ooting the kernel. [ 0.000000] Linux version 4.17.0+ (syzkaller@ci) (gcc version 8.0.1 20180413 (experimental) (GCC)) #94 SMP Sun Jun 10 11:44:37 UTC 2018 [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native rodata=n ftrace_dump_on_oops=orig_cpu oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400 kvm-intel.nested=1 nf-conntrack-ftp.ports=20000 nf-conntrack-tftp.ports=20000 nf-conntrack-sip.ports=20000 nf-conntrack-irc.ports=20000 nf-conntrack-sane.ports=20000 nopcid [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable [ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000bfff2fff] usable [ 0.000000] BIOS-e820: [mem 0x00000000bfff3000-0x00000000bfffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fffbc000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable [ 0.000000] bootconsole [earlyser0] enabled [ 0.000000] Malformed early option 'vsyscall' [ 0.000000] nopcid: PCID feature disabled [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] SMBIOS 2.4 present. [ 0.000000] DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 0.000000] Hypervisor detected: KVM [ 0.000000] last_pfn = 0x220000 max_arch_pfn = 0x400000000 [ 0.000000] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.000000] last_pfn = 0xbfff3 max_arch_pfn = 0x400000000 [ 0.000000] found SMP MP-table at [mem 0x000f22b0-0x000f22bf] mapped at [(____ptrval____)] [ 0.000000] Scanning 1 areas for low memory corruption [ 0.000000] Using GB pages for direct mapping [ 0.000000] ACPI: Early table checksum verification disabled [ 0.000000] ACPI: RSDP 0x00000000000F2270 000014 (v00 Google) [ 0.000000] ACPI: RSDT 0x00000000BFFF3430 000038 (v01 Google GOOGRSDT 00000001 GOOG 00000001) [ 0.000000] ACPI: FACP 0x00000000BFFFCF60 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) [ 0.000000] ACPI: DSDT 0x00000000BFFF3470 0017B2 (v01 Google GOOGDSDT 00000001 GOOG 00000001) [ 0.000000] ACPI: FACS 0x00000000BFFFCF00 000040 [ 0.000000] ACPI: FACS 0x00000000BFFFCF00 000040 [ 0.000000] ACPI: SSDT 0x00000000BFFF65F0 00690D (v01 Google GOOGSSDT 00000001 GOOG 00000001) [ 0.000000] ACPI: APIC 0x00000000BFFF5D10 000076 (v01 Google GOOGAPIC 00000001 GOOG 00000001) [ 0.000000] ACPI: WAET 0x00000000BFFF5CE0 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) [ 0.000000] ACPI: SRAT 0x00000000BFFF4C30 0000C8 (v01 Google GOOGSRAT 00000001 GOOG 00000001) [ 0.000000] SRAT: PXM 0 -> APIC 0x00 -> Node 0 [ 0.000000] SRAT: PXM 0 -> APIC 0x01 -> Node 0 [ 0.000000] ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] [ 0.000000] ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] [ 0.000000] ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] [ 0.000000] NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] [ 0.000000] NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] [ 0.000000] NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffdfff] [ 0.000000] kvm-clock: cpu 0, msr 2:1fff8001, primary cpu clock [ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00 [ 0.000000] kvm-clock: using sched offset of 2991096763 cycles [ 0.000000] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns [ 0.000000] Zone ranges: [ 0.000000] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.000000] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.000000] Normal [mem 0x0000000100000000-0x000000021fffffff] [ 0.000000] Movable zone start for each node [ 0.000000] Early memory node ranges [ 0.000000] node 0: [mem 0x0000000000001000-0x000000000009efff] [ 0.000000] node 0: [mem 0x0000000000100000-0x00000000bfff2fff] [ 0.000000] node 0: [mem 0x0000000100000000-0x000000021fffffff] [ 0.000000] Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] [ 0.000000] Reserved but unavailable: 98 pages [ 0.000000] kasan: KernelAddressSanitizer initialized [ 0.000000] ACPI: PM-Timer IO Port: 0xb008 [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) [ 0.000000] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) [ 0.000000] Using ACPI (MADT) for SMP configuration information [ 0.000000] smpboot: Allowing 2 CPUs, 0 hotplug CPUs [ 0.000000] PM: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.000000] PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] [ 0.000000] PM: Registered nosave memory: [mem 0x000a0000-0x000effff] [ 0.000000] PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] [ 0.000000] PM: Registered nosave memory: [mem 0xbfff3000-0xbfffffff] [ 0.000000] PM: Registered nosave memory: [mem 0xc0000000-0xfffbbfff] [ 0.000000] PM: Registered nosave memory: [mem 0xfffbc000-0xffffffff] [ 0.000000] [mem 0xc0000000-0xfffbbfff] available for PCI devices [ 0.000000] Booting paravirtualized kernel on KVM [ 0.000000] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns [ 0.000000] random: get_random_bytes called from start_kernel+0x10a/0x92d with crng_init=0 [ 0.000000] setup_percpu: NR_CPUS:64 nr_cpumask_bits:64 nr_cpu_ids:2 nr_node_ids:1 [ 0.000000] percpu: Embedded 56 pages/cpu @(____ptrval____) s188488 r8192 d32696 u1048576 [ 0.000000] Built 1 zonelists, mobility grouping on. Total pages: 1935228 [ 0.000000] Policy zone: Normal [ 0.000000] Kernel command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native rodata=n ftrace_dump_on_oops=orig_cpu oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400 kvm-intel.nested=1 nf-conntrack-ftp.ports=20000 nf-conntrack-tftp.ports=20000 nf-conntrack-sip.ports=20000 nf-conntrack-irc.ports=20000 nf-conntrack-sane.ports=20000 nopcid [ 0.000000] Memory: 6499856K/7863876K available (110620K kernel code, 12279K rwdata, 16036K rodata, 3952K init, 23144K bss, 1364020K reserved, 0K cma-reserved) [ 0.001000] Running RCU self tests [ 0.001000] Hierarchical RCU implementation. [ 0.001000] RCU lockdep checking is enabled. [ 0.001000] RCU restricting CPUs from NR_CPUS=64 to nr_cpu_ids=2. [ 0.001000] RCU callback double-/use-after-free debug enabled. [ 0.001000] RCU: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 [ 0.001000] NR_IRQS: 4352, nr_irqs: 440, preallocated irqs: 16 [ 0.001000] Console: colour VGA+ 80x25 [ 0.001000] console [ttyS0] enabled [ 0.001000] console [ttyS0] enabled [ 0.001000] bootconsole [earlyser0] disabled [ 0.001000] bootconsole [earlyser0] disabled [ 0.001000] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar [ 0.001000] ... MAX_LOCKDEP_SUBCLASSES: 8 [ 0.001000] ... MAX_LOCK_DEPTH: 48 [ 0.001000] ... MAX_LOCKDEP_KEYS: 8191 [ 0.001000] ... CLASSHASH_SIZE: 4096 [ 0.001000] ... MAX_LOCKDEP_ENTRIES: 32768 [ 0.001000] ... MAX_LOCKDEP_CHAINS: 65536 [ 0.001000] ... CHAINHASH_SIZE: 32768 [ 0.001000] memory used