[....] Starting OpenBSD Secure Shell server: sshd[ 21.907418] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 24.183894] random: sshd: uninitialized urandom read (32 bytes read) [ 24.443259] random: sshd: uninitialized urandom read (32 bytes read) [ 24.971476] random: sshd: uninitialized urandom read (32 bytes read) [ 811.488606] random: sshd: uninitialized urandom read (32 bytes read) [ 811.608515] sshd (4654) used greatest stack depth: 16872 bytes left Warning: Permanently added '10.128.10.48' (ECDSA) to the list of known hosts. [ 817.018201] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/04 07:06:26 parsed 1 programs [ 818.162515] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/04 07:06:28 executed programs: 0 [ 819.402823] IPVS: ftp: loaded support on port[0] = 21 [ 819.616932] bridge0: port 1(bridge_slave_0) entered blocking state [ 819.623528] bridge0: port 1(bridge_slave_0) entered disabled state [ 819.630874] device bridge_slave_0 entered promiscuous mode [ 819.647503] bridge0: port 2(bridge_slave_1) entered blocking state [ 819.653878] bridge0: port 2(bridge_slave_1) entered disabled state [ 819.660808] device bridge_slave_1 entered promiscuous mode [ 819.677209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 819.693249] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 819.735978] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 819.754830] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 819.820254] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 819.827727] team0: Port device team_slave_0 added [ 819.843327] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 819.850501] team0: Port device team_slave_1 added [ 819.866182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 819.883407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 819.901186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 819.919440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 820.045814] bridge0: port 2(bridge_slave_1) entered blocking state [ 820.052395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 820.059338] bridge0: port 1(bridge_slave_0) entered blocking state [ 820.065701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 820.516394] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 820.522608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 820.567862] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 820.589636] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 820.622905] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 820.629110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 820.636002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 820.675748] 8021q: adding VLAN 0 to HW filter on device team0 [ 821.100596] ================================================================== [ 821.108140] BUG: KASAN: use-after-free in tipc_group_fill_sock_diag+0x7b9/0x84b [ 821.115580] Read of size 4 at addr ffff8801d359405c by task syz-executor0/4981 [ 821.122917] [ 821.124532] CPU: 0 PID: 4981 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #201 [ 821.131789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.141124] Call Trace: [ 821.143752] dump_stack+0x1c9/0x2b4 [ 821.147379] ? dump_stack_print_info.cold.2+0x52/0x52 [ 821.152595] ? printk+0xa7/0xcf [ 821.155864] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 821.160606] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 821.165694] print_address_description+0x6c/0x20b [ 821.170517] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 