[....] Starting OpenBSD Secure Shell server: sshd[ 23.955753] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 24.624135] random: sshd: uninitialized urandom read (32 bytes read) [ 24.871279] sshd (4647) used greatest stack depth: 17032 bytes left [ 24.895761] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 25.495306] random: sshd: uninitialized urandom read (32 bytes read) [ 570.925889] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.59' (ECDSA) to the list of known hosts. [ 576.545772] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/04 09:57:53 parsed 1 programs [ 577.701555] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/04 09:57:55 executed programs: 0 [ 578.820926] IPVS: ftp: loaded support on port[0] = 21 [ 578.928523] ip (4695) used greatest stack depth: 17000 bytes left [ 579.049372] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.055976] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.063613] device bridge_slave_0 entered promiscuous mode [ 579.081545] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.087906] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.095134] device bridge_slave_1 entered promiscuous mode [ 579.111231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 579.128211] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 579.172852] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 579.191749] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 579.258147] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 579.265905] team0: Port device team_slave_0 added [ 579.282223] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 579.289464] team0: Port device team_slave_1 added [ 579.305182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 579.321907] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 579.338986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 579.356622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 579.446216] ip (4767) used greatest stack depth: 16824 bytes left [ 579.485361] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.491793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.498648] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.505000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.969407] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 579.975590] 8021q: adding VLAN 0 to HW filter on device bond0 [ 580.021353] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 580.047207] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 580.076825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 580.083111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 580.090540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 580.131674] 8021q: adding VLAN 0 to HW filter on device team0 [ 581.119057] ================================================================== [ 581.126708] BUG: KASAN: use-after-free in tipc_group_fill_sock_diag+0x7b9/0x84b [ 581.134147] Read of size 4 at addr ffff8801ce79475c by task syz-executor0/5148 [ 581.141480] [ 581.143095] CPU: 1 PID: 5148 Comm: syz-executor0 Not tainted 4.19.0-rc2+ #220 [ 581.150410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.159756] Call Trace: [ 581.162387] dump_stack+0x1c9/0x2b4 [ 581.166006] ? dump_stack_print_info.cold.2+0x52/0x52 [ 581.171211] ? printk+0xa7/0xcf [ 581.174488] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 581.179248] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 581.184403] print_address_description+0x6c/0x20b [ 581.189244] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 581.194334] kasan_report.cold.7+0x242/0x30d [ 581.198792] __asan_report_load4_noabort+0x14/0x20 [ 581.203711] tipc_group_fill_sock_diag+0x7b9/0x84b [ 581.208630] ? tipc_group_member_evt+0xe30/0xe30 [ 581.213369] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 581.218426] ? skb_put+0x17b/0x1e0 [ 581.221955] ? memset+0x31/0x40 [ 581.225218] ? memcpy+0x45/0x50 [ 581.228515] ? __nla_put+0x37/0x40 [ 581.232040] ? nla_put+0x11a/0x150 [ 581.235611] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 581.240302] ? tipc_diag_dump+0x30/0x30 [ 581.244281] ? tipc_getname+0x7f0/0x7f0 [ 581.248331] ? save_stack+0xa9/0xd0 [ 581.251948] ? save_stack+0x43/0xd0 [ 581.255558] ? kasan_kmalloc+0xc4/0xe0 [ 581.259428] ? __kmalloc_node_track_caller+0x47/0x70 [ 581.264511] ? graph_lock+0x170/0x170 [ 