[ 41.848600] audit: type=1800 audit(1559621699.833:32): pid=7523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 46.443423] kauditd_printk_skb: 2 callbacks suppressed [ 46.443437] audit: type=1400 audit(1559621704.503:35): avc: denied { map } for pid=7696 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.205' (ECDSA) to the list of known hosts. 2019/06/04 04:15:11 fuzzer started [ 53.059261] audit: type=1400 audit(1559621711.123:36): avc: denied { map } for pid=7705 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/04 04:15:14 dialing manager at 10.128.0.105:38735 2019/06/04 04:15:14 syscalls: 2460 2019/06/04 04:15:14 code coverage: enabled 2019/06/04 04:15:14 comparison tracing: enabled 2019/06/04 04:15:14 extra coverage: extra coverage is not supported by the kernel 2019/06/04 04:15:14 setuid sandbox: enabled 2019/06/04 04:15:14 namespace sandbox: enabled 2019/06/04 04:15:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/04 04:15:14 fault injection: enabled 2019/06/04 04:15:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/04 04:15:14 net packet injection: enabled 2019/06/04 04:15:14 net device setup: enabled 04:15:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000559000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) [ 58.997020] audit: type=1400 audit(1559621717.063:37): avc: denied { map } for pid=7722 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=3555 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 59.079885] IPVS: ftp: loaded support on port[0] = 21 [ 59.089364] NET: Registered protocol family 30 [ 59.093970] Failed to register TIPC socket type 04:15:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x28d}}, 0x4008000) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, 0x0, 0xf6, 0x201007fe, &(0x7f0000000300)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) syz_open_dev$evdev(0x0, 0xc2ac, 0x400000) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x06\x00\x00)\x86cJ\x0f\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$alg(r2, 0x0, 0x8005) write$P9_RATTACH(r2, 0x0, 0x0) socket(0x9, 0x800, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000000100)=[{&(0x7f0000000240)=""/189, 0xbd}, {&(0x7f0000001140)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x11, &(0x7f00000004c0)=0x3, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r4, 0x5386, &(0x7f0000000480)) [ 59.362064] IPVS: ftp: loaded support on port[0] = 21 [ 59.371063] NET: Registered protocol family 30 [ 59.375675] Failed to register TIPC socket type 04:15:17 executing program 2: r0 = socket(0x10, 0x20000000000003, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, 0x1c, 0x1ff}, 0x14}}, 0x0) [ 59.643399] IPVS: ftp: loaded support on port[0] = 21 [ 59.670336] NET: Registered protocol family 30 [ 59.674950] Failed to register TIPC socket type 04:15:17 executing program 3: r0 = socket$kcm(0x10, 0x4000000002, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00010006000000000009000e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) [ 60.113159] IPVS: ftp: loaded support on port[0] = 21 [ 60.153199] NET: Registered protocol family 30 [ 60.186477] Failed to register TIPC socket type 04:15:18 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) [ 60.699316] IPVS: ftp: loaded support on port[0] = 21 [ 60.728501] NET: Registered protocol family 30 [ 60.733166] Failed to register TIPC socket type 04:15:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780), 0x10) [ 61.173637] IPVS: ftp: loaded support on port[0] = 21 [ 61.190494] NET: Registered protocol family 30 [ 61.195105] Failed to register TIPC socket type [ 62.009302] chnl_net:caif_netlink_parms(): no params data found [ 62.412490] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.506528] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.544838] device bridge_slave_0 entered promiscuous mode [ 62.639638] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.646087] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.797551] device bridge_slave_1 entered promiscuous mode [ 63.249356] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.583351] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.019056] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.207951] team0: Port device team_slave_0 added [ 64.390478] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.536078] team0: Port device team_slave_1 added [ 64.864743] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.041353] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.391233] device hsr_slave_0 entered promiscuous mode [ 65.640388] device hsr_slave_1 entered promiscuous mode [ 65.821324] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 65.951417] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 66.156314] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.838437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.998912] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 67.198579] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 67.204850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.218762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.379213] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 67.385341] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.641200] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 67.798944] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 67.811713] IPVS: ftp: loaded support on port[0] = 21 [ 67.817289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.825227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.900092] NET: Registered protocol family 30 [ 67.904816] Failed to register TIPC socket type [ 67.937438] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.943947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.076786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.157379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.216829] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.223218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.322647] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 68.867892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.875359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.212399] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 69.557334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.737966] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 69.745123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.821633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.120232] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.494934] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 