Warning: Permanently added '10.128.0.91' (ECDSA) to the list of known hosts. 2019/10/02 00:01:37 fuzzer started syzkaller login: [ 50.723435] kauditd_printk_skb: 2 callbacks suppressed [ 50.723450] audit: type=1400 audit(1569974497.948:36): avc: denied { map } for pid=7656 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/02 00:01:39 dialing manager at 10.128.0.105:35887 2019/10/02 00:01:39 syscalls: 2516 2019/10/02 00:01:39 code coverage: enabled 2019/10/02 00:01:39 comparison tracing: enabled 2019/10/02 00:01:39 extra coverage: extra coverage is not supported by the kernel 2019/10/02 00:01:39 setuid sandbox: enabled 2019/10/02 00:01:39 namespace sandbox: enabled 2019/10/02 00:01:39 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/02 00:01:39 fault injection: enabled 2019/10/02 00:01:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/02 00:01:39 net packet injection: enabled 2019/10/02 00:01:39 net device setup: enabled 00:03:49 executing program 0: [ 182.201420] audit: type=1400 audit(1569974629.428:37): avc: denied { map } for pid=7674 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=69 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 182.286402] IPVS: ftp: loaded support on port[0] = 21 [ 182.391247] chnl_net:caif_netlink_parms(): no params data found 00:03:49 executing program 1: [ 182.442043] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.449081] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.461435] device bridge_slave_0 entered promiscuous mode [ 182.475265] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.489685] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.509141] device bridge_slave_1 entered promiscuous mode [ 182.532531] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.542132] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.563441] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.571853] team0: Port device team_slave_0 added [ 182.578162] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.585640] team0: Port device team_slave_1 added [ 182.591471] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 182.599134] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 00:03:49 executing program 2: [ 182.671155] device hsr_slave_0 entered promiscuous mode [ 182.708308] device hsr_slave_1 entered promiscuous mode [ 182.748550] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 182.755872] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 182.785646] IPVS: ftp: loaded support on port[0] = 21 [ 182.808718] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.815434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.822616] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.829296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.860430] IPVS: ftp: loaded support on port[0] = 21 00:03:50 executing program 3: [ 182.976084] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 182.989684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.053358] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 183.074598] chnl_net:caif_netlink_parms(): no params data found [ 183.090410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.100916] IPVS: ftp: loaded support on port[0] = 21 [ 183.111614] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.130580] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.139662] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 183.154611] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 183.162491] 8021q: adding VLAN 0 to HW filter on device team0 00:03:50 executing program 4: [ 183.226809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.237956] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.244376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.286204] chnl_net:caif_netlink_parms(): no params data found [ 183.312912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.321758] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.328495] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.383471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.395682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.415163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.437736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 00:03:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x2, 0x0, {0x0, 0x989680}}) [ 183.481610] IPVS: ftp: loaded support on port[0] = 21 [ 183.492066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.504616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.521368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.530433] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.536826] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.547139] device bridge_slave_0 entered promiscuous mode [ 183.563780] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 183.570316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.585074] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.592047] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.602464] device bridge_slave_1 entered promiscuous mode [ 183.633226] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 183.649941] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.678611] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.688978] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.695677] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.703290] device