581.268326] ? __netlink_dump_start+0x4f1/0x6f0 [ 581.273009] ? sock_diag_rcv_msg+0x31d/0x410 [ 581.277400] ? netlink_rcv_skb+0x172/0x440 [ 581.281616] ? sock_diag_rcv+0x2a/0x40 [ 581.285483] ? netlink_unicast+0x5a0/0x760 [ 581.289711] ? netlink_sendmsg+0xa18/0xfc0 [ 581.293972] ? sock_sendmsg+0xd5/0x120 [ 581.297864] ? ___sys_sendmsg+0x7fd/0x930 [ 581.301996] ? __x64_sys_sendmsg+0x78/0xb0 [ 581.306214] ? do_syscall_64+0x1b9/0x820 [ 581.310346] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.315701] ? mark_held_locks+0xc9/0x160 [ 581.319834] ? lock_acquire+0x1e4/0x4f0 [ 581.323836] ? tipc_nl_sk_walk+0x60a/0xd30 [ 581.328063] ? tipc_nl_sk_walk+0x311/0xd30 [ 581.332286] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 581.337288] ? skb_put+0x17b/0x1e0 [ 581.340851] ? __nlmsg_put+0x14c/0x1b0 [ 581.344733] __tipc_add_sock_diag+0x22f/0x360 [ 581.349223] tipc_nl_sk_walk+0x68d/0xd30 [ 581.353317] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 581.358584] ? __tipc_nl_add_sk+0x400/0x400 [ 581.362891] ? skb_scrub_packet+0x490/0x490 [ 581.367201] ? kasan_check_write+0x14/0x20 [ 581.371461] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 581.376523] ? lock_downgrade+0x8f0/0x8f0 [ 581.380688] tipc_diag_dump+0x24/0x30 [ 581.384497] netlink_dump+0x519/0xd50 [ 581.388302] ? netlink_broadcast+0x50/0x50 [ 581.392552] __netlink_dump_start+0x4f1/0x6f0 [ 581.397053] ? kasan_check_read+0x11/0x20 [ 581.401222] tipc_sock_diag_handler_dump+0x234/0x340 [ 581.406345] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 581.411025] ? tipc_unregister_sysctl+0x20/0x20 [ 581.415698] ? netlink_deliver_tap+0x356/0xfb0 [ 581.420291] sock_diag_rcv_msg+0x31d/0x410 [ 581.424532] netlink_rcv_skb+0x172/0x440 [ 581.428594] ? sock_diag_bind+0x80/0x80 [ 581.432573] ? netlink_ack+0xbe0/0xbe0 [ 581.436461] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 581.441153] sock_diag_rcv+0x2a/0x40 [ 581.444885] netlink_unicast+0x5a0/0x760 [ 581.448951] ? netlink_attachskb+0x9a0/0x9a0 [ 581.453388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 581.458935] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 581.463962] netlink_sendmsg+0xa18/0xfc0 [ 581.468030] ? netlink_unicast+0x760/0x760 [ 581.472357] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 581.477310] ? apparmor_socket_sendmsg+0x29/0x30 [ 581.482081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 581.487664] ? security_socket_sendmsg+0x94/0xc0 [ 581.492429] ? netlink_unicast+0x760/0x760 [ 581.496673] sock_sendmsg+0xd5/0x120 [ 581.500393] ___sys_sendmsg+0x7fd/0x930 [ 581.504370] ? __switch_to_asm+0x40/0x70 [ 581.508433] ? __switch_to_asm+0x40/0x70 [ 581.512499] ? copy_msghdr_from_user+0x580/0x580 [ 581.517274] ? __sched_text_start+0x8/0x8 [ 581.521429] ? __fget_light+0x2f7/0x440 [ 581.525405] ? __local_bh_enable_ip+0x161/0x230 [ 581.530078] ? fget_raw+0x20/0x20 [ 581.533547] ? __release_sock+0x3a0/0x3a0 [ 581.537721] ? tipc_nametbl_build_group+0x279/0x360 [ 581.542746] ? tipc_setsockopt+0x726/0xd70 [ 581.546990] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 581.552531] ? sockfd_lookup_light+0xc5/0x160 [ 581.557030] __sys_sendmsg+0x11d/0x290 [ 581.560927] ? __ia32_sys_shutdown+0x80/0x80 [ 581.565340] ? fput+0x130/0x1a0 [ 581.568636] ? __x64_sys_futex+0x47f/0x6a0 [ 581.572882] ? do_syscall_64+0x9a/0x820 [ 581.576859] ? do_syscall_64+0x9a/0x820 [ 581.581016] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 581.586148] __x64_sys_sendmsg+0x78/0xb0 [ 581.590234] do_syscall_64+0x1b9/0x820 [ 581.594133] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 581.599504] ? syscall_return_slowpath+0x5e0/0x5e0 [ 581.604438] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 581.609282] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 581.614304] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 581.619326] ? prepare_exit_to_usermode+0x291/0x3b0 [ 581.624359] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 581.629221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.634410] RIP: 0033:0x457099 [ 581.637612] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 581.656524] RSP: 002b:00007fb793e18c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 581.664234] RAX: ffffffffffffffda RBX: 00007fb793e196d4 RCX: 0000000000457099 [ 581.671504] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 581.678983] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 