./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2877145547 <...> [ 29.502222][ T3178] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.513839][ T3178] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 42.672446][ T27] kauditd_printk_skb: 37 callbacks suppressed [ 42.672461][ T27] audit: type=1400 audit(1652618668.624:73): avc: denied { transition } for pid=3482 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 42.704643][ T27] audit: type=1400 audit(1652618668.634:74): avc: denied { write } for pid=3482 comm="sh" path="pipe:[27119]" dev="pipefs" ino=27119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.37' (ECDSA) to the list of known hosts. execve("./syz-executor2877145547", ["./syz-executor2877145547"], 0x7ffe116d7980 /* 10 vars */) = 0 brk(NULL) = 0x555556d79000 brk(0x555556d79c40) = 0x555556d79c40 arch_prctl(ARCH_SET_FS, 0x555556d79300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor2877145547", 4096) = 28 brk(0x555556d9ac40) = 0x555556d9ac40 brk(0x555556d9b000) = 0x555556d9b000 mprotect(0x7fa61bdd1000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SOCKET_FILTER, insn_cnt=3, insns=0x20001000, license="syzkaller", log_level=4, log_size=1078, log_buf="", kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS}, 72) = 3 socket(AF_KCM, SOCK_DGRAM, KCMPROTO_CONNECTED) = 4 socket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 5 setsockopt(5, SOL_TCP, TCP_REPAIR, "\x01\x00\x00\x00\x66\x69\x63\x61\x74\x69\x6f\x6e\x20\x74\x69\x6d\x65\x20\x33\x37\x31\x20\x75\x73\x65\x63\x0a\x73\x74\x61\x63\x6b\x20\x64\x65\x70\x74\x68\x20\x30\x0a\x70\x72\x6f\x63\x65\x73\x73\x65\x64\x20\x32\x20\x69\x6e\x73\x6e\x73\x20\x28\x6c\x69\x6d\x69\x74\x20\x31\x30\x30\x30\x30\x30\x30\x29\x20\x6d\x61\x78\x5f\x73\x74\x61\x74\x65\x73\x5f\x70\x65\x72\x5f\x69\x6e\x73\x6e\x20\x30\x20\x74\x6f\x74"..., 30428) = 0 connect(5, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::", &sin6_addr), sin6_scope_id=0}, 28) = 0 setsockopt(5, SOL_TCP, TCP_ULP, [7564404], 4) = 0 [ 52.267646][ T27] audit: type=1400 audit(1652618678.224:75): avc: denied { execmem } for pid=3598 comm="syz-executor287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 52.290858][ T27] audit: type=1400 audit(1652618678.224:76): avc: denied { prog_load } for pid=3598 comm="syz-executor287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 52.311085][ T27] audit: type=1400 audit(1652618678.224:77): avc: denied { bpf } for pid=3598 comm="syz-executor287" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 52.332533][ T27] audit: type=1400 audit(1652618678.224:78): avc: denied { perfmon } for pid=3598 comm="syz-executor287" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 setsockopt(5, SOL_TLS, TLS_RX, "\x04\x03\x34\x00\x54\x27\x01\x0e\xde\x10\x25\x9c\xd6\x2b\x94\x9a\xca\x1e\x27\xe1\x48\x20\x80\x6f\x1b\x32\x11\x76\x62\x97\xc5\x50\xc9\xbe\xfe\xe0\x98\x67\x00\x2a\xa9\xb6\x3d\x50\xd6\x52\x0a\xed\x37\x77\x62\x01\xe1\x59\x4f\xb9", 56) = 0 ioctl(4, SIOCPROTOPRIVATE, 0x20000200) = 0 [ 52.353978][ T27] audit: type=1400 audit(1652618678.244:79): avc: denied { prog_run } for pid=3598 comm="syz-executor287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 