[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 24.582405] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 25.143518] random: sshd: uninitialized urandom read (32 bytes read) [ 25.492209] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.144728] random: sshd: uninitialized urandom read (32 bytes read) [ 92.237541] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.9' (ECDSA) to the list of known hosts. [ 97.842502] random: sshd: uninitialized urandom read (32 bytes read) 2018/08/22 14:56:46 parsed 1 programs [ 99.037960] random: cc1: uninitialized urandom read (8 bytes read) 2018/08/22 14:56:49 executed programs: 0 [ 100.525622] IPVS: ftp: loaded support on port[0] = 21 [ 100.747819] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.754270] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.761798] device bridge_slave_0 entered promiscuous mode [ 100.779566] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.785942] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.793337] device bridge_slave_1 entered promiscuous mode [ 100.810422] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 100.827639] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 100.875398] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 100.894780] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 100.965391] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 100.972661] team0: Port device team_slave_0 added [ 100.989184] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 100.996534] team0: Port device team_slave_1 added [ 101.014244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.031514] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.048604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.065126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.198176] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.204675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.211630] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.218033] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.693550] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 101.699656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.711512] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 101.752758] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 101.800406] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 101.806548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.814776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.858982] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.438482] ================================================================== [ 102.446050] BUG: KASAN: use-after-free in tipc_group_fill_sock_diag+0x739/0x84b [ 102.453485] Read of size 2 at addr ffff8801d2b5bc72 by task syz-executor0/4875 [ 102.460957] [ 102.462578] CPU: 0 PID: 4875 Comm: syz-executor0 Not tainted 4.18.0-next-20180822+ #45 [ 102.470611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.479945] Call Trace: [ 102.482525] dump_stack+0x1c9/0x2b4 [ 102.486146] ? dump_stack_print_info.cold.2+0x52/0x52 [ 102.491329] ? printk+0xa7/0xcf [ 102.494596] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 102.499338] ? tipc_group_fill_sock_diag+0x739/0x84b [ 102.504428] print_address_description+0x6c/0x20b [ 102.509264] ? tipc_group_fill_sock_diag+0x739/0x84b [ 102.514358] kasan_report.cold.7+0x242/0x30d [ 102.518765] __asan_report_load2_noabort+0x14/0x20 [ 102.523695] tipc_group_fill_sock_diag+0x739/0x84b [ 102.528617] ? tipc_group_member_evt+0xe30/0xe30 [ 102.533428] ? skb_put+0x17b/0x1e0 [ 102.536961] ? memset+0x31/0x40 [ 102.540227] ? memcpy+0x45/0x50 [ 102.543494] ? __nla_put+0x37/0x40 [ 102.547018] ? nla_put+0x11a/0x150 [ 102.550546] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 102.555199] ? tipc_diag_dump+0x30/0x30 [ 102.559164] ? tipc_getname+0x7f0/0x7f0 [ 102.563174] ? save_stack+0xa9/0xd0 [ 102.566795] ? save_stack+0x43/0xd0 [ 102.570407] ? kasan_kmalloc+0xc4/0xe0 [ 102.574276] ? __kmalloc_node_track_caller+0x47/0x70 [ 102.579436] ? graph_lock+0x170/0x170 [ 102.583227] ? __netlink_dump_start+0x4f1/0x6f0 [ 102.587995] ? sock_diag_rcv_msg+0x31d/0x410 [ 102.592478] ? netlink_rcv_skb+0x172/0x440 [ 102.596718] ? sock_diag_rcv+0x2a/0x40 [ 102.600593] ? netlink_unicast+0x5a0/0x760 [ 102.604811] ? netlink_sendmsg+0xa18/0xfc0 [ 102.609032] ? sock_sendmsg+0xd5/0x120 [ 102.612908] ? ___sys_sendmsg+0x7fd/0x930 [ 102.617046] ? __x64_sys_sendmsg+0x78/0xb0 [ 102.621268] ? do_syscall_64+0x1b9/0x820 [ 102.625359] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.630720] ? mark_held_locks+0xc9/0x160 [ 102.634907] ? lock_acquire+0x1e4/0x4f0 [ 102.638875] ? tipc_nl_sk_walk+0x60a/0xd30 [ 102.643098] ? tipc_nl_sk_walk+0x311/0xd30 [ 102.647323] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 102.652446] ? skb_put+0x17b/0x1e0 [ 102.655988] ? __nlmsg_put+0x14c/0x1b0 [ 102.659869] __tipc_add_sock_diag+0x22f/0x360 [ 102.664354] tipc_nl_sk_walk+0x68d/0xd30 [ 102.668411] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 102.673736] ? __tipc_nl_add_sk+0x400/0x400 [ 102.678048] ? skb_scrub_packet+0x490/0x490 [ 102.682428] ? kasan_check_write+0x14/0x20 [ 102.686658] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 102.691596] ? lock_downgrade+0x8f0/0x8f0 [ 102.695733] tipc_diag_dump+0x24/0x30 [ 102.699537] netlink_dump+0x519/0xd50 [ 102.703400] ? netlink_broadcast+0x50/0x50 [ 102.707635] __netlink_dump_start+0x4f1/0x6f0 [ 102.712120] ? kasan_check_read+0x11/0x20 [ 102.716259] tipc_sock_diag_handler_dump+0x234/0x340 [ 102.721633] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 102.726296] ? tipc_unregister_sysctl+0x20/0x20 [ 102.730950] ? netlink_deliver_tap+0x356/0xfb0 [ 102.735521] sock_diag_rcv_msg+0x31d/0x410 [ 102.739796] netlink_rcv_skb+0x172/0x440 [ 102.743852] ? sock_diag_bind+0x80/0x80 [ 102.747809] ? netlink_ack+0xbe0/0xbe0 [ 102.751681] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 102.756344] sock_diag_rcv+0x2a/0x40 [ 102.760133] netlink_unicast+0x5a0/0x760 [ 102.764186] ? netlink_attachskb+0x9a0/0x9a0 [ 102.768689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.774243] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 102.779255] netlink_sendmsg+0xa18/0xfc0 [ 102.783309] ? netlink_unicast+0x760/0x760 [ 102.787536] ? move_addr_to_kernel.part.18+0x100/0x100 [ 102.792799] ? security_socket_sendmsg+0x94/0xc0 [ 102.797602] ? netlink_unicast+0x760/0x760 [ 102.801831] sock_sendmsg+0xd5/0x120 [ 102.805539] ___sys_sendmsg+0x7fd/0x930 [ 102.809508] ? copy_msghdr_from_user+0x580/0x580 [ 102.814257] ? _raw_spin_unlock_bh+0x30/0x40 [ 102.818651] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 102.823787] ? do_raw_spin_unlock+0xa7/0x2f0 [ 102.828189] ? __release_sock+0x276/0x3a0 [ 102.832401] ? __fget_light+0x2f7/0x440 [ 102.836368] ? __local_bh_enable_ip+0x161/0x230 [ 102.841079] ? fget_raw+0x20/0x20 [ 102.844529] ? __release_sock+0x3a0/0x3a0 [ 102.848664] ? tipc_nametbl_build_group+0x279/0x360 [ 102.853713] ? tipc_setsockopt+0x726/0xd70 [ 102.857953] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.863477] ? sockfd_lookup_light+0xc5/0x160 [ 102.867958] __sys_sendmsg+0x11d/0x290 [ 102.871840] ? __ia32_sys_shutdown+0x80/0x80 [ 102.876241] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 102.881771] ? fput+0x130/0x1a0 [ 102.885088] ? __x64_sys_futex+0x47f/0x6a0 [ 102.889326] ? do_syscall_64+0x9a/0x820 [ 102.893289] ? do_syscall_64+0x9a/0x820 [ 102.897257] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 102.902356] __x64_sys_sendmsg+0x78/0xb0 [ 102.906417] do_syscall_64+0x1b9/0x820 [ 102.910298] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 102.915738] ? syscall_return_slowpath+0x5e0/0x5e0 [ 102.920658] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 102.925660] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 102.930660] ? recalc_sigpending_tsk+0x180/0x180 [ 102.935410] ? kasan_check_write+0x14/0x20 [ 102.939696] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 102.944548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.949729] RIP: 0033:0x457089 [ 102.952913] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 102.971849] RSP: 002b:00007f665c206c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.979593] RAX: ffffffffffffffda RBX: 00007f665c2076d4 RCX: 0000000000457089 [ 102.986864] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 102.994126] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 103.001388] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 103.008659] R13: 00000000004d4088 R14: 00000000004c8ab0 