./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3447384402 <...> Warning: Permanently added '10.128.0.34' (ECDSA) to the list of known hosts. execve("./syz-executor3447384402", ["./syz-executor3447384402"], 0x7fff7ba2cab0 /* 10 vars */) = 0 brk(NULL) = 0x55555672f000 brk(0x55555672fd00) = 0x55555672fd00 arch_prctl(ARCH_SET_FS, 0x55555672f3c0) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor3447384402", 4096) = 28 brk(0x555556750d00) = 0x555556750d00 brk(0x555556751000) = 0x555556751000 mprotect(0x7f7d506b8000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 rt_sigaction(SIGRTMIN, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGSEGV, {sa_handler=0x7f7d506080a0, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7f7d50608e30}, NULL, 8) = 0 rt_sigaction(SIGBUS, {sa_handler=0x7f7d506080a0, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7f7d50608e30}, NULL, 8) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 3606 attached , child_tidptr=0x55555672f690) = 3606 [pid 3605] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 3606] openat(AT_FDCWD, "/dev/loop0", O_RDWR./strace-static-x86_64: Process 3607 attached [pid 3605] <... clone resumed>, child_tidptr=0x55555672f690) = 3607 [pid 3605] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 3606] <... openat resumed>) = 3 ./strace-static-x86_64: Process 3608 attached [pid 3607] openat(AT_FDCWD, "/dev/loop1", O_RDWR [pid 3606] ioctl(3, LOOP_CLR_FD [pid 3605] <... clone resumed>, child_tidptr=0x55555672f690) = 3608 [pid 3608] openat(AT_FDCWD, "/dev/loop2", O_RDWR [pid 3607] <... openat resumed>) = 3 [pid 3605] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 3607] ioctl(3, LOOP_CLR_FD) = -1 ENXIO (No such device or address) [pid 3605] <... clone resumed>, child_tidptr=0x55555672f690) = 3609 [pid 3607] close(3 [pid 3605] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 3607] <... close resumed>) = 0 [pid 3607] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55555672f690) = 3610 ./strace-static-x86_64: Process 3609 attached [pid 3609] openat(AT_FDCWD, "/dev/loop3", O_RDWR) = 3 [pid 3609] ioctl(3, LOOP_CLR_FD) = -1 ENXIO (No such device or address) [pid 3609] close(3 [pid 3605] <... clone resumed>, child_tidptr=0x55555672f690) = 3611 [pid 3606] <... ioctl resumed>) = -1 ENXIO (No such device or address) [pid 3605] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 3606] close(3 [pid 3609] <... close resumed>) = 0 [pid 3606] <... close resumed>) = 0 [pid 3605] <... clone resumed>, child_tidptr=0x55555672f690) = 3612 [pid 3608] <... openat resumed>) = 3 ./strace-static-x86_64: Process 3612 attached [pid 3606] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 3608] ioctl(3, LOOP_CLR_FD [pid 3609] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 3608] <... ioctl resumed>) = -1 ENXIO (No such device or address) [pid 3606] <... clone resumed>, child_tidptr=0x55555672f690) = 3613 [pid 3612] openat(AT_FDCWD, "/dev/loop5", O_RDWR [pid 3608] close(3 [pid 3612] <... openat resumed>) = 3 [pid 3608] <... close resumed>) = 0 ./strace-static-x86_64: Process 3610 attached [pid 3612] ioctl(3, LOOP_CLR_FD [pid 3609] <... clone resumed>, child_tidptr=0x55555672f690) = 3614 [pid 3608] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 3612] <... ioctl resumed>) = -1 ENXIO (No such device or