[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 42.111175][ T25] audit: type=1800 audit(1570697578.322:25): pid=7069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 42.138475][ T25] audit: type=1800 audit(1570697578.322:26): pid=7069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 42.159006][ T25] audit: type=1800 audit(1570697578.322:27): pid=7069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.178' (ECDSA) to the list of known hosts. 2019/10/10 08:53:06 fuzzer started 2019/10/10 08:53:08 dialing manager at 10.128.0.105:34287 2019/10/10 08:53:08 syscalls: 2523 2019/10/10 08:53:08 code coverage: enabled 2019/10/10 08:53:08 comparison tracing: enabled 2019/10/10 08:53:08 extra coverage: extra coverage is not supported by the kernel 2019/10/10 08:53:08 setuid sandbox: enabled 2019/10/10 08:53:08 namespace sandbox: enabled 2019/10/10 08:53:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/10 08:53:08 fault injection: enabled 2019/10/10 08:53:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/10 08:53:08 net packet injection: enabled 2019/10/10 08:53:08 net device setup: enabled 2019/10/10 08:53:08 concurrency sanitizer: enabled 08:53:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socket(0x2000000000000024, 0x0, 0x0) syzkaller login: [ 54.277335][ T7239] IPVS: ftp: loaded support on port[0] = 21 08:53:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xc0000000024, &(0x7f0000000080), 0x72) [ 54.364100][ T7239] chnl_net:caif_netlink_parms(): no params data found [ 54.410234][ T7239] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.425776][ T7239] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.435977][ T7239] device bridge_slave_0 entered promiscuous mode [ 54.445708][ T7239] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.454315][ T7239] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.462689][ T7239] device bridge_slave_1 entered promiscuous mode [ 54.485498][ T7239] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.496219][ T7239] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.521356][ T7239] team0: Port device team_slave_0 added [ 54.529190][ T7239] team0: Port device team_slave_1 added [ 54.584894][ T7239] device hsr_slave_0 entered promiscuous mode [ 54.632679][ T7239] device hsr_slave_1 entered promiscuous mode [ 54.679615][ T7239] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.686727][ T7239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.694284][ T7239] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.701327][ T7239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.720111][ T7242] IPVS: ftp: loaded support on port[0] = 21 08:53:11 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000800c5012, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000200)) accept4$vsock_stream(r4, &(0x7f00000001c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x400) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x40000, 0x0) setsockopt$sock_linger(r5, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x800, 0x0) ioctl$TCSETS(r6, 0x5402, &(0x7f0000000100)={0xfffffffd, 0x3, 0x6, 0xffffff00, 0xe, 0x4, 0x0, 0x0, 0x0, 0x94af, 0x0, 0x1}) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) r7 = shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x2000) prctl$PR_GET_FPEMU(0x9, 0x0) ioctl$VT_WAITACTIVE(r4, 0x5607) shmdt(r7) sendmmsg(r5, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) io_setup(0x2, &(0x7f0000000180)=0x0) r9 = accept4$inet6(r5, &(0x7f0000000240)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c, 0x80000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup2(r10, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r12, 0x10d, 0x1, &(0x7f00001c9fff), 0x0) r13 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r13, 0x10d, 0x1, &(0x7f00001c9fff), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r15 = dup2(r14, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = inotify_init1(0x558d488a3c8d83a6) io_submit(r8, 0x4, &(0x7f0000000740)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x4f, r9, &(0x7f0000000400)="e17a2e5a66c1148a3e2a017e", 0xc, 0x6}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0x0, r12, &(0x7f0000000840), 0x0, 0x8, 0x0, 0xe5b3aa7c4e5fed44}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x8, 0x1ff, r13, &(0x7f00000005c0)="ab45f2ef4459ea6af854d378ec6a2f31f1317ada01953f39dbc1c1256888ee1fdb2833332f5fe196d7f2371822619056b9ba", 