[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 23.232371] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.863372] random: sshd: uninitialized urandom read (32 bytes read) [ 27.184186] random: sshd: uninitialized urandom read (32 bytes read) [ 27.745401] random: sshd: uninitialized urandom read (32 bytes read) [ 51.511901] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.198' (ECDSA) to the list of known hosts. [ 57.088264] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/02 08:59:08 parsed 1 programs [ 58.177203] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/02 08:59:09 executed programs: 0 [ 59.209417] IPVS: ftp: loaded support on port[0] = 21 [ 59.431714] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.438425] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.446221] device bridge_slave_0 entered promiscuous mode [ 59.464669] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.471044] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.478454] device bridge_slave_1 entered promiscuous mode [ 59.496613] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.513503] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.558611] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.579164] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.647245] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.654629] team0: Port device team_slave_0 added [ 59.670081] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.677430] team0: Port device team_slave_1 added [ 59.694602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.713599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.732589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.751390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.885158] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.891614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.898684] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.905110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.368787] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 60.375043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.403813] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 60.426527] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.474139] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.480322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.488257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.535246] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.443091] ================================================================== [ 61.450652] BUG: KASAN: use-after-free in tipc_group_fill_sock_diag+0x7b9/0x84b [ 61.458133] Read of size 4 at addr ffff8801ce4a1c5c by task syz-executor0/5127 [ 61.465487] [ 61.467119] CPU: 1 PID: 5127 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #218 [ 61.474422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.483769] Call Trace: [ 61.486356] dump_stack+0x1c9/0x2b4 [ 61.489976] ? dump_stack_print_info.cold.2+0x52/0x52 [ 61.495216] ? printk+0xa7/0xcf [ 61.498499] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 61.503256] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 61.508352] print_address_description+0x6c/0x20b [ 61.513186] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 61.518278] kasan_report.cold.7+0x242/0x30d [ 61.522679] __asan_report_load4_noabort+0x14/0x20 [ 61.527667] tipc_group_fill_sock_diag+0x7b9/0x84b [ 61.532590] ? tipc_group_member_evt+0xe30/0xe30 [ 61.537362] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 61.542396] ? skb_put+0x17b/0x1e0 [ 61.545938] ? memset+0x31/0x40 [ 61.549220] ? memcpy+0x45/0x50 [ 61.552513] ? __nla_put+0x37/0x40 [ 61.556064] ? nla_put+0x11a/0x150 [ 61.559616] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 61.564292] ? tipc_diag_dump+0x30/0x30 [ 61.568278] ? tipc_getname+0x7f0/0x7f0 [ 61.572273] ? save_stack+0xa9/0xd0 [ 61.575906] ? save_stack+0x43/0xd0 [ 61.579536] ? kasan_kmalloc+0xc4/0xe0 [ 61.583430] ? __kmalloc_node_track_caller+0x47/0x70 [ 61.588655] ? graph_lock+0x170/0x170 [ 61.592838] ? __netlink_dump_start+0x4f1/0x6f0 [ 61.597514] ? sock_diag_rcv_msg+0x31d/0x410 [ 61.601926] ? netlink_rcv_skb+0x172/0x440 [ 61.606163] ? sock_diag_rcv+0x2a/0x40 [ 61.610048] ? netlink_unicast+0x5a0/0x760 [ 61.614290] ? netlink_sendmsg+0xa18/0xfc0 [ 61.618527] ? sock_sendmsg+0xd5/0x120 [ 61.622501] ? ___sys_sendmsg+0x7fd/0x930 [ 61.626652] ? __x64_sys_sendmsg+0x78/0xb0 [ 61.630890] ? do_syscall_64+0x1b9/0x820 [ 61.634971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 61.640423] ? mark_held_locks+0xc9/0x160 [ 61.644605] ? lock_acquire+0x1e4/0x4f0 [ 61.648584] ? tipc_nl_sk_walk+0x60a/0xd30 [ 61.652821] ? tipc_nl_sk_walk+0x311/0xd30 [ 61.657074] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 61.662454] ? skb_put+0x17b/0x1e0 [ 61.666110] ? __nlmsg_put+0x14c/0x1b0 [ 61.670010] __tipc_add_sock_diag+0x22f/0x360 [ 61.674719] tipc_nl_sk_walk+0x68d/0xd30 [ 61.678788] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 61.684070] ? __tipc_nl_add_sk+0x400/0x400 [ 61.688394] ? skb_scrub_packet+0x490/0x490 [ 61.692726] ? kasan_check_write+0x14/0x20 [ 61.696964] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 61.701904] ? lock_downgrade+0x8f0/0x8f0 [ 61.706065] tipc_diag_dump+0x24/0x30 [ 61.709871] netlink_dump+0x519/0xd50 [ 61.713687] ? netlink_broadcast+0x50/0x50 [ 61.717932] __netlink_dump_start+0x4f1/0x6f0 [ 61.722436] ? kasan_check_read+0x11/0x20 [ 61.726600] tipc_sock_diag_handler_dump+0x234/0x340 [ 61.731710] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 61.736380] ? tipc_unregister_sysctl+0x20/0x20 [ 61.741058] ? netlink_deliver_tap+0x356/0xfb0 [ 61.745650] sock_diag_rcv_msg+0x31d/0x410 [ 61.750345] netlink_rcv_skb+0x172/0x440 [ 61.754408] ? sock_diag_bind+0x80/0x80 [ 61.758383] ? netlink_ack+0xbe0/0xbe0 [ 61.762275] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 61.766959] sock_diag_rcv+0x2a/0x40 [ 61.770684] netlink_unicast+0x5a0/0x760 [ 61.774749] ? netlink_attachskb+0x9a0/0x9a0 [ 61.779160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 61.784703] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 61.789727] netlink_sendmsg+0xa18/0xfc0 [ 61.793797] ? netlink_unicast+0x760/0x760 [ 61.798052] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 61.802988] ? apparmor_socket_sendmsg+0x29/0x30 [ 61.807752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 61.813296] ? security_socket_sendmsg+0x94/0xc0 [ 61.818052] ? netlink_unicast+0x760/0x760 [ 61.822296] sock_sendmsg+0xd5/0x120 [ 61.826025] ___sys_sendmsg+0x7fd/0x930 [ 61.830002] ? __switch_to_asm+0x40/0x70 [ 61.834068] ? __switch_to_asm+0x40/0x70 [ 61.838168] ? copy_msghdr_from_user+0x580/0x580 [ 61.842965] ? __sched_text_start+0x8/0x8 [ 61.847122] ? __fget_light+0x2f7/0x440 [ 61.851110] ? fget_raw+0x20/0x20 [ 61.854572] ? __fd_install+0x2db/0x880 [ 61.858555] ? get_unused_fd_flags+0x1a0/0x1a0 [ 61.863150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 61.868721] ? sockfd_lookup_light+0xc5/0x160 [ 61.873222] __sys_sendmsg+0x11d/0x290 [ 61.877140] ? __ia32_sys_shutdown+0x80/0x80 [ 61.881576] ? do_syscall_64+0x6be/0x820 [ 61.885639] ? trace_hardirqs_on+0x2c0/0x2c0 [ 61.890051] ? __x64_sys_futex+0x47f/0x6a0 [ 61.894289] ? do_syscall_64+0x9a/0x820 [ 61.898274] ? do_syscall_64+0x9a/0x820 [ 61.902264] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 61.907372] ? trace_hardirqs_off+0xb8/0x2b0 [ 61.911787] __x64_sys_sendmsg+0x78/0xb0 [ 61.915857] do_syscall_64+0x1b9/0x820 [ 61.919750] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 61.925117] ? syscall_return_slowpath+0x5e0/0x5e0 [ 61.930056] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 61.935074] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 61.940090] ? recalc_sigpending_tsk+0x180/0x180 [ 61.944847] ? kasan_check_write+0x14/0x20 [ 61.949086] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 61.953954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 61.959150] RIP: 0033:0x457099 [ 61.962345] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 61.981333] RSP: 002b:00007f075a910c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 61.989066] RAX: ffffffffffffffda RBX: 00007f075a9116d4 RCX: 0000000000457099 [ 61.996343] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 62.003630] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 62.010894] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 