by lock dependency info: 7391 kB [ 0.001000] per task-struct memory footprint: 1920 bytes [ 0.001000] ACPI: Core revision 20180508 [ 0.001029] APIC: Switch to symmetric I/O mode setup [ 0.002368] x2apic enabled [ 0.003012] Switched APIC routing to physical x2apic. [ 0.007000] ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 [ 0.007000] tsc: Detected 2300.000 MHz processor [ 0.007000] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212735223b2, max_idle_ns: 440795277976 ns [ 0.007028] Calibrating delay loop (skipped) preset value.. 4600.00 BogoMIPS (lpj=2300000) [ 0.008009] pid_max: default: 32768 minimum: 301 [ 0.009585] Security Framework initialized [ 0.010012] Yama: becoming mindful. [ 0.010548] SELinux: Initializing. [ 0.011360] AppArmor: AppArmor disabled by boot time parameter [ 0.017438] Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes) [ 0.020463] Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes) [ 0.022099] Mount-cache hash table entries: 16384 (order: 5, 131072 bytes) [ 0.023712] Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes) [ 0.026533] CPU: Physical Processor ID: 0 [ 0.027064] mce: CPU supports 32 MCE banks [ 0.027798] Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 [ 0.028011] Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 [ 0.029025] Spectre V2 : Mitigation: Full generic retpoline [ 0.030007] Speculative Store Bypass: Vulnerable [ 0.031719] Freeing SMP alternatives memory: 64K [ 0.035000] smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) [ 0.036290] Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. [ 0.037222] Hierarchical SRCU implementation. [ 0.038513] NMI watchdog: Perf event create on CPU 0 failed with -2 [ 0.039010] NMI watchdog: Perf NMI watchdog permanently disabled [ 0.041048] smp: Bringing up secondary CPUs ... [ 0.043318] x86: Booting SMP configuration: [ 0.044012] .... node #0, CPUs: #1 [ 0.001000] kvm-clock: cpu 1, msr 2:1fff8041, secondary cpu clock [ 0.046024] smp: Brought up 1 node, 2 CPUs [ 0.046610] smpboot: Max logical packages: 1 [ 0.047042] smpboot: Total of 2 processors activated (9200.00 BogoMIPS) [ 0.050397] devtmpfs: initialized [ 0.061123] kworker/u4:0 (24) used greatest stack depth: 24120 bytes left [ 0.063095] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns [ 0.064058] futex hash table entries: 512 (order: 4, 65536 bytes) [ 0.065210] xor: automatically using best checksumming function avx [ 0.067448] RTC time: 11:58:39, date: 06/10/18 [ 0.076234] NET: Registered protocol family 16 [ 0.079158] audit: initializing netlink subsys (disabled) [ 0.080111] audit: type=2000 audit(1528631919.383:1): state=initialized audit_enabled=0 res=1 [ 0.082387] kworker/u4:1 (34) used greatest stack depth: 23848 bytes left [ 0.083071] cpuidle: using governor menu [ 0.084361] ACPI: bus type PCI registered [ 0.086455] PCI: Using configuration type 1 for base access [ 0.125979] kworker/u4:2 (232) used greatest stack depth: 21992 bytes left [ 0.192357] ================================================================== [ 0.194196] BUG: KASAN: use-after-free in call_usermodehelper_exec_work+0x2d3/0x310 [ 0.194196] Write of size 4 at addr ffff8801d8bdd770 by task kworker/u4:0/7 [ 0.194196] [ 0.194196] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 