./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1099769985 <...> forked to background, child pid 3182 no interfaces have a carrier [ 21.853917][ T3183] 8021q: adding VLAN 0 to HW filter on device bond0 [ 21.864060][ T3183] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.83' (ECDSA) to the list of known hosts. execve("./syz-executor1099769985", ["./syz-executor1099769985"], 0x7ffec11dc010 /* 10 vars */) = 0 brk(NULL) = 0x555556775000 brk(0x555556775c40) = 0x555556775c40 arch_prctl(ARCH_SET_FS, 0x555556775300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor1099769985", 4096) = 28 brk(0x555556796c40) = 0x555556796c40 brk(0x555556797000) = 0x555556797000 mprotect(0x7f3784112000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 openat(AT_FDCWD, "/sys/kernel/debug/failslab/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_futex/ignore-private", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/min-order", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4 sendto(4, [{nlmsg_len=36, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=680, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=3604}, "\x01\x02\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00\x06\x00\x01\x00\x1c\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x25\x00\x00\x00\x48\x02\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x05\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x03\x00"...], 4096, 0, NULL, NULL) = 680 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3604}, {error=0, msg={nlmsg_len=36, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 access("/proc/net", R_OK) = 0 access("/proc/net/unix", R_OK) = 0 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0b\x00\x00\x00\x06\x00\x0a\x00\xa0\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3604}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x00\x00\x00\x00\x0b\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0c\x00\x01\x00\x02\x00\xaa\xaa\xaa\xaa\xaa\xaa"], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3604}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 sendto(3, [{nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=0, ifi_flags=0, ifi_change=0}, [[{nla_len=11, nla_type=IFLA_IFNAME}, "lowpan0"...], [{nla_len=16, nla_type=IFLA_LINKINFO}, [{nla_len=10, nla_type=IFLA_INFO_KIND}, "lowpan"...]], [{nla_len=8, nla_type=IFLA_LINK}, 11]]], 68, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 68 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3604}, {error=0, msg={nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0c\x00\x00\x00\x06\x00\x0a\x00\xa1\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3604}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=if_nametoindex("wpan1"), ifi_flags=IFF_UP, ifi_change=0x1}, [{nla_len=12, nla_type=IFLA_ADDRESS}, 02:01:aa:aa:aa:aa:aa]], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=3604}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 close(3) = 0 close(4) = 0 openat(AT_FDCWD, "/dev/dri/card0", O_RDONLY) = 3 ioctl(3, DRM_IOCTL_MODE_CREATE_DUMB, 0x20000100) = 0 openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 4 write(4, "4", 1) = 1 mmap(0x20ffc000, 12328, PROT_NONE, MAP_PRIVATE|MAP_FIXED, 3, 0x100000000) = -1 ENOMEM (Cannot allocate memory) exit_group(0) = ? syzkaller login: [ 43.840543][ T3604] ================================================================== [ 43.848910][ T3604] BUG: KASAN: use-after-free in drm_gem_object_release_handle+0xf2/0x110 [ 43.857379][ T3604] Read of size 8 at addr ffff88802111a9e8 by task syz-executor109/3604 [ 43.865596][ T3604] [ 43.867899][ T3604] CPU: 0 PID: 3604 Comm: syz-executor109 Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0 [ 43.878148][ T3604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 43.888191][ T3604] Call Trace: [ 43.891452][ T3604] [ 43.894363][ T3604] dump_stack_lvl+0xcd/0x134 [ 43.898940][ T3604] print_report.cold+0x2ba/0x719 [ 43.903861][ T3604] ? drm_gem_object_release_handle+0xf2/0x110 [ 43.909907][ T3604] kasan_report+0xb1/0x1e0 [ 43.914334][ T3604] ? drm_gem_object_release_handle+0xf2/0x110 [ 43.920488][ T3604] ? drm_gem_object_handle_put_unlocked+0x390/0x390 [ 43.927056][ T3604] drm_gem_object_release_handle+0xf2/0x110 [ 43.933102][ T3604] ? drm_gem_object_handle_put_unlocked+0x390/0x390 [ 43.939671][ T3604] idr_for_each+0x113/0x220 [ 43.944155][ T3604] ? idr_find+0x50/0x50 [ 43.948288][ T3604] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 43.954093][ T3604] drm_gem_release+0x22/0x30 [ 43.958664][ T3604] drm_file_free.part.0+0x805/0xb80 [ 43.963843][ T3604] ? fsnotify+0x1680/0x1680 [ 43.968325][ T3604] drm_close_helper.isra.0+0x17d/0x1f0 [ 43.973763][ T3604] drm_release+0x1e6/0x530 [ 43.978173][ T3604] __fput+0x277/0x9d0 [ 43.982140][ T3604] ? drm_release_noglobal+0x180/0x180 [ 43.987507][ T3604] task_work_run+0xdd/0x1a0 [ 43.992166][ T3604] do_exit+0xad5/0x29b0 [ 43.996301][ T3604] ? mm_update_next_owner+0x7a0/0x7a0 [ 44.001648][ T3604] ? _raw_spin_unlock_irq+0x1f/0x40 [ 44.006829][ T3604] ? _raw_spin_unlock_irq+0x1f/0x40 [ 44.012016][ T3604] do_group_exit+0xd2/0x2f0 [ 44.016500][ T3604] __x64_sys_exit_group+0x3a/0x50 [ 44.021498][ T3604] do_syscall_64+0x35/0xb0 [ 44.025895][ T3604] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 44.031774][ T3604] RIP: 0033:0x7f37840a2009 [ 44.036171][ T3604] Code: Unable to access opcode bytes at RIP 0x7f37840a1fdf. [ 44.043535][ T3604] RSP: 002b:00007ffe21d2a3f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 44.051927][ T3604] RAX: ffffffffffffffda RBX: 00007f37841183f0 RCX: 00007f37840a2009 [ 44.059879][ T3604] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 44.067830][ T3604] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000100000000 [ 44.075826][ T3604] R10: 0000000000000012 R11: 0000000000000246 R12: 00007f37841183f0 [ 44.083775][ T3604] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 44.091735][ T3604] [ 44.094739][ T3604] [ 44.097039][ T3604] Allocated by task 3604: [ 44.101337][ T3604] kasan_save_stack+0x1e/0x40 [ 44.105996][ T3604] __kasan_kmalloc+0xa9/0xd0 [ 44.110564][ T3604] vgem_gem_create_object+0x38/0xb0 [ 44.115743][ T3604] __drm_gem_shmem_create+0x80/0x480 [ 44.121007][ T3604] drm_gem_shmem_dumb_create+0x13c/0x380 [ 44.126614][ T3604] drm_mode_create_dumb+0x26c/0x2f0 [ 44.131792][ T3604] drm_ioctl_kernel+0x27d/0x4e0 [ 44.136626][ T3604] drm_ioctl+0x51e/0x9d0 [ 44.140846][ T3604] __x64_sys_ioctl+0x193/0x200 [ 44.145587][ T3604] do_syscall_64+0x35/0xb0 [ 44.149997][ T3604] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 44.155870][ T3604] [ 44.158169][ T3604] Freed by task 3604: [ 44.162122][ T3604] kasan_save_stack+0x1e/0x40 [ 44.166775][ T3604] kasan_set_track+0x21/0x30 [ 44.171339][ T3604] kasan_set_free_info+0x20/0x30 [ 44.176253][ T3604] ____kasan_slab_free+0x166/0x1c0 [ 44.181338][ T3604] slab_free_freelist_hook+0x8b/0x1c0 [ 44.186685][ T3604] kfree+0xe2/0x580 [ 44.190473][ T3604] drm_gem_mmap+0x4fc/0x770 [ 44.194950][ T3604] mmap_region+0xbff/0x1460 [ 44.199431][ T3604] do_mmap+0x863/0xfa0 [ 44.203477][ T3604] vm_mmap_pgoff+0x1ab/0x270 [ 44.208044][ T3604] ksys_mmap_pgoff+0x41b/0x5a0 [ 44.212789][ T3604] do_syscall_64+0x35/0xb0 [ 44.217188][ T3604] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 44.223062][ T3604] [ 44.225360][ T3604] The buggy address belongs to the object at ffff88802111a800 [ 44.225360][ T3604] which belongs to the cache kmalloc-1k of size 1024 [ 44.239393][ T3604] The buggy address is located 488 bytes inside of [ 44.239393][ T3604] 1024-byte region [ffff88802111a800, ffff88802111ac00) [ 44.252731][ T3604] [ 44.255030][ T3604] The buggy address belongs to the physical page: [ 44.261413][ T3604] page:ffffea0000844600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21118 [ 44.271537][ T3604] head:ffffea0000844600 order:3 compound_mapcount:0 compound_pincount:0 [ 44.279838][ T3604] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 44.287796][ T3604] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff888011841dc0 [ 44.296363][ T3604] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 44.304919][ T3604] page dumped because: kasan: bad access detected [ 44.311304][ T3604] page_owner tracks the page as allocated [ 44.316997][ T3604] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3599, tgid 3599 (sshd), ts 43832492930, free_ts 43805533578 [ 44.337649][ T3604] get_page_from_freelist+0x109b/0x2ce0 [ 44.343183][ T3604] __alloc_pages+0x1c7/0x510 [ 44.347748][ T3604] alloc_pages+0x1a6/0x270 [ 44.352140][ T3604] allocate_slab+0x27e/0x3d0 [ 44.356708][ T3604] ___slab_alloc+0x7f1/0xe10 [ 44.361292][ T3604] __slab_alloc.constprop.0+0x4d/0xa0 [ 44.366640][ T3604] __kmalloc_node_track_caller+0x2f2/0x380 [ 44.372427][ T3604] __alloc_skb+0xd9/0x2f0 [ 44.376907][ T3604] tcp_stream_alloc_skb+0x38/0x580 [ 44.381996][ T3604] tcp_sendmsg_locked+0xc36/0x2f80 [ 44.387107][ T3604] tcp_sendmsg+0x2b/0x40 [ 44.391337][ T3604] inet_sendmsg+0x99/0xe0 [ 44.395644][ T3604] sock_sendmsg+0xcf/0x120 [ 44.400037][ T3604] sock_write_iter+0x291/0x3d0 [ 44.404775][ T3604] vfs_write+0x9e9/0xdd0 [ 44.408998][ T3604] ksys_write+0x1e8/0x250 [ 44.413306][ T3604] page last free stack trace: [ 44.417952][ T3604] free_pcp_prepare+0x5e4/0xd20 [ 44.422869][ T3604] free_unref_page+0x19/0x4d0 [ 44.427612][ T3604] __unfreeze_partials+0x17c/0x1a0 [ 44.432704][ T3604] qlist_free_all+0x6a/0x170 [ 44.437271][ T3604] kasan_quarantine_reduce+0x180/0x200 [ 44.442706][ T3604] __kasan_slab_alloc+0xa2/0xc0 [ 44.447533][ T3604] kmem_cache_alloc_trace+0x2c0/0x3e0 [ 44.452899][ T3604] apparmor_sk_alloc_security+0x84/0x150 [ 44.458507][ T3604] security_sk_alloc+0x50/0xb0 [ 44.463265][ T3604] sk_prot_alloc+0x161/0x290 [ 44.467850][ T3604] sk_alloc+0x36/0x770 [ 44.471914][ T3604] __netlink_create+0x63/0x380 [ 44.476656][ T3604] netlink_create+0x3ad/0x5e0 [ 44.481307][ T3604] __sock_create+0x355/0x790 [ 44.485871][ T3604] __sys_socket+0x12f/0x240 [ 44.490368][ T3604] __x64_sys_socket+0x6f/0xb0 [ 44.495022][ T3604] [ 44.497322][ T3604] Memory state around the buggy address: [ 44.502945][ T3604] ffff88802111a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.510998][ T3604] ffff88802111a900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.519038][ T3604] >ffff88802111a980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.527086][ T3604] ^ [ 44.534516][ T3604] ffff88802111aa00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.542569][ T3604] ffff88802111aa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.550609][ T3604] ================================================================== [ 44.559317][ T3604] Kernel panic - not syncing: panic_on_warn set ... [ 44.565918][ T3604] CPU: 0 PID: 3604 Comm: syz-executor109 Not tainted 5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0 [ 44.576096][ T3604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 44.586147][ T3604] Call Trace: [ 44.589403][ T3604] [ 44.592317][ T3604] dump_stack_lvl+0xcd/0x134 [ 44.596890][ T3604] panic+0x2c8/0x627 [ 44.600761][ T3604] ? panic_print_sys_info.part.0+0x10b/0x10b [ 44.606721][ T3604] ? preempt_schedule_common+0x59/0xc0 [ 44.612177][ T3604] ? preempt_schedule_thunk+0x16/0x18 [ 44.617532][ T3604] ? drm_gem_object_release_handle+0xf2/0x110 [ 44.623578][ T3604] end_report.part.0+0x3f/0x7c [ 44.628322][ T3604] kasan_report.cold+0xa/0xf [ 44.632894][ T3604] ? drm_gem_object_release_handle+0xf2/0x110 [ 44.638938][ T3604] ? drm_gem_object_handle_put_unlocked+0x390/0x390 [ 44.645504][ T3604] drm_gem_object_release_handle+0xf2/0x110 [ 44.651389][ T3604] ? drm_gem_object_handle_put_unlocked+0x390/0x390 [ 44.657959][ T3604] idr_for_each+0x113/0x220 [ 44.662448][ T3604] ? idr_find+0x50/0x50 [ 44.666581][ T3604] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 44.672368][ T3604] drm_gem_release+0x22/0x30 [ 44.676939][ T3604] drm_file_free.part.0+0x805/0xb80 [ 44.682115][ T3604] ? fsnotify+0x1680/0x1680 [ 44.686596][ T3604] drm_close_helper.isra.0+0x17d/0x1f0 [ 44.692032][ T3604] drm_release+0x1e6/0x530 [ 44.696424][ T3604] __fput+0x277/0x9d0 [ 44.700382][ T3604] ? drm_release_noglobal+0x180/0x180 [ 44.705731][ T3604] task_work_run+0xdd/0x1a0 [ 44.710228][ T3604] do_exit+0xad5/0x29b0 [ 44.714370][ T3604] ? mm_update_next_owner+0x7a0/0x7a0 [ 44.719721][ T3604] ? _raw_spin_unlock_irq+0x1f/0x40 [ 44.724901][ T3604] ? _raw_spin_unlock_irq+0x1f/0x40 [ 44.730076][ T3604] do_group_exit+0xd2/0x2f0 [ 44.734557][ T3604] __x64_sys_exit_group+0x3a/0x50 [ 44.739559][ T3604] do_syscall_64+0x35/0xb0 [ 44.743956][ T3604] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 44.749829][ T3604] RIP: 0033:0x7f37840a2009 [ 44.754243][ T3604] Code: Unable to access opcode bytes at RIP 0x7f37840a1fdf. [ 44.761584][ T3604] RSP: 002b:00007ffe21d2a3f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 44.769972][ T3604] RAX: ffffffffffffffda RBX: 00007f37841183f0 RCX: 00007f37840a2009 [ 44.777926][ T3604] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 44.785894][ T3604] RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000100000000 [ 44.793845][ T3604] R10: 0000000000000012 R11: 0000000000000246 R12: 00007f37841183f0 [ 44.801796][ T3604] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 44.809750][ T3604] [ 44.813303][ T3604] Kernel Offset: disabled [ 44.817616][ T3604] Rebooting in 86400 seconds..