[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 23.396478] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 24.948020] random: sshd: uninitialized urandom read (32 bytes read) [ 25.284079] random: sshd: uninitialized urandom read (32 bytes read) [ 25.853079] random: sshd: uninitialized urandom read (32 bytes read) [ 26.036010] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.11' (ECDSA) to the list of known hosts. [ 31.687445] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/04 12:37:39 parsed 1 programs [ 33.306764] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/04 12:37:41 executed programs: 0 [ 34.488924] IPVS: ftp: loaded support on port[0] = 21 [ 34.700965] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.707408] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.714922] device bridge_slave_0 entered promiscuous mode [ 34.732577] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.739840] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.747170] device bridge_slave_1 entered promiscuous mode [ 34.764224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 34.782250] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 34.826486] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 34.845168] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 34.908170] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 34.915485] team0: Port device team_slave_0 added [ 34.930194] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 34.937364] team0: Port device team_slave_1 added [ 34.952162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 34.969317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 34.986587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.004860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.137372] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.144196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.151250] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.161610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.647273] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 35.653437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.668556] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 35.708027] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 35.755589] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 35.761866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.769887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.809519] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.287512] ================================================================== [ 37.295052] BUG: KASAN: use-after-free in tipc_group_fill_sock_diag+0x7c3/0x84b [ 37.302493] Read of size 4 at addr ffff8801ce476c60 by task syz-executor0/5160 [ 37.309861] [ 37.311483] CPU: 0 PID: 5160 Comm: syz-executor0 Not tainted 4.19.0-rc2+ #220 [ 37.318853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.328388] Call Trace: [ 37.330984] dump_stack+0x1c9/0x2b4 [ 37.334633] ? dump_stack_print_info.cold.2+0x52/0x52 [ 37.340088] ? printk+0xa7/0xcf [ 37.343366] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 37.348169] ? tipc_group_fill_sock_diag+0x7c3/0x84b [ 37.353875] print_address_description+0x6c/0x20b [ 37.358735] ? tipc_group_fill_sock_diag+0x7c3/0x84b [ 37.363850] kasan_report.cold.7+0x242/0x30d [ 37.368376] __asan_report_load4_noabort+0x14/0x20 [ 37.373328] tipc_group_fill_sock_diag+0x7c3/0x84b [ 37.378273] ? tipc_group_member_evt+0xe30/0xe30 [ 37.383041] ? skb_put+0x17b/0x1e0 [ 37.386569] ? memset+0x31/0x40 [ 37.389841] ? memcpy+0x45/0x50 [ 37.394123] ? __nla_put+0x37/0x40 [ 37.397700] ? nla_put+0x11a/0x150 [ 37.401255] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 37.405916] ? tipc_diag_dump+0x30/0x30 [ 37.409887] ? tipc_getname+0x7f0/0x7f0 [ 37.413975] ? save_stack+0xa9/0xd0 [ 37.417613] ? print_usage_bug+0xc0/0xc0 [ 37.422466] ? graph_lock+0x170/0x170 [ 37.426766] ? graph_lock+0x170/0x170 [ 37.431869] ? __netlink_dump_start+0x4f1/0x6f0 [ 37.437075] ? sock_diag_rcv_msg+0x31d/0x410 [ 37.442190] ? netlink_rcv_skb+0x172/0x440 [ 37.447054] ? sock_diag_rcv+0x2a/0x40 [ 37.450999] ? netlink_unicast+0x5a0/0x760 [ 