821.175608] kasan_report.cold.7+0x242/0x30d [ 821.180004] __asan_report_load4_noabort+0x14/0x20 [ 821.184915] tipc_group_fill_sock_diag+0x7b9/0x84b [ 821.189828] ? tipc_group_member_evt+0xe30/0xe30 [ 821.194566] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 821.199621] ? skb_put+0x17b/0x1e0 [ 821.203152] ? memset+0x31/0x40 [ 821.206505] ? memcpy+0x45/0x50 [ 821.209931] ? __nla_put+0x37/0x40 [ 821.213462] ? nla_put+0x11a/0x150 [ 821.217013] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 821.221666] ? tipc_diag_dump+0x30/0x30 [ 821.225628] ? tipc_getname+0x7f0/0x7f0 [ 821.229586] ? save_stack+0xa9/0xd0 [ 821.233193] ? save_stack+0x43/0xd0 [ 821.236799] ? kasan_kmalloc+0xc4/0xe0 [ 821.240668] ? __kmalloc_node_track_caller+0x47/0x70 [ 821.245752] ? graph_lock+0x170/0x170 [ 821.249560] ? __netlink_dump_start+0x4f1/0x6f0 [ 821.254244] ? sock_diag_rcv_msg+0x31d/0x410 [ 821.258727] ? netlink_rcv_skb+0x172/0x440 [ 821.262952] ? sock_diag_rcv+0x2a/0x40 [ 821.266827] ? netlink_unicast+0x5a0/0x760 [ 821.271045] ? netlink_sendmsg+0xa18/0xfc0 [ 821.275308] ? sock_sendmsg+0xd5/0x120 [ 821.279183] ? ___sys_sendmsg+0x7fd/0x930 [ 821.283314] ? __x64_sys_sendmsg+0x78/0xb0 [ 821.287530] ? do_syscall_64+0x1b9/0x820 [ 821.291598] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.296947] ? mark_held_locks+0xc9/0x160 [ 821.301086] ? lock_acquire+0x1e4/0x4f0 [ 821.305047] ? tipc_nl_sk_walk+0x60a/0xd30 [ 821.309269] ? tipc_nl_sk_walk+0x311/0xd30 [ 821.313566] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 821.318582] ? skb_put+0x17b/0x1e0 [ 821.322151] ? __nlmsg_put+0x14c/0x1b0 [ 821.326028] __tipc_add_sock_diag+0x22f/0x360 [ 821.330513] tipc_nl_sk_walk+0x68d/0xd30 [ 821.334562] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 821.339821] ? __tipc_nl_add_sk+0x400/0x400 [ 821.344128] ? skb_scrub_packet+0x490/0x490 [ 821.348557] ? kasan_check_write+0x14/0x20 [ 821.352811] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 821.357731] ? lock_downgrade+0x8f0/0x8f0 [ 821.361863] tipc_diag_dump+0x24/0x30 [ 821.365647] netlink_dump+0x519/0xd50 [ 821.369431] ? netlink_broadcast+0x50/0x50 [ 821.373652] __netlink_dump_start+0x4f1/0x6f0 [ 821.378126] ? kasan_check_read+0x11/0x20 [ 821.382300] tipc_sock_diag_handler_dump+0x234/0x340 [ 821.387431] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 821.392089] ? tipc_unregister_sysctl+0x20/0x20 [ 821.396753] ? netlink_deliver_tap+0x356/0xfb0 [ 821.401360] sock_diag_rcv_msg+0x31d/0x410 [ 821.405598] netlink_rcv_skb+0x172/0x440 [ 821.409661] ? sock_diag_bind+0x80/0x80 [ 821.413636] ? netlink_ack+0xbe0/0xbe0 [ 821.417523] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 821.422204] sock_diag_rcv+0x2a/0x40 [ 821.425918] netlink_unicast+0x5a0/0x760 [ 821.429986] ? netlink_attachskb+0x9a0/0x9a0 [ 821.434401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 821.439942] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 821.444963] netlink_sendmsg+0xa18/0xfc0 [ 821.449034] ? netlink_unicast+0x760/0x760 [ 821.453355] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 821.458294] ? apparmor_socket_sendmsg+0x29/0x30 [ 821.463060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 821.468646] ? security_socket_sendmsg+0x94/0xc0 [ 821.473409] ? netlink_unicast+0x760/0x760 [ 821.477652] sock_sendmsg+0xd5/0x120 [ 821.481370] ___sys_sendmsg+0x7fd/0x930 [ 821.485356] ? copy_msghdr_from_user+0x580/0x580 [ 821.490125] ? _raw_spin_unlock_bh+0x30/0x40 [ 821.494539] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 821.499647] ? do_raw_spin_unlock+0xa7/0x2f0 [ 821.504062] ? __release_sock+0x276/0x3a0 [ 821.508222] ? __fget_light+0x2f7/0x440 [ 821.512202] ? __local_bh_enable_ip+0x161/0x230 [ 821.516878] ? fget_raw+0x20/0x20 [ 821.520337] ? __release_sock+0x3a0/0x3a0 [ 821.524487] ? tipc_nametbl_build_group+0x279/0x360 [ 821.529513] ? tipc_setsockopt+0x726/0xd70 [ 821.533759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 821.539308] ? sockfd_lookup_light+0xc5/0x160 [ 821.543816] __sys_sendmsg+0x11d/0x290 [ 821.547709] ? __ia32_sys_shutdown+0x80/0x80 [ 821.552124] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 821.557661] ? fput+0x130/0x1a0 [ 821.560945] ? __x64_sys_futex+0x47f/0x6a0 [ 821.565798] ? do_syscall_64+0x9a/0x820 [ 821.569774] ? do_syscall_64+0x9a/0x820 [ 821.573768] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 821.578890] __x64_sys_sendmsg+0x78/0xb0 [ 821.582957] do_syscall_64+0x1b9/0x820 [ 821.586851] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 821.592218] ? syscall_return_slowpath+0x5e0/0x5e0 [ 821.597150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 821.601996] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 821.607022] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 821.612053] ? prepare_exit_to_usermode+0x291/0x3b0 [ 821.617080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 821.621936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.627130] RIP: 0033:0x457099 [ 821.630343] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 821.649258] RSP: 002b:00007f92b295dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 821.656976] RAX: ffffffffffffffda RBX: 00007f92b295e6d4 RCX: 0000000000457099 [ 821.664247] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 821.671605] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 821.678876] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 821.686143] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 821.693424] [ 821.695054] Allocated by task 4981: [ 821.698689] save_stack+0x43/0xd0 [ 821.702148] kasan_kmalloc+0xc4/0xe0 [ 821.705867] kmem_cache_alloc_trace+0x152/0x730 [ 821.710537] tipc_group_create+0x155/0xa70 [ 821.714775] tipc_setsockopt+0x2d1/0xd70 [ 821.718850] __sys_setsockopt+0x1c5/0x3b0 [ 821.723001] __x64_sys_setsockopt+0xbe/0x150 [ 821.727416] do_syscall_64+0x1b9/0x820 [ 821.731308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.736486] [ 821.738110] Freed by task 4980: [ 821.741387] save_stack+0x43/0xd0 [ 821.744841] __kasan_slab_free+0x11a/0x170 [ 821.749075] kasan_slab_free+0xe/0x10 [ 821.752880] kfree+0xd9/0x210 [ 821.755988] tipc_group_delete+0x2e5/0x3f0 [ 821.760222] tipc_sk_leave+0x113/0x220 [ 821.764107] tipc_release+0x14e/0x12b0 [ 821.767997] __sock_release+0xd7/0x250 [ 821.771884] sock_close+0x19/0x20 [ 821.775342] __fput+0x38a/0xa40 [ 821.778618] ____fput+0x15/0x20 [ 821.781900] task_work_run+0x1e8/0x2a0 [ 821.785802] exit_to_usermode_loop+0x318/0x380 [ 821.790386] do_syscall_64+0x6be/0x820 [ 821.794273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.799451] [ 821.801084] The buggy address belongs to the object at ffff8801d3594000 [ 821.801084] which belongs to the cache kmalloc-192 of size 192 [ 821.813743] The buggy address is located 92 bytes inside of [ 821.813743] 192-byte region [ffff8801d3594000, ffff8801d35940c0) [ 821.825532] The buggy address belongs to the page: [ 821.830464] page:ffffea00074d6500 count:1 mapcount:0 mapping:ffff8801dac00040 index:0x0 [ 821.838609] flags: 0x2fffc0000000100(slab) [ 821.842852] raw: 02fffc0000000100 ffffea00074edfc8 ffffea00074b0f48 