[ 40.076111] audit: type=1800 audit(1546076745.597:25): pid=7983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 40.110659] audit: type=1800 audit(1546076745.597:26): pid=7983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 40.143706] audit: type=1800 audit(1546076745.597:27): pid=7983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 44.003507] sshd (8141) used greatest stack depth: 15720 bytes left Warning: Permanently added '10.128.10.50' (ECDSA) to the list of known hosts. RTNETLINK answers: No buffer space available RTNETLINK answers: No buffer space available [ 50.787100] IPVS: ftp: loaded support on port[0] = 21 RTNETLINK answers: File exists [ 50.943907] chnl_net:caif_netlink_parms(): no params data found [ 51.057275] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.064100] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.071639] device bridge_slave_0 entered promiscuous mode [ 51.089596] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.096152] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.103328] device bridge_slave_1 entered promiscuous mode [ 51.154920] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 51.176142] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 51.227673] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 51.235252] team0: Port device team_slave_0 added [ 51.253062] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 51.260262] team0: Port device team_slave_1 added [ 51.276940] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.295629] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready Garbage instead of arguments "slave1 ...". Try "ip link help". [ 51.358984] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 51.377176] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 51.530842] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.537426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.544572] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.550981] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 51.902461] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.910780] bridge0: port 2(bridge_slave_1) entered disabled state RTNETLINK answers: Invalid argument [ 52.126562] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.183150] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 52.238212] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 52.244774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.254338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.308579] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 52.314975] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.371177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 52.378216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.387462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.395336] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.401769] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.449163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 52.456247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.464643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.472634] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.478985] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.525492] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 52.532565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.589761] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 52.596983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.653200] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 52.660198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.669874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.677845] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.723460] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 52.730392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.738252] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.794670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 52.801566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.809035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready Cannot find