[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 24.207292] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 24.983915] random: sshd: uninitialized urandom read (32 bytes read) [ 25.293272] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 25.824969] random: sshd: uninitialized urandom read (32 bytes read) [ 121.859542] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.13' (ECDSA) to the list of known hosts. [ 127.443461] random: sshd: uninitialized urandom read (32 bytes read) 2018/08/22 22:12:24 parsed 1 programs [ 128.824972] random: cc1: uninitialized urandom read (8 bytes read) 2018/08/22 22:12:26 executed programs: 0 [ 130.088406] IPVS: ftp: loaded support on port[0] = 21 [ 130.318683] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.325142] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.332532] device bridge_slave_0 entered promiscuous mode [ 130.349923] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.356279] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.363219] device bridge_slave_1 entered promiscuous mode [ 130.380153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 130.397303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 130.443968] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 130.462778] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 130.531749] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 130.539164] team0: Port device team_slave_0 added [ 130.555159] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 130.562237] team0: Port device team_slave_1 added [ 130.578173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.592739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.611834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.630906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.758869] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.765315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.772083] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.778481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.241428] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 131.247538] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.296087] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 131.302696] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 131.347224] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 131.353443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.360946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.401084] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.919297] ================================================================== [ 131.926741] BUG: KASAN: use-after-free in tipc_group_fill_sock_diag+0x7b9/0x84b [ 131.934186] Read of size 4 at addr ffff8801cedfb75c by task syz-executor0/4822 [ 131.941537] [ 131.943157] CPU: 1 PID: 4822 Comm: syz-executor0 Not tainted 4.18.0-next-20180822+ #45 [ 131.951191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.960522] Call Trace: [ 131.963094] dump_stack+0x1c9/0x2b4 [ 131.966704] ? dump_stack_print_info.cold.2+0x52/0x52 [ 131.971883] ? printk+0xa7/0xcf [ 131.975150] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 131.979894] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 131.984991] print_address_description+0x6c/0x20b [ 131.989989] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 131.995089] kasan_report.cold.7+0x242/0x30d [ 131.999491] __asan_report_load4_noabort+0x14/0x20 [ 132.004426] tipc_group_fill_sock_diag+0x7b9/0x84b [ 132.009342] ? tipc_group_member_evt+0xe30/0xe30 [ 132.014083] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 132.019085] ? skb_put+0x17b/0x1e0 [ 132.022727] ? memset+0x31/0x40 [ 132.026168] ? memcpy+0x45/0x50 [ 132.029431] ? __nla_put+0x37/0x40 [ 132.033005] ? nla_put+0x11a/0x150 [ 132.036581] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 132.041247] ? tipc_diag_dump+0x30/0x30 [ 132.045214] ? tipc_getname+0x7f0/0x7f0 [ 132.049174] ? save_stack+0xa9/0xd0 [ 132.052790] ? print_usage_bug+0xc0/0xc0 [ 132.056831] ? graph_lock+0x170/0x170 [ 132.060611] ? graph_lock+0x170/0x170 [ 132.064393] ? __netlink_dump_start+0x4f1/0x6f0 [ 132.069054] ? sock_diag_rcv_msg+0x31d/0x410 [ 132.073448] ? netlink_rcv_skb+0x172/0x440 [ 