581.686252] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 581.693519] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 581.700794] [ 581.702428] Allocated by task 5148: [ 581.706060] save_stack+0x43/0xd0 [ 581.709513] kasan_kmalloc+0xc4/0xe0 [ 581.713233] kmem_cache_alloc_trace+0x152/0x730 [ 581.717919] tipc_group_create+0x155/0xa70 [ 581.722186] tipc_setsockopt+0x2d1/0xd70 [ 581.726253] __sys_setsockopt+0x1c5/0x3b0 [ 581.730404] __x64_sys_setsockopt+0xbe/0x150 [ 581.734828] do_syscall_64+0x1b9/0x820 [ 581.738742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.743932] [ 581.745563] Freed by task 5147: [ 581.748856] save_stack+0x43/0xd0 [ 581.752309] __kasan_slab_free+0x11a/0x170 [ 581.756544] kasan_slab_free+0xe/0x10 [ 581.760348] kfree+0xd9/0x210 [ 581.763466] tipc_group_delete+0x2e5/0x3f0 [ 581.767705] tipc_sk_leave+0x113/0x220 [ 581.771592] tipc_release+0x14e/0x12b0 [ 581.775485] __sock_release+0xd7/0x250 [ 581.779905] sock_close+0x19/0x20 [ 581.783364] __fput+0x38a/0xa40 [ 581.786652] ____fput+0x15/0x20 [ 581.789932] task_work_run+0x1e8/0x2a0 [ 581.793825] exit_to_usermode_loop+0x318/0x380 [ 581.798412] do_syscall_64+0x6be/0x820 [ 581.802301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.807484] [ 581.809122] The buggy address belongs to the object at ffff8801ce794700 [ 581.809122] which belongs to the cache kmalloc-192 of size 192 [ 581.821804] The buggy address is located 92 bytes inside of [ 581.821804] 192-byte region [ffff8801ce794700, ffff8801ce7947c0) [ 581.833591] The buggy address belongs to the page: [ 581.838534] page:ffffea000739e500 count:1 mapcount:0 mapping:ffff8801dac00040 index:0x0 [ 581.846687] flags: 0x2fffc0000000100(slab) [ 581.850926] raw: 02fffc0000000100 ffffea000739e248 ffff8801dac01148 ffff8801dac00040 [ 581.858811] raw: 0000000000000000 ffff8801ce794000 0000000100000010 0000000000000000 [ 581.866684] page dumped because: kasan: bad access detected [ 581.872403] [ 581.874021] Memory state around the buggy address: [ 581.878950] ffff8801ce794600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 581.886307] ffff8801ce794680: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 581.893675] >ffff8801ce794700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 581.901037] ^ [ 581.907282] ffff8801ce794780: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 581.914657] ffff8801ce794800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 581.922012] ================================================================== [ 581.929379] Disabling lock debugging due to kernel taint [ 581.934878] Kernel panic - not syncing: panic_on_warn set ... [ 581.934878] [ 581.942261] CPU: 1 PID: 5148 Comm: syz-executor0 Tainted: G B 4.19.0-rc2+ #220 [ 581.950916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.960263] Call Trace: [ 581.962858] dump_stack+0x1c9/0x2b4 [ 581.966485] ? dump_stack_print_info.cold.2+0x52/0x52 [ 581.971693] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 581.976449] panic+0x238/0x4e7 [ 581.979663] ? add_taint.cold.5+0x16/0x16 [ 581.983817] ? trace_hardirqs_on+0xb4/0x2c0 [ 581.988156] ? trace_hardirqs_on+0x9a/0x2c0 [ 581.992509] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 581.997608] kasan_end_report+0x47/0x4f [ 582.001581] kasan_report.cold.7+0x76/0x30d [ 582.005904] __asan_report_load4_noabort+0x14/0x20 [ 582.010829] tipc_group_fill_sock_diag+0x7b9/0x84b [ 582.015760] ? tipc_group_member_evt+0xe30/0xe30 [ 582.020528] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 582.025564] ? skb_put+0x17b/0x1e0 [ 582.029136] ? memset+0x31/0x40 [ 582.032417] ? memcpy+0x45/0x50 [ 582.035697] ? __nla_put+0x37/0x40 [ 582.039235] ? nla_put+0x11a/0x150 [ 582.042779] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 582.047450] ? tipc_diag_dump+0x30/0x30 [ 582.051427] ? tipc_getname+0x7f0/0x7f0 [ 582.055402] ? save_stack+0xa9/0xd0 [ 582.059026] ? save_stack+0x43/0xd0 [ 582.062656] ? kasan_kmalloc+0xc4/0xe0 [ 582.066555] ? __kmalloc_node_track_caller+0x47/0x70 [ 582.071658] ? graph_lock+0x170/0x170 [ 582.075456] ? __netlink_dump_start+0x4f1/0x6f0 [ 582.080161] ? sock_diag_rcv_msg+0x31d/0x410 [ 582.084581] ? netlink_rcv_skb+0x172/0x440 [ 582.088813] ? sock_diag_rcv+0x2a/0x40 [ 582.092705] ? netlink_unicast+0x5a0/0x760 [ 582.096948] ? netlink_sendmsg+0xa18/0xfc0 [ 582.101193] ? sock_sendmsg+0xd5/0x120 [ 