device "hsr0" [ 52.865137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 52.872508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.880156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready Cannot find device "hsr0" Cannot find device "hsr0" Cannot find device "hsr0" Cannot find device "ip6erspan0" Cannot find device "ip6erspan0" Cannot find device "ip6erspan0" Cannot find device "ip6erspan0" RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported [ 53.219090] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready RTNETLINK answers: No such device executing program [ 53.382017] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.491020] ================================================================== [ 53.498552] BUG: KASAN: use-after-free in batadv_interface_tx+0x160a/0x18b0 [ 53.505650] Read of size 2 at addr ffff8880a9218c8b by task syz-executor114/8156 [ 53.513172] [ 53.514797] CPU: 0 PID: 8156 Comm: syz-executor114 Not tainted 4.20.0+ #394 [ 53.521885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 53.531239] Call Trace: [ 53.533840] dump_stack+0x1d3/0x2c6 [ 53.537463] ? dump_stack_print_info.cold.1+0x20/0x20 [ 53.542651] ? printk+0xa7/0xcf [ 53.545928] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 53.550726] print_address_description.cold.5+0x9/0x1ff [ 53.556103] ? batadv_interface_tx+0x160a/0x18b0 [ 53.560856] kasan_report.cold.6+0x1b/0x39 [ 53.565087] ? batadv_interface_tx+0x160a/0x18b0 [ 53.569878] ? batadv_interface_tx+0x160a/0x18b0 [ 53.574792] __asan_report_load_n_noabort+0xf/0x20 [ 53.579739] batadv_interface_tx+0x160a/0x18b0 [ 53.584365] ? batadv_skb_head_push+0x3b0/0x3b0 [ 53.589035] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 53.594569] ? validate_xmit_xfrm+0x41c/0xef0 [ 53.599058] ? arch_local_save_flags+0x40/0x40 [ 53.603639] ? skb_set_owner_w+0x21d/0x320 [ 53.607874] ? validate_xmit_skb+0x849/0xf70 [ 53.612285] ? kasan_check_write+0x14/0x20 [ 53.616514] ? netif_skb_features+0xb50/0xb50 [ 53.621009] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 53.626088] ? _copy_from_iter+0x389/0xf70 [ 53.630324] ? usercopy_warn+0x110/0x110 [ 53.634395] ? dev_direct_xmit+0x225/0x6a0 [ 53.638663] dev_direct_xmit+0x36c/0x6a0 [ 53.642741] ? validate_xmit_skb_list+0x140/0x140 [ 53.647585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.653120] ? skb_copy_datagram_from_iter+0x445/0x650 [ 53.658396] packet_direct_xmit+0xfb/0x170 [ 53.662628] packet_sendmsg+0x298a/0x6ad0 [ 53.666773] ? mark_held_locks+0x130/0x130 [ 53.671019] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 53.676140] ? packet_getname+0x5f0/0x5f0 [ 53.680292] ? debug_object_free+0x32d/0x690 [ 53.684732] ? aa_profile_af_perm+0x410/0x410 [ 53.689232] ? ___might_sleep+0x1ed/0x300 [ 53.693419] ? finish_task_switch+0x360/0x910 [ 53.697911] ? __local_bh_enable_ip+0x160/0x260 [ 53.702573] ? __local_bh_enable_ip+0x160/0x260 [ 53.707245] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 53.712174] ? aa_sk_perm+0x22b/0x8e0 [ 53.715971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.721502] ? __fget_light+0x2e9/0x430 [ 53.725471] ? aa_af_perm+0x5a0/0x5a0 [ 53.729265] ? __local_bh_enable_ip+0x160/0x260 [ 53.733934] ? _raw_spin_unlock_bh+0x30/0x40 [ 53.738340] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 53.743268] ? apparmor_socket_sendmsg+0x29/0x30 [ 53.748023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.753556] ? security_socket_sendmsg+0x94/0xc0 [ 53.758309] ? packet_getname+0x5f0/0x5f0 [ 53.762451] sock_sendmsg+0xd5/0x120 [ 53.766161] __sys_sendto+0x3d7/0x670 [ 53.769957] ? aa_af_perm+0x5a0/0x5a0 [ 53.773760] ? __ia32_sys_getpeername+0xb0/0xb0 [ 53.778431] ? packet_bind+0x164/0x1b0 [ 53.782366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.787897] ? __sys_bind+0x1d1/0x440 [ 53.791725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.797260] ? __sys_setsockopt+0x254/0x3c0 [ 53.801581] ? do_syscall_64+0x9a/0x820 [ 53.805547] ? do_syscall_64+0x9a/0x820 [ 53.809553] ? lockdep_hardirqs_on+0x421/0x5c0 [ 53.814135] ? trace_hardirqs_on+0xbd/0x310 [ 