132.077664] ? sock_diag_rcv+0x2a/0x40 [ 132.081539] ? netlink_unicast+0x5a0/0x760 [ 132.085756] ? netlink_sendmsg+0xa18/0xfc0 [ 132.089987] ? sock_sendmsg+0xd5/0x120 [ 132.093867] ? ___sys_sendmsg+0x7fd/0x930 [ 132.098000] ? __x64_sys_sendmsg+0x78/0xb0 [ 132.102227] ? do_syscall_64+0x1b9/0x820 [ 132.106280] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.111641] ? lock_acquire+0x1e4/0x4f0 [ 132.115603] ? tipc_nl_sk_walk+0x60a/0xd30 [ 132.119876] ? lockdep_hardirqs_on+0x421/0x5c0 [ 132.124453] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 132.129460] ? skb_put+0x17b/0x1e0 [ 132.132988] ? __nlmsg_put+0x14c/0x1b0 [ 132.136863] __tipc_add_sock_diag+0x22f/0x360 [ 132.141353] tipc_nl_sk_walk+0x68d/0xd30 [ 132.145405] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 132.150728] ? __tipc_nl_add_sk+0x400/0x400 [ 132.155049] ? skb_scrub_packet+0x490/0x490 [ 132.159362] ? kasan_check_write+0x14/0x20 [ 132.163583] ? lock_downgrade+0x8f0/0x8f0 [ 132.167716] tipc_diag_dump+0x24/0x30 [ 132.171509] netlink_dump+0x519/0xd50 [ 132.175306] ? netlink_broadcast+0x50/0x50 [ 132.179537] __netlink_dump_start+0x4f1/0x6f0 [ 132.184015] ? kasan_check_read+0x11/0x20 [ 132.188155] tipc_sock_diag_handler_dump+0x234/0x340 [ 132.193247] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 132.197902] ? tipc_unregister_sysctl+0x20/0x20 [ 132.202554] ? netlink_deliver_tap+0x356/0xfb0 [ 132.207132] sock_diag_rcv_msg+0x31d/0x410 [ 132.211355] netlink_rcv_skb+0x172/0x440 [ 132.215398] ? sock_diag_bind+0x80/0x80 [ 132.219355] ? netlink_ack+0xbe0/0xbe0 [ 132.223226] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 132.227891] sock_diag_rcv+0x2a/0x40 [ 132.231593] netlink_unicast+0x5a0/0x760 [ 132.235650] ? netlink_attachskb+0x9a0/0x9a0 [ 132.240060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.245619] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 132.250629] netlink_sendmsg+0xa18/0xfc0 [ 132.254679] ? netlink_unicast+0x760/0x760 [ 132.258899] ? move_addr_to_kernel.part.18+0x100/0x100 [ 132.264172] ? security_socket_sendmsg+0x94/0xc0 [ 132.268916] ? netlink_unicast+0x760/0x760 [ 132.273141] sock_sendmsg+0xd5/0x120 [ 132.276842] ___sys_sendmsg+0x7fd/0x930 [ 132.280812] ? copy_msghdr_from_user+0x580/0x580 [ 132.285556] ? _raw_spin_unlock_bh+0x30/0x40 [ 132.289952] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 132.295051] ? do_raw_spin_unlock+0xa7/0x2f0 [ 132.299446] ? __release_sock+0x276/0x3a0 [ 132.303582] ? __fget_light+0x2f7/0x440 [ 132.307542] ? __local_bh_enable_ip+0x161/0x230 [ 132.312195] ? fget_raw+0x20/0x20 [ 132.315635] ? __release_sock+0x3a0/0x3a0 [ 132.319771] ? tipc_nametbl_build_group+0x279/0x360 [ 132.324786] ? tipc_setsockopt+0x726/0xd70 [ 132.329016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 132.334539] ? sockfd_lookup_light+0xc5/0x160 [ 132.339019] __sys_sendmsg+0x11d/0x290 [ 132.342891] ? __ia32_sys_shutdown+0x80/0x80 [ 132.347283] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 132.352807] ? fput+0x130/0x1a0 [ 132.356079] ? __x64_sys_futex+0x47f/0x6a0 [ 132.360303] ? do_syscall_64+0x9a/0x820 [ 132.364269] ? do_syscall_64+0x9a/0x820 [ 132.368326] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 132.373422] __x64_sys_sendmsg+0x78/0xb0 [ 132.377472] do_syscall_64+0x1b9/0x820 [ 132.381345] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 132.386694] ? syscall_return_slowpath+0x5e0/0x5e0 [ 132.391610] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 132.396617] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 132.401641] ? recalc_sigpending_tsk+0x180/0x180 [ 132.406385] ? kasan_check_write+0x14/0x20 [ 132.410606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 132.415435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.420608] RIP: 0033:0x457089 [ 132.423832] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 132.442727] RSP: 002b:00007f630fc16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 132.450418] RAX: ffffffffffffffda RBX: 00007f630fc176d4 RCX: 0000000000457089 [ 132.457669] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 132.464920] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 132.472170] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 132.479422] R13: 00000000004d4088 R14: 