4.17.0+ #94 [ 0.194196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 0.194196] Workqueue: events_unbound call_usermodehelper_exec_work [ 0.194196] Call Trace: [ 0.194196] dump_stack+0x1b9/0x294 [ 0.194196] ? dump_stack_print_info.cold.2+0x52/0x52 [ 0.194196] ? printk+0x9e/0xba [ 0.194196] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 0.194196] ? kasan_check_write+0x14/0x20 [ 0.194196] print_address_description+0x6c/0x20b [ 0.194196] ? call_usermodehelper_exec_work+0x2d3/0x310 [ 0.194196] kasan_report.cold.7+0x242/0x2fe [ 0.194196] __asan_report_store4_noabort+0x17/0x20 [ 0.194196] call_usermodehelper_exec_work+0x2d3/0x310 [ 0.194196] ? call_usermodehelper_exec_async+0x9e0/0x9e0 [ 0.194196] process_one_work+0xc64/0x1b70 [ 0.194196] ? finish_task_switch+0x28b/0x840 [ 0.194196] ? pwq_dec_nr_in_flight+0x490/0x490 [ 0.194196] ? __schedule+0x809/0x1e30 [ 0.194196] ? graph_lock+0x170/0x170 [ 0.194196] ? lock_downgrade+0x8e0/0x8e0 [ 0.194196] ? find_held_lock+0x36/0x1c0 [ 0.194196] ? lock_acquire+0x1dc/0x520 [ 0.194196] ? worker_thread+0x3d4/0x13a0 [ 0.194196] ? lock_downgrade+0x8e0/0x8e0 [ 0.194196] ? lock_release+0xa10/0xa10 [ 0.194196] ? kasan_check_read+0x11/0x20 [ 0.194196] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 0.194196] worker_thread+0x181/0x13a0 [ 0.194196] ? process_one_work+0x1b70/0x1b70 [ 0.194196] ? graph_lock+0x170/0x170 [ 0.194196] ? find_held_lock+0x36/0x1c0 [ 0.194196] ? find_held_lock+0x36/0x1c0 [ 0.194196] ? schedule+0xef/0x430 [ 0.194196] ? __schedule+0x1e30/0x1e30 [ 0.194196] ? do_raw_spin_unlock+0x9e/0x2e0 [ 0.194196] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 0.194196] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 0.194196] ? __kthread_parkme+0x111/0x1d0 [ 0.194196] ? parse_args.cold.15+0x1b3/0x1b3 [ 0.194196] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 0.194196] ? trace_hardirqs_on+0xd/0x10 [ 0.194196] kthread+0x345/0x410 [ 0.194196] ? process_one_work+0x1b70/0x1b70 [ 0.194196] ? kthread_bind+0x40/0x40 [ 0.194196] ret_from_fork+0x3a/0x50 [ 0.225100] [ 0.225414] Allocated by task 1: [ 0.225893] save_stack+0x43/0xd0 [ 0.226225] kasan_kmalloc+0xc4/0xe0 [ 0.226856] kmem_cache_alloc_trace+0x152/0x780 [ 0.226856] call_usermodehelper_setup+0xe8/0x400 [ 0.227932] kobject_uevent_env+0xb21/0x1110 [ 0.228777] kobject_uevent+0x1f/0x30 [ 0.229301] param_sysfs_init+0x3f9/0x486 [ 0.229831] do_one_initcall+0x127/0x913 [ 0.230366] kernel_init_freeable+0x49b/0x58e [ 0.231067] kernel_init+0x11/0x1b3 [ 0.231460] ret_from_fork+0x3a/0x50 [ 0.231604] [ 0.231604] Freed by task 514: [ 0.232371] save_stack+0x43/0xd0 [ 0.233236] __kasan_slab_free+0x11a/0x170 [ 0.233827] kasan_slab_free+0xe/0x10 [ 0.233975] kfree+0xd9/0x260 [ 0.233975] umh_complete+0x7b/0x90 [ 0.233975] call_usermodehelper_exec_async+0x6e8/0x9e0 [ 0.233975] ret_from_fork+0x3a/0x50 [ 0.233975] [ 0.233975] The buggy address belongs to the object at ffff8801d8bdd700 [ 0.233975] which belongs to the cache kmalloc-192 of size 192 [ 0.233975] The buggy address is located 112 bytes inside of [ 0.233975] 192-byte region [ffff8801d8bdd700, ffff8801d8bdd7c0) [ 0.233975] The buggy address belongs to the page: [ 0.233975] page:ffffea000762f740 count:1 mapcount:0 mapping:ffff8801da800040 index:0x0 [ 0.233975] flags: 