syzkaller login: [ 65.315251][ T37] audit: type=1400 audit(1575266342.905:41): avc: denied { map } for pid=7967 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:2276' (ECDSA) to the list of known hosts. [ 67.121285][ T37] audit: type=1400 audit(1575266344.705:42): avc: denied { map } for pid=7977 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16526 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/12/02 05:59:04 fuzzer started 2019/12/02 05:59:05 dialing manager at 10.0.2.10:40377 2019/12/02 05:59:05 syscalls: 2617 2019/12/02 05:59:05 code coverage: enabled 2019/12/02 05:59:05 comparison tracing: enabled 2019/12/02 05:59:05 extra coverage: extra coverage is not supported by the kernel 2019/12/02 05:59:05 setuid sandbox: enabled 2019/12/02 05:59:05 namespace sandbox: enabled 2019/12/02 05:59:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/02 05:59:05 fault injection: enabled 2019/12/02 05:59:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/02 05:59:05 net packet injection: enabled 2019/12/02 05:59:05 net device setup: enabled 2019/12/02 05:59:05 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/02 05:59:05 devlink PCI setup: PCI device 0000:00:10.0 is not available 05:59:25 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) [ 88.232482][ T37] audit: type=1400 audit(1575266365.825:43): avc: denied { map } for pid=8000 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=49 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 05:59:25 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$setpipe(r1, 0x407, 0x0) [ 88.431049][ T8003] IPVS: ftp: loaded support on port[0] = 21 [ 88.431056][ T8001] IPVS: ftp: loaded support on port[0] = 21 [ 88.539067][ T8003] chnl_net:caif_netlink_parms(): no params data found [ 88.557573][ T8001] chnl_net:caif_netlink_parms(): no params data found [ 88.594112][ T8003] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.601528][ T8003] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.609551][ T8003] device bridge_slave_0 entered promiscuous mode [ 88.621269][ T8003] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.628532][ T8003] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.636230][ T8003] device bridge_slave_1 entered promiscuous mode [ 88.657525][ T8001] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.664754][ T8001] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.672514][ T8001] device bridge_slave_0 entered promiscuous mode [ 88.680837][ T8003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.690403][ T8001] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.697656][ T8001] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.705417][ T8001] device bridge_slave_1 entered promiscuous mode [ 88.713415][ T8003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.739205][ T8001] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.749892][ T8003] team0: Port device team_slave_0 added [ 88.756869][ T8001] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.768575][ T8003] team0: Port device team_slave_1 added [ 88.784760][ T8001] team0: Port device team_slave_0 added [ 88.796171][ T8001] team0: Port device team_slave_1 added [ 88.873758][ T8003] device hsr_slave_0 entered promiscuous mode [ 88.942256][ T8003] device hsr_slave_1 entered promiscuous mode [ 89.083803][ T8001] device hsr_slave_0 entered promiscuous mode [ 89.161964][ T8001] device hsr_slave_1 entered promiscuous mode [ 89.221828][ T8001] debugfs: Directory 'hsr0' with parent '/' already present! [ 89.257032][ T37] audit: type=1400 audit(1575266366.845:44): avc: denied { create } for pid=8001 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 89.281836][ T37] audit: type=1400 audit(1575266366.845:45): avc: denied { write } for pid=8001 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 89.306916][ T37] audit: type=1400 audit(1575266366.845:46): avc: denied { read } for pid=8001 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 89.333851][ T8001] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 89.384069][ T8003] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 89.463803][ T8003] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 89.523182][ T8001] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 89.593524][ T8001] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 89.664050][ T8003] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 89.732196][ T8001] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.783401][ T8003] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 89.897935][ T8001] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.906744][ T8003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.919203][ T8007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.927493][ T8007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.937018][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.944863][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.955066][ T8001] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.964049][ T8003] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.973581][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.982148][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.990193][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.997403][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.006912][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.014944][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.023611][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.031980][ T8008] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.038699][ T8008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.048194][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.059674][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.068168][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.076630][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.083768][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.090848][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.099668][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.108283][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.115532][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.126563][ T8007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.139258][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.150002][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.169788][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.178662][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.187193][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.195820][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.205071][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.213979][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.222467][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.230641][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.239804][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.248822][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.256994][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.268490][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.277407][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.285761][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.293972][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.306887][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.315073][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.323627][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.339887][ T8010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.349217][ T8010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.359650][ T8003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.377560][ T8010] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.385460][ T8010] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.393313][ T8010] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.400812][ T8010] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.412284][ T8001] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.423631][ T37] audit: type=1400 audit(1575266368.015:47): avc: denied { associate } for pid=8001 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 90.424167][ T8003] 8021q: adding VLAN 0 to HW filter on device batadv0 05:59:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) listen(r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000000), 0x4) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 90.575763][ C2] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 90.594403][ C3] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:59:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) listen(r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000000), 0x4) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 90.633746][ C2] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 90.645071][ T8016] ================================================================== [ 90.653301][ T8016] BUG: KASAN: slab-out-of-bounds in pipe_write+0xe30/0x1000 [ 90.654222][ T8016] Write of size 8 at addr ffff88800e8217a8 by task syz-executor.1/8016 [ 90.668466][ T8016] [ 90.668466][ T8016] CPU: 1 PID: 8016 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 90.668466][ T8016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 90.668466][ T8016] Call Trace: [ 90.668466][ T8016] dump_stack+0x197/0x210 [ 90.668466][ T8016] ? pipe_write+0xe30/0x1000 [ 90.668466][ T8016] print_address_description.constprop.0.cold+0xd4/0x30b [ 90.668466][ T8016] ? pipe_write+0xe30/0x1000 [ 90.668466][ T8016] ? pipe_write+0xe30/0x1000 [ 90.668466][ T8016] __kasan_report.cold+0x1b/0x41 [ 90.668466][ T8016] ? pipe_write+0xe30/0x1000 [ 90.668466][ T8016] kasan_report+0x12/0x20 [ 90.668466][ T8016] __asan_report_store8_noabort+0x17/0x20 [ 90.668466][ T8016] pipe_write+0xe30/0x1000 [ 90.668466][ T8016] new_sync_write+0x4d3/0x770 [ 90.668466][ T8016] ? new_sync_read+0x800/0x800 [ 90.668466][ T8016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 90.668466][ T8016] ? security_file_permission+0x8f/0x380 [ 90.668466][ T8016] __vfs_write+0xe1/0x110 [ 90.668466][ T8016] vfs_write+0x268/0x5d0 [ 90.668466][ T8016] ksys_write+0x220/0x290 [ 90.668466][ T8016] ? __ia32_sys_read+0xb0/0xb0 [ 90.668466][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 90.668466][ T8016] ? do_syscall_64+0x26/0x790 [ 90.668466][ T8016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 90.668466][ T8016] ? do_syscall_64+0x26/0x790 [ 90.668466][ T8016] __x64_sys_write+0x73/0xb0 [ 90.668466][ T8016] do_syscall_64+0xfa/0x790 [ 90.668466][ T8016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 90.668466][ T8016] RIP: 0033:0x45a759 [ 90.668466][ T8016] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 90.668466][ T8016] RSP: 002b:00007f32529acc88 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 90.668466][ T8016] RAX: ffffffffffffffda RBX: 000000000072bf00 RCX: 000000000045a759 [ 90.668466][ T8016] RDX: 00000000fffffef3 RSI: 00000000200001c0 RDI: 0000000000000004 [ 90.668466][ T8016] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 90.668466][ T8016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f32529ad6d4 [ 90.668466][ T8016] R13: 00000000004ae831 R14: 00000000006f7bb0 R15: 00000000ffffffff [ 90.668466][ T8016] [ 90.668466][ T8016] Allocated by task 8025: [ 90.668466][ T8016] save_stack+0x23/0x90 [ 90.668466][ T8016] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 90.668466][ T8016] kasan_kmalloc+0x9/0x10 [ 90.668466][ T8016] __kmalloc+0x163/0x770 [ 90.668466][ T8016] pipe_fcntl+0x3f7/0x8e0 [ 90.668466][ T8016] do_fcntl+0x255/0x1030 [ 90.668466][ T8016] __x64_sys_fcntl+0x16d/0x1e0 [ 90.668466][ T8016] do_syscall_64+0xfa/0x790 [ 90.668466][ T8016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 90.668466][ T8016] [ 90.668466][ T8016] Freed by task 0: [ 90.668466][ T8016] (stack is not available) [ 90.668466][ T8016] [ 90.668466][ T8016] The buggy address belongs to the object at ffff88800e821780 [ 90.668466][ T8016] which belongs to the cache kmalloc-64(23:syz1) of size 64 [ 90.668466][ T8016] The buggy address is located 40 bytes inside of [ 90.668466][ T8016] 64-byte region [ffff88800e821780, ffff88800e8217c0) [ 90.668466][ T8016] The buggy address belongs to the page: [ 90.668466][ T8016] page:ffffea00003a0840 refcount:1 mapcount:0 mapping:ffff888021a22700 index:0xffff88800e821f80 [ 90.668466][ T8016] raw: 00fffe0000000200 ffff88802bb8fc38 ffff88802bb8fc38 ffff888021a22700 [ 90.668466][ T8016] raw: ffff88800e821f80 ffff88800e821000 0000000100000010 0000000000000000 [ 90.668466][ T8016] page dumped because: kasan: bad access detected [ 90.668466][ T8016] [ 90.668466][ T8016] Memory state around the buggy address: [ 90.668466][ T8016] ffff88800e821680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.668466][ T8016] ffff88800e821700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.668466][ T8016] >ffff88800e821780: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 90.668466][ T8016] ^ [ 90.668466][ T8016] ffff88800e821800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.668466][ T8016] ffff88800e821880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 90.668466][ T8016] ================================================================== [ 90.668466][ T8016] Disabling lock debugging due to kernel taint [ 91.151928][ T8016] Kernel panic - not syncing: panic_on_warn set ... [ 91.158654][ T8016] CPU: 1 PID: 8016 Comm: syz-executor.1 Tainted: G B 5.4.0-syzkaller #0 [ 91.161627][ T8016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 91.161627][ T8016] Call Trace: [ 91.161627][ T8016] dump_stack+0x197/0x210 [ 91.161627][ T8016] panic+0x2e3/0x75c [ 91.161627][ T8016] ? add_taint.cold+0x16/0x16 [ 91.161627][ T8016] ? pipe_write+0xe30/0x1000 [ 91.161627][ T8016] ? preempt_schedule+0x4b/0x60 [ 91.161627][ T8016] ? ___preempt_schedule+0x16/0x18 [ 91.161627][ T8016] ? trace_hardirqs_on+0x5e/0x240 [ 91.161627][ T8016] ? pipe_write+0xe30/0x1000 [ 91.161627][ T8016] end_report+0x47/0x4f [ 91.161627][ T8016] ? pipe_write+0xe30/0x1000 [ 91.161627][ T8016] __kasan_report.cold+0xe/0x41 [ 91.161627][ T8016] ? pipe_write+0xe30/0x1000 [ 91.161627][ T8016] kasan_report+0x12/0x20 [ 91.161627][ T8016] __asan_report_store8_noabort+0x17/0x20 [ 91.161627][ T8016] pipe_write+0xe30/0x1000 [ 91.161627][ T8016] new_sync_write+0x4d3/0x770 [ 91.161627][ T8016] ? new_sync_read+0x800/0x800 [ 91.161627][ T8016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 91.161627][ T8016] ? security_file_permission+0x8f/0x380 [ 91.161627][ T8016] __vfs_write+0xe1/0x110 [ 91.161627][ T8016] vfs_write+0x268/0x5d0 [ 91.161627][ T8016] ksys_write+0x220/0x290 [ 91.161627][ T8016] ? __ia32_sys_read+0xb0/0xb0 [ 91.161627][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 91.161627][ T8016] ? do_syscall_64+0x26/0x790 [ 91.161627][ T8016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 91.161627][ T8016] ? do_syscall_64+0x26/0x790 [ 91.161627][ T8016] __x64_sys_write+0x73/0xb0 [ 91.161627][ T8016] do_syscall_64+0xfa/0x790 [ 91.161627][ T8016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 91.161627][ T8016] RIP: 0033:0x45a759 [ 91.161627][ T8016] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 91.161627][ T8016] RSP: 002b:00007f32529acc88 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 91.161627][ T8016] RAX: ffffffffffffffda RBX: 000000000072bf00 RCX: 000000000045a759 [ 91.161627][ T8016] RDX: 00000000fffffef3 RSI: 00000000200001c0 RDI: 0000000000000004 [ 91.161627][ T8016] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 91.161627][ T8016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f32529ad6d4 [ 91.161627][ T8016] R13: 00000000004ae831 R14: 00000000006f7bb0 R15: 00000000ffffffff [ 91.161627][ T8016] Kernel Offset: disabled [ 91.161627][ T8016] Rebooting in 86400 seconds..