37.455233] ? netlink_sendmsg+0xa18/0xfc0 [ 37.459489] ? sock_sendmsg+0xd5/0x120 [ 37.463371] ? ___sys_sendmsg+0x7fd/0x930 [ 37.467632] ? __x64_sys_sendmsg+0x78/0xb0 [ 37.471878] ? do_syscall_64+0x1b9/0x820 [ 37.475948] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.481354] ? lock_acquire+0x1e4/0x4f0 [ 37.485367] ? tipc_nl_sk_walk+0x60a/0xd30 [ 37.490539] ? lockdep_hardirqs_on+0x421/0x5c0 [ 37.495618] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 37.500646] ? skb_put+0x17b/0x1e0 [ 37.504353] ? __nlmsg_put+0x14c/0x1b0 [ 37.508259] __tipc_add_sock_diag+0x22f/0x360 [ 37.512784] tipc_nl_sk_walk+0x68d/0xd30 [ 37.516881] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 37.522155] ? __tipc_nl_add_sk+0x400/0x400 [ 37.526469] ? skb_scrub_packet+0x490/0x490 [ 37.531604] ? kasan_check_write+0x14/0x20 [ 37.535854] ? lock_downgrade+0x8f0/0x8f0 [ 37.540297] tipc_diag_dump+0x24/0x30 [ 37.544102] netlink_dump+0x519/0xd50 [ 37.548910] ? netlink_broadcast+0x50/0x50 [ 37.553153] __netlink_dump_start+0x4f1/0x6f0 [ 37.557683] ? kasan_check_read+0x11/0x20 [ 37.561843] tipc_sock_diag_handler_dump+0x234/0x340 [ 37.566942] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 37.571635] ? tipc_unregister_sysctl+0x20/0x20 [ 37.576798] ? netlink_deliver_tap+0x356/0xfb0 [ 37.581936] sock_diag_rcv_msg+0x31d/0x410 [ 37.586244] netlink_rcv_skb+0x172/0x440 [ 37.590297] ? sock_diag_bind+0x80/0x80 [ 37.594292] ? netlink_ack+0xbe0/0xbe0 [ 37.598174] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 37.602838] sock_diag_rcv+0x2a/0x40 [ 37.606545] netlink_unicast+0x5a0/0x760 [ 37.610642] ? netlink_attachskb+0x9a0/0x9a0 [ 37.615063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 37.621020] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 37.626029] netlink_sendmsg+0xa18/0xfc0 [ 37.631155] ? netlink_unicast+0x760/0x760 [ 37.635431] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 37.640372] ? apparmor_socket_sendmsg+0x29/0x30 [ 37.645291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 37.650863] ? security_socket_sendmsg+0x94/0xc0 [ 37.655622] ? netlink_unicast+0x760/0x760 [ 37.659873] sock_sendmsg+0xd5/0x120 [ 37.663588] ___sys_sendmsg+0x7fd/0x930 [ 37.667560] ? copy_msghdr_from_user+0x580/0x580 [ 37.672325] ? _raw_spin_unlock_bh+0x30/0x40 [ 37.679267] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 37.684364] ? do_raw_spin_unlock+0xa7/0x2f0 [ 37.689693] ? __release_sock+0x276/0x3a0 [ 37.693842] ? __fget_light+0x2f7/0x440 [ 37.698491] ? __local_bh_enable_ip+0x161/0x230 [ 37.703806] ? fget_raw+0x20/0x20 [ 37.707291] ? __release_sock+0x3a0/0x3a0 [ 37.711431] ? tipc_nametbl_build_group+0x279/0x360 [ 37.716481] ? tipc_setsockopt+0x726/0xd70 [ 37.721269] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 37.726833] ? sockfd_lookup_light+0xc5/0x160 [ 37.731850] __sys_sendmsg+0x11d/0x290 [ 37.736229] ? __ia32_sys_shutdown+0x80/0x80 [ 37.741689] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 37.747231] ? fput+0x130/0x1a0 [ 37.751580] ? __x64_sys_futex+0x47f/0x6a0 [ 37.755818] ? do_syscall_64+0x9a/0x820 [ 37.761819] ? do_syscall_64+0x9a/0x820 [ 37.766345] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 37.772439] __x64_sys_sendmsg+0x78/0xb0 [ 37.776510] do_syscall_64+0x1b9/0x820 [ 37.780427] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 37.785935] ? syscall_return_slowpath+0x5e0/0x5e0 [ 37.791599] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 37.796463] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 37.801490] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 37.806546] ? prepare_exit_to_usermode+0x291/0x3b0 [ 37.811653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 37.816635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.821846] RIP: 0033:0x457099 [ 37.825096] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 37.845112] RSP: 002b:00007f3f024d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 37.853823] RAX: ffffffffffffffda RBX: 00007f3f024da6d4 RCX: 0000000000457099 [ 37.861104] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 37.869785] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 37.877063] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 