70.727390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.738807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.059106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 71.069522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.547052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.706333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 71.906364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.928124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.050251] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 72.131267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 72.288342] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 72.489407] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.692347] audit: type=1400 audit(1559621730.753:38): avc: denied { associate } for pid=7723 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 04:15:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000559000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 04:15:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000559000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 04:15:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000559000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) [ 73.955806] IPVS: ftp: loaded support on port[0] = 21 [ 73.964721] NET: Registered protocol family 30 [ 73.969843] Failed to register TIPC socket type 04:15:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000559000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 04:15:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000559000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 04:15:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000559000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 04:15:32 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) read$alg(r0, 0x0, 0x0) [ 75.537737] IPVS: ftp: loaded support on port[0] = 21 [ 75.540183] IPVS: ftp: loaded support on port[0] = 21 [ 75.546244] NET: Registered protocol family 30 [ 75.551934] list_add double add: new=ffffffff892e7630, prev=ffffffff890f3140, next=ffffffff892e7630. [ 75.564018] ------------[ cut here ]------------ [ 75.568808] kernel BUG at lib/list_debug.c:29! [ 75.574031] Failed to register TIPC socket type [ 75.578151] IPVS: ftp: loaded support on port[0] = 21 [ 75.580211] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 75.589285] CPU: 1 PID: 8394 Comm: syz-executor.5 Not tainted 4.19.47 #19 [ 75.596198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.605557] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 75.610734] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 a0 ae 81 87 e8 d0 f3 30 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 e0 af 81 87 e8 b9 f3 30 fe <0f> 0b 48 89 f1 48 c7 c7 60 af 81 87 4c 89 e6 e8 a5 f3 30 fe 0f 0b [ 75.629710] RSP: 0018:ffff88806c277b88 EFLAGS: 00010282 [ 75.635065] RAX: 0000000000000058 RBX: ffffffff892e74a0 RCX: 0000000000000000 [ 75.642323] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed100d84ef63 [ 75.649840] RBP: ffff88806c277ba0 R08: 0000000000000058 R09: ffffed1015d24fe9 [ 75.657095] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffffffff892e7630 [ 75.664348] R13: ffffffff892e7630 R14: ffffffff892e7630 R15: ffffffff892e75d0 [ 75.671608] FS: 00000000027a6940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 75.679820] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 75.685685] CR2: 0000000000a75e58 CR3: 0000000068cf3000 CR4: 00000000001406e0 [ 75.692942] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 75.700660] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 75.707915] Call Trace: [ 75.710493] ? mutex_lock_nested+0x16/0x20 [ 75.714731] proto_register+0x459/0x8e0 [ 75.718697] tipc_socket_init+0x1c/0x70 [ 75.722660] tipc_init_net+0x2ed/0x570 [ 75.726541] ? tipc_exit_net+0x40/0x40 [ 75.730418] ops_init+0xb3/0x410 [ 75.733787] setup_net+0x2d3/0x740 [ 75.737316] ? lock_acquire+0x16f/0x3f0 [ 75.741276] ? ops_init+0x410/0x410 [ 75.744978] copy_net_ns+0x1df/0x340 [ 75.748687] create_new_namespaces+0x400/0x7b0 [ 75.753258] unshare_nsproxy_namespaces+0xc2/0x200 [ 75.758179] ksys_unshare+0x440/0x980 [ 75.761983] ? walk_process_tree+0x2c0/0x2c0 [ 75.766383] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 75.771132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 75.776569] ? do_syscall_64+0x26/0x620 [ 75.780530] ? lockdep_hardirqs_on+0x415/0x5d0 [ 75.785104] __x64_sys_unshare+0x31/0x40 [ 75.789153] do_syscall_64+0xfd/0x620 [ 75.792941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 75.798115] RIP: 0033:0x45bd47 [ 75.801295] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 75.820184] RSP: 002b:00007ffcb1b57b48 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 75.827879] RAX: ffffffffffffffda RBX: 000000000075c9a8 RCX: 000000000045bd47 [ 75.835136] RDX: 0000000000000000 RSI: 00007ffcb1b57af0 RDI: 0000000040000000 [ 75.842390] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 75.849648] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000075c9a8 [ 75.856911] R13: 00007ffcb1b57db8 R14: 0000000000000000 R15: 0000000000000000 [ 75.864215] Modules linked in: [ 75.868863] ---[ end trace f51ab5d584b126f1 ]--- [ 75.873641] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 75.878857] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 a0 ae 81 87 e8 d0 f3 30 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 e0 af 81 87 e8 b9 f3 30 fe <0f> 0b 48 89 f1 48 c7 c7 60 af 81 87 4c 89 e6 e8 a5 f3 30 fe 0f 0b [ 75.898129] RSP: 0018:ffff88806c277b88 EFLAGS: 00010282 [ 75.903489] RAX: 0000000000000058 RBX: ffffffff892e74a0 RCX: 0000000000000000 [ 75.910799] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed100d84ef63 [ 75.918209] RBP: ffff88806c277ba0 R08: 0000000000000058 R09: ffffed1015d24fe9 [ 75.925473] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffffffff892e7630 [ 75.932774] R13: ffffffff892e7630 R14: ffffffff892e7630 R15: ffffffff892e75d0 [ 75.940091] FS: 00000000027a6940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 75.948427] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 75.954310] CR2: 0000000000a75e58 CR3: 0000000068cf3000 CR4: 00000000001406e0 [ 75.961608] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 75.968901] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 75.976243] Kernel panic - not syncing: Fatal exception [ 75.982730] Kernel Offset: disabled [ 75.986358] Rebooting in 86400 seconds..