address) [pid 3610] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 3608] <... clone resumed>, child_tidptr=0x55555672f690) = 3615 [pid 3612] close(3./strace-static-x86_64: Process 3613 attached ./strace-static-x86_64: Process 3611 attached ) = 0 [pid 3610] <... prctl resumed>) = 0 ./strace-static-x86_64: Process 3615 attached [pid 3613] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 3612] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 3611] openat(AT_FDCWD, "/dev/loop4", O_RDWR [pid 3610] setpgid(0, 0./strace-static-x86_64: Process 3614 attached [pid 3615] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 3613] <... prctl resumed>) = 0 [pid 3611] <... openat resumed>) = 3 [pid 3610] <... setpgid resumed>) = 0 [pid 3615] <... prctl resumed>) = 0 [pid 3614] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 3613] setpgid(0, 0 [pid 3612] <... clone resumed>, child_tidptr=0x55555672f690) = 3617 [pid 3611] ioctl(3, LOOP_CLR_FD [pid 3610] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 3615] setpgid(0, 0 [pid 3614] <... prctl resumed>) = 0 [pid 3613] <... setpgid resumed>) = 0 [pid 3611] <... ioctl resumed>) = -1 ENXIO (No such device or address) [pid 3610] <... openat resumed>) = 3 ./strace-static-x86_64: Process 3617 attached [pid 3615] <... setpgid resumed>) = 0 [pid 3614] setpgid(0, 0 [pid 3613] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 3611] close(3 [pid 3610] write(3, "1000", 4 [pid 3617] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 3615] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 3614] <... setpgid resumed>) = 0 [pid 3613] <... openat resumed>) = 3 [pid 3611] <... close resumed>) = 0 [pid 3610] <... write resumed>) = 4 [pid 3617] <... prctl resumed>) = 0 [pid 3615] <... openat resumed>) = 3 [pid 3614] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 3613] write(3, "1000", 4 [pid 3611] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 3610] close(3 [pid 3617] setpgid(0, 0 [pid 3615] write(3, "1000", 4 [pid 3614] <... openat resumed>) = 3 [pid 3613] <... write resumed>) = 4 [pid 3610] <... close resumed>) = 0 [pid 3617] <... setpgid resumed>) = 0 [pid 3615] <... write resumed>) = 4 [pid 3614] write(3, "1000", 4 [pid 3613] close(3 [pid 3611] <... clone resumed>, child_tidptr=0x55555672f690) = 3618 [pid 3610] pipe2( [pid 3617] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 3615] close(3 [pid 3614] <... write resumed>) = 4 [pid 3613] <... close resumed>) = 0 [pid 3610] <... pipe2 resumed>[3, 4], 0) = 0 [pid 3617] <... openat resumed>) = 3 [pid 3615] <... close resumed>) = 0 [pid 3614] close(3 [pid 3613] pipe2( [pid 3610] write(-1, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 24./strace-static-x86_64: Process 3618 attached [pid 3617] write(3, "1000", 4 [pid 3615] pipe2( [pid 3614] <... close resumed>) = 0 [pid 3613] <... pipe2 resumed>[3, 4], 0) = 0 [pid 3610] <... write resumed>) = -1 EBADF (Bad file descriptor) [pid 3618] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 3617] <... write resumed>) = 4 [pid 3615] <... pipe2 resumed>[3, 4], 0) = 0 [pid 3614] pipe2( [pid 3613] write(-1, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 24 [pid 3610] mkdir("./file0", 0777 [pid 3618] <... prctl resumed>) = 0 [pid 3617] close(3 [pid 3615] write(-1, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 