Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.88' (ECDSA) to the list of known hosts. syzkaller login: [ 68.166732][ T6533] chnl_net:caif_netlink_parms(): no params data found [ 68.244002][ T6533] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.252504][ T6533] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.263506][ T6533] device bridge_slave_0 entered promiscuous mode [ 68.274026][ T6533] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.282681][ T6533] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.290895][ T6533] device bridge_slave_1 entered promiscuous mode [ 68.325896][ T6533] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.339281][ T6533] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.375073][ T6533] team0: Port device team_slave_0 added [ 68.383293][ T6533] team0: Port device team_slave_1 added [ 68.412227][ T6533] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.419181][ T6533] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.445671][ T6533] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.458427][ T6533] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.467004][ T6533] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 68.493666][ T6533] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.530521][ T6533] device hsr_slave_0 entered promiscuous mode [ 68.537970][ T6533] device hsr_slave_1 entered promiscuous mode [ 68.661957][ T6533] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.676567][ T6533] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.685984][ T6533] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.697225][ T6533] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.722758][ T6533] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.729996][ T6533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.737546][ T6533] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.744678][ T6533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.790701][ T6533] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.804433][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.815955][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.825413][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.834474][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 68.847490][ T6533] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.858312][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.868191][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.875307][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.891979][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.900471][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.907551][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.931635][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.940446][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.948881][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.958097][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.971936][ T6855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.983445][ T6533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 69.002520][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 69.010146][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 69.024538][ T6533] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.042883][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 69.063772][ T6855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.071947][ T6855] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.081468][ T6855] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.092168][ T6533] device veth0_vlan entered promiscuous mode [ 69.105562][ T6533] device veth1_vlan entered promiscuous mode [ 69.126517][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 69.135007][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 69.143965][ T6685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.156607][ T6533] device veth0_macvtap entered promiscuous mode [ 69.167198][ T6533] device veth1_macvtap entered