0x32, 0x0, 0x0, 0x1}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x2, 0x8, r16, &(0x7f0000000780)="7fabcbe6c9063ab94dd353fc55416b84f75e564c40d1de454b1b0974fac45c16e608bfc11613ddbc5ad2ad49bae3f5f143d8a630a02be169299c9b85c811267e09bbb47ea292b138b3ba5f11f724f78884169206617fb5325ee686a323a37fd54af0468567226a0fd826eaf36ee87f58373a0ff10d524ae8513559c7f2cdd08b3256d9e7825331c20d3a", 0x8a, 0x0, 0x0, 0x1}]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r18, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, 0x0, r19) write$FUSE_ENTRY(r4, &(0x7f0000000280)={0x90, 0xffffffffffffffea, 0x4, {0x0, 0x0, 0x9, 0x8001, 0x4, 0x3, {0x2, 0xb3, 0x80, 0x9, 0xda6a, 0x40, 0x16a, 0x81, 0x80000000, 0x9, 0x2, r18, r19, 0x4, 0x81}}}, 0x90) [ 54.753854][ T7239] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.777511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.786922][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.807440][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.824681][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 54.841769][ T7239] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.859587][ T7243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.869665][ T7243] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.876807][ T7243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.909211][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.918473][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.925591][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.954581][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.973845][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.011175][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.033111][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.052049][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.062862][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.124968][ T7239] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.148336][ T7242] chnl_net:caif_netlink_parms(): no params data found 08:53:11 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="bad004ecb828018ee00f20c06635100000000f22c066b9800000c00f326635010000000f3026262e2e0f381d9cac000f797e3826660f3a0d882ba7fc660f2206f0fe8d0800f20f01f9", 0x49}], 0x1, 0x0, 0x0, 0xfffffffffffffdc5) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), 0xffffffffffffffff, 0x2}}, 0x18) [ 55.256513][ T7248] IPVS: ftp: loaded support on port[0] = 21 [ 55.269444][ T7242] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.301621][ T7242] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.313939][ T7242] device bridge_slave_0 entered promiscuous mode [ 55.333732][ T7242] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.340918][ T7242] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.362513][ T7242] device bridge_slave_1 entered promiscuous mode [ 55.415881][ T7242] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.464790][ T7242] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:53:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socket(0x2000000000000024, 0x0, 0x0) [ 55.575247][ T7242] team0: Port device team_slave_0 added [ 55.592562][ T7242] team0: Port device team_slave_1 added [ 55.648274][ T7258] IPVS: ftp: loaded support on port[0] = 21 08:53:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socket(0x2000000000000024, 0x0, 0x0) [ 55.734862][ T7242] device hsr_slave_0 entered promiscuous mode [ 55.791904][ T7242] device hsr_slave_1 entered promiscuous mode [ 55.831572][ T7242] debugfs: Directory 'hsr0' with parent '/' already present! 08:53:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socket(0x2000000000000024, 0x0, 0x0) [ 55.942883][ T7248] chnl_net:caif_netlink_parms(): no params data found [ 56.044934][ T7248] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.071616][ T7248] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.079634][ T7248] device bridge_slave_0 entered promiscuous mode [ 56.117981][ T7266] IPVS: ftp: loaded support on port[0] = 21 [ 56.148047][ T7248] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.164797][ T7248] bridge0: port 2(bridge_slave_1) entered disabled state 08:53:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socket(0x2000000000000024, 0x0, 0x0) 08:53:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") socket(0x2000000000000024, 0x0, 0x0) [ 56.194217][ T7248] device bridge_slave_1 entered promiscuous mode [ 56.216553][ T7242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.260421][ T7269] ================================================================== [ 56.268548][ T7269] BUG: KCSAN: data-race in __zone_watermark_ok / get_page_from_freelist [ 56.277133][ T7269] [ 56.279460][ T7269] read to 0xffff88812fffce88 of 8 bytes by task 7239 on cpu 0: [ 56.286988][ T7269] __zone_watermark_ok+0x106/0x240 [ 56.292085][ T7269] get_page_from_freelist+0x629/0x2300 [ 56.297528][ T7269] __alloc_pages_nodemask+0x255/0x4d0 [ 56.302886][ T7269] cache_grow_begin+0x76/0x670 [ 56.307632][ T7269] kmem_cache_alloc+0x500/0x5d0 [ 56.312466][ T7269] sk_prot_alloc+0x5a/0x240 [ 56.316964][ T7269] sk_alloc+0x51/0x540 [ 56.321024][ T7269] inet6_create+0x23a/0x830 [ 56.325528][ T7269] __sock_create+0x241/0x3a0 [ 56.330103][ T7269] __sys_socket+0x96/0x170 [ 56.334501][ T7269] __x64_sys_socket+0x4c/0x60 [ 56.339163][ T7269] do_syscall_64+0xcf/0x2f0 [ 56.343663][ T7269] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 56.349530][ T7269] [ 56.351845][ T7269] write to 0xffff88812fffce88 of 8 bytes by task 7269 on cpu 1: [ 56.359469][ T7269] get_page_from_freelist+0x131e/0x2300 [ 56.364996][ T7269] __alloc_pages_nodemask+0x255/0x4d0 [ 56.370347][ T7269] alloc_pages_current+0xd1/0x170 [ 56.375352][ T7269] __vmalloc_node_range+0x2d5/0x4d0 [ 56.380533][ T7269] vmalloc_user+0x65/0x80 [ 56.384843][ T7269] kcov_mmap+0x2e/0x150 [ 56.388982][ T7269] mmap_region+0x83c/0xd50 [ 56.393381][ T7269] do_mmap+0x6b0/0xb20 [ 56.397430][ T7269] vm_mmap_pgoff+0x12d/0x190 [ 56.401999][ T7269] ksys_mmap_pgoff+0x2d8/0x420 [ 56.406746][ T7269] __x64_sys_mmap+0x91/0xc0 [ 56.411233][ T7269] do_syscall_64+0xcf/0x2f0 [ 56.415724][ T7269] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 56.421590][ T7269] [ 56.423898][ T7269] Reported by Kernel Concurrency Sanitizer on: [ 56.430832][ T7269] CPU: 1 PID: 7269 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 56.438271][ T7269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.448303][ T7269] ================================================================== [ 56.456341][ T7269] Kernel panic - not syncing: panic_on_warn set ... [ 56.462908][ T7269] CPU: 1 PID: 7269 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 56.470339][ T7269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 56.480373][ T7269] Call Trace: [ 56.483744][ T7269] dump_stack+0xf5/0x159 [ 56.487977][ T7269] panic+0x209/0x639 [ 56.491856][ T7269] ? vm_mmap_pgoff+0x12d/0x190 [ 56.496606][ T7269] ? vprintk_func+0x8d/0x140 [ 56.501186][ T7269] kcsan_report.cold+0xc/0x1b [ 56.505849][ T7269] __kcsan_setup_watchpoint+0x3ee/0x510 [ 56.511378][ T7269] __tsan_write8+0x32/0x40 [ 56.515780][ T7269] get_page_from_freelist+0x131e/0x2300 [ 56.521328][ T7269] __alloc_pages_nodemask+0x255/0x4d0 [ 56.526690][ T7269] alloc_pages_current+0xd1/0x170 [ 56.531703][ T7269] __vmalloc_node_range+0x2d5/0x4d0 [ 56.536889][ T7269] ? kcov_mmap+0x2e/0x150 [ 56.541199][ T7269] vmalloc_user+0x65/0x80 [ 56.545511][ T7269] ? kcov_mmap+0x2e/0x150 [ 56.549824][ T7269] kcov_mmap+0x2e/0x150 [ 56.553976][ T7269] mmap_region+0x83c/0xd50 [ 56.558386][ T7269] do_mmap+0x6b0/0xb20 [ 56.562444][ T7269] vm_mmap_pgoff+0x12d/0x190 [ 56.567027][ T7269] ksys_mmap_pgoff+0x2d8/0x420 [ 56.571779][ T7269] __x64_sys_mmap+0x91/0xc0 [ 56.576271][ T7269] do_syscall_64+0xcf/0x2f0 [ 56.580763][ T7269] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 56.586636][ T7269] RIP: 0033:0x459aaa [ 56.590521][ T7269] Code: 89 f5 41 54 49 89 fc 55 53 74 35 49 63 e8 48 63 da 4d 89 f9 49 89 e8 4d 63 d6 48 89 da 4c 89 ee 4c 89 e7 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 4e 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 00 [ 56.610117][ T7269] RSP: 002b:00007ffe7d9e0d28 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 56.618512][ T7269] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459aaa [ 56.626464][ T7269] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 56.634422][ T7269] RBP: 00000000000000e8 R08: 00000000000000e8 R09: 0000000000000000 [ 56.642388][ T7269] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 56.650343][ T7269] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 57.788107][ T7269] Shutting down cpus with NMI [ 57.794039][ T7269] Kernel Offset: disabled [ 57.798357][ T7269] Rebooting in 86400 seconds..