bridge_slave_0 entered promiscuous mode [ 183.737489] IPVS: ftp: loaded support on port[0] = 21 [ 183.745943] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.753535] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.761422] device bridge_slave_1 entered promiscuous mode [ 183.773516] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.782256] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 183.790828] team0: Port device team_slave_0 added [ 183.796181] chnl_net:caif_netlink_parms(): no params data found [ 183.823576] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.824238] audit: type=1400 audit(1569974631.048:38): avc: denied { associate } for pid=7675 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 183.834029] team0: Port device team_slave_1 added [ 183.872110] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.898473] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.921947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.937060] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 00:03:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f0000000300)="640f01c366b8ad008ed00f08c4417b2c020f3548b800000100000000000f23c00f21f835010008000f23f80fc778fc0f350fd8060f30", 0x36}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 184.014361] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.028320] team0: Port device team_slave_0 added [ 184.034260] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.041784] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.050487] device bridge_slave_0 entered promiscuous mode [ 184.056348] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 00:03:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000002c0)={0x0, 0x6, 0x4, {0x2, @raw_data="37eff2653430a431c64fbfa30c2a38dac2bfec391e57a058488681818c09f696cb927986149d147e5bdb188052955e73dbf46d0c32aeefcf9e6d9c6dfa4d837c7d89baad901a0c27dadb0b9776316a2c36b33646115376e3602346de9a65e5d812ecf6eeb88f247ed31abc084429e7d6a0f8935c808ac4a805487b5567ebe45005271260780a78abcf70deaff66bccb36c3d9fb3c831a9e576ad07f3ce722003c54f90a4dfba0e81095ad2f4c1089003cdd592bb47b86b4224fee36fbe35865d14833c4094de11b3"}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, r1, 0x0) [ 184.109853] device hsr_slave_0 entered promiscuous mode [ 184.148255] device hsr_slave_1 entered promiscuous mode [ 184.199000] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 184.210574] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.219777] team0: Port device team_slave_1 added [ 184.225276] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.232409] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.242793] device bridge_slave_1 entered promiscuous mode 00:03:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000002c0)={0x0, 0x6, 0x4, {0x2, @raw_data="37eff2653430a431c64fbfa30c2a38dac2bfec391e57a058488681818c09f696cb927986149d147e5bdb188052955e73dbf46d0c32aeefcf9e6d9c6dfa4d837c7d89baad901a0c27dadb0b9776316a2c36b33646115376e3602346de9a65e5d812ecf6eeb88f247ed31abc084429e7d6a0f8935c808ac4a805487b5567ebe45005271260780a78abcf70deaff66bccb36c3d9fb3c831a9e576ad07f3ce722003c54f90a4dfba0e81095ad2f4c1089003cdd592bb47b86b4224fee36fbe35865d14833c4094de11b3"}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000000)=0x2) dup3(r0, r1, 0x0) [ 184.255939] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 184.272227] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 184.280095] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 184.318865] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.363874] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.401475] ================================================================== [ 184.409965] BUG: KASAN: use-after-free in v4l2_ctrl_grab+0x159/0x160 [ 184.416857] Read of size 8 at addr ffff888092fc8ea0 by task syz-executor.0/7708 [ 184.424938] [ 184.426575] CPU: 0 PID: 7708 Comm: syz-executor.0 Not tainted 4.19.76 #0 [ 184.434344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.444137] Call Trace: [ 184.446777] dump_stack+0x172/0x1f0 [ 184.450571] ? v4l2_ctrl_grab+0x159/0x160 [ 184.454734] print_address_description.cold+0x7c/0x20d [ 184.460149] ? v4l2_ctrl_grab+0x159/0x160 [ 184.464300] kasan_report.cold+0x8c/0x2ba [ 184.468873] ? vidioc_querycap+0x110/0x110 [ 184.473555] __asan_report_load8_noabort+0x14/0x20 [ 184.478650] v4l2_ctrl_grab+0x159/0x160 [ 184.482668] ? vidioc_querycap+0x110/0x110 [ 184.486995] vicodec_stop_streaming+0x158/0x1a0 [ 184.491962] ? vicodec_return_bufs+0x220/0x220 [ 184.496721] __vb2_queue_cancel+0xb1/0x790 [ 184.501059] ? vidioc_querycap+0x110/0x110 [ 184.505626] ? dev_debug_store+0x110/0x110 [ 184.509872] vb2_core_queue_release+0x28/0x80 [ 184.514414] vb2_queue_release+0x16/0x20 [ 184.518480] v4l2_m2m_ctx_release+0x2d/0x40 [ 184.522899] vicodec_release+0xc0/0x120 [ 184.526926] v4l2_release+0xf9/0x1a0 [ 184.530647] __fput+0x2dd/0x8b0 [ 184.533990] ____fput+0x16/0x20 [ 184.537279] task_work_run+0x145/0x1c0 [ 184.542303] exit_to_usermode_loop+0x273/0x2c0 [ 184.547218] do_syscall_64+0x53d/0x620 [ 184.551296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.556653] RIP: 0033:0x459a29 [ 184.559870] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.579894] RSP: 