[....] Starting OpenBSD Secure Shell server: sshd[ 22.154679] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.952547] random: sshd: uninitialized urandom read (32 bytes read) [ 24.237832] random: sshd: uninitialized urandom read (32 bytes read) [ 24.784322] random: sshd: uninitialized urandom read (32 bytes read) [ 24.947242] sshd (4640) used greatest stack depth: 16872 bytes left [ 799.497064] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.206' (ECDSA) to the list of known hosts. [ 805.190661] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/02 10:01:30 parsed 1 programs [ 806.331766] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/02 10:01:31 executed programs: 0 [ 807.371330] IPVS: ftp: loaded support on port[0] = 21 [ 807.595513] bridge0: port 1(bridge_slave_0) entered blocking state [ 807.601998] bridge0: port 1(bridge_slave_0) entered disabled state [ 807.609632] device bridge_slave_0 entered promiscuous mode [ 807.627156] bridge0: port 2(bridge_slave_1) entered blocking state [ 807.633535] bridge0: port 2(bridge_slave_1) entered disabled state [ 807.640592] device bridge_slave_1 entered promiscuous mode [ 807.656673] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 807.673623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 807.718352] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 807.737742] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 807.804827] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 807.812239] team0: Port device team_slave_0 added [ 807.827640] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 807.834790] team0: Port device team_slave_1 added [ 807.851195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 807.868670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 807.886512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 807.904151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 808.034518] bridge0: port 2(bridge_slave_1) entered blocking state [ 808.041172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 808.048084] bridge0: port 1(bridge_slave_0) entered blocking state [ 808.054448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 808.526700] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 808.532918] 8021q: adding VLAN 0 to HW filter on device bond0 [ 808.565791] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 808.585738] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 808.630940] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 808.637103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 808.644293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 808.684032] 8021q: adding VLAN 0 to HW filter on device team0 [ 810.805074] ================================================================== [ 810.812755] BUG: KASAN: use-after-free in tipc_group_fill_sock_diag+0x7b9/0x84b [ 810.820378] Read of size 4 at addr ffff8801ce36905c by task syz-executor0/5382 [ 810.827731] [ 810.829377] CPU: 0 PID: 5382 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #218 [ 810.836649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.845996] Call Trace: [ 810.848639] dump_stack+0x1c9/0x2b4 [ 810.852281] ? dump_stack_print_info.cold.2+0x52/0x52 [ 810.857541] ? printk+0xa7/0xcf [ 810.860829] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 810.865591] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 810.870745] print_address_description+0x6c/0x20b [ 810.875591] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 810.880697] kasan_report.cold.7+0x242/0x30d [ 810.885134] __asan_report_load4_noabort+0x14/0x20 [ 810.890058] tipc_group_fill_sock_diag+0x7b9/0x84b [ 810.894991] ? tipc_group_member_evt+0xe30/0xe30 [ 810.899788] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 810.904898] ? skb_put+0x17b/0x1e0 [ 810.908465] ? memset+0x31/0x40 [ 810.911749] ? memcpy+0x45/0x50 [ 810.915089] ? __nla_put+0x37/0x40 [ 810.918642] ? nla_put+0x11a/0x150 [ 810.922199] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 810.926913] ? tipc_diag_dump+0x30/0x30 [ 810.930897] ? tipc_getname+0x7f0/0x7f0 [ 810.934875] ? save_stack+0xa9/0xd0 [ 810.938535] ? print_usage_bug+0xc0/0xc0 [ 810.942600] ? graph_lock+0x170/0x170 [ 810.946425] ? graph_lock+0x170/0x170 [ 810.950287] ? __netlink_dump_start+0x4f1/0x6f0 [ 810.955014] ? sock_diag_rcv_msg+0x31d/0x410 [ 