52.373607][ T27] audit: type=1400 audit(1652618678.244:80): avc: denied { create } for pid=3598 comm="syz-executor287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 52.381093][ T3598] ================================================================== [ 52.393682][ T27] audit: type=1400 audit(1652618678.264:81): avc: denied { module_request } for pid=3598 comm="syz-executor287" kmod="crypto-cryptd(__generic-gcm-aesni)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 52.401291][ T3598] BUG: KASAN: slab-out-of-bounds in sk_psock_get+0x123/0x410 [ 52.401340][ T3598] Read of size 4 at addr ffff88807da55e78 by task syz-executor287/3598 [ 52.401357][ T3598] [ 52.401363][ T3598] CPU: 1 PID: 3598 Comm: syz-executor287 Not tainted 5.18.0-rc6-syzkaller-00153-g2fe1020d73ca #0 [ 52.401384][ T3598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.401395][ T3598] Call Trace: [ 52.401401][ T3598] [ 52.401407][ T3598] dump_stack_lvl+0xcd/0x134 [ 52.401436][ T3598] print_address_description.constprop.0.cold+0xeb/0x467 [ 52.426143][ T27] audit: type=1400 audit(1652618678.334:82): avc: denied { ioctl } for pid=3598 comm="syz-executor287" path="socket:[27245]" dev="sockfs" ino=27245 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 52.432737][ T3598] ? sk_psock_get+0x123/0x410 [ 52.510998][ T3598] kasan_report.cold+0xf4/0x1c6 [ 52.515845][ T3598] ? sk_psock_get+0x123/0x410 [ 52.520503][ T3598] kasan_check_range+0x13d/0x180 [ 52.525424][ T3598] sk_psock_get+0x123/0x410 [ 52.529909][ T3598] ? padding_length.part.0+0x270/0x270 [ 52.535692][ T3598] ? mark_lock.part.0+0xee/0x1910 [ 52.540703][ T3598] tls_sw_recvmsg+0x195/0x15a0 [ 52.545447][ T3598] ? avc_has_perm_noaudit+0x390/0x390 [ 52.550805][ T3598] ? decrypt_skb+0xc0/0xc0 [ 52.555203][ T3598] ? selinux_socket_recvmsg+0x203/0x2b0 [ 52.560730][ T3598] ? selinux_socket_getsockopt+0x2b0/0x2b0 [ 52.566518][ T3598] inet6_recvmsg+0x11b/0x5e0 [ 52.571093][ T3598] ? inet6_sk_rebuild_header+0xce0/0xce0 [ 52.576710][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 52.582933][ T3598] ? security_socket_recvmsg+0x8f/0xc0 [ 52.588373][ T3598] ? inet6_sk_rebuild_header+0xce0/0xce0 [ 52.593988][ T3598] ____sys_recvmsg+0x2be/0x5f0 [ 52.598738][ T3598] ? __sock_recv_ts_and_drops+0x5c0/0x5c0 [ 52.604443][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 52.610666][ T3598] ? __import_iovec+0x1f7/0x5d0 [ 52.615504][ T3598] ? import_iovec+0x10c/0x150 [ 52.620162][ T3598] ___sys_recvmsg+0x127/0x200 [ 52.624827][ T3598] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 52.630464][ T3598] ? __lock_acquire+0x163e/0x56c0 [ 52.635561][ T3598] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 52.641522][ T3598] ? lockdep_hardirqs_on+0x79/0x100 [ 52.646726][ T3598] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 52.652691][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 52.658911][ T3598] ? __fget_light+0x20f/0x270 [ 52.663569][ T3598] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 52.669792][ T3598] do_recvmmsg+0x24d/0x6d0 [ 52.674214][ T3598] ? ___sys_recvmsg+0x200/0x200 [ 52.679045][ T3598] ? rwlock_bug.part.0+0x90/0x90 [ 52.683964][ T3598] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 52.690195][ T3598] ? ptrace_notify+0xfa/0x140 [ 52.694864][ T3598] ? lock_downgrade+0x6e0/0x6e0 [ 52.699703][ T3598] __x64_sys_recvmmsg+0x20b/0x260 [ 52.704717][ T3598] ? _raw_spin_unlock_irq+0x1f/0x40 [ 52.709933][ T3598] ? __do_sys_socketcall+0x590/0x590 [ 52.715220][ T3598] ? lockdep_hardirqs_on+0x79/0x100 [ 52.720402][ T3598] ? _raw_spin_unlock_irq+0x2a/0x40 [ 52.725582][ T3598] ? ptrace_notify+0xfa/0x140 [ 52.730245][ T3598] do_syscall_64+0x35/0xb0 [ 52.734645][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 52.740784][ T3598] RIP: 0033:0x7fa61bd641c9 [ 52.745181][ T3598] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 52.764769][ T3598] RSP: 002b:00007ffdfc46b3c8 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 52.773182][ T3598] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa61bd641c9 [ 52.781135][ T3598] RDX: 000000000000000a RSI: 00000000200030c0 RDI: 0000000000000005 [ 52.789090][ T3598] RBP: 00007fa61bd28370 R08: 0000000000000000 R09: 0000000000000000 [ 52.797040][ T3598] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa61bd28400 [ 52.804993][ T3598] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 52.812947][ T3598] [ 52.815946][ T3598] [ 52.818260][ T3598] Allocated by task 3598: [ 52.822562][ T3598] kasan_save_stack+0x1e/0x40 [ 52.827318][ T3598] __kasan_slab_alloc+0x85/0xb0 [ 52.832146][ T3598] kmem_cache_alloc+0x265/0x560 [ 52.836982][ T3598] kcm_ioctl+0x7f1/0x1180 [ 52.841291][ T3598] sock_do_ioctl+0xcc/0x230 [ 52.845778][ T3598] sock_ioctl+0x2f1/0x640 [ 52.850090][ T3598] __x64_sys_ioctl+0x193/0x200 [ 52.854834][ T3598] do_syscall_64+0x35/0xb0 [ 52.859234][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 52.865110][ T3598] [ 52.867415][ T3598] Last potentially related work creation: [ 52.873106][ T3598] kasan_save_stack+0x1e/0x40 [ 52.877767][ T3598] __kasan_record_aux_stack+0x7e/0x90 [ 52.883120][ T3598] insert_work+0x48/0x350 [ 52.887432][ T3598] __queue_work+0x62e/0x1140 [ 52.892000][ T3598] queue_work_on+0xee/0x110 [ 52.896570][ T3598] kcm_ioctl+0xede/0x1180 [ 52.900882][ T3598] sock_do_ioctl+0xcc/0x230 [ 52.905395][ T3598] sock_ioctl+0x2f1/0x640 [ 52.909710][ T3598] __x64_sys_ioctl+0x193/0x200 [ 52.914456][ T3598] do_syscall_64+0x35/0xb0 [ 52.918849][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 52.924725][ T3598] [ 52.927037][ T3598] The buggy address belongs to the object at ffff88807da55bc0 [ 52.927037][ T3598] which belongs to the cache kcm_psock_cache of size 568 [ 52.941414][ T3598] The buggy address is located 128 bytes to the right of [ 52.941414][ T3598] 568-byte region [ffff88807da55bc0, ffff88807da55df8) [ 52.955199][ T3598] [ 52.957502][ T3598] The buggy address belongs to the physical page: [ 52.963891][ T3598] page:ffffea0001f69500 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7da54 [ 52.974020][ T3598] head:ffffea0001f69500 order:1 compound_mapcount:0 compound_pincount:0 [ 52.982321][ T3598] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 52.990294][ T3598] raw: 00fff00000010200 ffff8880249c7050 ffff8880249c7050 ffff88814bd0c600 [ 52.999105][ T3598] raw: 