promiscuous mode [ 69.185921][ T6533] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 69.193900][ T6855] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.203074][ T6855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.215263][ T6533] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 69.224209][ T6855] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.233400][ T6855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.250998][ T6533] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.260747][ T6533] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.269427][ T6533] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 69.278299][ T6533] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.327038][ T6533] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 69.338084][ T6533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 69.346619][ T6533] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 69.356449][ T6533] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 69.379992][ C1] ------------[ cut here ]------------ [ 69.385671][ C1] Illegal XDP return value 4294967274, expect packet loss! [ 69.393637][ C1] WARNING: CPU: 1 PID: 6533 at net/core/filter.c:8186 bpf_warn_invalid_xdp_action+0x6f/0x80 [ 69.403872][ C1] Modules linked in: [ 69.407806][ C1] CPU: 1 PID: 6533 Comm: syz-executor913 Not tainted 5.15.0-rc5-syzkaller #0 [ 69.416673][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.426830][ C1] RIP: 0010:bpf_warn_invalid_xdp_action+0x6f/0x80 [ 69.433350][ C1] Code: 20 da 8c 8a 41 83 fc 04 48 c7 c6 60 da 8c 8a 48 0f 46 ee e8 e3 82 4c fa 44 89 e2 48 c7 c7 a0 da 8c 8a 48 89 ee e8 f8 ae cb 01 <0f> 0b 5b 5d 41 5c e9 c6 82 4c fa 66 0f 1f 44 00 00 41 57 41 56 49 [ 69.453051][ C1] RSP: 0018:ffffc90000dc0a58 EFLAGS: 00010282 [ 69.459132][ C1] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 69.467170][ C1] RDX: ffff88801adf0000 RSI: ffffffff815e9628 RDI: fffff520001b813d [ 69.475227][ C1] RBP: ffffffff8a8cda20 R08: 0000000000000000 R09: 0000000000000000 [ 69.483362][ C1] R10: ffffffff815e33ce R11: 0000000000000000 R12: 00000000ffffffea [ 69.491450][ C1] R13: 00000000ffffffea R14: 00000000ffffffea R15: 00000000ffffff8e [ 69.499601][ C1] FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 69.508556][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 69.515199][ C1] CR2: 00007fa145ad5e08 CR3: 000000006ee57000 CR4: 00000000003506e0 [ 69.523306][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 69.531361][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 69.539339][ C1] Call Trace: [ 69.542697][ C1] [ 69.545557][ C1] do_xdp_generic.part.0+0x80b/0xa00 [ 69.550961][ C1] ? generic_xdp_tx+0x6b0/0x6b0 [ 69.555953][ C1] __netif_receive_skb_core+0x11b0/0x3640 [ 69.561783][ C1] ? do_xdp_generic+0x40/0x40 [ 69.566561][ C1] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 69.572623][ C1] ? lock_chain_count+0x20/0x20 [ 69.577494][ C1] __netif_receive_skb_one_core+0xae/0x180 [ 69.583460][ C1] ? __netif_receive_skb_core+0x3640/0x3640 [ 69.589373][ C1] ? mark_held_locks+0x9f/0xe0 [ 69.594230][ C1] __netif_receive_skb+0x24/0x1b0 [ 69.599268][ C1] process_backlog+0x2a5/0x6c0 [ 69.604102][ C1] ? mark_held_locks+0x9f/0xe0 [ 69.608877][ C1] __napi_poll+0xaf/0x440 [ 69.613281][ C1] net_rx_action+0x801/0xb40 [ 69.618155][ C1] ? napi_threaded_poll+0x520/0x520 [ 69.623443][ C1] __do_softirq+0x29b/0x9c2 [ 69.627969][ C1] __irq_exit_rcu+0x123/0x180 [ 69.632712][ C1] irq_exit_rcu+0x5/0x20 [ 69.636976][ C1] sysvec_apic_timer_interrupt+0x93/0xc0 [ 69.642694][ C1] [ 69.645632][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 69.651678][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x38/0x70 [ 69.658146][ C1] Code: 74 24 10 e8 ba 93 20 f8 48 89 ef e8 02 0a 21 f8 81 e3 00 02 00 00 75 25 9c 58 f6 c4 02 75 2d 48 85 db 74 01 fb bf 01 00 00 00 43 f5 13 f8 65 8b 05 3c 4c c6 76 85 c0 74 0a 5b 5d c3 e8 50 6b [ 69.678261][ C1] RSP: 0018:ffffc90002baf8d8 EFLAGS: 00000206 [ 69.684428][ C1] RAX: 0000000000000002 RBX: 