./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2877145547
<...>
[ 29.502222][ T3178] 8021q: adding VLAN 0 to HW filter on device bond0
[ 29.513839][ T3178] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK
syzkaller
syzkaller login: [ 42.672446][ T27] kauditd_printk_skb: 37 callbacks suppressed
[ 42.672461][ T27] audit: type=1400 audit(1652618668.624:73): avc: denied { transition } for pid=3482 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 42.704643][ T27] audit: type=1400 audit(1652618668.634:74): avc: denied { write } for pid=3482 comm="sh" path="pipe:[27119]" dev="pipefs" ino=27119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1
Warning: Permanently added '10.128.0.37' (ECDSA) to the list of known hosts.
execve("./syz-executor2877145547", ["./syz-executor2877145547"], 0x7ffe116d7980 /* 10 vars */) = 0
brk(NULL) = 0x555556d79000
brk(0x555556d79c40) = 0x555556d79c40
arch_prctl(ARCH_SET_FS, 0x555556d79300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
readlink("/proc/self/exe", "/root/syz-executor2877145547", 4096) = 28
brk(0x555556d9ac40) = 0x555556d9ac40
brk(0x555556d9b000) = 0x555556d9b000
mprotect(0x7fa61bdd1000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SOCKET_FILTER, insn_cnt=3, insns=0x20001000, license="syzkaller", log_level=4, log_size=1078, log_buf="", kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS}, 72) = 3
socket(AF_KCM, SOCK_DGRAM, KCMPROTO_CONNECTED) = 4
socket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 5
setsockopt(5, SOL_TCP, TCP_REPAIR, "\x01\x00\x00\x00\x66\x69\x63\x61\x74\x69\x6f\x6e\x20\x74\x69\x6d\x65\x20\x33\x37\x31\x20\x75\x73\x65\x63\x0a\x73\x74\x61\x63\x6b\x20\x64\x65\x70\x74\x68\x20\x30\x0a\x70\x72\x6f\x63\x65\x73\x73\x65\x64\x20\x32\x20\x69\x6e\x73\x6e\x73\x20\x28\x6c\x69\x6d\x69\x74\x20\x31\x30\x30\x30\x30\x30\x30\x29\x20\x6d\x61\x78\x5f\x73\x74\x61\x74\x65\x73\x5f\x70\x65\x72\x5f\x69\x6e\x73\x6e\x20\x30\x20\x74\x6f\x74"..., 30428) = 0
connect(5, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::", &sin6_addr), sin6_scope_id=0}, 28) = 0
setsockopt(5, SOL_TCP, TCP_ULP, [7564404], 4) = 0
[ 52.267646][ T27] audit: type=1400 audit(1652618678.224:75): avc: denied { execmem } for pid=3598 comm="syz-executor287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 52.290858][ T27] audit: type=1400 audit(1652618678.224:76): avc: denied { prog_load } for pid=3598 comm="syz-executor287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 52.311085][ T27] audit: type=1400 audit(1652618678.224:77): avc: denied { bpf } for pid=3598 comm="syz-executor287" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 52.332533][ T27] audit: type=1400 audit(1652618678.224:78): avc: denied { perfmon } for pid=3598 comm="syz-executor287" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
setsockopt(5, SOL_TLS, TLS_RX, "\x04\x03\x34\x00\x54\x27\x01\x0e\xde\x10\x25\x9c\xd6\x2b\x94\x9a\xca\x1e\x27\xe1\x48\x20\x80\x6f\x1b\x32\x11\x76\x62\x97\xc5\x50\xc9\xbe\xfe\xe0\x98\x67\x00\x2a\xa9\xb6\x3d\x50\xd6\x52\x0a\xed\x37\x77\x62\x01\xe1\x59\x4f\xb9", 56) = 0