810.959431] ? netlink_rcv_skb+0x172/0x440 [ 810.963675] ? sock_diag_rcv+0x2a/0x40 [ 810.967587] ? netlink_unicast+0x5a0/0x760 [ 810.971833] ? netlink_sendmsg+0xa18/0xfc0 [ 810.976132] ? sock_sendmsg+0xd5/0x120 [ 810.980022] ? ___sys_sendmsg+0x7fd/0x930 [ 810.984194] ? __x64_sys_sendmsg+0x78/0xb0 [ 810.988496] ? do_syscall_64+0x1b9/0x820 [ 810.992589] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.997969] ? lock_acquire+0x1e4/0x4f0 [ 811.001950] ? tipc_nl_sk_walk+0x60a/0xd30 [ 811.006212] ? lockdep_hardirqs_on+0x421/0x5c0 [ 811.010847] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 811.015868] ? skb_put+0x17b/0x1e0 [ 811.019464] ? __nlmsg_put+0x14c/0x1b0 [ 811.023384] __tipc_add_sock_diag+0x22f/0x360 [ 811.027903] tipc_nl_sk_walk+0x68d/0xd30 [ 811.031984] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 811.037268] ? __tipc_nl_add_sk+0x400/0x400 [ 811.041591] ? skb_scrub_packet+0x490/0x490 [ 811.045922] ? kasan_check_write+0x14/0x20 [ 811.050164] ? lock_downgrade+0x8f0/0x8f0 [ 811.054330] tipc_diag_dump+0x24/0x30 [ 811.058128] netlink_dump+0x519/0xd50 [ 811.061930] ? netlink_broadcast+0x50/0x50 [ 811.066205] __netlink_dump_start+0x4f1/0x6f0 [ 811.070703] ? kasan_check_read+0x11/0x20 [ 811.074858] tipc_sock_diag_handler_dump+0x234/0x340 [ 811.079961] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 811.084656] ? tipc_unregister_sysctl+0x20/0x20 [ 811.089346] ? netlink_deliver_tap+0x356/0xfb0 [ 811.093936] sock_diag_rcv_msg+0x31d/0x410 [ 811.098185] netlink_rcv_skb+0x172/0x440 [ 811.102248] ? sock_diag_bind+0x80/0x80 [ 811.106252] ? netlink_ack+0xbe0/0xbe0 [ 811.110204] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 811.114891] sock_diag_rcv+0x2a/0x40 [ 811.118640] netlink_unicast+0x5a0/0x760 [ 811.122707] ? netlink_attachskb+0x9a0/0x9a0 [ 811.127118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 811.132666] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 811.137688] netlink_sendmsg+0xa18/0xfc0 [ 811.141767] ? netlink_unicast+0x760/0x760 [ 811.146080] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 811.151041] ? apparmor_socket_sendmsg+0x29/0x30 [ 811.155799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 811.161365] ? security_socket_sendmsg+0x94/0xc0 [ 811.166132] ? netlink_unicast+0x760/0x760 [ 811.170372] sock_sendmsg+0xd5/0x120 [ 811.174103] ___sys_sendmsg+0x7fd/0x930 [ 811.178098] ? copy_msghdr_from_user+0x580/0x580 [ 811.182878] ? _raw_spin_unlock_bh+0x30/0x40 [ 811.187305] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 811.192414] ? do_raw_spin_unlock+0xa7/0x2f0 [ 811.196833] ? __release_sock+0x276/0x3a0 [ 811.201008] ? __fget_light+0x2f7/0x440 [ 811.205046] ? __local_bh_enable_ip+0x161/0x230 [ 811.209723] ? fget_raw+0x20/0x20 [ 811.213193] ? __release_sock+0x3a0/0x3a0 [ 811.217346] ? tipc_nametbl_build_group+0x279/0x360 [ 811.222371] ? tipc_setsockopt+0x726/0xd70 [ 811.226624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 811.232159] ? sockfd_lookup_light+0xc5/0x160 [ 811.236678] __sys_sendmsg+0x11d/0x290 [ 811.240573] ? __ia32_sys_shutdown+0x80/0x80 [ 811.244996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 811.250575] ? fput+0x130/0x1a0 [ 811.253936] ? __x64_sys_futex+0x47f/0x6a0 [ 811.258190] ? do_syscall_64+0x9a/0x820 [ 811.262194] ? do_syscall_64+0x9a/0x820 [ 811.266191] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 811.271305] __x64_sys_sendmsg+0x78/0xb0 [ 811.275370] do_syscall_64+0x1b9/0x820 [ 811.279274] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 811.284644] ? syscall_return_slowpath+0x5e0/0x5e0 [ 811.289574] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 811.294593] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 811.299626] ? recalc_sigpending_tsk+0x180/0x180 [ 811.304387] ? kasan_check_write+0x14/0x20 [ 811.308647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 811.313509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.318735] RIP: 0033:0x457099 [ 811.321928] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 811.340836] RSP: 002b:00007fdaa2653c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 811.348546] RAX: ffffffffffffffda RBX: 00007fdaa26546d4 RCX: 0000000000457099 [ 811.355815] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 811.363095] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 