0000000000000200 RCX: 1ffffffff1fa4f32 [ 69.692498][ C1] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000001 [ 69.700911][ C1] RBP: ffff888010c7d050 R08: 0000000000000001 R09: ffffffff8fd0ea27 [ 69.708914][ C1] R10: 0000000000000001 R11: 0000000000000000 R12: dffffc0000000000 [ 69.717064][ C1] R13: 000000000000000f R14: ffff8880b9d2cd90 R15: ffff888010c7d000 [ 69.725138][ C1] pagevec_lru_move_fn+0x39c/0x610 [ 69.730365][ C1] ? pagevec_move_tail_fn+0x1bd0/0x1bd0 [ 69.735932][ C1] ? release_pages+0x20b0/0x20b0 [ 69.740963][ C1] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 69.746695][ C1] ? vm_normal_page+0x146/0x2a0 [ 69.751640][ C1] mark_page_accessed+0x1594/0x19d0 [ 69.756859][ C1] unmap_page_range+0xd45/0x2a10 [ 69.761888][ C1] ? vm_normal_page_pmd+0x550/0x550 [ 69.767112][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 69.772026][ C1] ? uprobe_munmap+0x1c/0x560 [ 69.776719][ C1] unmap_single_vma+0x198/0x310 [ 69.781746][ C1] unmap_vmas+0x16d/0x2f0 [ 69.786439][ C1] ? unmap_mapping_range+0x50/0x50 [ 69.791680][ C1] ? lru_add_drain_cpu+0x635/0x900 [ 69.796807][ C1] exit_mmap+0x1d0/0x630 [ 69.801130][ C1] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 69.807131][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 69.813532][ C1] __mmput+0x122/0x4b0 [ 69.817614][ C1] mmput+0x58/0x60 [ 69.821414][ C1] do_exit+0xabc/0x2a30 [ 69.825598][ C1] ? __context_tracking_exit+0xb8/0xe0 [ 69.831140][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 69.836001][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 69.840929][ C1] ? mm_update_next_owner+0x7a0/0x7a0 [ 69.846416][ C1] do_group_exit+0x125/0x310 [ 69.851178][ C1] __x64_sys_exit_group+0x3a/0x50 [ 69.856305][ C1] do_syscall_64+0x35/0xb0 [ 69.860820][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.866746][ C1] RIP: 0033:0x7fa145a92ab9 [ 69.871221][ C1] Code: Unable to access opcode bytes at RIP 0x7fa145a92a8f. [ 69.878590][ C1] RSP: 002b:00007ffc79edc418 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 69.887176][ C1] RAX: ffffffffffffffda RBX: 00007fa145b073f0 RCX: 00007fa145a92ab9 [ 69.895257][ C1] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 69.903415][ C1] RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000 [ 69.911475][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa145b073f0 [ 69.919533][ C1] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 69.927522][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 69.934086][ C1] CPU: 1 PID: 6533 Comm: syz-executor913 Not tainted 5.15.0-rc5-syzkaller #0 [ 69.942827][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.952884][ C1] Call Trace: [ 69.956156][ C1] [ 69.958985][ C1] dump_stack_lvl+0xcd/0x134 [ 69.963582][ C1] panic+0x2b0/0x6dd [ 69.967469][ C1] ? __warn_printk+0xf3/0xf3 [ 69.972060][ C1] ? __warn.cold+0x1a/0x44 [ 69.976506][ C1] ? bpf_warn_invalid_xdp_action+0x6f/0x80 [ 69.982312][ C1] __warn.cold+0x35/0x44 [ 69.986549][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 69.992786][ C1] ? bpf_warn_invalid_xdp_action+0x6f/0x80 [ 69.998586][ C1] report_bug+0x1bd/0x210 [ 70.002912][ C1] handle_bug+0x3c/0x60 [ 70.007056][ C1] exc_invalid_op+0x14/0x40 [ 70.011542][ C1] asm_exc_invalid_op+0x12/0x20 [ 70.016387][ C1] RIP: 0010:bpf_warn_invalid_xdp_action+0x6f/0x80 [ 70.022787][ C1] Code: 20 da 8c 8a 41 83 fc 04 48 c7 c6 60 da 8c 8a 48 0f 46 ee e8 e3 82 4c fa 44 89 e2 48 c7 c7 a0 da 8c 8a 48 89 ee e8 f8 ae cb 01 <0f> 0b 5b 5d 41 5c e9 c6 82 4c fa 66 0f 1f 44 00 00 41 57 41 56 49 [ 70.042498][ C1] RSP: 0018:ffffc90000dc0a58 EFLAGS: 00010282 [ 70.048553][ C1] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 70.056508][ C1] RDX: ffff88801adf0000 RSI: ffffffff815e9628 RDI: fffff520001b813d [ 70.064466][ C1] RBP: ffffffff8a8cda20 R08: 0000000000000000 R09: 0000000000000000 [ 70.072423][ C1] R10: ffffffff815e33ce R11: 0000000000000000 R12: 00000000ffffffea [ 70.080402][ C1] R13: 00000000ffffffea R14: 00000000ffffffea R15: 00000000ffffff8e [ 70.088361][ C1] ? wake_up_klogd.part.0+0x8e/0xd0 [ 70.093552][ C1] ? vprintk+0x88/0x90 [ 70.097611][ C1] ? bpf_warn_invalid_xdp_action+0x6f/0x80 [ 70.103404][ C1] do_xdp_generic.part.0+0x80b/0xa00 [ 70.108678][ C1] ? generic_xdp_tx+0x6b0/0x6b0 [ 70.113543][ C1] __netif_receive_skb_core+0x11b0/0x3640 [ 70.119265][ C1] ? do_xdp_generic+0x40/0x40 [ 70.123940][ C1] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 70.130270][ C1] ? lock_chain_count+0x20/0x20 [ 70.135112][ C1] __netif_receive_skb_one_core+0xae/0x180 [ 70.140923][ C1] ? __netif_receive_skb_core+0x3640/0x3640 [ 70.146803][ C1] ? mark_held_locks+0x9f/0xe0 [ 70.151553][ C1] __netif_receive_skb+0x24/0x1b0 [ 70.156562][ C1] process_backlog+0x2a5/0x6c0 [ 70.161328][ C1] ? mark_held_locks+0x9f/0xe0 [ 70.166083][ C1] __napi_poll+0xaf/0x440 [ 70.170399][ C1] net_rx_action+0x801/0xb40 [ 70.174978][ C1] ? napi_threaded_poll+0x520/0x520 [ 70.180170][ C1] __do_softirq+0x29b/0x9c2 [ 70.184666][ C1] __irq_exit_rcu+0x123/0x180 [ 70.189340][ C1] irq_exit_rcu+0x5/0x20 [ 70.193573][ C1] sysvec_apic_timer_interrupt+0x93/0xc0 [ 70.199193][ C1] [ 70.202125][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 70.210169][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0x38/0x70 [ 70.216575][ C1] Code: 74 24 10 e8 ba 93 20 f8 48 89 ef e8 02 0a 21 f8 81 e3 00 02 00 00 75 25 9c 58 f6 c4 02 75 2d 48 85 db 74 01 fb bf 01 00 00 00 43 f5 13 f8 65 8b 05 3c 4c c6 76 85 c0 74 0a 5b 5d c3 e8 50 6b [ 70.236168][ C1] RSP: 0018:ffffc90002baf8d8 EFLAGS: 00000206 [ 70.242223][ C1] RAX: 0000000000000002 RBX: 0000000000000200 RCX: 1ffffffff1fa4f32 [ 70.250182][ C1] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000001 [ 70.258134][ C1] RBP: ffff888010c7d050 R08: 0000000000000001 R09: ffffffff8fd0ea27 [ 70.266089][ C1] R10: 0000000000000001 R11: 0000000000000000 R12: dffffc0000000000 [ 70.274040][ C1] R13: 000000000000000f R14: ffff8880b9d2cd90 R15: ffff888010c7d000 [ 70.282010][ C1] pagevec_lru_move_fn+0x39c/0x610 [ 70.287114][ C1] ? pagevec_move_tail_fn+0x1bd0/0x1bd0 [ 70.292659][ C1] ? release_pages+0x20b0/0x20b0 [ 70.297638][ C1] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 70.303362][ C1] ? vm_normal_page+0x146/0x2a0 [ 70.308213][ C1] mark_page_accessed+0x1594/0x19d0 [ 70.313407][ C1] unmap_page_range+0xd45/0x2a10 [ 70.318346][ C1] ? vm_normal_page_pmd+0x550/0x550 [ 70.323538][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 70.328373][ C1] ? uprobe_munmap+0x1c/0x560 [ 70.333123][ C1] unmap_single_vma+0x198/0x310 [ 70.337975][ C1] unmap_vmas+0x16d/0x2f0 [ 70.342289][ C1] ? unmap_mapping_range+0x50/0x50 [ 70.347386][ C1] ? lru_add_drain_cpu+0x635/0x900 [ 70.352496][ C1] exit_mmap+0x1d0/0x630 [ 70.356731][ C1] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 70.362704][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 70.368958][ C1] __mmput+0x122/0x4b0 [ 70.373016][ C1] mmput+0x58/0x60 [ 70.376735][ C1] do_exit+0xabc/0x2a30 [ 70.380885][ C1] ? __context_tracking_exit+0xb8/0xe0 [ 70.386339][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 70.391181][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 70.396016][ C1] ? mm_update_next_owner+0x7a0/0x7a0 [ 70.401379][ C1] do_group_exit+0x125/0x310 [ 70.405956][ C1] __x64_sys_exit_group+0x3a/0x50 [ 70.410963][ C1] do_syscall_64+0x35/0xb0 [ 70.415363][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.421248][ C1] RIP: 0033:0x7fa145a92ab9 [ 70.425648][ C1] Code: Unable to access opcode bytes at RIP 0x7fa145a92a8f. [ 70.432990][ C1] RSP: 002b:00007ffc79edc418 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 70.441471][ C1] RAX: ffffffffffffffda RBX: 00007fa145b073f0 RCX: 00007fa145a92ab9 [ 70.449423][ C1] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 70.457376][ C1] RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000 [ 70.465329][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa145b073f0 [ 70.473298][ C1] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 70.481634][ C1] Kernel Offset: disabled [ 70.486025][ C1] Rebooting in 86400 seconds..