53.818453] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.823820] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 53.829265] __x64_sys_sendto+0xe1/0x1a0 [ 53.833328] do_syscall_64+0x1b9/0x820 [ 53.837208] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 53.842572] ? syscall_return_slowpath+0x5e0/0x5e0 [ 53.847494] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 53.852378] ? trace_hardirqs_on_caller+0x310/0x310 [ 53.857390] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 53.862404] ? prepare_exit_to_usermode+0x291/0x3b0 [ 53.867417] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 53.872267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.877507] RIP: 0033:0x441619 [ 53.880733] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 0b fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 53.899652] RSP: 002b:00007ffe137acfa8 EFLAGS: 00000216 ORIG_RAX: 000000000000002c [ 53.907360] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441619 [ 53.914626] RDX: 000000000000000e RSI: 0000000020000180 RDI: 0000000000000003 [ 53.921893] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 53.929162] R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004025e0 [ 53.936430] R13: 0000000000402670 R14: 0000000000000000 R15: 0000000000000000 [ 53.943726] [ 53.945395] Allocated by task 6631: [ 53.949018] save_stack+0x43/0xd0 [ 53.952466] kasan_kmalloc+0xcb/0xd0 [ 53.956172] kasan_slab_alloc+0x12/0x20 [ 53.960138] kmem_cache_alloc+0x130/0x730 [ 53.964279] anon_vma_clone+0x140/0x710 [ 53.968244] anon_vma_fork+0xf4/0x820 [ 53.972039] copy_process+0x4690/0x8790 [ 53.976006] _do_fork+0x1cb/0x11d0 [ 53.979537] __x64_sys_clone+0xbf/0x150 [ 53.983509] do_syscall_64+0x1b9/0x820 [ 53.987389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.992564] [ 53.994182] Freed by task 6633: [ 53.997506] save_stack+0x43/0xd0 [ 54.000952] __kasan_slab_free+0x102/0x150 [ 54.005177] kasan_slab_free+0xe/0x10 [ 54.009011] kmem_cache_free+0x83/0x290 [ 54.012978] unlink_anon_vmas+0x3b2/0xa60 [ 54.017126] free_pgtables+0x271/0x380 [ 54.021005] exit_mmap+0x2cd/0x590 [ 54.024536] mmput+0x247/0x610 [ 54.027740] do_exit+0xdeb/0x2620 [ 54.031193] do_group_exit+0x177/0x440 [ 54.035078] __x64_sys_exit_group+0x3e/0x50 [ 54.039435] do_syscall_64+0x1b9/0x820 [ 54.043363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.048536] [ 54.050194] The buggy address belongs to the object at ffff8880a9218c40 [ 54.050194] which belongs to the cache anon_vma_chain of size 80 [ 54.063016] The buggy address is located 75 bytes inside of [ 54.063016] 80-byte region [ffff8880a9218c40, ffff8880a9218c90) [ 54.074731] The buggy address belongs to the page: [ 54.079652] page:ffffea0002a48600 count:1 mapcount:0 mapping:ffff8880aa0fca80 index:0xffff8880a9218d90 [ 54.089089] flags: 0x1fffc0000000200(slab) [ 54.093318] raw: 01fffc0000000200 ffffea0002499648 ffffea00029daa88 ffff8880aa0fca80 [ 54.101192] raw: ffff8880a9218d90 ffff8880a9218000 0000000100000003 0000000000000000 [ 54.109059] page dumped because: kasan: bad access detected [ 54.114803] [ 54.116420] Memory state around the buggy address: [ 54.121341] ffff8880a9218b80: fb fb fb fb fb fb fc fc fc fc fb fb fb fb fb fb [ 54.128689] ffff8880a9218c00: fb fb fb fb fc fc fc fc fb fb fb fb fb fb fb fb [ 54.136060] >ffff8880a9218c80: fb fb fc fc fc fc fb fb fb fb fb fb fb fb fb fb [ 54.143406] ^ [ 54.147064] ffff8880a9218d00: fc fc fc fc fb fb fb fb fb fb fb fb fb fb fc fc [ 54.154416] ffff8880a9218d80: fc fc fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 54.161763] ================================================================== [ 54.169111] Disabling lock debugging due to kernel taint [ 54.174595] Kernel panic - not syncing: panic_on_warn set ... [ 54.180488] CPU: 0 PID: 8156 Comm: syz-executor114 Tainted: G B 4.20.0+ #394 [ 54.188962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.198301] Call Trace: [ 54.200884] dump_stack+0x1d3/0x2c6 [ 54.204503] ? dump_stack_print_info.cold.1+0x20/0x20 [ 54.209685] ? batadv_interface_tx+0x1590/0x18b0 [ 54.214459] panic+0x2ad/0x55f [ 54.217640] ? add_taint.cold.5+0x16/0x16 [ 54.221787] ? trace_hardirqs_on+0xb4/0x310 [ 