ffff8801dac00040 [ 821.850734] raw: 0000000000000000 ffff8801d3594000 0000000100000010 0000000000000000 [ 821.858609] page dumped because: kasan: bad access detected [ 821.864306] [ 821.865925] Memory state around the buggy address: [ 821.870855] ffff8801d3593f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 821.878212] ffff8801d3593f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 821.885588] >ffff8801d3594000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 821.892941] ^ [ 821.899170] ffff8801d3594080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 821.906525] ffff8801d3594100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 821.913879] ================================================================== [ 821.921229] Disabling lock debugging due to kernel taint [ 821.926733] Kernel panic - not syncing: panic_on_warn set ... [ 821.926733] [ 821.934104] CPU: 0 PID: 4981 Comm: syz-executor0 Tainted: G B 4.19.0-rc1+ #201 [ 821.942760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.952114] Call Trace: [ 821.954707] dump_stack+0x1c9/0x2b4 [ 821.958339] ? dump_stack_print_info.cold.2+0x52/0x52 [ 821.963532] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 821.968291] panic+0x238/0x4e7 [ 821.971484] ? add_taint.cold.5+0x16/0x16 [ 821.975635] ? trace_hardirqs_on+0xb4/0x2c0 [ 821.979953] ? trace_hardirqs_on+0x9a/0x2c0 [ 821.984273] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 821.989379] kasan_end_report+0x47/0x4f [ 821.993361] kasan_report.cold.7+0x76/0x30d [ 821.997685] __asan_report_load4_noabort+0x14/0x20 [ 822.002611] tipc_group_fill_sock_diag+0x7b9/0x84b [ 822.007538] ? tipc_group_member_evt+0xe30/0xe30 [ 822.012295] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 822.017309] ? skb_put+0x17b/0x1e0 [ 822.020846] ? memset+0x31/0x40 [ 822.024123] ? memcpy+0x45/0x50 [ 822.027401] ? __nla_put+0x37/0x40 [ 822.030943] ? nla_put+0x11a/0x150 [ 822.034492] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 822.039166] ? tipc_diag_dump+0x30/0x30 [ 822.043145] ? tipc_getname+0x7f0/0x7f0 [ 822.047122] ? save_stack+0xa9/0xd0 [ 822.050750] ? save_stack+0x43/0xd0 [ 822.054381] ? kasan_kmalloc+0xc4/0xe0 [ 822.058269] ? __kmalloc_node_track_caller+0x47/0x70 [ 822.063369] ? graph_lock+0x170/0x170 [ 822.067172] ? __netlink_dump_start+0x4f1/0x6f0 [ 822.071842] ? sock_diag_rcv_msg+0x31d/0x410 [ 822.076248] ? netlink_rcv_skb+0x172/0x440 [ 822.080485] ? sock_diag_rcv+0x2a/0x40 [ 822.084373] ? netlink_unicast+0x5a0/0x760 [ 822.088607] ? netlink_sendmsg+0xa18/0xfc0 [ 822.092843] ? sock_sendmsg+0xd5/0x120 [ 822.096740] ? ___sys_sendmsg+0x7fd/0x930 [ 822.100886] ? __x64_sys_sendmsg+0x78/0xb0 [ 822.105119] ? do_syscall_64+0x1b9/0x820 [ 822.109191] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.114571] ? mark_held_locks+0xc9/0x160 [ 822.118727] ? lock_acquire+0x1e4/0x4f0 [ 822.122704] ? tipc_nl_sk_walk+0x60a/0xd30 [ 822.126951] ? tipc_nl_sk_walk+0x311/0xd30 [ 822.131200] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 822.136225] ? skb_put+0x17b/0x1e0 [ 822.139789] ? __nlmsg_put+0x14c/0x1b0 [ 822.143687] __tipc_add_sock_diag+0x22f/0x360 [ 822.148192] tipc_nl_sk_walk+0x68d/0xd30 [ 822.152259] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 822.157539] ? __tipc_nl_add_sk+0x400/0x400 [ 822.161860] ? skb_scrub_packet+0x490/0x490 [ 822.166188] ? kasan_check_write+0x14/0x20 [ 822.170426] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 822.175355] ? lock_downgrade+0x8f0/0x8f0 [ 822.179501] tipc_diag_dump+0x24/0x30 [ 822.183301] netlink_dump+0x519/0xd50 [ 822.187099] ? netlink_broadcast+0x50/0x50 [ 822.191335] __netlink_dump_start+0x4f1/0x6f0 [ 822.195827] ? kasan_check_read+0x11/0x20 [ 822.199981] tipc_sock_diag_handler_dump+0x234/0x340 [ 822.205084] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 822.209753] ? tipc_unregister_sysctl+0x20/0x20 [ 822.214432] ? netlink_deliver_tap+0x356/0xfb0 [ 822.219018] sock_diag_rcv_msg+0x31d/0x410 [ 822.223256] netlink_rcv_skb+0x172/0x440 [ 822.227316] ? sock_diag_bind+0x80/0x80 [ 822.231286] ? netlink_ack+0xbe0/0xbe0 [ 822.235173] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 822.239851] sock_diag_rcv+0x2a/0x40 [ 822.243569] netlink_unicast+0x5a0/0x760 [ 822.247629] ? netlink_attachskb+0x9a0/0x9a0 [ 822.252044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.257584] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 822.262615] netlink_sendmsg+0xa18/0xfc0 [ 822.266677] ? netlink_unicast+0x760/0x760 [ 822.270930] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 822.275860] ? apparmor_socket_sendmsg+0x29/0x30 [ 822.280632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.286166] ? security_socket_sendmsg+0x94/0xc0 [ 822.290922] ? netlink_unicast+0x760/0x760 [ 822.295160] sock_sendmsg+0xd5/0x120 [ 822.298878] ___sys_sendmsg+0x7fd/0x930 [ 822.302859] ? copy_msghdr_from_user+0x580/0x580 [ 822.307612] ? _raw_spin_unlock_bh+0x30/0x40 [ 822.312022] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 822.317129] ? do_raw_spin_unlock+0xa7/0x2f0 [ 822.321534] ? __release_sock+0x276/0x3a0 [ 822.325683] ? __fget_light+0x2f7/0x440 [ 822.329678] ? __local_bh_enable_ip+0x161/0x230 [ 822.334344] ? fget_raw+0x20/0x20 [ 822.337804] ? __release_sock+0x3a0/0x3a0 [ 822.341957] ? tipc_nametbl_build_group+0x279/0x360 [ 822.346974] ? tipc_setsockopt+0x726/0xd70 [ 822.351216] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 822.356752] ? sockfd_lookup_light+0xc5/0x160 [ 822.361257] __sys_sendmsg+0x11d/0x290 [ 822.365148] ? __ia32_sys_shutdown+0x80/0x80 [ 822.369556] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 822.375094] ? fput+0x130/0x1a0 [ 822.378375] ? __x64_sys_futex+0x47f/0x6a0 [ 822.382608] ? do_syscall_64+0x9a/0x820 [ 822.386581] ? do_syscall_64+0x9a/0x820 [ 822.390557] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 822.395670] __x64_sys_sendmsg+0x78/0xb0 [ 822.399738] do_syscall_64+0x1b9/0x820 [ 822.403633] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 822.409007] ? syscall_return_slowpath+0x5e0/0x5e0 [ 822.413943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 822.418795] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 822.423829] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 822.428853] ? prepare_exit_to_usermode+0x291/0x3b0 [ 822.433876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 822.438724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.443908] RIP: 0033:0x457099 [ 822.447100] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 822.467483] RSP: 002b:00007f92b295dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 822.475219] RAX: ffffffffffffffda RBX: 00007f92b295e6d4 RCX: 0000000000457099 [ 822.482491] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 822.489760] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 822.497042] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 822.504313] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 822.511916] Dumping ftrace buffer: [ 822.515453] (ftrace buffer empty) [ 822.519155] Kernel Offset: disabled [ 822.522834] Rebooting in 86400 seconds..