002b:00007f68f13f6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000124 [ 184.587768] RAX: 0000000000000004 RBX: 0000000000000003 RCX: 0000000000459a29 [ 184.595381] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 184.603282] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 184.610855] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f68f13f76d4 [ 184.618316] R13: 00000000004c00ad R14: 00000000004d2410 R15: 00000000ffffffff [ 184.625671] [ 184.627328] Allocated by task 7707: [ 184.630961] save_stack+0x45/0xd0 [ 184.634469] kasan_kmalloc+0xce/0xf0 [ 184.638185] __kmalloc_node+0x51/0x80 [ 184.642026] kvmalloc_node+0x68/0x100 [ 184.645822] v4l2_ctrl_new.part.0+0x214/0x1450 [ 184.650577] v4l2_ctrl_new_std+0x22d/0x360 [ 184.654816] vicodec_open+0x1a8/0xb30 [ 184.658658] v4l2_open+0x1b2/0x360 [ 184.662195] chrdev_open+0x245/0x6b0 [ 184.665950] do_dentry_open+0x4c3/0x1210 [ 184.670007] vfs_open+0xa0/0xd0 [ 184.673283] path_openat+0x10d7/0x45e0 [ 184.677252] do_filp_open+0x1a1/0x280 [ 184.681117] do_sys_open+0x3fe/0x550 [ 184.684833] __x64_sys_openat+0x9d/0x100 [ 184.688897] do_syscall_64+0xfd/0x620 [ 184.692700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.697969] [ 184.699631] Freed by task 7708: [ 184.703038] save_stack+0x45/0xd0 [ 184.706492] __kasan_slab_free+0x102/0x150 [ 184.710811] kasan_slab_free+0xe/0x10 [ 184.714825] kfree+0xcf/0x220 [ 184.717955] kvfree+0x61/0x70 [ 184.721072] v4l2_ctrl_handler_free+0x4a8/0x7e0 [ 184.725958] vicodec_release+0x6b/0x120 [ 184.729938] v4l2_release+0xf9/0x1a0 [ 184.733796] __fput+0x2dd/0x8b0 [ 184.737246] ____fput+0x16/0x20 [ 184.740579] task_work_run+0x145/0x1c0 [ 184.744839] exit_to_usermode_loop+0x273/0x2c0 [ 184.749521] do_syscall_64+0x53d/0x620 [ 184.753601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.759240] [ 184.760874] The buggy address belongs to the object at ffff888092fc8e80 [ 184.760874] which belongs to the cache kmalloc-256 of size 256 [ 184.773577] The buggy address is located 32 bytes inside of [ 184.773577] 256-byte region [ffff888092fc8e80, ffff888092fc8f80) [ 184.785656] The buggy address belongs to the page: [ 184.790841] page:ffffea00024bf200 count:1 mapcount:0 mapping:ffff88812c3f07c0 index:0x0 [ 184.799269] flags: 0x1fffc0000000100(slab) [ 184.803510] raw: 01fffc0000000100 ffffea0002089b08 ffffea00022c3588 ffff88812c3f07c0 [ 184.811396] raw: 0000000000000000 ffff888092fc80c0 000000010000000c 0000000000000000 [ 184.819282] page dumped because: kasan: bad access detected [ 184.824987] [ 184.826667] Memory state around the buggy address: [ 184.831679] ffff888092fc8d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 184.839038] ffff888092fc8e00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 184.846409] >ffff888092fc8e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 184.853802] ^ [ 184.858235] ffff888092fc8f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 184.865639] ffff888092fc8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.873238] ================================================================== [ 184.880935] Disabling lock debugging due to kernel taint [ 184.887435] Kernel panic - not syncing: panic_on_warn set ... [ 184.887435] [ 184.894928] CPU: 0 PID: 7708 Comm: syz-executor.0 Tainted: G B 4.19.76 #0 [ 184.903301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.912804] Call Trace: [ 184.915423] dump_stack+0x172/0x1f0 [ 184.919085] ? v4l2_ctrl_grab+0x159/0x160 [ 184.923253] panic+0x263/0x507 [ 184.926460] ? __warn_printk+0xf3/0xf3 [ 184.930472] ? v4l2_ctrl_grab+0x159/0x160 [ 184.934871] ? preempt_schedule+0x4b/0x60 [ 184.939070] ? ___preempt_schedule+0x16/0x18 [ 184.943589] ? trace_hardirqs_on+0x5e/0x220 [ 184.947925] ? v4l2_ctrl_grab+0x159/0x160 [ 184.952080] kasan_end_report+0x47/0x4f [ 184.956216] kasan_report.cold+0xa9/0x2ba [ 184.960753] ? vidioc_querycap+0x110/0x110 [ 184.965260] __asan_report_load8_noabort+0x14/0x20 [ 184.970372] v4l2_ctrl_grab+0x159/0x160 [ 184.974648] ? vidioc_querycap+0x110/0x110 [ 184.979218] vicodec_stop_streaming+0x158/0x1a0 [ 184.984162] ? vicodec_return_bufs+0x220/0x220 [ 184.988987] __vb2_queue_cancel+0xb1/0x790 [ 184.993399] ? vidioc_querycap+0x110/0x110 [ 184.997642] ? dev_debug_store+0x110/0x110 [ 185.002250] vb2_core_queue_release+0x28/0x80 [ 185.006755] vb2_queue_release+0x16/0x20 [ 185.010829] v4l2_m2m_ctx_release+0x2d/0x40 [ 185.015451] vicodec_release+0xc0/0x120 [ 185.019837] v4l2_release+0xf9/0x1a0 [ 185.023558] __fput+0x2dd/0x8b0 [ 185.027068] ____fput+0x16/0x20 [ 185.030442] task_work_run+0x145/0x1c0 [ 185.034343] exit_to_usermode_loop+0x273/0x2c0 [ 185.039107] do_syscall_64+0x53d/0x620 [ 185.043001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.048230] RIP: 0033:0x459a29 [ 185.051461] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.070607] RSP: 002b:00007f68f13f6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000124 [ 185.078315] RAX: 0000000000000004 RBX: 0000000000000003 RCX: 0000000000459a29 [ 185.085590] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 185.092864] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 185.100271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f68f13f76d4 [ 185.107580] R13: 00000000004c00ad R14: 00000000004d2410 R15: 00000000ffffffff [ 185.116794] Kernel Offset: disabled [ 185.120435] Rebooting in 86400 seconds..