ioctl(4, SIOCPROTOPRIVATE, 0x20000200) = 0
[ 52.353978][ T27] audit: type=1400 audit(1652618678.244:79): avc: denied { prog_run } for pid=3598 comm="syz-executor287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 52.373607][ T27] audit: type=1400 audit(1652618678.244:80): avc: denied { create } for pid=3598 comm="syz-executor287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[ 52.381093][ T3598] ==================================================================
[ 52.393682][ T27] audit: type=1400 audit(1652618678.264:81): avc: denied { module_request } for pid=3598 comm="syz-executor287" kmod="crypto-cryptd(__generic-gcm-aesni)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 52.401291][ T3598] BUG: KASAN: slab-out-of-bounds in sk_psock_get+0x123/0x410
[ 52.401340][ T3598] Read of size 4 at addr ffff88807da55e78 by task syz-executor287/3598
[ 52.401357][ T3598]
[ 52.401363][ T3598] CPU: 1 PID: 3598 Comm: syz-executor287 Not tainted 5.18.0-rc6-syzkaller-00153-g2fe1020d73ca #0
[ 52.401384][ T3598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 52.401395][ T3598] Call Trace:
[ 52.401401][ T3598]
[ 52.401407][ T3598] dump_stack_lvl+0xcd/0x134
[ 52.401436][ T3598] print_address_description.constprop.0.cold+0xeb/0x467
[ 52.426143][ T27] audit: type=1400 audit(1652618678.334:82): avc: denied { ioctl } for pid=3598 comm="syz-executor287" path="socket:[27245]" dev="sockfs" ino=27245 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[ 52.432737][ T3598] ? sk_psock_get+0x123/0x410
[ 52.510998][ T3598] kasan_report.cold+0xf4/0x1c6
[ 52.515845][ T3598] ? sk_psock_get+0x123/0x410
[ 52.520503][ T3598] kasan_check_range+0x13d/0x180
[ 52.525424][ T3598] sk_psock_get+0x123/0x410
[ 52.529909][ T3598] ? padding_length.part.0+0x270/0x270
[ 52.535692][ T3598] ? mark_lock.part.0+0xee/0x1910
[ 52.540703][ T3598] tls_sw_recvmsg+0x195/0x15a0
[ 52.545447][ T3598] ? avc_has_perm_noaudit+0x390/0x390
[ 52.550805][ T3598] ? decrypt_skb+0xc0/0xc0
[ 52.555203][ T3598] ? selinux_socket_recvmsg+0x203/0x2b0
[ 52.560730][ T3598] ? selinux_socket_getsockopt+0x2b0/0x2b0
[ 52.566518][ T3598] inet6_recvmsg+0x11b/0x5e0
[ 52.571093][ T3598] ? inet6_sk_rebuild_header+0xce0/0xce0
[ 52.576710][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 52.582933][ T3598] ? security_socket_recvmsg+0x8f/0xc0
[ 52.588373][ T3598] ? inet6_sk_rebuild_header+0xce0/0xce0
[ 52.593988][ T3598] ____sys_recvmsg+0x2be/0x5f0
[ 52.598738][ T3598] ? __sock_recv_ts_and_drops+0x5c0/0x5c0
[ 52.604443][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 52.610666][ T3598] ? __import_iovec+0x1f7/0x5d0
[ 52.615504][ T3598] ? import_iovec+0x10c/0x150
[ 52.620162][ T3598] ___sys_recvmsg+0x127/0x200
[ 52.624827][ T3598] ? __copy_msghdr_from_user+0x4b0/0x4b0
[ 52.630464][ T3598] ? __lock_acquire+0x163e/0x56c0
[ 52.635561][ T3598] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 52.641522][ T3598] ? lockdep_hardirqs_on+0x79/0x100
