[ 36.767361] audit: type=1800 audit(1550025527.146:27): pid=7562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 36.803200] audit: type=1800 audit(1550025527.176:28): pid=7562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.257649] audit: type=1800 audit(1550025527.636:29): pid=7562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 37.282410] audit: type=1800 audit(1550025527.636:30): pid=7562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.224' (ECDSA) to the list of known hosts. 2019/02/13 02:38:57 fuzzer started 2019/02/13 02:38:59 dialing manager at 10.128.0.26:35799 2019/02/13 02:39:00 syscalls: 1 2019/02/13 02:39:00 code coverage: enabled 2019/02/13 02:39:00 comparison tracing: enabled 2019/02/13 02:39:00 extra coverage: extra coverage is not supported by the kernel 2019/02/13 02:39:00 setuid sandbox: enabled 2019/02/13 02:39:00 namespace sandbox: enabled 2019/02/13 02:39:00 Android sandbox: /sys/fs/selinux/policy does not exist 2019/02/13 02:39:00 fault injection: enabled 2019/02/13 02:39:00 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/02/13 02:39:00 net packet injection: enabled 2019/02/13 02:39:00 net device setup: enabled 02:39:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adb1f023c123f3188a070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="24000000640007031dfffd946fa2830020200a00ffffffffa61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1}, 0x0) syzkaller login: [ 50.518044] IPVS: ftp: loaded support on port[0] = 21 02:39:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @dev, 0xb}, 0x1c) syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x4e23, 0x4e20, 0x8}}}}}}, 0x0) [ 50.631517] chnl_net:caif_netlink_parms(): no params data found [ 50.726267] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.733077] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.755024] device bridge_slave_0 entered promiscuous mode [ 50.762836] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.776130] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.783512] device bridge_slave_1 entered promiscuous mode [ 50.808104] IPVS: ftp: loaded support on port[0] = 21 [ 50.827209] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 50.849673] bond0: Enslaving bond_slave_1 as an active interface with an up link 02:39:01 executing program 2: connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000140)={0x27, 0x1, 0x0, 0x7, 0x0, 0x0, "afc4527a6d47911bc1636e6f17d4daeaa5fbe8464cd4a6c8edd65b2d84f4cc53acb4b61fda56967ede073de2adff193bdc8239d736a289ef72c0ae82b94836"}, 0x60) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x7f}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r1, 0x32, "1069d477cda3f253d698367adc4655e31fcbe653c209fcd462116d1f59aa314a61b07307ecb0661b3d8872abe4a606d6a26e"}, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x8000000000000001, 0x0) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000100)) ioctl(0xffffffffffffffff, 0x8912, 0x0) socket$inet(0x10, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0xed5efe0f, 0x0, 0x0, 0x20000fff}) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x1000000000000005}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x171) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x3, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) [ 50.899535] team0: Port device team_slave_0 added [ 50.918538] team0: Port device team_slave_1 added 02:39:01 executing program 3: r0 = socket$inet6(0xa, 0x40000000000006, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 51.056835] device hsr_slave_0 entered promiscuous mode [ 51.084140] device hsr_slave_1 entered promiscuous mode [ 51.163159] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.169691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.176582] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.182957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.219543] chnl_net:caif_netlink_parms(): no params data found [ 51.223799] IPVS: ftp: loaded support on port[0] = 21 [ 51.286911] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.293314] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.303269] device bridge_slave_0 entered promiscuous mode [ 51.317340] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.323745] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.331791] IPVS: ftp: loaded support on port[0] = 21 [ 51.339990] device bridge_slave_1 entered promiscuous mode [ 51.386200] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 51.422166] bond0: Enslaving bond_slave_1 as an active interface with an up link 02:39:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000640)=""/12, 0xc}, {&(0x7f0000000740)=""/78, 0x4e}, {&(0x7f00000007c0)=""/68, 0x44}, {&(0x7f0000000840)=""/222, 0xde}, {&(0x7f0000000940)=""/124, 0x7c}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x6}, 0x0) [ 51.470857] team0: Port device team_slave_0 added [ 51.505685] team0: Port device team_slave_1 added [ 51.627782] device hsr_slave_0 entered promiscuous mode [ 51.664491] device hsr_slave_1 entered promiscuous mode 02:39:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}}, {{@in6=@ipv4, 