ C0] ? kcov_remote_start.cold+0xc/0x26 [ 32.708132][ C0] dummy_timer+0x125f/0x301a [ 32.712928][ C0] ? lock_acquire+0x127/0x320 [ 32.717595][ C0] ? dummy_udc_probe+0x930/0x930 [ 32.722539][ C0] call_timer_fn+0x179/0x650 [ 32.727309][ C0] ? dummy_udc_probe+0x930/0x930 [ 32.732232][ C0] ? msleep_interruptible+0x130/0x130 [ 32.737755][ C0] ? do_raw_spin_lock+0x11a/0x280 [ 32.743045][ C0] ? _raw_spin_unlock_irq+0x24/0x30 [ 32.748230][ C0] ? dummy_udc_probe+0x930/0x930 [ 32.753497][ C0] run_timer_softirq+0x5cc/0x14b0 [ 32.758802][ C0] ? add_timer+0x7a0/0x7a0 [ 32.763324][ C0] ? ktime_get+0x162/0x1c0 [ 32.767734][ C0] ? lapic_next_event+0x4d/0x80 [ 32.772942][ C0] __do_softirq+0x221/0x912 [ 32.778250][ C0] irq_exit+0x178/0x1a0 [ 32.782401][ C0] smp_apic_timer_interrupt+0x12f/0x500 [ 32.787948][ C0] apic_timer_interrupt+0xf/0x20 [ 32.792872][ C0] [ 32.795802][ C0] RIP: 0010:default_idle+0x28/0x2e0 [ 32.800991][ C0] Code: 90 90 41 56 41 55 65 44 8b 2d 54 d8 93 7a 41 54 55 53 0f 1f 44 00 00 e8 46 49 d5 fb e9 07 00 00 00 0f 00 2d ea 7d 54 00 fb f4 <65> 44 8b 2d 30 d8 93 7a 0f 1f 44 00 00 5b 5d 41 5c 41 5d 41 5e c3 [ 32.820587][ C0] RSP: 0018:ffffffff86c07da8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 32.828992][ C0] RAX: 0000000000000007 RBX: ffffffff86c2b200 RCX: 0000000000000000 [ 32.836954][ C0] RDX: 0000000000000000 RSI: 0000000000000006 RDI: ffffffff86c2ba44 [ 32.844933][ C0] RBP: fffffbfff0d85640 R08: ffffffff86c2b200 R09: 0000000000000000 [ 32.852919][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 32.860879][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 32.868846][ C0] ? default_idle+0x1a/0x2e0 [ 32.873421][ C0] do_idle+0x3c2/0x4f0 [ 32.877484][ C0] ? arch_cpu_idle_exit+0x40/0x40 [ 32.882570][ C0] ? schedule+0xde/0x250 [ 32.886809][ C0] cpu_startup_entry+0x14/0x20 [ 32.891586][ C0] start_kernel+0x838/0x872 [ 32.896093][ C0] ? mem_encrypt_init+0x5/0x5 [ 32.900761][ C0] ? x86_family+0x3d/0x50 [ 32.905078][ C0] ? load_ucode_bsp+0x23d/0x27d [ 32.909914][ C0] secondary_startup_64+0xa4/0xb0 [ 32.915828][ C0] Kernel Offset: disabled [ 32.920306][ C0] Rebooting in 86400 seconds..