0000000000000000 ffff88807da54040 000000010000000b 0000000000000000 [ 53.007666][ T3598] page dumped because: kasan: bad access detected [ 53.014054][ T3598] page_owner tracks the page as allocated [ 53.019751][ T3598] page last allocated via order 1, migratetype Unmovable, gfp_mask 0x2420c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_COMP|__GFP_THISNODE), pid 3598, tgid 3598 (syz-executor287), ts 52379940749, free_ts 52358397606 [ 53.040048][ T3598] get_page_from_freelist+0xba2/0x3e00 [ 53.045496][ T3598] __alloc_pages+0x1b2/0x500 [ 53.050066][ T3598] cache_grow_begin+0x75/0x350 [ 53.054813][ T3598] cache_alloc_refill+0x27f/0x380 [ 53.059827][ T3598] kmem_cache_alloc+0x450/0x560 [ 53.064674][ T3598] kcm_ioctl+0x7f1/0x1180 [ 53.068995][ T3598] sock_do_ioctl+0xcc/0x230 [ 53.073489][ T3598] sock_ioctl+0x2f1/0x640 [ 53.077805][ T3598] __x64_sys_ioctl+0x193/0x200 [ 53.082580][ T3598] do_syscall_64+0x35/0xb0 [ 53.086976][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 53.092852][ T3598] page last free stack trace: [ 53.097500][ T3598] free_pcp_prepare+0x549/0xd20 [ 53.102331][ T3598] free_unref_page+0x19/0x6a0 [ 53.106986][ T3598] slabs_destroy+0x89/0xc0 [ 53.111390][ T3598] ___cache_free+0x34e/0x670 [ 53.115961][ T3598] qlist_free_all+0x4f/0x1b0 [ 53.120532][ T3598] kasan_quarantine_reduce+0x180/0x200 [ 53.125969][ T3598] __kasan_slab_alloc+0x97/0xb0 [ 53.130800][ T3598] kmem_cache_alloc+0x265/0x560 [ 53.135633][ T3598] getname_flags.part.0+0x50/0x4f0 [ 53.140726][ T3598] getname+0x8e/0xd0 [ 53.144599][ T3598] do_sys_openat2+0xf5/0x4c0 [ 53.149168][ T3598] __x64_sys_openat+0x13f/0x1f0 [ 53.154003][ T3598] do_syscall_64+0x35/0xb0 [ 53.158397][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 53.164271][ T3598] [ 53.166572][ T3598] Memory state around the buggy address: [ 53.172177][ T3598] ffff88807da55d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.180220][ T3598] ffff88807da55d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 53.188261][ T3598] >ffff88807da55e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.196304][ T3598] ^ [ 53.204341][ T3598] ffff88807da55e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.212389][ T3598] ffff88807da55f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.220423][ T3598] ================================================================== [ 53.229454][ T3598] Kernel panic - not syncing: panic_on_warn set ... [ 53.236063][ T3598] CPU: 1 PID: 3598 Comm: syz-executor287 Not tainted 5.18.0-rc6-syzkaller-00153-g2fe1020d73ca #0 [ 53.246564][ T3598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 53.256607][ T3598] Call Trace: [ 53.259868][ T3598] [ 53.262784][ T3598] dump_stack_lvl+0xcd/0x134 [ 53.267369][ T3598] panic+0x2d7/0x636 [ 53.271249][ T3598] ? panic_print_sys_info.part.0+0x10b/0x10b [ 53.277217][ T3598] ? preempt_schedule_common+0x59/0xc0 [ 53.282676][ T3598] ? sk_psock_get+0x123/0x410 [ 53.287332][ T3598] ? preempt_schedule_thunk+0x16/0x18 [ 53.292686][ T3598] ? trace_hardirqs_on+0x38/0x1c0 [ 53.297691][ T3598] ? sk_psock_get+0x123/0x410 [ 53.302349][ T3598] end_report.part.0+0x3f/0x7c [ 53.307097][ T3598] kasan_report.cold+0x93/0x1c6 [ 53.311931][ T3598] ? sk_psock_get+0x123/0x410 [ 53.316586][ T3598] kasan_check_range+0x13d/0x180 [ 53.321503][ T3598] sk_psock_get+0x123/0x410 [ 53.325987][ T3598] ? padding_length.part.0+0x270/0x270 [ 53.331427][ T3598] ? mark_lock.part.0+0xee/0x1910 [ 53.336433][ T3598] tls_sw_recvmsg+0x195/0x15a0 [ 53.341175][ T3598] ? avc_has_perm_noaudit+0x390/0x390 [ 53.346535][ T3598] ? decrypt_skb+0xc0/0xc0 [ 53.350930][ T3598] ? selinux_socket_recvmsg+0x203/0x2b0 [ 53.356458][ T3598] ? selinux_socket_getsockopt+0x2b0/0x2b0 [ 53.362243][ T3598] inet6_recvmsg+0x11b/0x5e0 [ 53.366814][ T3598] ? inet6_sk_rebuild_header+0xce0/0xce0 [ 53.372430][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 53.378650][ T3598] ? security_socket_recvmsg+0x8f/0xc0 [ 53.384091][ T3598] ? inet6_sk_rebuild_header+0xce0/0xce0 [ 53.389704][ T3598] ____sys_recvmsg+0x2be/0x5f0 [ 53.394456][ T3598] ? __sock_recv_ts_and_drops+0x5c0/0x5c0 [ 53.400168][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 53.406404][ T3598] ? __import_iovec+0x1f7/0x5d0 [ 53.411248][ T3598] ? import_iovec+0x10c/0x150 [ 53.415915][ T3598] ___sys_recvmsg+0x127/0x200 [ 53.420582][ T3598] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 53.426325][ T3598] ? __lock_acquire+0x163e/0x56c0 [ 53.431470][ T3598] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 53.437556][ T3598] ? lockdep_hardirqs_on+0x79/0x100 [ 53.442758][ T3598] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 53.448739][ T3598] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 53.454971][ T3598] ? __fget_light+0x20f/0x270 [ 53.459642][ T3598] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 53.465877][ T3598] do_recvmmsg+0x24d/0x6d0 [ 53.470293][ T3598] ? ___sys_recvmsg+0x200/0x200 [ 53.475136][ T3598] ? rwlock_bug.part.0+0x90/0x90 [ 53.480081][ T3598] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 53.486320][ T3598] ? ptrace_notify+0xfa/0x140 [ 53.490987][ T3598] ? lock_downgrade+0x6e0/0x6e0 [ 53.495827][ T3598] __x64_sys_recvmmsg+0x20b/0x260 [ 53.500840][ T3598] ? _raw_spin_unlock_irq+0x1f/0x40 [ 53.506023][ T3598] ? __do_sys_socketcall+0x590/0x590 [ 53.511301][ T3598] ? lockdep_hardirqs_on+0x79/0x100 [ 53.516480][ T3598] ? _raw_spin_unlock_irq+0x2a/0x40 [ 53.521659][ T3598] ? ptrace_notify+0xfa/0x140 [ 53.526321][ T3598] do_syscall_64+0x35/0xb0 [ 53.530720][ T3598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 53.536598][ T3598] RIP: 0033:0x7fa61bd641c9 [ 53.540993][ T3598] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 53.560582][ T3598] RSP: 002b:00007ffdfc46b3c8 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 53.568978][ T3598] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa61bd641c9 [ 53.576929][ T3598] RDX: 000000000000000a RSI: 00000000200030c0 RDI: 0000000000000005 [ 53.584929][ T3598] RBP: 00007fa61bd28370 R08: 0000000000000000 R09: 0000000000000000 [ 53.592879][ T3598] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fa61bd28400 [ 53.600830][ T3598] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 53.608780][ T3598] [ 53.611965][ T3598] Kernel Offset: disabled [ 53.616279][ T3598] Rebooting in 86400 seconds..