811.370373] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 811.377672] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 811.384985] [ 811.386623] Allocated by task 5382: [ 811.390249] save_stack+0x43/0xd0 [ 811.393699] kasan_kmalloc+0xc4/0xe0 [ 811.397414] kmem_cache_alloc_trace+0x152/0x730 [ 811.402089] tipc_group_create+0x155/0xa70 [ 811.406319] tipc_setsockopt+0x2d1/0xd70 [ 811.410393] __sys_setsockopt+0x1c5/0x3b0 [ 811.414553] __x64_sys_setsockopt+0xbe/0x150 [ 811.418960] do_syscall_64+0x1b9/0x820 [ 811.422846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.428027] [ 811.429649] Freed by task 5381: [ 811.432936] save_stack+0x43/0xd0 [ 811.436404] __kasan_slab_free+0x11a/0x170 [ 811.440658] kasan_slab_free+0xe/0x10 [ 811.444462] kfree+0xd9/0x210 [ 811.447583] tipc_group_delete+0x2e5/0x3f0 [ 811.451828] tipc_sk_leave+0x113/0x220 [ 811.455714] tipc_release+0x14e/0x12b0 [ 811.459616] __sock_release+0xd7/0x250 [ 811.463503] sock_close+0x19/0x20 [ 811.466959] __fput+0x38a/0xa40 [ 811.470287] ____fput+0x15/0x20 [ 811.473609] task_work_run+0x1e8/0x2a0 [ 811.477497] exit_to_usermode_loop+0x318/0x380 [ 811.482087] do_syscall_64+0x6be/0x820 [ 811.485972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.491148] [ 811.492783] The buggy address belongs to the object at ffff8801ce369000 [ 811.492783] which belongs to the cache kmalloc-192 of size 192 [ 811.505485] The buggy address is located 92 bytes inside of [ 811.505485] 192-byte region [ffff8801ce369000, ffff8801ce3690c0) [ 811.517268] The buggy address belongs to the page: [ 811.522205] page:ffffea000738da40 count:1 mapcount:0 mapping:ffff8801dac00040 index:0xffff8801ce369f00 [ 811.531648] flags: 0x2fffc0000000100(slab) [ 811.535894] raw: 02fffc0000000100 ffffea0007371308 ffff8801dac01138 ffff8801dac00040 [ 811.543778] raw: ffff8801ce369f00 ffff8801ce369000 000000010000000c 0000000000000000 [ 811.551652] page dumped because: kasan: bad access detected [ 811.557356] [ 811.558981] Memory state around the buggy address: [ 811.563926] ffff8801ce368f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 811.571319] ffff8801ce368f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 811.578695] >ffff8801ce369000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 811.586058] ^ [ 811.592285] ffff8801ce369080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 811.599670] ffff8801ce369100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 811.607019] ================================================================== [ 811.614375] Disabling lock debugging due to kernel taint [ 811.619866] Kernel panic - not syncing: panic_on_warn set ... [ 811.619866] [ 811.627243] CPU: 0 PID: 5382 Comm: syz-executor0 Tainted: G B 4.19.0-rc1+ #218 [ 811.635898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.645244] Call Trace: [ 811.647848] dump_stack+0x1c9/0x2b4 [ 811.651482] ? dump_stack_print_info.cold.2+0x52/0x52 [ 811.656675] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 811.661451] panic+0x238/0x4e7 [ 811.664652] ? add_taint.cold.5+0x16/0x16 [ 811.668798] ? trace_hardirqs_on+0xb4/0x2c0 [ 811.673117] ? trace_hardirqs_on+0x9a/0x2c0 [ 811.677448] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 811.682550] kasan_end_report+0x47/0x4f [ 811.686531] kasan_report.cold.7+0x76/0x30d [ 811.690895] __asan_report_load4_noabort+0x14/0x20 [ 811.695821] tipc_group_fill_sock_diag+0x7b9/0x84b [ 811.700763] ? tipc_group_member_evt+0xe30/0xe30 [ 811.705517] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 811.710786] ? skb_put+0x17b/0x1e0 [ 811.714342] ? memset+0x31/0x40 [ 811.717621] ? memcpy+0x45/0x50 [ 811.720900] ? __nla_put+0x37/0x40 [ 811.724437] ? nla_put+0x11a/0x150 [ 811.727985] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 811.732657] ? tipc_diag_dump+0x30/0x30 [ 811.736628] ? tipc_getname+0x7f0/0x7f0 [ 811.740603] ? save_stack+0xa9/0xd0 [ 811.744253] ? print_usage_bug+0xc0/0xc0 [ 811.748309] ? graph_lock+0x170/0x170 [ 811.752105] ? graph_lock+0x170/0x170 [ 811.755916] ? __netlink_dump_start+0x4f1/0x6f0 [ 811.760583] ? sock_diag_rcv_msg+0x31d/0x410 [ 811.764998] ? netlink_rcv_skb+0x172/0x440 [ 811.769232] ? sock_diag_rcv+0x2a/0x40 [ 811.773115] ? netlink_unicast+0x5a0/0x760 [ 811.777358] ? netlink_sendmsg+0xa18/0xfc0 [ 811.781588] ? sock_sendmsg+0xd5/0x120 [ 811.785500] ? ___sys_sendmsg+0x7fd/0x930 [ 