[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 21.042222] random: sshd: uninitialized urandom read (32 bytes read, 33 bits of entropy available) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.575238] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 24.066566] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 25.338987] random: sshd: uninitialized urandom read (32 bytes read, 105 bits of entropy available) [ 25.516838] random: sshd: uninitialized urandom read (32 bytes read, 107 bits of entropy available) Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts. [ 31.014801] random: sshd: uninitialized urandom read (32 bytes read, 112 bits of entropy available) executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 38.355909] ================================================================== [ 38.363310] BUG: KASAN: use-after-free in l2tp_session_queue_purge+0xf4/0x100 [ 38.370566] Read of size 4 at addr ffff8800ba6c6780 by task syz-executor816/5636 [ 38.378075] [ 38.379683] CPU: 1 PID: 5636 Comm: syz-executor816 Not tainted 4.4.138-gcf21a9a #64 [ 38.387454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.396788] 0000000000000000 3d4336ddebff43a9 ffff8800b995f8b0 ffffffff81e0ed0d [ 38.404891] ffffea0002e9b180 ffff8800ba6c6780 0000000000000000 ffff8800ba6c6780 [ 38.412893] ffffffff82f1a2b0 ffff8800b995f8e8 ffffffff81515a16 ffff8800ba6c6780 [ 38.420887] Call Trace: [ 38.423452] [] dump_stack+0xc1/0x124 [ 38.428799] [] ? sock_release+0x1c0/0x1c0 [ 38.434570] [] print_address_description+0x6c/0x216 [ 38.441206] [] ? sock_release+0x1c0/0x1c0 [ 38.446976] [] kasan_report.cold.7+0x175/0x2f7 [ 38.453315] [] ? l2tp_session_queue_purge+0xf4/0x100 [ 38.460059] [] __asan_report_load4_noabort+0x14/0x20 [ 38.466782] [] l2tp_session_queue_purge+0xf4/0x100 [ 38.473332] [] ? sock_release+0x1c0/0x1c0 [ 38.479102] [] pppol2tp_release+0x1ff/0x310 [ 38.485045] [] sock_release+0x96/0x1c0 [ 38.490555] [] sock_close+0x16/0x20 [ 38.495803] [] __fput+0x235/0x6f0 [ 38.500883] [] ____fput+0x15/0x20 [ 38.505957] [] task_work_run+0x10f/0x190 [ 38.511639] [] do_exit+0x9e5/0x26b0 [ 38.516900] [] ? debug_check_no_locks_freed+0x210/0x210 [ 38.523884] [] ? release_task.part.17+0x1200/0x1200 [ 38.530533] [] ? debug_check_no_locks_freed+0x210/0x210 [ 38.537519] [] ? recalc_sigpending+0x76/0xa0 [ 38.543547] [] do_group_exit+0x111/0x330 [ 38.549228] [] get_signal+0x4ec/0x14b0 [ 38.554745] [] do_signal+0x8b/0x1d30 [ 38.560078] [] ? setup_sigcontext+0x780/0x780 [ 38.566194] [] ? get_unused_fd_flags+0xd0/0xd0 [ 38.572396] [] ? kernel_sock_shutdown+0x80/0x80 [ 38.578687] [] ? SyS_futex+0x1f8/0x300 [ 38.584197] [] ? fd_install+0x4d/0x60 [ 38.589620] [] ? exit_to_usermode_loop+0xe4/0x160 [ 38.596080] [] exit_to_usermode_loop+0x11a/0x160 [ 38.602457] [] syscall_return_slowpath+0x1b5/0x1f0 [ 38.609009] [] int_ret_from_sys_call+0x25/0xa3 [ 38.615208] [ 38.616806] Allocated by task 5636: [ 38.620399] [] save_stack_trace+0x26/0x50 [ 38.626307] [] save_stack+0x43/0xd0 [ 38.631671] [] kasan_kmalloc+0xc7/0xe0 [ 38.637305] [] __kmalloc+0x124/0x310 [ 38.642756] [] l2tp_session_create+0x39/0x1030 [ 38.649443] [] pppol2tp_connect+0x10f0/0x1910 [ 38.655701] [] SYSC_connect+0x1b8/0x300 [ 38.661418] [] SyS_connect+0x24/0x30 [ 38.666884] [] entry_SYSCALL_64_fastpath+0x22/0x9e [ 38.673575] [ 38.675177] Freed by task 5588: [ 38.678422] [] save_stack_trace+0x26/0x50 [ 