24 [pid 3614] <... pipe2 resumed>[3, 4], 0) = 0 [pid 3613] <... write resumed>) = -1 EBADF (Bad file descriptor) [pid 3618] setpgid(0, 0 [pid 3617] <... close resumed>) = 0 [pid 3615] <... write resumed>) = -1 EBADF (Bad file descriptor) [pid 3614] write(-1, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 24 [pid 3613] mkdir("./file0", 0777 [pid 3610] <... mkdir resumed>) = 0 [pid 3618] <... setpgid resumed>) = 0 [pid 3617] pipe2( [pid 3615] mkdir("./file0", 0777 [pid 3614] <... write resumed>) = -1 EBADF (Bad file descriptor) [pid 3613] <... mkdir resumed>) = -1 EEXIST (File exists) [pid 3610] --- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=NULL} --- [pid 3618] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 3617] <... pipe2 resumed>[3, 4], 0) = 0 [pid 3615] <... mkdir resumed>) = -1 EEXIST (File exists) [pid 3614] mkdir("./file0", 0777 [pid 3613] --- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=NULL} --- [pid 3610] mount(NULL, "./file0", "9p", 0, "\x74\x72\x61\x6e\x73\x3d\x66\x64\x2c\x72\x66\x64\x6e\x6f\x3d\x30\x78\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x33\x2c\x77\x66\x64\x6e\x6f\x3d\x30\x78\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x30\x34\x2c\x66\x73\x63\x61\x63\x68\x65\x2c\x63\x61\x63\x68\x65\x74\x61\x67\x3d\x7b\x42\xd2\x48\x11\x50\xa1\x4d\x73\xe9\x80\xac\x4d\xe9\xf5\x75\xd7\x68\x42\x19\x67\x4a\x1a\xbd"... [pid 3618] <... openat resumed>) = 3 [pid 3617] write(-1, "\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 24 [pid 3615] --- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=NULL} --- [pid 3614] <... mkdir resumed>) = -1 EEXIST (File exists) syzkaller login: [ 43.716504][ T3613] ================================================================== [ 43.724613][ T3613] BUG: KASAN: slab-out-of-bounds in memcmp+0x16f/0x1c0 [ 43.731527][ T3613] Read of size 8 at addr ffff888016f3aa90 by task syz-executor344/3613 [ 43.739868][ T3613] [ 43.742202][ T3613] CPU: 0 PID: 3613 Comm: syz-executor344 Not tainted 6.0.0-rc2-syzkaller-00327-g8379c0b31fbc #0 [ 43.752869][ T3613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 43.763010][ T3613] Call Trace: [ 43.766304][ T3613] [ 43.769311][ T3613] dump_stack_lvl+0xcd/0x134 [ 43.773906][ T3613] print_report.cold+0x2ba/0x719 [ 43.778856][ T3613] ? memcmp+0x16f/0x1c0 [ 43.783008][ T3613] kasan_report+0xb1/0x1e0 [ 43.787416][ T3613] ? memcmp+0x16f/0x1c0 [ 43.791565][ T3613] memcmp+0x16f/0x1c0 [ 43.795536][ T3613] __fscache_acquire_volume+0x76c/0x1080 [ 43.801517][ T3613] v9fs_cache_session_get_cookie+0x143/0x240 [ 43.807495][ T3613] v9fs_session_init+0x1166/0x1810 [ 43.812607][ T3613] ? v9fs_show_options+0x780/0x780 [ 43.817714][ T3613] ? rcu_read_lock_sched_held+0x3a/0x70 [ 43.823253][ T3613] ? trace_kmalloc+0x32/0x100 [ 43.828007][ T3613] v9fs_mount+0xba/0xc90 [ 43.832240][ T3613] ? v9fs_statfs+0x4d0/0x4d0 [ 43.836835][ T3613] ? apparmor_capable+0x1d8/0x460 [ 43.841855][ T3613] ? v9fs_statfs+0x4d0/0x4d0 [ 43.846436][ T3613] legacy_get_tree+0x105/0x220 [ 43.851237][ T3613] vfs_get_tree+0x89/0x2f0 [ 43.855651][ T3613] path_mount+0x1326/0x1e20 [ 43.860411][ T3613] ? kmem_cache_free+0xeb/0x5b0 [ 43.865341][ T3613] ? finish_automount+0x960/0x960 [ 43.870361][ T3613] ? putname+0xfe/0x140 [ 43.874518][ T3613] __x64_sys_mount+0x27f/0x300 [ 43.879367][ T3613] ? copy_mnt_ns+0xae0/0xae0 [ 43.883951][ T3613] ? lockdep_hardirqs_on+0x79/0x100 [ 43.889164][ T3613] ? _raw_spin_unlock_irq+0x2a/0x40 [ 43.894357][ T3613] ? ptrace_notify+0xfa/0x140 [ 43.899033][ T3613] do_syscall_64+0x35/0xb0 [ 43.903441][ T3613] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.909360][ T3613] RIP: 0033:0x7f7d5064b1d9 [ 43.913766][ T3613] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 43.934148][ T3613] RSP: 002b:00007ffd1700c028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 43.942559][ T3613] RAX: ffffffffffffffda RBX: 00007ffd1700c060 RCX: 00007f7d5064b1d9 [ 43.950547][ T3613] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 43.958600][ T3613] RBP: 0000000000000000 R08: 0000000020000200 R09: 0000000000000000 [ 43.966566][ T3613] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f4240 [ 43.974880][ T3613] R13: 0000000000000000 R14: 00007ffd1700c04c R15: 00007ffd1700c050 [ 43.982854][ T3613] [ 43.985863][ T3613] [ 43.988173][ T3613] Allocated by task 3613: [ 43.992516][ T3613] kasan_save_stack+0x1e/0x40 [ 43.997194][ T3613] __kasan_kmalloc+0xa9/0xd0 [ 44.001774][ T3613] __fscache_acquire_volume+0x2c2/0x1080 [ 44.007400][ T3613] v9fs_cache_session_get_cookie+0x143/0x240 [ 44.013373][ T3613] v9fs_session_init+0x1166/0x1810 [ 44.018567][ T3613] v9fs_mount+0xba/0xc90 [ 44.022797][ T3613] legacy_get_tree+0x105/0x220 [ 44.027558][ T3613] vfs_get_tree+0x89/0x2f0 [ 44.031964][ T3613] path_mount+0x1326/0x1e20 [ 44.036455][ T3613] __x64_sys_mount+0x27f/0x300 [ 44.041210][ T3613] do_syscall_64+0x35/0xb0 [ 44.045615][ T3613] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 44.051501][ T3613] [ 44.053810][ T3613] The buggy address belongs to the object at ffff888016f3aa00 [ 44.053810][ T3613] which belongs to the cache kmalloc-192 of size 192 [ 44.068140][ T3613] The buggy address is located 144 bytes inside of [ 44.068140][ T3613] 192-byte region [ffff888016f3aa00, ffff888016f3aac0) [ 44.081412][ T3613] [ 44.083724][ T3613] The buggy address belongs to the physical page: [ 44.090120][ T3613] page:ffffea00005bce80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x16f3a [ 44.100263][ T3613] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 44.108086][ T3613] raw: 00fff00000000200 ffffea00005bd000 dead000000000002 ffff888011841a00 [ 44.116859][ T3613] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 44.125427][ T3613] page dumped because: kasan: bad access detected [ 44.131821][ T3613] page_owner tracks the page as allocated [ 44.137518][ T3613] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, tgid 1 (swapper/0), ts 1480756181, free_ts 0 [ 44.154284][ T3613] get_page_from_freelist+0x109b/0x2ce0 [ 44.159920][ T3613] __alloc_pages+0x1c7/0x510 [ 44.164499][ T3613] alloc_page_interleave+0x1e/0x200 [ 44.169686][ T3613] alloc_pages+0x22f/0x270 [ 44.174264][ T3613] allocate_slab+0x27e/0x3d0 [ 44.178928][ T3613] ___slab_alloc+0x7f1/0xe10 [ 44.183505][ T3613] __slab_alloc.constprop.0+0x4d/0xa0 [ 44.188961][ T3613] kmem_cache_alloc_trace+0x323/0x3e0 [ 44.194319][ T3613] call_usermodehelper_setup+0x97/0x340 [ 44.199855][ T3613] kobject_uevent_env+0xee6/0x1640 [ 44.204984][ T3613] param_sysfs_init+0x367/0x43b [ 44.209865][ T3613] do_one_initcall+0xfe/0x650 [ 44.214532][ T3613] kernel_init_freeable+0x6b1/0x73a [ 44.219728][ T3613] kernel_init+0x1a/0x1d0 [ 44.224095][ T3613] ret_from_fork+0x1f/0x30 [ 44.228525][ T3613] page_owner free stack trace missing [ 44.233884][ T3613] [ 44.236193][ T3613] Memory state around the buggy address: [ 44.241811][ T3613] ffff888016f3a980: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.249860][ T3613] ffff888016f3aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.257910][ T3613] >ffff888016f3aa80: 00 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.265961][ T3613] ^ [ 44.270564][ T3613] ffff888016f3ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.278782][ T3613] ffff888016f3ab80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 44.286825][ T3613] ================================================================== [ 44.295280][ T3613] Kernel panic - not syncing: panic_on_warn set ... [ 44.301881][ T3613] CPU: 0 PID: 3613 Comm: syz-executor344 Not tainted 6.0.0-rc2-syzkaller-00327-g8379c0b31fbc #0 [ 44.312282][ T3613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 44.322329][ T3613] Call Trace: [ 44.325662][ T3613] [ 44.328601][ T3613] dump_stack_lvl+0xcd/0x134 [ 44.333191][ T3613] panic+0x2c8/0x627 [ 44.337076][ T3613] ? panic_print_sys_info.part.0+0x10b/0x10b [ 44.343059][ T3613] ? memcmp+0x16f/0x1c0 [ 44.347240][ T3613] end_report.part.0+0x3f/0x7c [ 44.352004][ T3613] kasan_report.cold+0xa/0xf [ 44.356610][ T3613] ? memcmp+0x16f/0x1c0 [ 44.360771][ T3613] memcmp+0x16f/0x1c0 [ 44.364745][ T3613] __fscache_acquire_volume+0x76c/0x1080 [ 44.370553][ T3613] v9fs_cache_session_get_cookie+0x143/0x240 [ 44.376529][ T3613] v9fs_session_init+0x1166/0x1810 [ 44.381637][ T3613] ? v9fs_show_options+0x780/0x780 [ 44.386742][ T3613] ? rcu_read_lock_sched_held+0x3a/0x70 [ 44.392364][ T3613] ? trace_kmalloc+0x32/0x100 [ 44.397033][ T3613] v9fs_mount+0xba/0xc90 [ 44.401271][ T3613] ? v9fs_statfs+0x4d0/0x4d0 [ 44.405939][ T3613] ? apparmor_capable+0x1d8/0x460 [ 44.411048][ T3613] ? v9fs_statfs+0x4d0/0x4d0 [ 44.415625][ T3613] legacy_get_tree+0x105/0x220 [ 44.420384][ T3613] vfs_get_tree+0x89/0x2f0 [ 44.424881][ T3613] path_mount+0x1326/0x1e20 [ 44.429396][ T3613] ? kmem_cache_free+0xeb/0x5b0 [ 44.434412][ T3613] ? finish_automount+0x960/0x960 [ 44.439434][ T3613] ? putname+0xfe/0x140 [ 44.443586][ T3613] __x64_sys_mount+0x27f/0x300 [ 44.448344][ T3613] ? copy_mnt_ns+0xae0/0xae0 [ 44.452927][ T3613] ? lockdep_hardirqs_on+0x79/0x100 [ 44.458118][ T3613] ? _raw_spin_unlock_irq+0x2a/0x40 [ 44.463418][ T3613] ? ptrace_notify+0xfa/0x140 [ 44.468183][ T3613] do_syscall_64+0x35/0xb0 [ 44.472591][ T3613] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 44.478496][ T3613] RIP: 0033:0x7f7d5064b1d9 [ 44.483010][ T3613] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 44.502784][ T3613] RSP: 002b:00007ffd1700c028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 44.511191][ T3613] RAX: ffffffffffffffda RBX: 00007ffd1700c060 RCX: 00007f7d5064b1d9 [ 44.519152][ T3613] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 44.527112][ T3613] RBP: 0000000000000000 R08: 0000000020000200 R09: 0000000000000000 [ 44.535095][ T3613] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f4240 [ 44.543062][ T3613] R13: 0000000000000000 R14: 00007ffd1700c04c R15: 00007ffd1700c050 [ 44.551033][ T3613] [ 44.554757][ T3613] Kernel Offset: disabled [ 44.559266][ T3613] Rebooting in 86400 seconds..