54.226100] ? batadv_interface_tx+0x160a/0x18b0 [ 54.230856] end_report+0x47/0x4f [ 54.234304] kasan_report.cold.6+0xe/0x39 [ 54.238443] ? batadv_interface_tx+0x160a/0x18b0 [ 54.243191] ? batadv_interface_tx+0x160a/0x18b0 [ 54.247939] __asan_report_load_n_noabort+0xf/0x20 [ 54.252861] batadv_interface_tx+0x160a/0x18b0 [ 54.257436] ? batadv_skb_head_push+0x3b0/0x3b0 [ 54.262102] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 54.267632] ? validate_xmit_xfrm+0x41c/0xef0 [ 54.272120] ? arch_local_save_flags+0x40/0x40 [ 54.276693] ? skb_set_owner_w+0x21d/0x320 [ 54.280948] ? validate_xmit_skb+0x849/0xf70 [ 54.285346] ? kasan_check_write+0x14/0x20 [ 54.289610] ? netif_skb_features+0xb50/0xb50 [ 54.294097] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 54.299101] ? _copy_from_iter+0x389/0xf70 [ 54.303367] ? usercopy_warn+0x110/0x110 [ 54.307422] ? dev_direct_xmit+0x225/0x6a0 [ 54.311650] dev_direct_xmit+0x36c/0x6a0 [ 54.315725] ? validate_xmit_skb_list+0x140/0x140 [ 54.320565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.326091] ? skb_copy_datagram_from_iter+0x445/0x650 [ 54.331486] packet_direct_xmit+0xfb/0x170 [ 54.335738] packet_sendmsg+0x298a/0x6ad0 [ 54.339897] ? mark_held_locks+0x130/0x130 [ 54.344126] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 54.349225] ? packet_getname+0x5f0/0x5f0 [ 54.353367] ? debug_object_free+0x32d/0x690 [ 54.357768] ? aa_profile_af_perm+0x410/0x410 [ 54.362256] ? ___might_sleep+0x1ed/0x300 [ 54.366395] ? finish_task_switch+0x360/0x910 [ 54.370884] ? __local_bh_enable_ip+0x160/0x260 [ 54.375544] ? __local_bh_enable_ip+0x160/0x260 [ 54.380208] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 54.385134] ? aa_sk_perm+0x22b/0x8e0 [ 54.388928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.394543] ? __fget_light+0x2e9/0x430 [ 54.398546] ? aa_af_perm+0x5a0/0x5a0 [ 54.402339] ? __local_bh_enable_ip+0x160/0x260 [ 54.407001] ? _raw_spin_unlock_bh+0x30/0x40 [ 54.411405] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 54.416326] ? apparmor_socket_sendmsg+0x29/0x30 [ 54.421118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.427386] ? security_socket_sendmsg+0x94/0xc0 [ 54.432136] ? packet_getname+0x5f0/0x5f0 [ 54.436276] sock_sendmsg+0xd5/0x120 [ 54.440026] __sys_sendto+0x3d7/0x670 [ 54.443820] ? aa_af_perm+0x5a0/0x5a0 [ 54.447610] ? __ia32_sys_getpeername+0xb0/0xb0 [ 54.452274] ? packet_bind+0x164/0x1b0 [ 54.456153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.461682] ? __sys_bind+0x1d1/0x440 [ 54.465503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.471079] ? __sys_setsockopt+0x254/0x3c0 [ 54.475394] ? do_syscall_64+0x9a/0x820 [ 54.479358] ? do_syscall_64+0x9a/0x820 [ 54.483322] ? lockdep_hardirqs_on+0x421/0x5c0 [ 54.487932] ? trace_hardirqs_on+0xbd/0x310 [ 54.492247] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.497597] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 54.503039] __x64_sys_sendto+0xe1/0x1a0 [ 54.507092] do_syscall_64+0x1b9/0x820 [ 54.510972] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 54.516327] ? syscall_return_slowpath+0x5e0/0x5e0 [ 54.521247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 54.526079] ? trace_hardirqs_on_caller+0x310/0x310 [ 54.531086] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 54.536093] ? prepare_exit_to_usermode+0x291/0x3b0 [ 54.541107] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 54.545990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.551170] RIP: 0033:0x441619 [ 54.554352] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 0b fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 54.573245] RSP: 002b:00007ffe137acfa8 EFLAGS: 00000216 ORIG_RAX: 000000000000002c [ 54.580992] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441619 [ 54.588290] RDX: 000000000000000e RSI: 0000000020000180 RDI: 0000000000000003 [ 54.595549] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 54.602811] R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004025e0 [ 54.610070] R13: 0000000000402670 R14: 0000000000000000 R15: 0000000000000000 [ 54.618533] Kernel Offset: disabled [ 54.622163] Rebooting in 86400 seconds..