62.018185] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000001 [ 62.025463] [ 62.027108] Allocated by task 5126: [ 62.030753] save_stack+0x43/0xd0 [ 62.034205] kasan_kmalloc+0xc4/0xe0 [ 62.037929] kmem_cache_alloc_trace+0x152/0x730 [ 62.042601] tipc_group_create+0x155/0xa70 [ 62.046843] tipc_setsockopt+0x2d1/0xd70 [ 62.050909] __sys_setsockopt+0x1c5/0x3b0 [ 62.055055] __x64_sys_setsockopt+0xbe/0x150 [ 62.059466] do_syscall_64+0x1b9/0x820 [ 62.063352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 62.068535] [ 62.070158] Freed by task 5125: [ 62.073450] save_stack+0x43/0xd0 [ 62.076913] __kasan_slab_free+0x11a/0x170 [ 62.081147] kasan_slab_free+0xe/0x10 [ 62.084945] kfree+0xd9/0x210 [ 62.088052] tipc_group_delete+0x2e5/0x3f0 [ 62.092313] tipc_sk_leave+0x113/0x220 [ 62.096211] tipc_release+0x14e/0x12b0 [ 62.100105] __sock_release+0xd7/0x250 [ 62.104027] sock_close+0x19/0x20 [ 62.107482] __fput+0x38a/0xa40 [ 62.110758] ____fput+0x15/0x20 [ 62.114042] task_work_run+0x1e8/0x2a0 [ 62.117933] exit_to_usermode_loop+0x318/0x380 [ 62.122514] do_syscall_64+0x6be/0x820 [ 62.126423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 62.131605] [ 62.133230] The buggy address belongs to the object at ffff8801ce4a1c00 [ 62.133230] which belongs to the cache kmalloc-192 of size 192 [ 62.145899] The buggy address is located 92 bytes inside of [ 62.145899] 192-byte region [ffff8801ce4a1c00, ffff8801ce4a1cc0) [ 62.157682] The buggy address belongs to the page: [ 62.162610] page:ffffea0007392840 count:1 mapcount:0 mapping:ffff8801dac00040 index:0x0 [ 62.170762] flags: 0x2fffc0000000100(slab) [ 62.175055] raw: 02fffc0000000100 ffffea00073926c8 ffffea0007392b48 ffff8801dac00040 [ 62.182983] raw: 0000000000000000 ffff8801ce4a1000 0000000100000010 0000000000000000 [ 62.190860] page dumped because: kasan: bad access detected [ 62.196566] [ 62.198187] Memory state around the buggy address: [ 62.203111] ffff8801ce4a1b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.210470] ffff8801ce4a1b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.217825] >ffff8801ce4a1c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.225178] ^ [ 62.231410] ffff8801ce4a1c80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.238764] ffff8801ce4a1d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.246113] ================================================================== [ 62.253464] Disabling lock debugging due to kernel taint [ 62.258974] Kernel panic - not syncing: panic_on_warn set ... [ 62.258974] [ 62.266344] CPU: 1 PID: 5127 Comm: syz-executor0 Tainted: G B 4.19.0-rc1+ #218 [ 62.275008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.284360] Call Trace: [ 62.286966] dump_stack+0x1c9/0x2b4 [ 62.290592] ? dump_stack_print_info.cold.2+0x52/0x52 [ 62.295785] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 62.300543] panic+0x238/0x4e7 [ 62.303731] ? add_taint.cold.5+0x16/0x16 [ 62.307903] ? trace_hardirqs_on+0xb4/0x2c0 [ 62.312218] ? trace_hardirqs_on+0x9a/0x2c0 [ 62.316563] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 62.321691] kasan_end_report+0x47/0x4f [ 62.325675] kasan_report.cold.7+0x76/0x30d [ 62.329996] __asan_report_load4_noabort+0x14/0x20 [ 62.334927] tipc_group_fill_sock_diag+0x7b9/0x84b [ 62.339855] ? tipc_group_member_evt+0xe30/0xe30 [ 62.344613] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 62.349625] ? skb_put+0x17b/0x1e0 [ 62.353160] ? memset+0x31/0x40 [ 62.356435] ? memcpy+0x45/0x50 [ 62.359711] ? __nla_put+0x37/0x40 [ 62.363272] ? nla_put+0x11a/0x150 [ 62.366825] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 62.371490] ? tipc_diag_dump+0x30/0x30 [ 62.375464] ? tipc_getname+0x7f0/0x7f0 [ 62.379437] ? save_stack+0xa9/0xd0 [ 62.383062] ? save_stack+0x43/0xd0 [ 62.386683] ? kasan_kmalloc+0xc4/0xe0 [ 62.390564] ? __kmalloc_node_track_caller+0x47/0x70 [ 62.395691] ? graph_lock+0x170/0x170 [ 62.399498] ? __netlink_dump_start+0x4f1/0x6f0 [ 62.404163] ? sock_diag_rcv_msg+0x31d/0x410 [ 62.408565] ? netlink_rcv_skb+0x172/0x440 [ 62.412797] ? sock_diag_rcv+0x2a/0x40 [ 62.416684] ? netlink_unicast+0x5a0/0x760 [ 62.420911] ? netlink_sendmsg+0xa18/0xfc0 [ 62.425142] ? sock_sendmsg+0xd5/0x120 [ 62.429032] ? ___sys_sendmsg+0x7fd/0x930 [ 