00000000004c8ab0 R15: 0000000000000000 [ 132.486678] [ 132.488286] Allocated by task 4822: [ 132.491896] save_stack+0x43/0xd0 [ 132.495331] kasan_kmalloc+0xc4/0xe0 [ 132.499036] kmem_cache_alloc_trace+0x152/0x730 [ 132.503692] tipc_group_create+0x155/0xa70 [ 132.507912] tipc_setsockopt+0x2d1/0xd70 [ 132.511960] __sys_setsockopt+0x1c5/0x3b0 [ 132.516089] __x64_sys_setsockopt+0xbe/0x150 [ 132.520482] do_syscall_64+0x1b9/0x820 [ 132.524415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.529586] [ 132.531291] Freed by task 4821: [ 132.534552] save_stack+0x43/0xd0 [ 132.537985] __kasan_slab_free+0x11a/0x170 [ 132.542203] kasan_slab_free+0xe/0x10 [ 132.545989] kfree+0xd9/0x210 [ 132.549082] tipc_group_delete+0x2e5/0x3f0 [ 132.553302] tipc_sk_leave+0x113/0x220 [ 132.557172] tipc_release+0x14e/0x12b0 [ 132.561047] __sock_release+0xd7/0x250 [ 132.564918] sock_close+0x19/0x20 [ 132.568352] __fput+0x376/0x8a0 [ 132.571610] ____fput+0x15/0x20 [ 132.574873] task_work_run+0x1e8/0x2a0 [ 132.578748] exit_to_usermode_loop+0x318/0x380 [ 132.583438] do_syscall_64+0x6be/0x820 [ 132.587315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.592484] [ 132.594101] The buggy address belongs to the object at ffff8801cedfb700 [ 132.594101] which belongs to the cache kmalloc-192 of size 192 [ 132.606743] The buggy address is located 92 bytes inside of [ 132.606743] 192-byte region [ffff8801cedfb700, ffff8801cedfb7c0) [ 132.618564] The buggy address belongs to the page: [ 132.623508] page:ffffea00073b7ec0 count:1 mapcount:0 mapping:ffff8801dac00040 index:0x0 [ 132.631640] flags: 0x2fffc0000000100(slab) [ 132.635911] raw: 02fffc0000000100 ffffea00073b5d48 ffffea00073b6248 ffff8801dac00040 [ 132.643792] raw: 0000000000000000 ffff8801cedfb000 0000000100000010 0000000000000000 [ 132.651660] page dumped because: kasan: bad access detected [ 132.657367] [ 132.659000] Memory state around the buggy address: [ 132.663938] ffff8801cedfb600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 132.671321] ffff8801cedfb680: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 132.678787] >ffff8801cedfb700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 132.686168] ^ [ 132.692423] ffff8801cedfb780: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 132.699802] ffff8801cedfb800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 132.707162] ================================================================== [ 132.714520] Disabling lock debugging due to kernel taint [ 132.720040] Kernel panic - not syncing: panic_on_warn set ... [ 132.720040] [ 132.727437] CPU: 1 PID: 4822 Comm: syz-executor0 Tainted: G B 4.18.0-next-20180822+ #45 [ 132.736877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.746228] Call Trace: [ 132.748825] dump_stack+0x1c9/0x2b4 [ 132.752457] ? dump_stack_print_info.cold.2+0x52/0x52 [ 132.757653] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 132.762410] panic+0x238/0x4e7 [ 132.765601] ? add_taint.cold.5+0x16/0x16 [ 132.769750] ? trace_hardirqs_on+0xb4/0x2c0 [ 132.774083] ? trace_hardirqs_on+0x9a/0x2c0 [ 132.778407] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 132.783512] kasan_end_report+0x47/0x4f [ 132.787488] kasan_report.cold.7+0x76/0x30d [ 132.791813] __asan_report_load4_noabort+0x14/0x20 [ 132.796740] tipc_group_fill_sock_diag+0x7b9/0x84b [ 132.801682] ? tipc_group_member_evt+0xe30/0xe30 [ 132.806440] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 132.811455] ? skb_put+0x17b/0x1e0 [ 132.814996] ? memset+0x31/0x40 [ 132.818279] ? memcpy+0x45/0x50 [ 132.821580] ? __nla_put+0x37/0x40 [ 132.825141] ? nla_put+0x11a/0x150 [ 132.828688] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 132.833365] ? tipc_diag_dump+0x30/0x30 [ 132.837360] ? tipc_getname+0x7f0/0x7f0 [ 132.841338] ? save_stack+0xa9/0xd0 [ 132.844968] ? print_usage_bug+0xc0/0xc0 [ 132.849024] ? graph_lock+0x170/0x170 [ 132.852824] ? graph_lock+0x170/0x170 [ 132.856655] ? __netlink_dump_start+0x4f1/0x6f0 [ 132.861343] ? sock_diag_rcv_msg+0x31d/0x410 [ 132.865754] ? netlink_rcv_skb+0x172/0x440 [ 132.870001] ? sock_diag_rcv+0x2a/0x40 [ 132.873887] ? netlink_unicast+0x5a0/0x760 [ 132.878122] ? netlink_sendmsg+0xa18/0xfc0 [ 132.882379] ? sock_sendmsg+0xd5/0x120 [ 132.886297] ? ___sys_sendmsg+0x7fd/0x930 [ 132.890464] ? __x64_sys_sendmsg+0x78/0xb0 [ 132.894703] ? do_syscall_64+0x1b9/0x820 [ 132.898773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 132.904146] ? lock_acquire+0x1e4/0x4f0 [ 132.908123] ? tipc_nl_sk_walk+0x60a/0xd30 [ 132.912357] ? lockdep_hardirqs_on+0x421/0x5c0 [ 132.916946] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 132.921962] ? skb_put+0x17b/0x1e0 [ 132.925503] ? __nlmsg_put+0x14c/0x1b0 [ 132.929402] __tipc_add_sock_diag+0x22f/0x360 [ 132.933905] tipc_nl_sk_walk+0x68d/0xd30 [ 132.937971] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 132.943248] ? __tipc_nl_add_sk+0x400/0x400 [ 132.947574] ? skb_scrub_packet+0x490/0x490 [ 132.951903] ? kasan_check_write+0x14/0x20 [ 132.956142] ? lock_downgrade+0x8f0/0x8f0 [ 132.960297] tipc_diag_dump+0x24/0x30 [ 132.964102] netlink_dump+0x519/0xd50 [ 132.967908] ? netlink_broadcast+0x50/0x50 [ 132.972147] __netlink_dump_start+0x4f1/0x6f0 [ 132.976641] ? kasan_check_read+0x11/0x20 [ 132.980799] tipc_sock_diag_handler_dump+0x234/0x340 [ 132.985904] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 132.990573] ? tipc_unregister_sysctl+0x20/0x20 [ 132.995243] ? netlink_deliver_tap+0x356/0xfb0 [ 132.999838] sock_diag_rcv_msg+0x31d/0x410 [ 133.004102] netlink_rcv_skb+0x172/0x440 [ 133.008179] ? sock_diag_bind+0x80/0x80 [ 133.012164] ? netlink_ack+0xbe0/0xbe0 [ 133.016052] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 133.020737] sock_diag_rcv+0x2a/0x40 [ 133.024463] netlink_unicast+0x5a0/0x760 [ 133.028531] ? netlink_attachskb+0x9a0/0x9a0 [ 133.032969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.038684] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 133.043703] netlink_sendmsg+0xa18/0xfc0 [ 133.047778] ? netlink_unicast+0x760/0x760 [ 133.052019] ? move_addr_to_kernel.part.18+0x100/0x100 [ 133.057302] ? security_socket_sendmsg+0x94/0xc0 [ 133.062057] ? netlink_unicast+0x760/0x760 [ 133.066301] sock_sendmsg+0xd5/0x120 [ 133.070031] ___sys_sendmsg+0x7fd/0x930 [ 133.074059] ? copy_msghdr_from_user+0x580/0x580 [ 133.078818] ? _raw_spin_unlock_bh+0x30/0x40 [ 133.083226] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 133.088419] ? do_raw_spin_unlock+0xa7/0x2f0 [ 133.092832] ? __release_sock+0x276/0x3a0 [ 133.096987] ? __fget_light+0x2f7/0x440 [ 133.100963] ? __local_bh_enable_ip+0x161/0x230 [ 133.105632] ? fget_raw+0x20/0x20 [ 133.109101] ? __release_sock+0x3a0/0x3a0 [ 133.113254] ? tipc_nametbl_build_group+0x279/0x360 [ 133.118287] ? tipc_setsockopt+0x726/0xd70 [ 133.122537] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 133.128078] ? sockfd_lookup_light+0xc5/0x160 [ 133.132576] __sys_sendmsg+0x11d/0x290 [ 133.136467] ? __ia32_sys_shutdown+0x80/0x80 [ 133.140878] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 133.146414] ? fput+0x130/0x1a0 [ 133.149699] ? __x64_sys_futex+0x47f/0x6a0 [ 133.153937] ? do_syscall_64+0x9a/0x820 [ 133.157912] ? do_syscall_64+0x9a/0x820 [ 133.161891] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 133.167000] __x64_sys_sendmsg+0x78/0xb0 [ 133.171066] do_syscall_64+0x1b9/0x820 [ 133.174954] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 133.180320] ? syscall_return_slowpath+0x5e0/0x5e0 [ 133.185249] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 133.190295] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 133.195307] ? recalc_sigpending_tsk+0x180/0x180 [ 133.200074] ? kasan_check_write+0x14/0x20 [ 133.204364] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 133.209254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 133.214938] RIP: 0033:0x457089 [ 133.218132] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 133.237039] RSP: 002b:00007f630fc16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.244751] RAX: ffffffffffffffda RBX: 00007f630fc176d4 RCX: 0000000000457089 [ 133.252035] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 133.259304] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 133.266659] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 133.273927] R13: 00000000004d4088 R14: 00000000004c8ab0 R15: 0000000000000000 [ 133.281486] Dumping ftrace buffer: [ 133.285026] (ftrace buffer empty) [ 133.288717] Kernel Offset: disabled [ 133.292328] Rebooting in 86400 seconds..