[ 86.909351][ T26] audit: type=1400 audit(1585039661.811:38): avc: denied { watch } for pid=10341 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 87.139703][ T26] audit: type=1800 audit(1585039662.051:39): pid=10255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 87.171720][ T26] audit: type=1800 audit(1585039662.061:40): pid=10255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 87.764899][ T26] audit: type=1400 audit(1585039662.681:41): avc: denied { map } for pid=10432 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.170' (ECDSA) to the list of known hosts. syzkaller login: [ 94.586470][ T26] audit: type=1400 audit(1585039669.501:42): avc: denied { map } for pid=10444 comm="syz-executor437" path="/root/syz-executor437604167" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 94.612553][T10445] IPVS: ftp: loaded support on port[0] = 21 [ 94.672735][T10445] chnl_net:caif_netlink_parms(): no params data found [ 94.715027][T10445] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.723323][T10445] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.731381][T10445] device bridge_slave_0 entered promiscuous mode [ 94.741098][T10445] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.748453][T10445] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.756444][T10445] device bridge_slave_1 entered promiscuous mode [ 94.775745][T10445] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.787240][T10445] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.808506][T10445] team0: Port device team_slave_0 added [ 94.816633][T10445] team0: Port device team_slave_1 added [ 94.834595][T10445] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 94.841877][T10445] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 94.868311][T10445] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 94.882114][T10445] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 94.889095][T10445] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 94.915031][T10445] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 94.992127][T10445] device hsr_slave_0 entered promiscuous mode [ 95.050831][T10445] device hsr_slave_1 entered promiscuous mode [ 95.164049][ T26] audit: type=1400 audit(1585039670.081:43): avc: denied { create } for pid=10445 comm="syz-executor437" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 95.167127][T10445] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 95.191123][ T26] audit: type=1400 audit(1585039670.081:44): avc: denied { write } for pid=10445 comm="syz-executor437" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 95.221374][ T26] audit: type=1400 audit(1585039670.081:45): avc: denied { read } for pid=10445 comm="syz-executor437" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 95.253717][T10445] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 95.312501][T10445] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 95.373112][T10445] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 95.449104][T10445] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.456453][T10445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.464598][T10445] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.471723][T10445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.528423][T10445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.544862][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.555378][ T3186] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.563693][ T3186] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.571885][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 95.585422][T10445] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.598097][ T2736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.606774][ T2736] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.613863][ T2736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.626603][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.636508][ T3186] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.643840][ T3186] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.667058][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.675776][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.686152][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.697206][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.707669][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.720788][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.729278][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.745024][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.753606][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.766338][T10445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.788707][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 95.796881][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 95.812044][T10445] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.834779][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 95.844316][ T3186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 95.866849][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 95.876027][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.885272][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.893292][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.905655][T10445] device veth0_vlan entered promiscuous mode [ 95.923140][T10445] device veth1_vlan entered promiscuous mode [ 95.949028][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 95.958973][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 95.967826][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 95.976704][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 95.988471][T10445] device veth0_macvtap entered promiscuous mode [ 96.001028][T10445] device veth1_macvtap entered promiscuous mode [ 96.021736][T10445] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 96.029428][ T3187] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 96.039325][ T3187] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.047790][ T3187] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 96.056621][ T3187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 96.071180][T10445] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 96.078659][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 96.088338][ T2732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 96.246612][T10445] netlink: 'syz-executor437': attribute type 1 has an invalid length. [ 96.280749][T10445] bond1: (slave gretap1): making interface the new active one [ 96.288781][T10445] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 96.298003][ T26] audit: type=1400 audit(1585039671.211:46): avc: denied { create } for pid=10445 comm="syz-executor437" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 [ 96.305075][T10445] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 96.323783][ T26] audit: type=1400 audit(1585039671.211:47): avc: denied { write } for pid=10445 comm="syz-executor437" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 [ 96.331035][T10445] [ 96.356736][T10445] ====================================================== [ 96.363735][T10445] WARNING: possible circular locking dependency detected [ 96.370790][T10445] 5.6.0-rc7-syzkaller #0 Not tainted [ 96.376089][T10445] ------------------------------------------------------ [ 96.383513][T10445] syz-executor437/10445 is trying to acquire lock: [ 96.390085][T10445] ffffffff8a34eb00 (rtnl_mutex){+.+.}, at: siw_create_listen+0x329/0xed0 [ 96.398597][T10445] [ 96.398597][T10445] but task is already holding lock: [ 96.406033][T10445] ffffffff8a1d39e0 (lock#3){+.+.}, at: cma_add_one+0x5dc/0xb60 [ 96.413568][T10445] [ 96.413568][T10445] which lock already depends on the new lock. [ 96.413568][T10445] [ 96.424052][T10445] [ 96.424052][T10445] the existing dependency chain (in reverse order) is: [ 96.433051][T10445] [ 96.433051][T10445] -> #1 (lock#3){+.+.