38.684313] [] save_stack+0x43/0xd0 [ 38.689703] [] kasan_slab_free+0x72/0xc0 [ 38.695505] [] kfree+0xf4/0x310 [ 38.700529] [] l2tp_session_free+0x170/0x200 [ 38.706686] [] l2tp_tunnel_closeall+0x2b9/0x350 [ 38.713122] [] l2tp_udp_encap_destroy+0x8b/0xf0 [ 38.719535] [] udpv6_destroy_sock+0xb1/0xd0 [ 38.725603] [] sk_common_release+0x6d/0x300 [ 38.731678] [] udp_lib_close+0x15/0x20 [ 38.737313] [] inet_release+0xff/0x1d0 [ 38.742947] [] inet6_release+0x50/0x70 [ 38.748575] [] sock_release+0x96/0x1c0 [ 38.754215] [] sock_close+0x16/0x20 [ 38.759605] [] __fput+0x235/0x6f0 [ 38.764808] [] ____fput+0x15/0x20 [ 38.769995] [] task_work_run+0x10f/0x190 [ 38.775790] [] do_exit+0x9e5/0x26b0 [ 38.781161] [] do_group_exit+0x111/0x330 [ 38.786958] [] SyS_exit_group+0x1d/0x20 [ 38.792669] [] entry_SYSCALL_64_fastpath+0x22/0x9e [ 38.799354] [ 38.800974] The buggy address belongs to the object at ffff8800ba6c6780 [ 38.800974] which belongs to the cache kmalloc-512 of size 512 [ 38.813601] The buggy address is located 0 bytes inside of [ 38.813601] 512-byte region [ffff8800ba6c6780, ffff8800ba6c6980) [ 38.825270] The buggy address belongs to the page: [ 38.849254] kasan: CONFIG_KASAN_INLINE enabled [ 38.853666] kasan: GPF could be caused by NULL-ptr deref or user memory accessgeneral protection fault: 0000 [#1] PREEMPT SMP KASAN [ 38.866606] Dumping ftrace buffer: [ 38.870114] (ftrace buffer empty) [ 38.873797] Modules linked in: [ 38.877081] CPU: 0 PID: 3839 Comm: sshd Not tainted 4.4.138-gcf21a9a #64 [ 38.883885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.893211] task: ffff8800ab809800 task.stack: ffff8800ba6c6980 [ 38.899852] RIP: 0010:[] [] debug_check_no_obj_freed+0x1a6/0x940 [ 38.909311] RSP: 0000:ffff8801d94374b8 EFLAGS: 00010807 [ 38.914731] RAX: 0000000000000286 RBX: 8580012500001604 RCX: ffffffff81e71d3e [ 38.921973] RDX: 10b00024a00002c0 RSI: 0000000000000004 RDI: ffff8800ba6c6998 [ 38.929214] RBP: ffff8801d94375a0 R08: ffff8801d9437538 R09: dead000000000200 [ 38.936456] R10: 0000000000000001 R11: ffff8800ab809800 R12: 8580012500001604 [ 38.943707] R13: dffffc0000000000 R14: ffffffff85a0c628 R15: 0000000000000000 [ 38.950951] FS: 0000000000000000(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 [ 38.959159] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 38.965014] CR2: 000000006980ffff CR3: 000000000440c000 CR4: 00000000001606f0 [ 38.972293] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 38.979537] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 38.986776] Stack: [ 38.988895] ffff8800ab80a0d8 ffff8801d9437538 ffffffff85a0c620 ffff88021fb55000 [ 38.996881] ffff88021fb55000 0000000000000004 0000000000000286 0000000000079e80 [ 39.004885] 1ffff1003b286ea3 ffff88021fb54000 fffffbfff0b418c4 ffff88021fb54000 [ 39.012900] Call Trace: [ 39.015467] [ 39.017505] Code: [ 39.019741] ------------[ cut here ]------------ [ 39.024485] WARNING: CPU: 0 PID: -1167300736 at include/linux/uaccess.h:15 __probe_kernel_read+0x1b9/0x200() [ 39.034420] Kernel panic - not syncing: panic_on_warn set ... [ 39.034420] SeaBIOS (version 1.8.2-20171130_102032-google) Total RAM Size = 0x00000001e0000000 = 7680 MiB CPUs found: 2 Max CPUs supported: 256 found virtio-scsi at 0:3 virtio-scsi vendor='Google' product='PersistentDisk' rev='1' type=0 removable=0 virtio-scsi blksize=512 sectors=4194304 = 2048 MiB drive 0x000f2290: PCHS=0/0/0 translation=lba