582.105077] ? ___sys_sendmsg+0x7fd/0x930 [ 582.109241] ? __x64_sys_sendmsg+0x78/0xb0 [ 582.113479] ? do_syscall_64+0x1b9/0x820 [ 582.117536] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.122895] ? mark_held_locks+0xc9/0x160 [ 582.127046] ? lock_acquire+0x1e4/0x4f0 [ 582.131019] ? tipc_nl_sk_walk+0x60a/0xd30 [ 582.135288] ? tipc_nl_sk_walk+0x311/0xd30 [ 582.139524] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 582.144580] ? skb_put+0x17b/0x1e0 [ 582.148133] ? __nlmsg_put+0x14c/0x1b0 [ 582.152022] __tipc_add_sock_diag+0x22f/0x360 [ 582.156522] tipc_nl_sk_walk+0x68d/0xd30 [ 582.160585] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 582.165875] ? __tipc_nl_add_sk+0x400/0x400 [ 582.170203] ? skb_scrub_packet+0x490/0x490 [ 582.174548] ? kasan_check_write+0x14/0x20 [ 582.178816] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 582.183760] ? lock_downgrade+0x8f0/0x8f0 [ 582.187907] tipc_diag_dump+0x24/0x30 [ 582.191723] netlink_dump+0x519/0xd50 [ 582.195535] ? netlink_broadcast+0x50/0x50 [ 582.199768] __netlink_dump_start+0x4f1/0x6f0 [ 582.204257] ? kasan_check_read+0x11/0x20 [ 582.208408] tipc_sock_diag_handler_dump+0x234/0x340 [ 582.213509] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 582.218181] ? tipc_unregister_sysctl+0x20/0x20 [ 582.222854] ? netlink_deliver_tap+0x356/0xfb0 [ 582.227441] sock_diag_rcv_msg+0x31d/0x410 [ 582.231680] netlink_rcv_skb+0x172/0x440 [ 582.235739] ? sock_diag_bind+0x80/0x80 [ 582.239712] ? netlink_ack+0xbe0/0xbe0 [ 582.243597] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 582.248271] sock_diag_rcv+0x2a/0x40 [ 582.251995] netlink_unicast+0x5a0/0x760 [ 582.256056] ? netlink_attachskb+0x9a0/0x9a0 [ 582.260468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 582.266006] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 582.271032] netlink_sendmsg+0xa18/0xfc0 [ 582.275095] ? netlink_unicast+0x760/0x760 [ 582.279341] ? aa_sock_msg_perm.isra.13+0xba/0x160 [ 582.284277] ? apparmor_socket_sendmsg+0x29/0x30 [ 582.289033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 582.294574] ? security_socket_sendmsg+0x94/0xc0 [ 582.299325] ? netlink_unicast+0x760/0x760 [ 582.303562] sock_sendmsg+0xd5/0x120 [ 582.307283] ___sys_sendmsg+0x7fd/0x930 [ 582.311254] ? __switch_to_asm+0x40/0x70 [ 582.315318] ? __switch_to_asm+0x40/0x70 [ 582.319384] ? copy_msghdr_from_user+0x580/0x580 [ 582.324150] ? __sched_text_start+0x8/0x8 [ 582.328302] ? __fget_light+0x2f7/0x440 [ 582.332276] ? __local_bh_enable_ip+0x161/0x230 [ 582.336945] ? fget_raw+0x20/0x20 [ 582.340398] ? __release_sock+0x3a0/0x3a0 [ 582.344545] ? tipc_nametbl_build_group+0x279/0x360 [ 582.349570] ? tipc_setsockopt+0x726/0xd70 [ 582.353823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 582.359387] ? sockfd_lookup_light+0xc5/0x160 [ 582.363884] __sys_sendmsg+0x11d/0x290 [ 582.367767] ? __ia32_sys_shutdown+0x80/0x80 [ 582.372226] ? fput+0x130/0x1a0 [ 582.375512] ? __x64_sys_futex+0x47f/0x6a0 [ 582.379747] ? do_syscall_64+0x9a/0x820 [ 582.383737] ? do_syscall_64+0x9a/0x820 [ 582.387716] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 582.392821] __x64_sys_sendmsg+0x78/0xb0 [ 582.396883] do_syscall_64+0x1b9/0x820 [ 582.400774] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 582.406148] ? syscall_return_slowpath+0x5e0/0x5e0 [ 582.411076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 582.416274] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 582.421290] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 582.426308] ? prepare_exit_to_usermode+0x291/0x3b0 [ 582.431330] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 582.436181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.441366] RIP: 0033:0x457099 [ 582.444571] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 582.463492] RSP: 002b:00007fb793e18c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 582.471210] RAX: ffffffffffffffda RBX: 00007fb793e196d4 RCX: 0000000000457099 [ 582.478487] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 582.485750] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 582.493130] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 582.500397] R13: 00000000004d4860 R14: 00000000004c8ebd R15: 0000000000000000 [ 582.507955] Dumping ftrace buffer: [ 582.511492] (ftrace buffer empty) [ 582.515179] Kernel Offset: disabled [ 582.518852] Rebooting in 86400 seconds..