[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 17.575497] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 18.046926] random: sshd: uninitialized urandom read (32 bytes read) [ 18.368532] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 19.186777] random: sshd: uninitialized urandom read (32 bytes read) [ 19.345473] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.45' (ECDSA) to the list of known hosts. [ 24.883497] random: sshd: uninitialized urandom read (32 bytes read) net.ipv6.conf.syz_tun.accept_dad = 0 [ 24.978080] IPVS: ftp: loaded support on port[0] = 21 net.ipv6.conf.syz_tun.router_solicitations = 0 [ 25.174678] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.181137] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.188734] device bridge_slave_0 entered promiscuous mode [ 25.205338] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.211745] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.218863] device bridge_slave_1 entered promiscuous mode [ 25.234043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 25.250303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 25.291163] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 25.308836] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 25.370452] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 25.378504] team0: Port device team_slave_0 added [ 25.392980] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 25.400429] team0: Port device team_slave_1 added [ 25.415622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 25.433888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 25.451113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.467661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 25.585149] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.591605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.598537] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.605051] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 26.017994] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 26.024115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.067614] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 26.110465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.118728] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 26.158812] 8021q: adding VLAN 0 to HW filter on device team0 executing program [ 26.386980] ================================================================== [ 26.394464] BUG: KASAN: slab-out-of-bounds in ipv6_gso_pull_exthdrs+0x53e/0x5d0 [ 26.401893] Read of size 1 at addr ffff8801d20c84c1 by task syz-executor587/4527 [ 26.409403] [ 26.411034] CPU: 0 PID: 4527 Comm: syz-executor587 Not tainted 4.17.0+ #84 [ 26.418031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 26.427364] Call Trace: [ 26.429939] dump_stack+0x1b9/0x294 [ 26.433557] ? dump_stack_print_info.cold.2+0x52/0x52 [ 26.438725] ? printk+0x9e/0xba [ 26.441985] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 26.446738] ? kasan_check_write+0x14/0x20 [ 26.450961] print_address_description+0x6c/0x20b [ 26.455793] ? ipv6_gso_pull_exthdrs+0x53e/0x5d0 [ 26.460529] kasan_report.cold.7+0x242/0x2fe [ 26.464922] __asan_report_load1_noabort+0x14/0x20 [ 26.469833] ipv6_gso_pull_exthdrs+0x53e/0x5d0 [ 26.474398] ? ip4ip6_gro_receive+0x100/0x100 [ 26.478876] ? graph_lock+0x170/0x170 [ 26.482670] ipv6_gso_segment+0x372/0x11c0 [ 26.486886] ? napi_busy_loop+0xb68/0xd40 [ 26.491034] ? sit_ip6ip6_gro_receive+0x100/0x100 [ 26.495856] ? kasan_check_read+0x11/0x20 [ 26.499997] ? rcu_is_watching+0x85/0x140 [ 26.504131] ? rcu_report_qs_rnp+0x790/0x790 [ 26.508531] ? skb_network_protocol+0xfc/0x4c0 [ 26.513105] skb_mac_gso_segment+0x3ad/0x720 [ 26.517493] ? __lock_acquire+0x7f5/0x5140 [ 26.521719] ? sit_ip6ip6_gro_receive+0x100/0x100 [ 26.526556] ? skb_network_protocol+0x4c0/0x4c0 [ 26.531209] ? lock_acquire+0x1dc/0x520 [ 26.535167] ? skb_mac_gso_segment+0x221/0x720 [ 26.539734] nsh_gso_segment+0x470/0xb40 [ 26.543779] skb_mac_gso_segment+0x3ad/0x720 [ 26.548166] ? nsh_pop+0x500/0x500 [ 26.551697] ? skb_network_protocol+0x4c0/0x4c0 [ 26.556349] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 26.561520] ? skb_network_protocol+0xfc/0x4c0 [ 26.566081] ? sock_sendmsg+0xd5/0x120 [ 26.569949] ? __sys_sendto+0x3d7/0x670 [ 26.573903] ? __x64_sys_sendto+0xe1/0x1a0 [ 26.578118] ? do_syscall_64+0x1b1/0x800 [ 26.582160] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 26.587332] __skb_gso_segment+0x3bb/0x870 [ 26.591557] ? skb_mac_gso_segment+0x720/0x720 [ 26.596129] ? lock_acquire+0x1dc/0x520 [ 26.600082] ? __dev_queue_xmit+0x323/0x3900 [ 26.604474] validate_xmit_skb+0x638/0xf20 [ 26.608691] ? netif_skb_features+0xb40/0xb40 [ 26.613170] __dev_queue_xmit+0xc0c/0x3900 [ 26.617390] ? netdev_pick_tx+0x2d0/0x2d0 [ 26.621519] ? print_usage_bug+0xc0/0xc0 [ 26.625562] ? skb_scrub_packet+0x580/0x580 [ 26.629874] ? debug_check_no_locks_freed+0x310/0x310 [ 26.635054] ? graph_lock+0x170/0x170 [ 26.638839] ? debug_check_no_locks_freed+0x310/0x310 [ 26.644022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 26.649544] ? refcount_add_not_zero+0x216/0x320 [ 26.654281] ? find_held_lock+0x36/0x1c0 [ 26.658326] ? lock_downgrade+0x8e0/0x8e0 [ 26.662458] ? lock_release+0xa10/0xa10 [ 26.666413] ? check_same_owner+0x320/0x320 [ 26.670729] ? skb_set_owner_w+0x24e/0x360 [ 26.674950] ? kasan_check_write+0x14/0x20 [ 26.679173] ? copyin+0xb7/0x100 [ 26.682522] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 26.687520] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 26.692527] ? __check_object_size+0x95/0x5d9 [ 26.697006] ? usercopy_warn+0x120/0x120 [ 26.701067] ? _copy_from_iter_nocache+0x1040/0x1040 [ 26.706152] ? _copy_from_iter_full+0x2b0/0xd10 [ 26.710804] ? kasan_check_read+0x11/0x20 [ 26.714933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 26.720452] ? skb_copy_datagram_from_iter+0x451/0x660 [ 26.725719] ? iov_iter_advance+0x14c0/0x14c0 [ 26.730204] dev_queue_xmit+0x17/0x20 [ 26.733993] ? dev_queue_xmit+0x17/0x20 [ 26.737950] packet_sendmsg+0x4275/0x6100 [ 26.742078] ? __local_bh_enable_ip+0x161/0x230 [ 26.746727] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 26.751726] ? release_sock+0x1e2/0x2b0 [ 26.755691] ? __local_bh_enable_ip+0x161/0x230 [ 26.760345] ? __release_sock+0x391/0x3a0 [ 26.764477] ? packet_getname+0x5f0/0x5f0 [ 26.768604] ? packet_setsockopt+0x839/0x22a0 [ 26.773081] ? __thp_get_unmapped_area+0x180/0x180 [ 26.777990] ? __sys_socket+0x16f/0x250 [ 26.781956] ? __x64_sys_socket+0x73/0xb0 [ 26.786093] ? do_syscall_64+0x1b1/0x800 [ 26.790142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 26.795488] ? graph_lock+0x170/0x170 [ 26.799270] ? packet_sendmsg_spkt+0x1640/0x1640 [ 26.804024] ? lock_acquire+0x1dc/0x520 [ 26.808012] ? find_held_lock+0x36/0x1c0 [ 26.812073] ? lock_downgrade+0x8e0/0x8e0 [ 