LCHS=520/128/63 s=4194304 Booting from Hard Disk 0... early console in decompress_kernel input_data: 0x0000000003b5126e input_len: 0x00000000014cc07c output: 0x0000000001000000 output_len: 0x0000000004008a40 run_size: 0x0000000005752000 Decompressing Linux... Parsing ELF... done. Booting the kernel. [ 0.000000] Initializing cgroup subsys cpuset [ 0.000000] Initializing cgroup subsys cpu [ 0.000000] Initializing cgroup subsys cpuacct [ 0.000000] Initializing cgroup subsys schedtune [ 0.000000] Linux version 4.4.138-gcf21a9a (syzkaller@ci) (gcc version 8.0.1 20180413 (experimental) (GCC) ) #64 SMP PREEMPT Tue Jun 26 00:41:54 UTC 2018 [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native rodata=n ftrace_dump_on_oops=orig_cpu oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400 nopti [ 0.000000] KERNEL supported cpus: [ 0.000000] Intel GenuineIntel [ 0.000000] AMD AuthenticAMD [ 0.000000] Centaur CentaurHauls [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.000000] x86/fpu: Supporting XSAVE feature 0x01: 'x87 floating point registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x02: 'SSE registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x04: 'AVX registers' [ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. [ 0.000000] e820: BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable [ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000bfff2fff] usable [ 0.000000] BIOS-e820: [mem 0x00000000bfff3000-0x00000000bfffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fffbc000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable [ 0.000000] bootconsole [earlyser0] enabled [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] SMBIOS 2.4 present. [ 0.000000] Hypervisor detected: KVM [ 0.000000] Kernel/User page tables isolation: disabled [ 0.000000] e820: last_pfn = 0x220000 max_arch_pfn = 0x400000000 [ 0.000000] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WC UC- WT [ 0.000000] e820: last_pfn = 0xbfff3 max_arch_pfn = 0x400000000 [ 0.000000] found SMP MP-table at [mem 0x000f2310-0x000f231f] mapped at [ffff8800000f2310] [ 0.000000] Scanning 1 areas for low memory corruption [ 0.000000] Using GB pages for direct mapping [ 0.000000] ACPI: Early table checksum verification disabled [ 0.000000] ACPI: RSDP 0x00000000000F22D0 000014 (v00 Google) [ 0.000000] ACPI: RSDT 0x00000000BFFF3430 000038 (v01 Google GOOGRSDT 00000001 GOOG 00000001) [ 0.000000] ACPI: FACP 0x00000000BFFFCF60 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) [ 0.000000] ACPI: DSDT 0x00000000BFFF3470 0017B2 (v01 Google GOOGDSDT 00000001 GOOG 00000001) [ 0.000000] ACPI: FACS 0x00000000BFFFCF00 000040 [ 0.000000] ACPI: FACS 0x00000000BFFFCF00 000040 [ 0.000000] ACPI: SSDT 0x00000000BFFF65F0 00690D (v01 Google GOOGSSDT 00000001 GOOG 00000001) [ 0.000000] ACPI: APIC 0x00000000BFFF5D10 000076 (v01 Google GOOGAPIC 00000001 GOOG 00000001) [ 0.000000] ACPI: WAET 0x00000000BFFF5CE0 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) [ 0.000000] ACPI: SRAT 0x00000000BFFF4C30 0000C8 (v01 Google GOOGSRAT 00000001 GOOG 00000001) [ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00 [ 0.000000] kvm-clock: cpu 0, msr 2:1fffd001, primary cpu clock [ 0.000000] kvm-clock: using sched offset of 2482615117 cycles [ 0.000000] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns [ 0.000000] Zone ranges: [ 