62.433177] ? __x64_sys_sendmsg+0x78/0xb0 [ 62.437413] ? do_syscall_64+0x1b9/0x820 [ 62.441472] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 62.446830] ? mark_held_locks+0xc9/0x160 [ 62.450982] ? lock_acquire+0x1e4/0x4f0 [ 62.454962] ? tipc_nl_sk_walk+0x60a/0xd30 [ 62.459201] ? tipc_nl_sk_walk+0x311/0xd30 [ 62.463439] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 62.468449] ? skb_put+0x17b/0x1e0 [ 62.471988] ? __nlmsg_put+0x14c/0x1b0 [ 62.475887] __tipc_add_sock_diag+0x22f/0x360 [ 62.480414] tipc_nl_sk_walk+0x68d/0xd30 [ 62.484480] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 62.489779] ? __tipc_nl_add_sk+0x400/0x400 [ 62.494110] ? skb_scrub_packet+0x490/0x490 [ 62.498432] ? kasan_check_write+0x14/0x20 [ 62.502665] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 62.507594] ? lock_downgrade+0x8f0/0x8f0 [ 62.511742] tipc_diag_dump+0x24/0x30 [ 62.515541] netlink_dump+0x519/0xd50 [ 62.519341] ? netlink_broadcast+0x50/0x50 [ 62.523580] __netlink_dump_start+0x4f1/0x6f0 [ 62.528074] ? kasan_check_read+0x11/0x20 [ 62.532219] tipc_sock_diag_handler_dump+0x234/0x340 [ 62.537333] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 62.542003] ? tipc_unregister_sysctl+0x20/0x20 [ 62.546675] ? netlink_deliver_tap+0x356/0xfb0 [ 62.551267] sock_diag_rcv_msg+0x31d/0x410 [ 62.555506] netlink_rcv_skb+0x172/0x440 [ 62.559579] ? sock_diag_bind+0x80/0x80 [ 62.563547] ? netlink_ack+0xbe0/0xbe0 [ 62.567435] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 62.572105] sock_diag_rcv+0x2a/0x40 [ 62.575817] netlink_unicast+0x5a0/0x760 [ 62.579877] ? netlink_attachskb+0x9a0/0x9a0 [ 62.584287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 62.589933] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 62.594970] netlink_sendmsg+0xa18/0xfc0 [ 62.599058] ? netlink_unicast+0x760/0x760 [ 62.603316] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 62.608264] ? apparmor_socket_sendmsg+0x29/0x30 [ 62.613034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 62.618568] ? security_socket_sendmsg+0x94/0xc0 [ 62.623322] ? netlink_unicast+0x760/0x760 [ 62.627584] sock_sendmsg+0xd5/0x120 [ 62.631299] ___sys_sendmsg+0x7fd/0x930 [ 62.635273] ? __switch_to_asm+0x40/0x70 [ 62.639329] ? __switch_to_asm+0x40/0x70 [ 62.643597] ? copy_msghdr_from_user+0x580/0x580 [ 62.648749] ? __sched_text_start+0x8/0x8 [ 62.653151] ? __fget_light+0x2f7/0x440 [ 62.657122] ? fget_raw+0x20/0x20 [ 62.660585] ? __fd_install+0x2db/0x880 [ 62.664560] ? get_unused_fd_flags+0x1a0/0x1a0 [ 62.669183] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 62.674728] ? sockfd_lookup_light+0xc5/0x160 [ 62.679220] __sys_sendmsg+0x11d/0x290 [ 62.683113] ? __ia32_sys_shutdown+0x80/0x80 [ 62.687520] ? do_syscall_64+0x6be/0x820 [ 62.691579] ? trace_hardirqs_on+0x2c0/0x2c0 [ 62.695985] ? __x64_sys_futex+0x47f/0x6a0 [ 62.700221] ? do_syscall_64+0x9a/0x820 [ 62.704199] ? do_syscall_64+0x9a/0x820 [ 62.708181] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 62.713277] ? trace_hardirqs_off+0xb8/0x2b0 [ 62.717686] __x64_sys_sendmsg+0x78/0xb0 [ 62.721748] do_syscall_64+0x1b9/0x820 [ 62.725635] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 62.731284] ? syscall_return_slowpath+0x5e0/0x5e0 [ 62.736213] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 62.741246] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 62.746275] ? recalc_sigpending_tsk+0x180/0x180 [ 62.751464] ? kasan_check_write+0x14/0x20 [ 62.755699] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 62.760542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 62.765730] RIP: 0033:0x457099 [ 62.769052] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 62.787950] RSP: 002b:00007f075a910c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 62.795663] RAX: ffffffffffffffda RBX: 00007f075a9116d4 RCX: 0000000000457099 [ 62.802924] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 62.810189] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 62.817455] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 62.824720] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000001 [ 62.832279] Dumping ftrace buffer: [ 62.835802] (ftrace buffer empty) [ 62.839487] Kernel Offset: disabled [ 62.843102] Rebooting in 86400 seconds..