26.816204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 26.821731] ? check_same_owner+0x320/0x320 [ 26.826050] ? __check_object_size+0x95/0x5d9 [ 26.830537] ? __might_sleep+0x95/0x190 [ 26.834503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 26.840029] ? security_socket_sendmsg+0x94/0xc0 [ 26.844772] ? packet_getname+0x5f0/0x5f0 [ 26.848911] sock_sendmsg+0xd5/0x120 [ 26.852609] __sys_sendto+0x3d7/0x670 [ 26.856392] ? __ia32_sys_getpeername+0xb0/0xb0 [ 26.861057] ? fget_raw+0x20/0x20 [ 26.864505] ? lock_downgrade+0x8e0/0x8e0 [ 26.868811] ? handle_mm_fault+0x8c0/0xc70 [ 26.873039] ? handle_mm_fault+0x55a/0xc70 [ 26.877292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 26.882829] ? kernel_accept+0x310/0x310 [ 26.886878] ? mm_fault_error+0x380/0x380 [ 26.891018] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 26.895872] __x64_sys_sendto+0xe1/0x1a0 [ 26.899921] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 26.904941] do_syscall_64+0x1b1/0x800 [ 26.908817] ? syscall_return_slowpath+0x5c0/0x5c0 [ 26.913733] ? syscall_return_slowpath+0x30f/0x5c0 [ 26.918655] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 26.924009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 26.928845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 26.934028] RIP: 0033:0x441639 [ 26.937201] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 26.956378] RSP: 002b:00007ffe5743de08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c [ 26.964069] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000441639 [ 26.971320] RDX: 0000000000000013 RSI: 00000000200016c0 RDI: 0000000000000003 [ 26.978579] RBP: 00000000006cd018 R08: 00000000200000c0 R09: 000000000000001c [ 26.985874] R10: 0000000000000000 R11: 0000000000000216 R12: 0000000000402390 [ 26.993125] R13: 0000000000402420 R14: 0000000000000000 R15: 0000000000000000 [ 27.000392] [ 27.002003] Allocated by task 1: [ 27.005361] save_stack+0x43/0xd0 [ 27.008797] kasan_kmalloc+0xc4/0xe0 [ 27.012517] kmem_cache_alloc_trace+0x152/0x780 [ 27.017171] wbt_init+0x95/0x690 [ 27.020517] wbt_enable_default+0xba/0xe0 [ 27.024644] blk_register_queue+0x2d2/0x8c0 [ 27.028963] __device_add_disk+0xe3b/0x1340 [ 27.033264] device_add_disk+0x22/0x30 [ 27.037139] nbd_dev_add+0x7c4/0xa40 [ 27.040831] nbd_init+0x20e/0x22f [ 27.044267] do_one_initcall+0x127/0x913 [ 27.048320] kernel_init_freeable+0x49b/0x58e [ 27.052796] kernel_init+0x11/0x1b3 [ 27.056405] ret_from_fork+0x3a/0x50 [ 27.060093] [ 27.061697] Freed by task 0: [ 27.064691] (stack is not available) [ 27.068379] [ 27.070005] The buggy address belongs to the object at ffff8801d20c8280 [ 27.070005] which belongs to the cache kmalloc-512 of size 512 [ 27.082654] The buggy address is located 65 bytes to the right of [ 27.082654] 512-byte region [ffff8801d20c8280, ffff8801d20c8480) [ 27.094942] The buggy address belongs to the page: [ 27.099854] page:ffffea0007483200 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 27.107975] flags: 0x2fffc0000000100(slab) [ 27.112201] raw: 02fffc0000000100 ffffea000749ea48 ffffea0007483648 ffff8801da800940 [ 27.120070] raw: 0000000000000000 ffff8801d20c8000 0000000100000006 0000000000000000 [ 27.127933] page dumped because: kasan: bad access detected [ 27.133617] [ 27.135221] Memory state around the buggy address: [ 27.140130] ffff8801d20c8380: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc [ 27.148075] ffff8801d20c8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.155421] >ffff8801d20c8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.162761] ^ [ 27.168191] ffff8801d20c8500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.175544] ffff8801d20c8580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.182876] ================================================================== [ 27.190219] Disabling lock debugging due to kernel taint [ 27.195686] Kernel panic - not syncing: panic_on_warn set ... [ 27.195686] [ 27.203079] CPU: 0 PID: 4527 Comm: syz-executor587 Tainted: G B 4.17.0+ #84 [ 27.211473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 27.220808] Call Trace: [ 27.223391] dump_stack+0x1b9/0x294 [ 27.226999] ? dump_stack_print_info.cold.2+0x52/0x52 [ 27.232174] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 27.236919] ? ipv6_gso_pull_exthdrs+0x490/0x5d0 [ 27.241652] panic+0x22f/0x4de [ 27.244826] ? add_taint.cold.5+0x16/0x16 [ 27.248954] ? do_raw_spin_unlock+0x9e/0x2e0 [ 27.253339] ? do_raw_spin_unlock+0x9e/0x2e0 [ 27.257725] ? ipv6_gso_pull_exthdrs+0x53e/0x5d0 [ 27.262459] kasan_end_report+0x47/0x4f [ 27.266415] kasan_report.cold.7+0x76/0x2fe [ 27.270727] __asan_report_load1_noabort+0x14/0x20 [ 27.275643] ipv6_gso_pull_exthdrs+0x53e/0x5d0 [ 27.280208] ? ip4ip6_gro_receive+0x100/0x100 [ 27.284682] ? graph_lock+0x170/0x170 [ 27.288462] ipv6_gso_segment+0x372/0x11c0 [ 27.292673] ? napi_busy_loop+0xb68/0xd40 [ 27.296800] ? sit_ip6ip6_gro_receive+0x100/0x100 [ 27.301630] ? kasan_check_read+0x11/0x20 [ 27.305768] ? rcu_is_watching+0x85/0x140 [ 27.309893] ? rcu_report_qs_rnp+0x790/0x790 [ 27.314290] ? skb_network_protocol+0xfc/0x4c0 [ 27.318850] skb_mac_gso_segment+0x3ad/0x720 [ 27.323236] ? __lock_acquire+0x7f5/0x5140 [ 27.327459] ? sit_ip6ip6_gro_receive+0x100/0x100 [ 27.332280] ? skb_network_protocol+0x4c0/0x4c0 [ 27.336932] ? lock_acquire+0x1dc/0x520 [ 27.340886] ? skb_mac_gso_segment+0x221/0x720 [ 27.345445] nsh_gso_segment+0x470/0xb40 [ 27.349496] skb_mac_gso_segment+0x3ad/0x720 [ 27.353880] ? nsh_pop+0x500/0x500 [ 27.357399] ? skb_network_protocol+0x4c0/0x4c0 [ 27.362048] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 27.367224] ? skb_network_protocol+0xfc/0x4c0 [ 27.371782] ? sock_sendmsg+0xd5/0x120 [ 27.375665] ? __sys_sendto+0x3d7/0x670 [ 27.379615] ? __x64_sys_sendto+0xe1/0x1a0 [ 27.383844] ? do_syscall_64+0x1b1/0x800 [ 27.387883] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 27.393052] __skb_gso_segment+0x3bb/0x870 [ 27.397267] ? skb_mac_gso_segment+0x720/0x720 [ 27.401830] ? lock_acquire+0x1dc/0x520 [ 27.405782] ? __dev_queue_xmit+0x323/0x3900 [ 27.410171] validate_xmit_skb+0x638/0xf20 [ 27.414384] ? netif_skb_features+0xb40/0xb40 [ 27.418880] __dev_queue_xmit+0xc0c/0x3900 [ 27.423097] ? netdev_pick_tx+0x2d0/0x2d0 [ 27.427223] ? print_usage_bug+0xc0/0xc0 [ 27.431260] ? skb_scrub_packet+0x580/0x580 [ 27.435562] ? debug_check_no_locks_freed+0x310/0x310 [ 27.440737] ? graph_lock+0x170/0x170 [ 27.444528] ? debug_check_no_locks_freed+0x310/0x310 [ 27.449700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 27.455216] ? refcount_add_not_zero+0x216/0x320 [ 27.459960] ? find_held_lock+0x36/0x1c0 [ 27.464002] ? lock_downgrade+0x8e0/0x8e0 [ 27.468135] ? lock_release+0xa10/0xa10 [ 27.472095] ? check_same_owner+0x320/0x320 [ 27.476397] ? skb_set_owner_w+0x24e/0x360 [ 27.480618] ? kasan_check_write+0x14/0x20 [ 27.484829] ? copyin+0xb7/0x100 [ 