0.000000] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.000000] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.000000] Normal [mem 0x0000000100000000-0x000000021fffffff] [ 0.000000] Movable zone start for each node [ 0.000000] Early memory node ranges [ 0.000000] node 0: [mem 0x0000000000001000-0x000000000009efff] [ 0.000000] node 0: [mem 0x0000000000100000-0x00000000bfff2fff] [ 0.000000] node 0: [mem 0x0000000100000000-0x000000021fffffff] [ 0.000000] Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] [ 0.000000] kasan: KernelAddressSanitizer initialized [ 0.000000] ACPI: PM-Timer IO Port: 0xb008 [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) [ 0.000000] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) [ 0.000000] Using ACPI (MADT) for SMP configuration information [ 0.000000] smpboot: Allowing 2 CPUs, 0 hotplug CPUs [ 0.000000] PM: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.000000] PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] [ 0.000000] PM: Registered nosave memory: [mem 0x000a0000-0x000effff] [ 0.000000] PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] [ 0.000000] PM: Registered nosave memory: [mem 0xbfff3000-0xbfffffff] [ 0.000000] PM: Registered nosave memory: [mem 0xc0000000-0xfffbbfff] [ 0.000000] PM: Registered nosave memory: [mem 0xfffbc000-0xffffffff] [ 0.000000] e820: [mem 0xc0000000-0xfffbbfff] available for PCI devices [ 0.000000] Booting paravirtualized kernel on KVM [ 0.000000] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns [ 0.000000] setup_percpu: NR_CPUS:64 nr_cpumask_bits:64 nr_cpu_ids:2 nr_node_ids:1 [ 0.000000] PERCPU: Embedded 42 pages/cpu @ffff8801db200000 s134024 r8192 d29816 u1048576 [ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 1935227 [ 0.000000] Kernel command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native rodata=n ftrace_dump_on_oops=orig_cpu oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400 nopti [ 0.000000] PID hash table entries: 4096 (order: 3, 32768 bytes) [ 0.000000] Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes) [ 0.000000] Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes) [ 0.000000] Memory: 6579092K/7863876K available (41761K kernel code, 6302K rwdata, 9048K rodata, 1864K init, 23696K bss, 1284784K reserved, 0K cma-reserved) [ 0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 [ 0.000000] Running RCU self tests [ 0.000000] Preemptible hierarchical RCU implementation. [ 0.000000] RCU lockdep checking is enabled. [ 0.000000] Build-time adjustment of leaf fanout to 64. [ 0.000000] RCU restricting CPUs from NR_CPUS=64 to nr_cpu_ids=2. [ 0.000000] RCU: Adjusting geometry for rcu_fanout_leaf=64, nr_cpu_ids=2 [ 0.000000] NR_IRQS:4352 nr_irqs:440 16 [ 0.000000] console [ttyS0] enabled [ 0.000000] console [ttyS0] enabled [ 0.000000] bootconsole [earlyser0] disabled [ 0.000000] bootconsole [earlyser0] disabled [ 0.000000] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar [ 0.000000] ... MAX_LOCKDEP_SUBCLASSES: 8 [ 0.000000] ... MAX_LOCK_DEPTH: 48 [ 0.000000] ... MAX_LOCKDEP_KEYS: 8191 [ 0.000000] ... CLASSHASH_SIZE: 4096 [ 0.000000] ... MAX_LOCKDEP_ENTRIES: 32768 [ 0.000000] ... MAX_LOCKDEP_CHAINS: 65536 [ 0.000000] ... CHAINHASH_SIZE: 32768 [ 0.000000] memory used by lock dependency info: 8159 kB [ 0.000000] per task-struct memory footprint: 1920 bytes [ 0.000000] tsc: Detected 2300.000 MHz processor [ 1.201881] Calibrating delay loop (skipped) preset value.. 