[ 52.646726][ T3598] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 52.652691][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 52.658911][ T3598] ? __fget_light+0x20f/0x270
[ 52.663569][ T3598] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 52.669792][ T3598] do_recvmmsg+0x24d/0x6d0
[ 52.674214][ T3598] ? ___sys_recvmsg+0x200/0x200
[ 52.679045][ T3598] ? rwlock_bug.part.0+0x90/0x90
[ 52.683964][ T3598] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 52.690195][ T3598] ? ptrace_notify+0xfa/0x140
[ 52.694864][ T3598] ? lock_downgrade+0x6e0/0x6e0
[ 52.699703][ T3598] __x64_sys_recvmmsg+0x20b/0x260
[ 52.704717][ T3598] ? _raw_spin_unlock_irq+0x1f/0x40
[ 52.709933][ T3598] ? __do_sys_socketcall+0x590/0x590
[ 52.715220][ T3598] ? lockdep_hardirqs_on+0x79/0x100
[ 52.720402][ T3598] ? _raw_spin_unlock_irq+0x2a/0x40
[ 52.725582][ T3598] ? ptrace_notify+0xfa/0x140
[ 52.730245][ T3598] do_syscall_64+0x35/0xb0
[ 52.734645][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 52.740784][ T3598] RIP: 0033:0x7fa61bd641c9
[ 52.745181][ T3598] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 52.764769][ T3598] RSP: 002b:00007ffdfc46b3c8 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 52.773182][ T3598] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa61bd641c9
[ 52.781135][ T3598] RDX: 000000000000000a RSI: 00000000200030c0 RDI: 0000000000000005
[ 52.789090][ T3598] RBP: 00007fa61bd28370 R08: 0000000000000000 R09: 0000000000000000
[ 52.797040][ T3598] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa61bd28400
[ 52.804993][ T3598] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 52.812947][ T3598]
[ 52.815946][ T3598]
[ 52.818260][ T3598] Allocated by task 3598:
[ 52.822562][ T3598] kasan_save_stack+0x1e/0x40
[ 52.827318][ T3598] __kasan_slab_alloc+0x85/0xb0
[ 52.832146][ T3598] kmem_cache_alloc+0x265/0x560
[ 52.836982][ T3598] kcm_ioctl+0x7f1/0x1180
[ 52.841291][ T3598] sock_do_ioctl+0xcc/0x230
[ 52.845778][ T3598] sock_ioctl+0x2f1/0x640
[ 52.850090][ T3598] __x64_sys_ioctl+0x193/0x200
[ 52.854834][ T3598] do_syscall_64+0x35/0xb0
[ 52.859234][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 52.865110][ T3598]
[ 52.867415][ T3598] Last potentially related work creation:
[ 52.873106][ T3598] kasan_save_stack+0x1e/0x40
[ 52.877767][ T3598] __kasan_record_aux_stack+0x7e/0x90
[ 52.883120][ T3598] insert_work+0x48/0x350
[ 52.887432][ T3598] __queue_work+0x62e/0x1140
[ 52.892000][ T3598] queue_work_on+0xee/0x110
[ 52.896570][ T3598] kcm_ioctl+0xede/0x1180
[ 52.900882][ T3598] sock_do_ioctl+0xcc/0x230
[ 52.905395][ T3598] sock_ioctl+0x2f1/0x640
[ 52.909710][ T3598] __x64_sys_ioctl+0x193/0x200
[ 52.914456][ T3598] do_syscall_64+0x35/0xb0
[ 52.918849][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 52.924725][ T3598]
[ 52.927037][ T3598] The buggy address belongs to the object at ffff88807da55bc0
[ 52.927037][ T3598] which belongs to the cache kcm_psock_cache of size 568
[ 52.941414][ T3598] The buggy address is located 128 bytes to the right of