811.789656] ? __x64_sys_sendmsg+0x78/0xb0 [ 811.793885] ? do_syscall_64+0x1b9/0x820 [ 811.797940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.803307] ? lock_acquire+0x1e4/0x4f0 [ 811.807281] ? tipc_nl_sk_walk+0x60a/0xd30 [ 811.811510] ? lockdep_hardirqs_on+0x421/0x5c0 [ 811.816103] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 811.821119] ? skb_put+0x17b/0x1e0 [ 811.824660] ? __nlmsg_put+0x14c/0x1b0 [ 811.828567] __tipc_add_sock_diag+0x22f/0x360 [ 811.833058] tipc_nl_sk_walk+0x68d/0xd30 [ 811.837189] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 811.842472] ? __tipc_nl_add_sk+0x400/0x400 [ 811.846805] ? skb_scrub_packet+0x490/0x490 [ 811.851128] ? kasan_check_write+0x14/0x20 [ 811.855364] ? lock_downgrade+0x8f0/0x8f0 [ 811.859509] tipc_diag_dump+0x24/0x30 [ 811.863304] netlink_dump+0x519/0xd50 [ 811.867101] ? netlink_broadcast+0x50/0x50 [ 811.871339] __netlink_dump_start+0x4f1/0x6f0 [ 811.875839] ? kasan_check_read+0x11/0x20 [ 811.879984] tipc_sock_diag_handler_dump+0x234/0x340 [ 811.885080] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 811.889756] ? tipc_unregister_sysctl+0x20/0x20 [ 811.894418] ? netlink_deliver_tap+0x356/0xfb0 [ 811.899004] sock_diag_rcv_msg+0x31d/0x410 [ 811.903234] netlink_rcv_skb+0x172/0x440 [ 811.907297] ? sock_diag_bind+0x80/0x80 [ 811.911275] ? netlink_ack+0xbe0/0xbe0 [ 811.915156] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 811.919832] sock_diag_rcv+0x2a/0x40 [ 811.923555] netlink_unicast+0x5a0/0x760 [ 811.927617] ? netlink_attachskb+0x9a0/0x9a0 [ 811.932023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 811.937561] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 811.942584] netlink_sendmsg+0xa18/0xfc0 [ 811.946690] ? netlink_unicast+0x760/0x760 [ 811.950922] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 811.955852] ? apparmor_socket_sendmsg+0x29/0x30 [ 811.960606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 811.966149] ? security_socket_sendmsg+0x94/0xc0 [ 811.970925] ? netlink_unicast+0x760/0x760 [ 811.975160] sock_sendmsg+0xd5/0x120 [ 811.978909] ___sys_sendmsg+0x7fd/0x930 [ 811.982933] ? copy_msghdr_from_user+0x580/0x580 [ 811.987685] ? _raw_spin_unlock_bh+0x30/0x40 [ 811.992090] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 811.997195] ? do_raw_spin_unlock+0xa7/0x2f0 [ 812.001630] ? __release_sock+0x276/0x3a0 [ 812.005780] ? __fget_light+0x2f7/0x440 [ 812.009749] ? __local_bh_enable_ip+0x161/0x230 [ 812.014415] ? fget_raw+0x20/0x20 [ 812.017875] ? __release_sock+0x3a0/0x3a0 [ 812.022037] ? tipc_nametbl_build_group+0x279/0x360 [ 812.027054] ? tipc_setsockopt+0x726/0xd70 [ 812.031288] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 812.036820] ? sockfd_lookup_light+0xc5/0x160 [ 812.041311] __sys_sendmsg+0x11d/0x290 [ 812.045225] ? __ia32_sys_shutdown+0x80/0x80 [ 812.049627] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 812.055155] ? fput+0x130/0x1a0 [ 812.058439] ? __x64_sys_futex+0x47f/0x6a0 [ 812.062689] ? do_syscall_64+0x9a/0x820 [ 812.066661] ? do_syscall_64+0x9a/0x820 [ 812.070636] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 812.075739] __x64_sys_sendmsg+0x78/0xb0 [ 812.079800] do_syscall_64+0x1b9/0x820 [ 812.083703] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 812.089065] ? syscall_return_slowpath+0x5e0/0x5e0 [ 812.093990] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 812.099016] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 812.104029] ? recalc_sigpending_tsk+0x180/0x180 [ 812.108795] ? kasan_check_write+0x14/0x20 [ 812.113045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 812.117886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.123070] RIP: 0033:0x457099 [ 812.126293] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 812.145196] RSP: 002b:00007fdaa2653c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 812.152900] RAX: ffffffffffffffda RBX: 00007fdaa26546d4 RCX: 0000000000457099 [ 812.160161] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 812.167430] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 812.174702] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 812.181969] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 812.189606] Dumping ftrace buffer: [ 812.193143] (ftrace buffer empty) [ 812.196830] Kernel Offset: disabled [ 812.200456] Rebooting in 86400 seconds..