37.884336] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 37.892669] [ 37.894331] Allocated by task 5160: [ 37.897960] save_stack+0x43/0xd0 [ 37.901409] kasan_kmalloc+0xc4/0xe0 [ 37.905120] kmem_cache_alloc_trace+0x152/0x730 [ 37.909803] tipc_group_create+0x155/0xa70 [ 37.914047] tipc_setsockopt+0x2d1/0xd70 [ 37.918606] __sys_setsockopt+0x1c5/0x3b0 [ 37.922763] __x64_sys_setsockopt+0xbe/0x150 [ 37.927167] do_syscall_64+0x1b9/0x820 [ 37.931080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.936277] [ 37.937942] Freed by task 5159: [ 37.941692] save_stack+0x43/0xd0 [ 37.945142] __kasan_slab_free+0x11a/0x170 [ 37.950410] kasan_slab_free+0xe/0x10 [ 37.954565] kfree+0xd9/0x210 [ 37.957665] tipc_group_delete+0x2e5/0x3f0 [ 37.961901] tipc_sk_leave+0x113/0x220 [ 37.965822] tipc_release+0x14e/0x12b0 [ 37.969711] __sock_release+0xd7/0x250 [ 37.974178] sock_close+0x19/0x20 [ 37.977650] __fput+0x38a/0xa40 [ 37.980938] ____fput+0x15/0x20 [ 37.984482] task_work_run+0x1e8/0x2a0 [ 37.989264] exit_to_usermode_loop+0x318/0x380 [ 37.993909] do_syscall_64+0x6be/0x820 [ 37.998155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.003384] [ 38.005013] The buggy address belongs to the object at ffff8801ce476c00 [ 38.005013] which belongs to the cache kmalloc-192 of size 192 [ 38.018705] The buggy address is located 96 bytes inside of [ 38.018705] 192-byte region [ffff8801ce476c00, ffff8801ce476cc0) [ 38.031016] The buggy address belongs to the page: [ 38.036081] page:ffffea0007391d80 count:1 mapcount:0 mapping:ffff8801dac00040 index:0x0 [ 38.044221] flags: 0x2fffc0000000100(slab) [ 38.048472] raw: 02fffc0000000100 ffffea0007391748 ffffea0007392048 ffff8801dac00040 [ 38.056901] raw: 0000000000000000 ffff8801ce476000 0000000100000010 0000000000000000 [ 38.064768] page dumped because: kasan: bad access detected [ 38.078786] [ 38.080409] Memory state around the buggy address: [ 38.086169] ffff8801ce476b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.093521] ffff8801ce476b80: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.101246] >ffff8801ce476c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.108620] ^ [ 38.115103] ffff8801ce476c80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.122840] ffff8801ce476d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.131301] ================================================================== [ 38.138724] Disabling lock debugging due to kernel taint [ 38.144281] Kernel panic - not syncing: panic_on_warn set ... [ 38.144281] [ 38.151687] CPU: 0 PID: 5160 Comm: syz-executor0 Tainted: G B 4.19.0-rc2+ #220 [ 38.160362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.169715] Call Trace: [ 38.172313] dump_stack+0x1c9/0x2b4 [ 38.175942] ? dump_stack_print_info.cold.2+0x52/0x52 [ 38.181135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 38.186843] panic+0x238/0x4e7 [ 38.190049] ? add_taint.cold.5+0x16/0x16 [ 38.194192] ? trace_hardirqs_on+0xb4/0x2c0 [ 38.199402] ? trace_hardirqs_on+0x9a/0x2c0 [ 38.203770] ? tipc_group_fill_sock_diag+0x7c3/0x84b [ 38.209264] kasan_end_report+0x47/0x4f [ 38.213237] kasan_report.cold.7+0x76/0x30d [ 38.218057] __asan_report_load4_noabort+0x14/0x20 [ 38.222984] tipc_group_fill_sock_diag+0x7c3/0x84b [ 38.228437] ? tipc_group_member_evt+0xe30/0xe30 [ 38.233225] ? skb_put+0x17b/0x1e0 [ 38.236759] ? memset+0x31/0x40 [ 38.240045] ? memcpy+0x45/0x50 [ 38.243347] ? __nla_put+0x37/0x40 [ 38.246879] ? nla_put+0x11a/0x150 [ 38.250415] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 38.255075] ? tipc_diag_dump+0x30/0x30 [ 38.259074] ? tipc_getname+0x7f0/0x7f0 [ 38.263038] ? save_stack+0xa9/0xd0 [ 38.266778] ? print_usage_bug+0xc0/0xc0 [ 38.270830] ? graph_lock+0x170/0x170 [ 38.275527] ? graph_lock+0x170/0x170 [ 38.279342] ? __netlink_dump_start+0x4f1/0x6f0 [ 38.284005] ? sock_diag_rcv_msg+0x31d/0x410 [ 38.293506] ? netlink_rcv_skb+0x172/0x440 [ 38.297757] ? sock_diag_rcv+0x2a/0x40 [ 38.301656] ? netlink_unicast+0x5a0/0x760 [ 38.305880] ? netlink_sendmsg+0xa18/0xfc0 [ 38.310215] ? sock_sendmsg+0xd5/0x120 [ 38.314092] ? ___sys_sendmsg+0x7fd/0x930 [ 38.318243] ? __x64_sys_sendmsg+0x78/0xb0 [ 38.322642] ? do_syscall_64+0x1b9/0x820 [ 