27.488175] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 27.493179] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 27.498174] ? __check_object_size+0x95/0x5d9 [ 27.502656] ? usercopy_warn+0x120/0x120 [ 27.506707] ? _copy_from_iter_nocache+0x1040/0x1040 [ 27.511789] ? _copy_from_iter_full+0x2b0/0xd10 [ 27.516443] ? kasan_check_read+0x11/0x20 [ 27.520572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 27.526089] ? skb_copy_datagram_from_iter+0x451/0x660 [ 27.531343] ? iov_iter_advance+0x14c0/0x14c0 [ 27.535820] dev_queue_xmit+0x17/0x20 [ 27.539602] ? dev_queue_xmit+0x17/0x20 [ 27.543556] packet_sendmsg+0x4275/0x6100 [ 27.547683] ? __local_bh_enable_ip+0x161/0x230 [ 27.552332] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 27.557326] ? release_sock+0x1e2/0x2b0 [ 27.561276] ? __local_bh_enable_ip+0x161/0x230 [ 27.565927] ? __release_sock+0x391/0x3a0 [ 27.570056] ? packet_getname+0x5f0/0x5f0 [ 27.574188] ? packet_setsockopt+0x839/0x22a0 [ 27.578660] ? __thp_get_unmapped_area+0x180/0x180 [ 27.583571] ? __sys_socket+0x16f/0x250 [ 27.587533] ? __x64_sys_socket+0x73/0xb0 [ 27.591661] ? do_syscall_64+0x1b1/0x800 [ 27.595700] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 27.601045] ? graph_lock+0x170/0x170 [ 27.604833] ? packet_sendmsg_spkt+0x1640/0x1640 [ 27.609575] ? lock_acquire+0x1dc/0x520 [ 27.613530] ? find_held_lock+0x36/0x1c0 [ 27.617571] ? lock_downgrade+0x8e0/0x8e0 [ 27.621698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 27.627214] ? check_same_owner+0x320/0x320 [ 27.631513] ? __check_object_size+0x95/0x5d9 [ 27.635987] ? __might_sleep+0x95/0x190 [ 27.639952] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 27.645468] ? security_socket_sendmsg+0x94/0xc0 [ 27.650201] ? packet_getname+0x5f0/0x5f0 [ 27.654327] sock_sendmsg+0xd5/0x120 [ 27.658027] __sys_sendto+0x3d7/0x670 [ 27.661811] ? __ia32_sys_getpeername+0xb0/0xb0 [ 27.666460] ? fget_raw+0x20/0x20 [ 27.669893] ? lock_downgrade+0x8e0/0x8e0 [ 27.674033] ? handle_mm_fault+0x8c0/0xc70 [ 27.678247] ? handle_mm_fault+0x55a/0xc70 [ 27.682464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 27.687989] ? kernel_accept+0x310/0x310 [ 27.692036] ? mm_fault_error+0x380/0x380 [ 27.696172] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 27.700992] __x64_sys_sendto+0xe1/0x1a0 [ 27.705048] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 27.710051] do_syscall_64+0x1b1/0x800 [ 27.713919] ? syscall_return_slowpath+0x5c0/0x5c0 [ 27.718835] ? syscall_return_slowpath+0x30f/0x5c0 [ 27.723745] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 27.729221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 27.734045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 27.739220] RIP: 0033:0x441639 [ 27.742384] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 27.761500] RSP: 002b:00007ffe5743de08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c [ 27.769194] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000441639 [ 27.776451] RDX: 0000000000000013 RSI: 00000000200016c0 RDI: 0000000000000003 [ 27.783707] RBP: 00000000006cd018 R08: 00000000200000c0 R09: 000000000000001c [ 27.790957] R10: 0000000000000000 R11: 0000000000000216 R12: 0000000000402390 [ 27.798211] R13: 0000000000402420 R14: 0000000000000000 R15: 0000000000000000 [ 27.805936] Dumping ftrace buffer: [ 27.809460] (ftrace buffer empty) [ 27.813147] Kernel Offset: disabled [ 27.816753] Rebooting in 86400 seconds..