}: [ 96.439499][T10445] __mutex_lock+0x156/0x13c0 [ 96.444620][T10445] cma_netdev_callback+0xc5/0x380 [ 96.450149][T10445] notifier_call_chain+0xc0/0x230 [ 96.455671][T10445] call_netdevice_notifiers_info+0xb5/0x130 [ 96.462071][T10445] call_netdevice_notifiers+0x79/0xa0 [ 96.467949][T10445] bond_change_active_slave+0x80e/0x1d90 [ 96.474087][T10445] bond_select_active_slave+0x250/0xa60 [ 96.480137][T10445] bond_enslave+0x4281/0x4800 [ 96.485320][T10445] do_set_master+0x1d7/0x230 [ 96.490423][T10445] __rtnl_newlink+0x11d4/0x1590 [ 96.495767][T10445] rtnl_newlink+0x64/0xa0 [ 96.500590][T10445] rtnetlink_rcv_msg+0x44e/0xad0 [ 96.506022][T10445] netlink_rcv_skb+0x15a/0x410 [ 96.511277][T10445] netlink_unicast+0x537/0x740 [ 96.516537][T10445] netlink_sendmsg+0x882/0xe10 [ 96.521795][T10445] sock_sendmsg+0xcf/0x120 [ 96.526712][T10445] ____sys_sendmsg+0x6b9/0x7d0 [ 96.531970][T10445] ___sys_sendmsg+0x100/0x170 [ 96.537141][T10445] __sys_sendmsg+0xec/0x1b0 [ 96.542154][T10445] do_syscall_64+0xf6/0x7d0 [ 96.547282][T10445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 96.553690][T10445] [ 96.553690][T10445] -> #0 (rtnl_mutex){+.+.}: [ 96.560406][T10445] __lock_acquire+0x201b/0x3ca0 [ 96.565766][T10445] lock_acquire+0x197/0x420 [ 96.570820][T10445] __mutex_lock+0x156/0x13c0 [ 96.575916][T10445] siw_create_listen+0x329/0xed0 [ 96.581354][T10445] iw_cm_listen+0x166/0x1e0 [ 96.586355][T10445] rdma_listen+0x5e2/0x910 [ 96.591277][T10445] cma_listen_on_dev+0x512/0x650 [ 96.596707][T10445] cma_add_one+0x6aa/0xb60 [ 96.601620][T10445] add_client_context+0x3b4/0x520 [ 96.607144][T10445] enable_device_and_get+0x1cd/0x3b0 [ 96.612923][T10445] ib_register_device+0xa12/0xda0 [ 96.618453][T10445] siw_newlink+0xdef/0x1310 [ 96.623450][T10445] nldev_newlink+0x27f/0x400 [ 96.628532][T10445] rdma_nl_rcv+0x586/0x900 [ 96.633444][T10445] netlink_unicast+0x537/0x740 [ 96.638709][T10445] netlink_sendmsg+0x882/0xe10 [ 96.643974][T10445] sock_sendmsg+0xcf/0x120 [ 96.648892][T10445] ____sys_sendmsg+0x6b9/0x7d0 [ 96.654169][T10445] ___sys_sendmsg+0x100/0x170 [ 96.659339][T10445] __sys_sendmsg+0xec/0x1b0 [ 96.664347][T10445] do_syscall_64+0xf6/0x7d0 [ 96.669345][T10445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 96.675724][T10445] [ 96.675724][T10445] other info that might help us debug this: [ 96.675724][T10445] [ 96.685928][T10445] Possible unsafe locking scenario: [ 96.685928][T10445] [ 96.693612][T10445] CPU0 CPU1 [ 96.698974][T10445] ---- ---- [ 96.704329][T10445] lock(lock#3); [ 96.707939][T10445] lock(rtnl_mutex); [ 96.714422][T10445] lock(lock#3); [ 96.721202][T10445] lock(rtnl_mutex); [ 96.725171][T10445] [ 96.725171][T10445] *** DEADLOCK *** [ 96.725171][T10445] [ 96.733344][T10445] 6 locks held by syz-executor437/10445: [ 96.738957][T10445] #0: ffffffff8cf2b700 (&rdma_nl_types[idx].sem){.+.+}, at: rdma_nl_rcv+0x3ba/0x900 [ 96.748421][T10445] #1: ffffffff8a1c93a8 (link_ops_rwsem){++++}, at: nldev_newlink+0x23b/0x400 [ 96.757258][T10445] #2: ffffffff8a1bcec8 (devices_rwsem){++++}, at: enable_device_and_get+0xfc/0x3b0 [ 96.766616][T10445] #3: ffffffff8a1bcd88 (clients_rwsem){++++}, at: enable_device_and_get+0x15b/0x3b0 [ 96.776063][T10445] #4: ffff88809392c538 (&device->client_data_rwsem){++++}, at: add_client_context+0x382/0x520 [ 96.786383][T10445] #5: ffffffff8a1d39e0 (lock#3){+.+.}, at: cma_add_one+0x5dc/0xb60 [ 96.794498][T10445] [ 96.794498][T10445] stack backtrace: [ 96.800388][T10445] CPU: 0 PID: 10445 Comm: syz-executor437 Not tainted 5.6.0-rc7-syzkaller #0 [ 96.809127][T10445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.819156][T10445] Call Trace: [ 96.822430][T10445] dump_stack+0x188/0x20d [ 96.826736][T10445] check_noncircular+0x32e/0x3e0 [ 96.831744][T10445] ? print_circular_bug.isra.0+0x220/0x220 [ 96.837536][T10445] ? mark_lock+0xbc/0x1220 [ 96.841936][T10445] ? alloc_list_entry+0xb0/0xb0 [ 96.846757][T10445] ? mark_lock+0xbc/0x1220 [ 96.851157][T10445] ? find_first_zero_bit+0x94/0xb0 [ 96.856248][T10445] __lock_acquire+0x201b/0x3ca0 [ 96.861075][T10445] ? mark_held_locks+0xe0/0xe0 [ 96.865826][T10445] ? iw_cm_map+0x49e/0xfb0 [ 96.870216][T10445] lock_acquire+0x197/0x420 [ 96.874694][T10445] ? siw_create_listen+0x329/0xed0 [ 96.879781][T10445] __mutex_lock+0x156/0x13c0 [ 96.884342][T10445] ? siw_create_listen+0x329/0xed0 [ 96.889426][T10445] ? siw_create_listen+0x329/0xed0 [ 