[ 52.941414][ T3598] 568-byte region [ffff88807da55bc0, ffff88807da55df8)
[ 52.955199][ T3598]
[ 52.957502][ T3598] The buggy address belongs to the physical page:
[ 52.963891][ T3598] page:ffffea0001f69500 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7da54
[ 52.974020][ T3598] head:ffffea0001f69500 order:1 compound_mapcount:0 compound_pincount:0
[ 52.982321][ T3598] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 52.990294][ T3598] raw: 00fff00000010200 ffff8880249c7050 ffff8880249c7050 ffff88814bd0c600
[ 52.999105][ T3598] raw: 0000000000000000 ffff88807da54040 000000010000000b 0000000000000000
[ 53.007666][ T3598] page dumped because: kasan: bad access detected
[ 53.014054][ T3598] page_owner tracks the page as allocated
[ 53.019751][ T3598] page last allocated via order 1, migratetype Unmovable, gfp_mask 0x2420c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_COMP|__GFP_THISNODE), pid 3598, tgid 3598 (syz-executor287), ts 52379940749, free_ts 52358397606
[ 53.040048][ T3598] get_page_from_freelist+0xba2/0x3e00
[ 53.045496][ T3598] __alloc_pages+0x1b2/0x500
[ 53.050066][ T3598] cache_grow_begin+0x75/0x350
[ 53.054813][ T3598] cache_alloc_refill+0x27f/0x380
[ 53.059827][ T3598] kmem_cache_alloc+0x450/0x560
[ 53.064674][ T3598] kcm_ioctl+0x7f1/0x1180
[ 53.068995][ T3598] sock_do_ioctl+0xcc/0x230
[ 53.073489][ T3598] sock_ioctl+0x2f1/0x640
[ 53.077805][ T3598] __x64_sys_ioctl+0x193/0x200
[ 53.082580][ T3598] do_syscall_64+0x35/0xb0
[ 53.086976][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 53.092852][ T3598] page last free stack trace:
[ 53.097500][ T3598] free_pcp_prepare+0x549/0xd20
[ 53.102331][ T3598] free_unref_page+0x19/0x6a0
[ 53.106986][ T3598] slabs_destroy+0x89/0xc0
[ 53.111390][ T3598] ___cache_free+0x34e/0x670
[ 53.115961][ T3598] qlist_free_all+0x4f/0x1b0
[ 53.120532][ T3598] kasan_quarantine_reduce+0x180/0x200
[ 53.125969][ T3598] __kasan_slab_alloc+0x97/0xb0
[ 53.130800][ T3598] kmem_cache_alloc+0x265/0x560
[ 53.135633][ T3598] getname_flags.part.0+0x50/0x4f0
[ 53.140726][ T3598] getname+0x8e/0xd0
[ 53.144599][ T3598] do_sys_openat2+0xf5/0x4c0
[ 53.149168][ T3598] __x64_sys_openat+0x13f/0x1f0
[ 53.154003][ T3598] do_syscall_64+0x35/0xb0
[ 53.158397][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 53.164271][ T3598]
[ 53.166572][ T3598] Memory state around the buggy address:
[ 53.172177][ T3598] ffff88807da55d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 53.180220][ T3598] ffff88807da55d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 53.188261][ T3598] >ffff88807da55e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 53.196304][ T3598] ^
[ 53.204341][ T3598] ffff88807da55e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 53.212389][ T3598] ffff88807da55f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 53.220423][ T3598] ==================================================================
[ 53.229454][ T3598] Kernel panic - not syncing: panic_on_warn set ...