38.326698] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.332084] ? lock_acquire+0x1e4/0x4f0 [ 38.337535] ? tipc_nl_sk_walk+0x60a/0xd30 [ 38.341781] ? lockdep_hardirqs_on+0x421/0x5c0 [ 38.346661] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 38.351672] ? skb_put+0x17b/0x1e0 [ 38.355933] ? __nlmsg_put+0x14c/0x1b0 [ 38.359850] __tipc_add_sock_diag+0x22f/0x360 [ 38.364391] tipc_nl_sk_walk+0x68d/0xd30 [ 38.368468] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 38.373883] ? __tipc_nl_add_sk+0x400/0x400 [ 38.378228] ? skb_scrub_packet+0x490/0x490 [ 38.382570] ? kasan_check_write+0x14/0x20 [ 38.386837] ? lock_downgrade+0x8f0/0x8f0 [ 38.390990] tipc_diag_dump+0x24/0x30 [ 38.394816] netlink_dump+0x519/0xd50 [ 38.398621] ? netlink_broadcast+0x50/0x50 [ 38.402968] __netlink_dump_start+0x4f1/0x6f0 [ 38.407479] ? kasan_check_read+0x11/0x20 [ 38.412102] tipc_sock_diag_handler_dump+0x234/0x340 [ 38.417247] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 38.422412] ? tipc_unregister_sysctl+0x20/0x20 [ 38.427574] ? netlink_deliver_tap+0x356/0xfb0 [ 38.432187] sock_diag_rcv_msg+0x31d/0x410 [ 38.436947] netlink_rcv_skb+0x172/0x440 [ 38.440999] ? sock_diag_bind+0x80/0x80 [ 38.445002] ? netlink_ack+0xbe0/0xbe0 [ 38.448896] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 38.453655] sock_diag_rcv+0x2a/0x40 [ 38.457364] netlink_unicast+0x5a0/0x760 [ 38.461449] ? netlink_attachskb+0x9a0/0x9a0 [ 38.465883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 38.471469] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 38.476495] netlink_sendmsg+0xa18/0xfc0 [ 38.480590] ? netlink_unicast+0x760/0x760 [ 38.484862] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 38.489792] ? apparmor_socket_sendmsg+0x29/0x30 [ 38.494959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 38.500694] ? security_socket_sendmsg+0x94/0xc0 [ 38.505978] ? netlink_unicast+0x760/0x760 [ 38.510217] sock_sendmsg+0xd5/0x120 [ 38.515362] ___sys_sendmsg+0x7fd/0x930 [ 38.519390] ? copy_msghdr_from_user+0x580/0x580 [ 38.524213] ? _raw_spin_unlock_bh+0x30/0x40 [ 38.528615] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 38.534195] ? do_raw_spin_unlock+0xa7/0x2f0 [ 38.538974] ? __release_sock+0x276/0x3a0 [ 38.543120] ? __fget_light+0x2f7/0x440 [ 38.547227] ? __local_bh_enable_ip+0x161/0x230 [ 38.552824] ? fget_raw+0x20/0x20 [ 38.556285] ? __release_sock+0x3a0/0x3a0 [ 38.560425] ? tipc_nametbl_build_group+0x279/0x360 [ 38.565448] ? tipc_setsockopt+0x726/0xd70 [ 38.569825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 38.575370] ? sockfd_lookup_light+0xc5/0x160 [ 38.579907] __sys_sendmsg+0x11d/0x290 [ 38.583815] ? __ia32_sys_shutdown+0x80/0x80 [ 38.591308] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 38.597089] ? fput+0x130/0x1a0 [ 38.600450] ? __x64_sys_futex+0x47f/0x6a0 [ 38.604693] ? do_syscall_64+0x9a/0x820 [ 38.608672] ? do_syscall_64+0x9a/0x820 [ 38.612656] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 38.617786] __x64_sys_sendmsg+0x78/0xb0 [ 38.622969] do_syscall_64+0x1b9/0x820 [ 38.627253] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 38.632636] ? syscall_return_slowpath+0x5e0/0x5e0 [ 38.637593] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 38.642462] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 38.647855] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 38.652860] ? prepare_exit_to_usermode+0x291/0x3b0 [ 38.657913] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 38.662749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 38.667964] RIP: 0033:0x457099 [ 38.671643] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 38.692036] RSP: 002b:00007f3f024d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 38.701246] RAX: ffffffffffffffda RBX: 00007f3f024da6d4 RCX: 0000000000457099 [ 38.708577] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 38.715879] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 38.723167] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 38.730887] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 38.739094] Dumping ftrace buffer: [ 38.742628] (ftrace buffer empty) [ 38.746318] Kernel Offset: disabled [ 38.749920] Rebooting in 86400 seconds..