0x2fffc0000000100(slab) [ 0.233975] raw: 02fffc0000000100 ffffea0007627108 ffffea000762fbc8 ffff8801da800040 [ 0.233975] raw: 0000000000000000 ffff8801d8bdd000 0000000100000010 0000000000000000 [ 0.233975] page dumped because: kasan: bad access detected [ 0.233975] [ 0.233975] Memory state around the buggy address: [ 0.233975] ffff8801d8bdd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 0.233975] ffff8801d8bdd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 0.233975] >ffff8801d8bdd700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 0.233975] ^ [ 0.233975] ffff8801d8bdd780: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 0.233975] ffff8801d8bdd800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 0.233975] ================================================================== [ 0.233975] Disabling lock debugging due to kernel taint [ 0.253073] Kernel panic - not syncing: panic_on_warn set ... [ 0.253073] [ 0.254000] CPU: 1 PID: 7 Comm: kworker/u4:0 Tainted: G B 4.17.0+ #94 [ 0.255884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 0.256986] Workqueue: events_unbound call_usermodehelper_exec_work [ 0.258008] Call Trace: [ 0.258008] dump_stack+0x1b9/0x294 [ 0.258008] ? dump_stack_print_info.cold.2+0x52/0x52 [ 0.258008] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 0.258008] ? call_usermodehelper_exec_work+0x290/0x310 [ 0.258008] panic+0x22f/0x4de [ 0.258008] ? add_taint.cold.5+0x16/0x16 [ 0.258008] ? do_raw_spin_unlock+0x9e/0x2e0 [ 0.258008] ? do_raw_spin_unlock+0x9e/0x2e0 [ 0.258008] ? call_usermodehelper_exec_work+0x2d3/0x310 [ 0.258008] kasan_end_report+0x47/0x4f [ 0.258008] kasan_report.cold.7+0x76/0x2fe [ 0.258008] __asan_report_store4_noabort+0x17/0x20 [ 0.258008] call_usermodehelper_exec_work+0x2d3/0x310 [ 0.266546] ? call_usermodehelper_exec_async+0x9e0/0x9e0 [ 0.266995] process_one_work+0xc64/0x1b70 [ 0.266995] ? finish_task_switch+0x28b/0x840 [ 0.266995] ? pwq_dec_nr_in_flight+0x490/0x490 [ 0.266995] ? __schedule+0x809/0x1e30 [ 0.266995] ? graph_lock+0x170/0x170 [ 0.266995] ? lock_downgrade+0x8e0/0x8e0 [ 0.266995] ? find_held_lock+0x36/0x1c0 [ 0.266995] ? lock_acquire+0x1dc/0x520 [ 0.266995] ? worker_thread+0x3d4/0x13a0 [ 0.266995] ? lock_downgrade+0x8e0/0x8e0 [ 0.266995] ? lock_release+0xa10/0xa10 [ 0.266995] ? kasan_check_read+0x11/0x20 [ 0.266995] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 0.266995] worker_thread+0x181/0x13a0 [ 0.266995] ? process_one_work+0x1b70/0x1b70 [ 0.266995] ? graph_lock+0x170/0x170 [ 0.266995] ? find_held_lock+0x36/0x1c0 [ 0.266995] ? find_held_lock+0x36/0x1c0 [ 0.277967] ? schedule+0xef/0x430 [ 0.277967] ? __schedule+0x1e30/0x1e30 [ 0.277967] ? do_raw_spin_unlock+0x9e/0x2e0 [ 0.277967] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 0.277967] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 0.277967] ? __kthread_parkme+0x111/0x1d0 [ 0.277967] ? parse_args.cold.15+0x1b3/0x1b3 [ 0.277967] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 0.277967] ? trace_hardirqs_on+0xd/0x10 [ 0.277967] kthread+0x345/0x410 [ 0.277967] ? process_one_work+0x1b70/0x1b70 [ 0.277967] ? kthread_bind+0x40/0x40 [ 0.277967] ret_from_fork+0x3a/0x50 [ 0.277967] Dumping ftrace buffer: [ 0.277967] (ftrace buffer empty) [ 0.277967] Rebooting in 86400 seconds..