R15: 0000000000000000 [ 103.015948] [ 103.017579] Allocated by task 4875: [ 103.021214] save_stack+0x43/0xd0 [ 103.024670] kasan_kmalloc+0xc4/0xe0 [ 103.028396] kmem_cache_alloc_trace+0x152/0x730 [ 103.033082] tipc_group_create+0x155/0xa70 [ 103.037320] tipc_setsockopt+0x2d1/0xd70 [ 103.041391] __sys_setsockopt+0x1c5/0x3b0 [ 103.045547] __x64_sys_setsockopt+0xbe/0x150 [ 103.049955] do_syscall_64+0x1b9/0x820 [ 103.053843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.059021] [ 103.060652] Freed by task 4874: [ 103.063934] save_stack+0x43/0xd0 [ 103.067399] __kasan_slab_free+0x11a/0x170 [ 103.071645] kasan_slab_free+0xe/0x10 [ 103.075443] kfree+0xd9/0x210 [ 103.078554] tipc_group_delete+0x2e5/0x3f0 [ 103.082788] tipc_sk_leave+0x113/0x220 [ 103.086675] tipc_release+0x14e/0x12b0 [ 103.090560] __sock_release+0xd7/0x250 [ 103.094445] sock_close+0x19/0x20 [ 103.097901] __fput+0x376/0x8a0 [ 103.101180] ____fput+0x15/0x20 [ 103.104458] task_work_run+0x1e8/0x2a0 [ 103.108344] exit_to_usermode_loop+0x318/0x380 [ 103.112932] do_syscall_64+0x6be/0x820 [ 103.116825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.122005] [ 103.123632] The buggy address belongs to the object at ffff8801d2b5bc00 [ 103.123632] which belongs to the cache kmalloc-192 of size 192 [ 103.136297] The buggy address is located 114 bytes inside of [ 103.136297] 192-byte region [ffff8801d2b5bc00, ffff8801d2b5bcc0) [ 103.148174] The buggy address belongs to the page: [ 103.153112] page:ffffea00074ad6c0 count:1 mapcount:0 mapping:ffff8801dac00040 index:0x0 [ 103.161259] flags: 0x2fffc0000000100(slab) [ 103.165499] raw: 02fffc0000000100 ffffea00073a5188 ffff8801dac01148 ffff8801dac00040 [ 103.173396] raw: 0000000000000000 ffff8801d2b5b000 0000000100000010 0000000000000000 [ 103.181282] page dumped because: kasan: bad access detected [ 103.186987] [ 103.188608] Memory state around the buggy address: [ 103.193535] ffff8801d2b5bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 103.200896] ffff8801d2b5bb80: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 103.208261] >ffff8801d2b5bc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 103.215614] ^ [ 103.222632] ffff8801d2b5bc80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 103.229998] ffff8801d2b5bd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 103.237357] ================================================================== [ 103.244730] Disabling lock debugging due to kernel taint [ 103.250235] Kernel panic - not syncing: panic_on_warn set ... [ 103.250235] [ 103.257608] CPU: 0 PID: 4875 Comm: syz-executor0 Tainted: G B 4.18.0-next-20180822+ #45 [ 103.267047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.276399] Call Trace: [ 103.279001] dump_stack+0x1c9/0x2b4 [ 103.282635] ? dump_stack_print_info.cold.2+0x52/0x52 [ 103.287830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 103.292586] panic+0x238/0x4e7 [ 103.295778] ? add_taint.cold.5+0x16/0x16 [ 103.299928] ? trace_hardirqs_on+0xb4/0x2c0 [ 103.304247] ? trace_hardirqs_on+0x9a/0x2c0 [ 103.308569] ? tipc_group_fill_sock_diag+0x739/0x84b [ 103.313671] kasan_end_report+0x47/0x4f [ 103.317652] kasan_report.cold.7+0x76/0x30d [ 103.321975] __asan_report_load2_noabort+0x14/0x20 [ 103.326905] tipc_group_fill_sock_diag+0x739/0x84b [ 103.331836] ? tipc_group_member_evt+0xe30/0xe30 [ 103.336588] ? skb_put+0x17b/0x1e0 [ 103.340129] ? memset+0x31/0x40 [ 103.343415] ? memcpy+0x45/0x50 [ 103.346696] ? __nla_put+0x37/0x40 [ 103.350236] ? nla_put+0x11a/0x150 [ 103.353780] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 103.358450] ? tipc_diag_dump+0x30/0x30 [ 103.362434] ? tipc_getname+0x7f0/0x7f0 [ 103.366420] ? save_stack+0xa9/0xd0 [ 103.370044] ? save_stack+0x43/0xd0 [ 103.373671] ? kasan_kmalloc+0xc4/0xe0 [ 103.377557] ? __kmalloc_node_track_caller+0x47/0x70 [ 103.382660] ? graph_lock+0x170/0x170 [ 103.386460] ? __netlink_dump_start+0x4f1/0x6f0 [ 103.391130] ? sock_diag_rcv_msg+0x31d/0x410 [ 103.395544] ? netlink_rcv_skb+0x172/0x440 [ 103.399868] ? sock_diag_rcv+0x2a/0x40 [ 103.403757] ? netlink_unicast+0x5a0/0x760 [ 103.407987] ? netlink_sendmsg+0xa18/0xfc0 [ 103.412220] ? sock_sendmsg+0xd5/0x120 [ 103.416106] ? ___sys_sendmsg+0x7fd/0x930 [ 103.420256] ? __x64_sys_sendmsg+0x78/0xb0 [ 