[ 53.236063][ T3598] CPU: 1 PID: 3598 Comm: syz-executor287 Not tainted 5.18.0-rc6-syzkaller-00153-g2fe1020d73ca #0
[ 53.246564][ T3598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 53.256607][ T3598] Call Trace:
[ 53.259868][ T3598]
[ 53.262784][ T3598] dump_stack_lvl+0xcd/0x134
[ 53.267369][ T3598] panic+0x2d7/0x636
[ 53.271249][ T3598] ? panic_print_sys_info.part.0+0x10b/0x10b
[ 53.277217][ T3598] ? preempt_schedule_common+0x59/0xc0
[ 53.282676][ T3598] ? sk_psock_get+0x123/0x410
[ 53.287332][ T3598] ? preempt_schedule_thunk+0x16/0x18
[ 53.292686][ T3598] ? trace_hardirqs_on+0x38/0x1c0
[ 53.297691][ T3598] ? sk_psock_get+0x123/0x410
[ 53.302349][ T3598] end_report.part.0+0x3f/0x7c
[ 53.307097][ T3598] kasan_report.cold+0x93/0x1c6
[ 53.311931][ T3598] ? sk_psock_get+0x123/0x410
[ 53.316586][ T3598] kasan_check_range+0x13d/0x180
[ 53.321503][ T3598] sk_psock_get+0x123/0x410
[ 53.325987][ T3598] ? padding_length.part.0+0x270/0x270
[ 53.331427][ T3598] ? mark_lock.part.0+0xee/0x1910
[ 53.336433][ T3598] tls_sw_recvmsg+0x195/0x15a0
[ 53.341175][ T3598] ? avc_has_perm_noaudit+0x390/0x390
[ 53.346535][ T3598] ? decrypt_skb+0xc0/0xc0
[ 53.350930][ T3598] ? selinux_socket_recvmsg+0x203/0x2b0
[ 53.356458][ T3598] ? selinux_socket_getsockopt+0x2b0/0x2b0
[ 53.362243][ T3598] inet6_recvmsg+0x11b/0x5e0
[ 53.366814][ T3598] ? inet6_sk_rebuild_header+0xce0/0xce0
[ 53.372430][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 53.378650][ T3598] ? security_socket_recvmsg+0x8f/0xc0
[ 53.384091][ T3598] ? inet6_sk_rebuild_header+0xce0/0xce0
[ 53.389704][ T3598] ____sys_recvmsg+0x2be/0x5f0
[ 53.394456][ T3598] ? __sock_recv_ts_and_drops+0x5c0/0x5c0
[ 53.400168][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 53.406404][ T3598] ? __import_iovec+0x1f7/0x5d0
[ 53.411248][ T3598] ? import_iovec+0x10c/0x150
[ 53.415915][ T3598] ___sys_recvmsg+0x127/0x200
[ 53.420582][ T3598] ? __copy_msghdr_from_user+0x4b0/0x4b0
[ 53.426325][ T3598] ? __lock_acquire+0x163e/0x56c0
[ 53.431470][ T3598] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 53.437556][ T3598] ? lockdep_hardirqs_on+0x79/0x100
[ 53.442758][ T3598] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 53.448739][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 53.454971][ T3598] ? __fget_light+0x20f/0x270
[ 53.459642][ T3598] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 53.465877][ T3598] do_recvmmsg+0x24d/0x6d0
[ 53.470293][ T3598] ? ___sys_recvmsg+0x200/0x200
[ 53.475136][ T3598] ? rwlock_bug.part.0+0x90/0x90
[ 53.480081][ T3598] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[ 53.486320][ T3598] ? ptrace_notify+0xfa/0x140
[ 53.490987][ T3598] ? lock_downgrade+0x6e0/0x6e0
[ 53.495827][ T3598] __x64_sys_recvmmsg+0x20b/0x260
[ 53.500840][ T3598] ? _raw_spin_unlock_irq+0x1f/0x40
[ 53.506023][ T3598] ? __do_sys_socketcall+0x590/0x590
[ 53.511301][ T3598] ? lockdep_hardirqs_on+0x79/0x100
[ 53.516480][ T3598] ? _raw_spin_unlock_irq+0x2a/0x40
[ 53.521659][ T3598] ? ptrace_notify+0xfa/0x140
[ 53.526321][ T3598] do_syscall_64+0x35/0xb0
[ 53.530720][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 53.536598][ T3598] RIP: 0033:0x7fa61bd641c9
[ 53.540993][ T3598] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 53.560582][ T3598] RSP: 002b:00007ffdfc46b3c8 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 53.568978][ T3598] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa61bd641c9
[ 53.576929][ T3598] RDX: 000000000000000a RSI: 00000000200030c0 RDI: 0000000000000005
[ 53.584929][ T3598] RBP: 00007fa61bd28370 R08: 0000000000000000 R09: 0000000000000000
[ 53.592879][ T3598] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa61bd28400
[ 53.600830][ T3598] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 53.608780][ T3598]
[ 53.611965][ T3598] Kernel Offset: disabled
[ 53.616279][ T3598] Rebooting in 86400 seconds..