96.894539][T10445] ? mutex_trylock+0x2c0/0x2c0 [ 96.899291][T10445] ? find_held_lock+0x2d/0x110 [ 96.904039][T10445] ? siw_create_listen+0x26b/0xed0 [ 96.909123][T10445] ? lock_downgrade+0x7f0/0x7f0 [ 96.913948][T10445] ? rcu_read_lock_held_common+0x130/0x130 [ 96.919727][T10445] ? siw_create_listen+0x329/0xed0 [ 96.924814][T10445] ? rtnl_lock+0x5/0x20 [ 96.928955][T10445] siw_create_listen+0x329/0xed0 [ 96.933880][T10445] ? find_held_lock+0x2d/0x110 [ 96.938620][T10445] ? siw_reject+0x280/0x280 [ 96.943206][T10445] ? mark_held_locks+0x9f/0xe0 [ 96.947999][T10445] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 96.953796][T10445] ? iw_cm_listen+0x166/0x1e0 [ 96.958464][T10445] iw_cm_listen+0x166/0x1e0 [ 96.963735][T10445] rdma_listen+0x5e2/0x910 [ 96.968132][T10445] cma_listen_on_dev+0x512/0x650 [ 96.973048][T10445] cma_add_one+0x6aa/0xb60 [ 96.977494][T10445] ? cma_listen_on_dev+0x650/0x650 [ 96.982605][T10445] ? do_raw_spin_unlock+0x171/0x260 [ 96.987865][T10445] ? cma_listen_on_dev+0x650/0x650 [ 96.992952][T10445] add_client_context+0x3b4/0x520 [ 96.997958][T10445] ? ib_device_get_by_netdev+0x4f0/0x4f0 [ 97.003567][T10445] enable_device_and_get+0x1cd/0x3b0 [ 97.008926][T10445] ? add_one_compat_dev+0x7e0/0x7e0 [ 97.014109][T10445] ? rdma_counter_init+0x200/0x400 [ 97.019219][T10445] ib_register_device+0xa12/0xda0 [ 97.024485][T10445] ? enable_device_and_get+0x3b0/0x3b0 [ 97.030159][T10445] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 97.038085][T10445] ? _raw_spin_unlock_irqrestore+0x9b/0xe0 [ 97.043914][T10445] ? lockdep_init_map+0x1b0/0x6c0 [ 97.048919][T10445] siw_newlink+0xdef/0x1310 [ 97.053424][T10445] ? siw_get_base_qp+0x470/0x470 [ 97.058355][T10445] nldev_newlink+0x27f/0x400 [ 97.062927][T10445] ? nldev_set_doit+0x3e0/0x3e0 [ 97.067768][T10445] ? __lock_acquire+0x80b/0x3ca0 [ 97.072696][T10445] ? selinux_sb_eat_lsm_opts+0x6d0/0x6d0 [ 97.078411][T10445] ? selinux_sb_eat_lsm_opts+0x6d0/0x6d0 [ 97.084038][T10445] ? rdma_nl_rcv+0x3ba/0x900 [ 97.088607][T10445] ? cap_capable+0x1eb/0x250 [ 97.093179][T10445] ? ns_capable_common+0xe2/0x100 [ 97.098192][T10445] ? nldev_set_doit+0x3e0/0x3e0 [ 97.103023][T10445] rdma_nl_rcv+0x586/0x900 [ 97.107432][T10445] ? rdma_nl_multicast+0x310/0x310 [ 97.112542][T10445] ? netlink_deliver_tap+0x227/0xb50 [ 97.117861][T10445] netlink_unicast+0x537/0x740 [ 97.122628][T10445] ? netlink_attachskb+0x810/0x810 [ 97.127722][T10445] ? _copy_from_iter_full+0x25c/0x870 [ 97.133112][T10445] netlink_sendmsg+0x882/0xe10 [ 97.137855][T10445] ? netlink_unicast+0x740/0x740 [ 97.143294][T10445] ? netlink_unicast+0x740/0x740 [ 97.148208][T10445] sock_sendmsg+0xcf/0x120 [ 97.152625][T10445] ____sys_sendmsg+0x6b9/0x7d0 [ 97.157382][T10445] ? kernel_sendmsg+0x50/0x50 [ 97.162039][T10445] ___sys_sendmsg+0x100/0x170 [ 97.166709][T10445] ? sendmsg_copy_msghdr+0x70/0x70 [ 97.171900][T10445] ? __lock_acquire+0x80b/0x3ca0 [ 97.176915][T10445] ? find_held_lock+0x2d/0x110 [ 97.181671][T10445] ? __fd_install+0x1b4/0x600 [ 97.186410][T10445] ? lock_downgrade+0x7f0/0x7f0 [ 97.191237][T10445] ? __fget_light+0x1a5/0x270 [ 97.196322][T10445] __sys_sendmsg+0xec/0x1b0 [ 97.200944][T10445] ? __sys_sendmsg_sock+0xb0/0xb0 [ 97.206083][T10445] ? trace_hardirqs_off_caller+0x55/0x230 [ 97.212060][T10445] ? do_syscall_64+0x21/0x7d0 [ 97.216775][T10445] do_syscall_64+0xf6/0x7d0 [ 97.221285][T10445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 97.227154][T10445] RIP: 0033:0x4435f9 [ 97.231025][T10445] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b 10 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 97.250646][T10445] RSP: 002b:00007fff29d8cb68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 97.261814][T10445] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004435f9 [ 97.269761][T10445] RDX: 0000000000000000 RSI: 00000000200031c0 RDI: 0000000000000005 [ 97.277720][T10445] RBP: 00007fff29d8cb70 R08: 0000000001bbbbbb R09: 0000000001bbbbbb [ 97.285669][T10445] R10: 0000000001bbbbbb R11: 0000000000000246 R12: 00007fff29d8cb80 [ 97.293624][T10445] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000