103.424491] ? do_syscall_64+0x1b9/0x820 [ 103.428551] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.433914] ? mark_held_locks+0xc9/0x160 [ 103.438067] ? lock_acquire+0x1e4/0x4f0 [ 103.442046] ? tipc_nl_sk_walk+0x60a/0xd30 [ 103.446286] ? tipc_nl_sk_walk+0x311/0xd30 [ 103.450522] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 103.455538] ? skb_put+0x17b/0x1e0 [ 103.459082] ? __nlmsg_put+0x14c/0x1b0 [ 103.462972] __tipc_add_sock_diag+0x22f/0x360 [ 103.467474] tipc_nl_sk_walk+0x68d/0xd30 [ 103.471539] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 103.476901] ? __tipc_nl_add_sk+0x400/0x400 [ 103.481222] ? skb_scrub_packet+0x490/0x490 [ 103.485545] ? kasan_check_write+0x14/0x20 [ 103.489798] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 103.494737] ? lock_downgrade+0x8f0/0x8f0 [ 103.498887] tipc_diag_dump+0x24/0x30 [ 103.502690] netlink_dump+0x519/0xd50 [ 103.506491] ? netlink_broadcast+0x50/0x50 [ 103.510726] __netlink_dump_start+0x4f1/0x6f0 [ 103.515217] ? kasan_check_read+0x11/0x20 [ 103.519364] tipc_sock_diag_handler_dump+0x234/0x340 [ 103.524485] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 103.529151] ? tipc_unregister_sysctl+0x20/0x20 [ 103.533816] ? netlink_deliver_tap+0x356/0xfb0 [ 103.538413] sock_diag_rcv_msg+0x31d/0x410 [ 103.542648] netlink_rcv_skb+0x172/0x440 [ 103.546710] ? sock_diag_bind+0x80/0x80 [ 103.550683] ? netlink_ack+0xbe0/0xbe0 [ 103.554570] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 103.559245] sock_diag_rcv+0x2a/0x40 [ 103.562958] netlink_unicast+0x5a0/0x760 [ 103.567022] ? netlink_attachskb+0x9a0/0x9a0 [ 103.571436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 103.576975] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 103.581990] netlink_sendmsg+0xa18/0xfc0 [ 103.586058] ? netlink_unicast+0x760/0x760 [ 103.590297] ? move_addr_to_kernel.part.18+0x100/0x100 [ 103.595572] ? security_socket_sendmsg+0x94/0xc0 [ 103.600323] ? netlink_unicast+0x760/0x760 [ 103.604554] sock_sendmsg+0xd5/0x120 [ 103.608267] ___sys_sendmsg+0x7fd/0x930 [ 103.612243] ? copy_msghdr_from_user+0x580/0x580 [ 103.616996] ? _raw_spin_unlock_bh+0x30/0x40 [ 103.621422] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 103.626529] ? do_raw_spin_unlock+0xa7/0x2f0 [ 103.630942] ? __release_sock+0x276/0x3a0 [ 103.635089] ? __fget_light+0x2f7/0x440 [ 103.639062] ? __local_bh_enable_ip+0x161/0x230 [ 103.643730] ? fget_raw+0x20/0x20 [ 103.647184] ? __release_sock+0x3a0/0x3a0 [ 103.651331] ? tipc_nametbl_build_group+0x279/0x360 [ 103.656348] ? tipc_setsockopt+0x726/0xd70 [ 103.660595] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 103.666134] ? sockfd_lookup_light+0xc5/0x160 [ 103.670628] __sys_sendmsg+0x11d/0x290 [ 103.674518] ? __ia32_sys_shutdown+0x80/0x80 [ 103.678927] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 103.684467] ? fput+0x130/0x1a0 [ 103.687748] ? __x64_sys_futex+0x47f/0x6a0 [ 103.691981] ? do_syscall_64+0x9a/0x820 [ 103.695952] ? do_syscall_64+0x9a/0x820 [ 103.699927] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 103.705030] __x64_sys_sendmsg+0x78/0xb0 [ 103.709093] do_syscall_64+0x1b9/0x820 [ 103.712979] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 103.718340] ? syscall_return_slowpath+0x5e0/0x5e0 [ 103.723266] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 103.728283] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 103.733297] ? recalc_sigpending_tsk+0x180/0x180 [ 103.738053] ? kasan_check_write+0x14/0x20 [ 103.742294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 103.747141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.752328] RIP: 0033:0x457089 [ 103.755520] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 103.774427] RSP: 002b:00007f665c206c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 103.782138] RAX: ffffffffffffffda RBX: 00007f665c2076d4 RCX: 0000000000457089 [ 103.789412] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 103.796678] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 103.803941] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 103.811205] R13: 00000000004d4088 R14: 00000000004c8ab0 R15: 0000000000000000 [ 103.818804] Dumping ftrace buffer: [ 103.822339] (ftrace buffer empty) [ 103.826031] Kernel Offset: disabled [ 103.829641] Rebooting in 86400 seconds..