0x0, 0x2b}}}, 0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x14, 0x29, 0xffffff1f, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) [ 51.763110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.774835] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.792500] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.799924] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 51.831144] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.832784] IPVS: ftp: loaded support on port[0] = 21 [ 51.843317] chnl_net:caif_netlink_parms(): no params data found [ 51.868784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.875824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.899371] chnl_net:caif_netlink_parms(): no params data found [ 51.918247] IPVS: ftp: loaded support on port[0] = 21 [ 51.957358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.966827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.974758] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.981092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.988043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.995820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.003301] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.009724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.016438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.048013] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.054679] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.061539] device bridge_slave_0 entered promiscuous mode [ 52.068822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.076950] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.083316] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.090959] device bridge_slave_1 entered promiscuous mode [ 52.116796] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 52.128876] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 52.166516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.174776] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.183799] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.192496] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.199006] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.205957] device bridge_slave_0 entered promiscuous mode [ 52.212655] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.219223] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.226675] device bridge_slave_1 entered promiscuous mode [ 52.240490] team0: Port device team_slave_0 added [ 52.254285] team0: Port device team_slave_1 added [ 52.287438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.295288] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.302762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.310524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.335634] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.347103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.395517] device hsr_slave_0 entered promiscuous mode [ 52.464682] device hsr_slave_1 entered promiscuous mode [ 52.515653] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 52.533341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.541166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.562583] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 52.639270] team0: Port device team_slave_0 added [ 52.648699] team0: Port device team_slave_1 added [ 52.660299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.696602] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.765805] device hsr_slave_0 entered promiscuous mode [ 52.784688] device hsr_slave_1 entered promiscuous mode [ 52.831952] chnl_net:caif_netlink_parms(): no params data found [ 52.850492] chnl_net:caif_netlink_parms(): no params data found [ 52.868244] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.893585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.905040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.911799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.920228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.927868] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.934254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.967069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.975870] kasan: CONFIG_KASAN_INLINE enabled [ 52.980457] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 52.987819] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 52.994041] CPU: 0 PID: 7751 Comm: syz-executor.0 Not tainted 5.0.0-rc5+ #60 [ 53.001204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 53.010544] RIP: 0010:__lock_acquire+0x8df/0x4700 [ 53.015463] Code: 28 00 00 00 0f 85 35 27 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 27 00 00 49 81 3c 24 20 45 9a 89 0f 84 03 f8 [ 53.034392] RSP: 0018:ffff88806d067180 EFLAGS: 00010006 [ 53.039733] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 53.046980] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000000000060 [ 53.054244] RBP: ffff88806d067350 R08: 0000000000000001 R09: 0000000000000001 [ 53.061493] R10: ffff88806d067570 R11: 0000000000000001 R12: 0000000000000060 [ 53.068750] R13: 0000000000000000 R14: 0000000000000000 R15: ffff88806d05a080 [ 53.075997] FS: 00007f2f36982700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 53.084199] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.090060] CR2: 000000000070a088 CR3: 000000006d52a000 CR4: 00000000001406f0 [ 53.097304] Call Trace: [ 53.099872] ? mark_held_locks+0x100/0x100 [ 53.104129] ? __lock_acquire+0x53b/0x4700 [ 53.108358] ? cpuacct_charge+0x1db/0x360 [ 53.112487] ? mark_held_locks+0x100/0x100 [ 53.116701] ? __lock_is_held+0xb6/0x140 [ 53.120760] ? __lock_acquire+0x53b/0x4700 [ 53.124974] ? __lock_is_held+0xb6/0x140 [ 53.129016] ? tc_ctl_chain+0x42f/0x11a0 [ 53.133059] lock_acquire+0x16f/0x3f0 [ 53.136840] ? tc_ctl_chain+0x42f/0x11a0 [ 53.140883] ? tc_ctl_chain+0x42f/0x11a0 [ 53.144931] __mutex_lock+0xf7/0x1310 [ 53.148727] ? tc_ctl_chain+0x42f/0x11a0 [ 53.152779] ? tcf_block_refcnt_get+0x22d/0x3e0 [ 53.157429] ? tc_ctl_chain+0x42f/0x11a0 [ 53.161470] ? tcf_block_refcnt_get+0x22d/0x3e0 [ 53.166123] ? mutex_trylock+0x1e0/0x1e0 [ 53.170257] ? lock_downgrade+0x810/0x810 [ 53.174390] ? kasan_check_read+0x11/0x20 [ 53.178535] ? tcf_block_refcnt_get+0x254/0x3e0 [ 53.183194] mutex_lock_nested+0x16/0x20 [ 53.187239] ? mutex_lock_nested+0x16/0x20 [ 53.191454] tc_ctl_chain+0x42f/0x11a0 [ 53.195347] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 53.199738] ? tcf_block_release+0xa0/0xa0 [ 53.203954] ? refcount_dec_and_test_checked+0x1b/0x20 [ 53.209219] ? mutex_trylock+0x1e0/0x1e0 [ 53.213284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.218806] ? tcf_block_release+0xa0/0xa0 [ 53.223032] rtnetlink_rcv_msg+0x465/0xb00 [ 53.227257] ? rtnetlink_put_metrics+0x560/0x560 [ 53.232012] ? netdev_pick_tx+0x300/0x300 [ 53.236190] ? netlink_deliver_tap+0x22d/0xbf0 [ 53.240777] ? find_held_lock+0x35/0x130 [ 53.244821] netlink_rcv_skb+0x17a/0x460 [ 53.248872] ? rtnetlink_put_metrics+0x560/0x560 [ 53.253614] ? netlink_ack+0xb50/0xb50 [ 53.257485] ? kasan_check_read+0x11/0x20 [ 53.261616] ? netlink_deliver_tap+0x254/0xbf0 [ 53.266178] rtnetlink_rcv+0x1d/0x30 [ 53.269869] netlink_unicast+0x536/0x720 [ 53.273908] ? netlink_attachskb+0x770/0x770 [ 53.278312] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 53.283313] ? __check_object_size+0x3d/0x42f [ 53.287791] netlink_sendmsg+0x8ae/0xd70 [ 53.291838] ? netlink_unicast+0x720/0x720 [ 53.296062] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 53.300885] ? apparmor_socket_sendmsg+0x2a/0x30 [ 53.305619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.311164] ? security_socket_sendmsg+0x93/0xc0 [ 53.315901] ? netlink_unicast+0x720/0x720 [ 53.320114] sock_sendmsg+0xdd/0x130 [ 53.323805] ___sys_sendmsg+0x806/0x930 [ 53.327758] ? copy_msghdr_from_user+0x430/0x430 [ 53.332532] ? lock_downgrade+0x810/0x810 [ 53.336674] ? kasan_check_read+0x11/0x20 [ 53.340816] ? __fget+0x367/0x540 [ 53.344248] ? iterate_fd+0x360/0x360 [ 53.348028] ? lock_downgrade+0x810/0x810 [ 53.352157] ? __fget_light+0x1a9/0x230 [ 53.356114] ? __fdget+0x1b/0x20 [ 53.359461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 53.364976] __sys_sendmsg+0x105/0x1d0 [ 53.368844] ? __ia32_sys_shutdown+0x80/0x80 [ 53.373232] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 53.377992] ? do_syscall_64+0x26/0x610 [ 53.381983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.387325] ? do_syscall_64+0x26/0x610 [ 53.391283] __x64_sys_sendmsg+0x78/0xb0 [ 53.395345] do_syscall_64+0x103/0x610 [ 53.399237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.404403] RIP: 0033:0x457e39 [ 53.407578] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 53.426460] RSP: 002b:00007f2f36981c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.434171] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 53.441466] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 53.448724] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 53.455986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f369826d4 [ 53.463260] R13: 00000000004c4e41 R14: 00000000004d8b08 R15: 00000000ffffffff [ 53.470516] Modules linked in: [ 53.473691] ---[ end trace 6649cdc94d85a5e2 ]--- [ 53.478430] RIP: 0010:__lock_acquire+0x8df/0x4700 [ 53.483250] Code: 28 00 00 00 0f 85 35 27 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 27 00 00 49 81 3c 24 20 45 9a 89 0f 84 03 f8 [ 53.502130] RSP: 0018:ffff88806d067180 EFLAGS: 00010006 [ 53.507469] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 53.514731] RDX: 000000000000000c RSI: 0000000000000000 RDI: 0000000000000060 [ 53.521976] RBP: ffff88806d067350 R08: 0000000000000001 R09: 0000000000000001 [ 53.529224] R10: ffff88806d067570 R11: 0000000000000001 R12: 0000000000000060 [ 53.536471] R13: 0000000000000000 R14: 0000000000000000 R15: ffff88806d05a080 [ 53.543721] FS: 00007f2f36982700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 53.551927] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.557791] CR2: 000000000070a088 CR3: 000000006d52a000 CR4: 00000000001406f0 [ 53.565044] Kernel panic - not syncing: Fatal exception [ 53.571253] Kernel Offset: disabled [ 53.574872] Rebooting in 86400 seconds..