Warning: Permanently added '10.128.0.56' (ECDSA) to the list of known hosts. 2019/10/09 20:41:29 fuzzer started 2019/10/09 20:41:31 dialing manager at 10.128.0.105:43471 2019/10/09 20:41:31 syscalls: 2523 2019/10/09 20:41:31 code coverage: enabled 2019/10/09 20:41:31 comparison tracing: enabled 2019/10/09 20:41:31 extra coverage: extra coverage is not supported by the kernel 2019/10/09 20:41:31 setuid sandbox: enabled 2019/10/09 20:41:31 namespace sandbox: enabled 2019/10/09 20:41:31 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/09 20:41:31 fault injection: enabled 2019/10/09 20:41:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/09 20:41:31 net packet injection: enabled 2019/10/09 20:41:31 net device setup: enabled 2019/10/09 20:41:31 concurrency sanitizer: enabled 20:41:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='coredump_filter\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x200000001008147c) syzkaller login: [ 49.110194][ T7228] IPVS: ftp: loaded support on port[0] = 21 20:41:34 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0046209, 0x0) [ 49.204094][ T7228] chnl_net:caif_netlink_parms(): no params data found [ 49.267594][ T7228] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.293125][ T7228] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.303164][ T7228] device bridge_slave_0 entered promiscuous mode [ 49.324210][ T7228] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.331376][ T7228] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.344787][ T7228] device bridge_slave_1 entered promiscuous mode [ 49.393992][ T7228] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 49.405472][ T7228] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.429819][ T7228] team0: Port device team_slave_0 added [ 49.436807][ T7228] team0: Port device team_slave_1 added 20:41:35 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x4000, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000011003586000000030000000007000000", @ANYRES32=r1, @ANYBLOB="00000005000000000c001a00080000"], 0x2c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x332, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x5012, r5, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[@ANYRESHEX], 0x12) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000480)=0x800, 0x4) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10080000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r6, 0xde49c21fa4ada6f3, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1c, 0x1, @udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x6000000}, 0x20000000) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 49.525042][ T7228] device hsr_slave_0 entered promiscuous mode [ 49.563232][ T7228] device hsr_slave_1 entered promiscuous mode [ 49.623388][ T7228] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.624179][ T7231] IPVS: ftp: loaded support on port[0] = 21 [ 49.630512][ T7228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.643892][ T7228] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.651004][ T7228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.784327][ T7228] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.818127][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.837355][ T3009] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.853725][ T3009] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.873717][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 49.892081][ T7228] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.915562][ T7233] IPVS: ftp: loaded support on port[0] = 21 [ 49.951463][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.960580][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.967676][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.984799][ T7231] chnl_net:caif_netlink_parms(): no params data found 20:41:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x304}, 0x9c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) [ 50.015179][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.024267][ T3009] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.031319][ T3009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.077341][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.127200][ T7228] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 50.152251][ T7228] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 50.186325][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.203718][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.223251][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.243058][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.261543][ T7231] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.282303][ T7231] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.290348][ T7231] device bridge_slave_0 entered promiscuous mode [ 50.298580][ T7231] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.307984][ T7231] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.316448][ T7231] device bridge_slave_1 entered promiscuous mode [ 50.332228][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.350058][ T7238] IPVS: ftp: loaded support on port[0] = 21 [ 50.380024][ T7231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.395219][ T7228] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 50.412237][ T7231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.497861][ T7231] team0: Port device team_slave_0 added [ 50.528512][ T7231] team0: Port device team_slave_1 added [ 50.542875][ T7233] chnl_net:caif_netlink_parms(): no params data found 20:41:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_tables_matches\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) [ 50.675304][ T7231] device hsr_slave_0 entered promiscuous mode [ 50.712574][ T7231] device hsr_slave_1 entered promiscuous mode [ 50.802192][ T7231] debugfs: Directory 'hsr0' with parent '/' already present! [ 50.871840][ T7231] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.878945][ T7231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.930310][ T7233] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.942023][ T7233] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.958032][ T7233] device bridge_slave_0 entered promiscuous mode 20:41:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='coredump_filter\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x200000001008147c) [ 50.980438][ T7233] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.990209][ T7233] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.998731][ T7233] device bridge_slave_1 entered promiscuous mode [ 51.020427][ T7238] chnl_net:caif_netlink_parms(): no params data found [ 51.079891][ T7213] ================================================================== [ 51.088021][ T7213] BUG: KCSAN: data-race in ext4_es_lookup_extent / ext4_es_lookup_extent [ 51.091224][ T7233] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.096409][ T7213] [ 51.096423][ T7213] read to 0xffff888218678428 of 8 bytes by task 7253 on cpu 0: [ 51.096440][ T7213] ext4_es_lookup_extent+0x3ba/0x510 [ 51.096466][ T7213] ext4_map_blocks+0xc2/0xf70 [ 51.120931][ T7233] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.125355][ T7213] ext4_getblk+0x30b/0x380 [ 51.125366][ T7213] ext4_bread_batch+0x8a/0x2e0 [ 51.125376][ T7213] __ext4_find_entry+0x32f/0x970 [ 51.125384][ T7213] ext4_lookup+0x35f/0x4f0 [ 51.125394][ T7213] __lookup_hash+0xcb/0x110 [ 51.125405][ T7213] filename_create+0x102/0x2d0 [ 51.125415][ T7213] do_symlinkat+0x91/0x1e0 [ 51.125426][ T7213] __x64_sys_symlink+0x3f/0x50 [ 51.125440][ T7213] do_syscall_64+0xcf/0x2f0 [ 51.125472][ T7213] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 51.149078][ T7233] team0: Port device team_slave_0 added [ 51.153170][ T7213] [ 51.153184][ T7213] write to 0xffff888218678428 of 8 bytes by task 7213 on cpu 1: [ 51.153202][ T7213] ext4_es_lookup_extent+0x3d3/0x510 [ 51.153214][ T7213] ext4_map_blocks+0xc2/0xf70 [ 51.153226][ T7213] ext4_mpage_readpages+0x92b/0x1270 [ 51.153236][ T7213] ext4_readpages+0x92/0xc0 [ 51.153259][ T7213] read_pages+0xa2/0x2d0 [ 51.159566][ T7233] team0: Port device team_slave_1 added [ 51.162492][ T7213] __do_page_cache_readahead+0x353/0x390 [ 51.162503][ T7213] ondemand_readahead+0x35d/0x710 [ 51.162514][ T7213] page_cache_async_readahead+0x22c/0x250 [ 51.162529][ T7213] generic_file_read_iter+0xffc/0x1440 [ 51.162556][ T7213] ext4_file_read_iter+0xfa/0x240 [ 51.253856][ T7213] new_sync_read+0x389/0x4f0 [ 51.258443][ T7213] __vfs_read+0xb1/0xc0 [ 51.262612][ T7213] integrity_kernel_read+0xa1/0xe0 [ 51.267723][ T7213] [ 51.270045][ T7213] Reported by Kernel Concurrency Sanitizer on: [ 51.276186][ T7213] CPU: 1 PID: 7213 Comm: syz-fuzzer Not tainted 5.3.0+ #0 [ 51.283971][ T7213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.294022][ T7213] ================================================================== [ 51.302166][ T7213] Kernel panic - not syncing: panic_on_warn set ... [ 51.308751][ T7213] CPU: 1 PID: 7213 Comm: syz-fuzzer Not tainted 5.3.0+ #0 [ 51.315849][ T7213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.325888][ T7213] Call Trace: [ 51.329172][ T7213] dump_stack+0xf5/0x159 [ 51.333405][ T7213] panic+0x209/0x639 [ 51.337305][ T7213] ? generic_file_read_iter+0xffc/0x1440 [ 51.342931][ T7213] ? vprintk_func+0x8d/0x140 [ 51.347513][ T7213] kcsan_report.cold+0xc/0x1b [ 51.352182][ T7213] __kcsan_setup_watchpoint+0x3ee/0x510 [ 51.357719][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.363341][ T7213] __tsan_write8+0x32/0x40 [ 51.367748][ T7213] ext4_es_lookup_extent+0x3d3/0x510 [ 51.373038][ T7213] ext4_map_blocks+0xc2/0xf70 [ 51.377720][ T7213] ext4_mpage_readpages+0x92b/0x1270 [ 51.383007][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.388628][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.394351][ T7213] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 51.400242][ T7213] ? ext4_invalidatepage+0x1e0/0x1e0 [ 51.405518][ T7213] ext4_readpages+0x92/0xc0 [ 51.410018][ T7213] ? ext4_invalidatepage+0x1e0/0x1e0 [ 51.415296][ T7213] read_pages+0xa2/0x2d0 [ 51.419542][ T7213] __do_page_cache_readahead+0x353/0x390 [ 51.425272][ T7213] ondemand_readahead+0x35d/0x710 [ 51.430301][ T7213] page_cache_async_readahead+0x22c/0x250 [ 51.436012][ T7213] generic_file_read_iter+0xffc/0x1440 [ 51.441475][ T7213] ext4_file_read_iter+0xfa/0x240 [ 51.446492][ T7213] new_sync_read+0x389/0x4f0 [ 51.451078][ T7213] __vfs_read+0xb1/0xc0 [ 51.455228][ T7213] integrity_kernel_read+0xa1/0xe0 [ 51.460331][ T7213] ima_calc_file_hash_tfm+0x1b5/0x260 [ 51.465698][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.471338][ T7213] ? should_fail+0xd4/0x45d [ 51.475854][ T7213] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 51.481577][ T7213] ? widen_string+0x4a/0x1a0 [ 51.486168][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.491832][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.497462][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.503081][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.508700][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.514320][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.519936][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.525559][ T7213] ? __tsan_read4+0x2c/0x30 [ 51.530054][ T7213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 51.536283][ T7213] ? refcount_sub_and_test_checked+0xc8/0x190 [ 51.542339][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.547960][ T7213] ? __tsan_read4+0x2c/0x30 [ 51.552502][ T7213] ima_calc_file_hash+0x158/0xf10 [ 51.557523][ T7213] ? __tsan_write8+0x32/0x40 [ 51.562105][ T7213] ? ext4_xattr_get+0x10b/0x5c0 [ 51.566951][ T7213] ? __rcu_read_unlock+0x62/0xe0 [ 51.572053][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.577680][ T7213] ima_collect_measurement+0x384/0x3b0 [ 51.583139][ T7213] process_measurement+0x980/0xff0 [ 51.588248][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.593868][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.599490][ T7213] ? __tsan_read4+0x2c/0x30 [ 51.603994][ T7213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 51.610233][ T7213] ? refcount_sub_and_test_checked+0xc8/0x190 [ 51.616291][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.621913][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.627538][ T7213] ima_file_check+0x7e/0xb0 [ 51.632035][ T7213] path_openat+0xfb1/0x3530 [ 51.636526][ T7213] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.642170][ T7213] do_filp_open+0x11e/0x1b0 [ 51.646682][ T7213] ? _raw_spin_unlock+0x4b/0x60 [ 51.651518][ T7213] ? __alloc_fd+0x316/0x4c0 [ 51.656013][ T7213] ? get_unused_fd_flags+0x93/0xc0 [ 51.661118][ T7213] do_sys_open+0x3b3/0x4f0 [ 51.665540][ T7213] __x64_sys_openat+0x62/0x80 [ 51.670221][ T7213] do_syscall_64+0xcf/0x2f0 [ 51.674718][ T7213] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 51.680604][ T7213] RIP: 0033:0x47c5aa [ 51.684489][ T7213] Code: e8 7b 6b fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 51.704080][ T7213] RSP: 002b:000000c4204bd850 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 51.712477][ T7213] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c5aa [ 51.720436][ T7213] RDX: 0000000000080002 RSI: 000000c4200231a0 RDI: ffffffffffffff9c [ 51.728396][ T7213] RBP: 000000c4204bd8d0 R08: 0000000000000000 R09: 0000000000000000 [ 51.736371][ T7213] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 51.744334][ T7213] R13: 000000000000008e R14: 000000000000008d R15: 0000000000000100 [ 51.753610][ T7213] Kernel Offset: disabled [ 51.757929][ T7213] Rebooting in 86400 seconds..