4600.00 BogoMIPS (lpj=23000000) [ 1.203099] pid_max: default: 32768 minimum: 301 [ 1.203846] ACPI: Core revision 20150930 [ 1.592855] ACPI: 2 ACPI AML tables successfully acquired and loaded [ 1.594139] Security Framework initialized [ 1.594712] SELinux: Initializing. [ 1.595373] AppArmor: AppArmor disabled by boot time parameter [ 1.596312] Mount-cache hash table entries: 16384 (order: 5, 131072 bytes) [ 1.597260] Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes) [ 1.600794] Initializing cgroup subsys io [ 1.601465] Initializing cgroup subsys freezer [ 1.602156] Initializing cgroup subsys hugetlb [ 1.602820] Initializing cgroup subsys debug [ 1.603676] CPU: Physical Processor ID: 0 [ 1.605609] mce: CPU supports 32 MCE banks [ 1.606427] Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 [ 1.607312] Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 [ 1.608259] Spectre V2 : Mitigation: Full generic retpoline [ 1.611439] Freeing SMP alternatives memory: 48K [ 1.620921] ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 [ 1.741197] smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) [ 1.743024] Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. [ 1.831475] x86: Booting SMP configuration: [ 1.832133] .... node #0, CPUs: #1 [ 1.833016] kvm-clock: cpu 1, msr 2:1fffd041, secondary cpu clock [ 1.837853] x86: Booted up 1 node, 2 CPUs [ 1.838467] smpboot: Total of 2 processors activated (9200.00 BogoMIPS) [ 1.843081] devtmpfs: initialized [ 1.853554] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns [ 1.854935] futex hash table entries: 512 (order: 4, 65536 bytes) [ 1.856664] xor: automatically using best checksumming function: [ 1.869022] kworker/u4:0 (21) used greatest stack depth: 27920 bytes left [ 1.951189] avx : 23522.800 MB/sec [ 1.952588] RTC time: 15:44:06, date: 07/03/18 [ 1.955785] NET: Registered protocol family 16 [ 1.957149] schedtune: init normalization constants... [ 1.958305] schedtune: no energy model data [ 1.959053] schedtune: disabled! [ 1.991451] cpuidle: using governor ladder [ 2.021251] cpuidle: using governor menu [ 2.022902] ACPI: bus type PCI registered [ 2.023664] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [ 2.026595] PCI: Using configuration type 1 for base access [ 2.037587] kworker/u4:0 (50) used greatest stack depth: 27424 bytes left [ 2.059075] kworker/u4:1 (105) used greatest stack depth: 27024 bytes left [ 2.461138] raid6: sse2x1 gen() 4673 MB/s [ 2.631067] raid6: sse2x1 xor() 2463 MB/s [ 2.801041] raid6: sse2x2 gen() 7598 MB/s [ 2.971006] raid6: sse2x2 xor() 4271 MB/s [ 3.140981] raid6: sse2x4 gen() 9892 MB/s [ 3.310957] raid6: sse2x4 xor() 5726 MB/s [ 3.480923] raid6: avx2x1 gen() 9406 MB/s [ 3.650897] raid6: avx2x2 gen() 14677 MB/s [ 3.820870] raid6: avx2x4 gen() 18544 MB/s [ 3.821580] raid6: using algorithm avx2x4 gen() 18544 MB/s [ 3.822408] raid6: using avx2x2 recovery algorithm [ 3.823907] ACPI: Added _OSI(Module Device) [ 3.825118] ACPI: Added _OSI(Processor Device) [ 3.825864] ACPI: Added _OSI(3.0 _SCP Extensions) [ 3.826609] ACPI: Added _OSI(Processor Aggregator Device) [ 3.853157] ACPI: Executed 2 blocks of module-level executable AML code [ 4.776646] ACPI: Interpreter enabled [ 4.777947] ACPI: (supports S0 S3 S4 S5) [ 4.778525] ACPI: Using IOAPIC for interrupt routing [ 4.779906] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug