[ 44.835887] audit: type=1800 audit(1584114728.741:30): pid=7985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 49.747737] kauditd_printk_skb: 4 callbacks suppressed [ 49.747750] audit: type=1400 audit(1584114733.681:35): avc: denied { map } for pid=8156 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.169' (ECDSA) to the list of known hosts. [ 1023.790232] audit: type=1400 audit(1584115707.731:36): avc: denied { map } for pid=8168 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/13 16:08:27 parsed 1 programs [ 1025.545076] audit: type=1400 audit(1584115709.481:37): avc: denied { map } for pid=8168 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17171 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/03/13 16:08:29 executed programs: 0 [ 1025.743457] IPVS: ftp: loaded support on port[0] = 21 [ 1025.815812] chnl_net:caif_netlink_parms(): no params data found [ 1025.871836] bridge0: port 1(bridge_slave_0) entered blocking state [ 1025.878933] bridge0: port 1(bridge_slave_0) entered disabled state [ 1025.886397] device bridge_slave_0 entered promiscuous mode [ 1025.894572] bridge0: port 2(bridge_slave_1) entered blocking state [ 1025.901571] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.908807] device bridge_slave_1 entered promiscuous mode [ 1025.926386] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1025.936136] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1025.954986] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1025.962543] team0: Port device team_slave_0 added [ 1025.968543] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1025.975811] team0: Port device team_slave_1 added [ 1025.990433] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1025.996693] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1026.021911] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1026.033823] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1026.040145] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1026.065495] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1026.076530] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1026.084280] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1026.140124] device hsr_slave_0 entered promiscuous mode [ 1026.177939] device hsr_slave_1 entered promiscuous mode [ 1026.218613] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1026.225873] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1026.282135] audit: type=1400 audit(1584115710.221:38): avc: denied { create } for pid=8186 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1026.306310] audit: type=1400 audit(1584115710.221:39): avc: denied { write } for pid=8186 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1026.308302] bridge0: port 2(bridge_slave_1) entered blocking state [ 1026.330969] audit: type=1400 audit(1584115710.231:40): avc: denied { read } for pid=8186 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1026.336802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1026.367425] bridge0: port 1(bridge_slave_0) entered blocking state [ 1026.373875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1026.414253] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1026.422086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1026.431314] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1026.441142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1026.460833] bridge0: port 1(bridge_slave_0) entered disabled state [ 1026.468649] bridge0: port 2(bridge_slave_1) entered disabled state [ 1026.475840] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1026.487754] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1026.494078] 8021q: adding VLAN 0 to HW filter on device team0 [ 1026.508887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1026.516885] bridge0: port 1(bridge_slave_0) entered blocking state [ 1026.523339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1026.530663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1026.539571] bridge0: port 2(bridge_slave_1) entered blocking state [ 1026.545958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1026.563006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1026.571098] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1026.589582] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1026.599072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1026.609092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1026.620024] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1026.626281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1026.641157] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1026.649210] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1026.655905] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1026.669082] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1026.683288] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1026.693926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1026.733465] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1026.741190] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1026.748192] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1026.759534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1026.767240] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1026.774824] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1026.783961] device veth0_vlan entered promiscuous mode [ 1026.793838] device veth1_vlan entered promiscuous mode [ 1026.800107] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1026.810149] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1026.816947] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1026.824834] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1026.839970] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1026.850122] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1026.858489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1026.866318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1026.875920] device veth0_macvtap entered promiscuous mode [ 1026.883167] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1026.892595] device veth1_macvtap entered promiscuous mode [ 1026.899404] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1026.908414] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1026.919641] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1026.929494] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1026.936795] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1026.943931] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1026.951818] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1026.959688] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1026.967689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1026.979592] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1026.986604] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1026.993368] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1027.001584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1027.112964] audit: type=1400 audit(1584115711.051:41): avc: denied { associate } for pid=8186 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 1029.119410] bridge0: port 2(bridge_slave_1) entered disabled state [ 1029.279921] device bridge_slave_1 left promiscuous mode [ 1029.285565] bridge0: port 2(bridge_slave_1) entered disabled state [ 1029.855067] bond0: Releasing backup interface bond_slave_1 [ 1030.462384] team0: Port device team_slave_1 removed 2020/03/13 16:08:34 executed programs: 10 [ 1030.831108] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1031.152611] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1031.726152] device hsr_slave_1 left promiscuous mode 2020/03/13 16:08:39 executed programs: 22 [ 1036.319156] NOHZ: local_softirq_pending 08 [ 1037.778726] ================================================================== [ 1037.786983] BUG: KASAN: use-after-free in free_netdev+0x3b0/0x420 [ 1037.793380] Read of size 8 at addr ffff88809fb187e0 by task syz-executor.0/8380 [ 1037.800903] [ 1037.802518] CPU: 0 PID: 8380 Comm: syz-executor.0 Not tainted 4.19.109-syzkaller #0 [ 1037.810446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1037.819829] Call Trace: [ 1037.822468] dump_stack+0x188/0x20d [ 1037.826089] ? free_netdev+0x3b0/0x420 [ 1037.829980] print_address_description.cold+0x7c/0x212 [ 1037.835285] ? free_netdev+0x3b0/0x420 [ 1037.839253] kasan_report.cold+0x88/0x2b9 [ 1037.843389] free_netdev+0x3b0/0x420 [ 1037.847092] netdev_run_todo+0x5ea/0x740 [ 1037.851148] ? register_netdev+0x50/0x50 [ 1037.855191] ? __lock_is_held+0xad/0x140 [ 1037.859299] ? rtnl_link_get_net_capable.constprop.0+0x230/0x230 [ 1037.865535] rtnetlink_rcv_msg+0x460/0xaf0 [ 1037.869767] ? rtnetlink_put_metrics+0x520/0x520 [ 1037.874515] ? find_held_lock+0x2d/0x110 [ 1037.878623] netlink_rcv_skb+0x160/0x410 [ 1037.882674] ? rtnetlink_put_metrics+0x520/0x520 [ 1037.887425] ? netlink_ack+0xa60/0xa60 [ 1037.891313] netlink_unicast+0x4d7/0x6a0 [ 1037.895461] ? netlink_attachskb+0x710/0x710 [ 1037.899919] netlink_sendmsg+0x80b/0xcd0 [ 1037.903992] ? netlink_unicast+0x6a0/0x6a0 [ 1037.908267] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1037.913462] ? netlink_unicast+0x6a0/0x6a0 [ 1037.917691] sock_sendmsg+0xcf/0x120 [ 1037.922365] ___sys_sendmsg+0x803/0x920 [ 1037.926342] ? copy_msghdr_from_user+0x410/0x410 [ 1037.931096] ? __fget+0x319/0x510 [ 1037.934541] ? lock_downgrade+0x740/0x740 [ 1037.938761] ? check_preemption_disabled+0x41/0x280 [ 1037.943792] ? __fget+0x340/0x510 [ 1037.947235] ? iterate_fd+0x350/0x350 [ 1037.951124] ? __fget_light+0x1d1/0x230 [ 1037.955094] __sys_sendmsg+0xec/0x1b0 [ 1037.958969] ? __ia32_sys_shutdown+0x70/0x70 [ 1037.963394] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1037.968139] ? trace_hardirqs_off_caller+0x55/0x210 [ 1037.973157] ? do_syscall_64+0x21/0x620 [ 1037.977117] do_syscall_64+0xf9/0x620 [ 1037.980973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1037.986415] RIP: 0033:0x45c799 [ 1037.989602] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1038.009831] RSP: 002b:00007f893b7b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1038.017543] RAX: ffffffffffffffda RBX: 00007f893b7b36d4 RCX: 000000000045c799 [ 1038.024909] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 1038.032166] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1038.039779] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1038.047041] R13: 00000000000009f9 R14: 00000000004cca57 R15: 000000000076c04c [ 1038.054396] [ 1038.056007] Allocated by task 8378: [ 1038.059622] kasan_kmalloc+0xbf/0xe0 [ 1038.063347] __kmalloc+0x15b/0x770 [ 1038.066923] sk_prot_alloc+0x18c/0x2d0 [ 1038.071158] sk_alloc+0x36/0xf50 [ 1038.074610] tun_chr_open+0x7b/0x560 [ 1038.078395] misc_open+0x372/0x4a0 [ 1038.081983] chrdev_open+0x219/0x5c0 [ 1038.085907] do_dentry_open+0x4a8/0x1160 [ 1038.089970] path_openat+0x1031/0x4200 [ 1038.093871] do_filp_open+0x1a1/0x280 [ 1038.097888] do_sys_open+0x3c0/0x500 [ 1038.101612] do_syscall_64+0xf9/0x620 [ 1038.105447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1038.110906] [ 1038.112516] Freed by task 8376: [ 1038.115783] __kasan_slab_free+0xf7/0x140 [ 1038.119944] kfree+0xce/0x220 [ 1038.123036] __sk_destruct+0x579/0x780 [ 1038.126906] sk_destruct+0xb9/0xf0 [ 1038.130697] __sk_free+0xc2/0x2e0 [ 1038.134139] sk_free+0x3b/0x50 [ 1038.137322] __tun_detach+0xa04/0x1020 [ 1038.141384] tun_chr_close+0x10e/0x180 [ 1038.145275] __fput+0x2cd/0x890 [ 1038.148550] task_work_run+0x13f/0x1b0 [ 1038.152449] exit_to_usermode_loop+0x25a/0x2b0 [ 1038.157025] do_syscall_64+0x538/0x620 [ 1038.160904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1038.166138] [ 1038.167750] The buggy address belongs to the object at ffff88809fb18140 [ 1038.167750] which belongs to the cache kmalloc-4096 of size 4096 [ 1038.180739] The buggy address is located 1696 bytes inside of [ 1038.180739] 4096-byte region [ffff88809fb18140, ffff88809fb19140) [ 1038.192890] The buggy address belongs to the page: [ 1038.198981] page:ffffea00027ec600 count:1 mapcount:0 mapping:ffff88812c3dcdc0 index:0x0 compound_mapcount: 0 [ 1038.209853] flags: 0xfffe0000008100(slab|head) [ 1038.214718] raw: 00fffe0000008100 ffffea0002801b08 ffffea00021bfc88 ffff88812c3dcdc0 [ 1038.222584] raw: 0000000000000000 ffff88809fb18140 0000000100000001 0000000000000000 [ 1038.230642] page dumped because: kasan: bad access detected [ 1038.236347] [ 1038.237963] Memory state around the buggy address: [ 1038.242891] ffff88809fb18680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1038.250238] ffff88809fb18700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1038.257585] >ffff88809fb18780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1038.264932] ^ [ 1038.271422] ffff88809fb18800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1038.278774] ffff88809fb18880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1038.286119] ================================================================== [ 1038.294115] Disabling lock debugging due to kernel taint [ 1038.300572] Kernel panic - not syncing: panic_on_warn set ... [ 1038.300572] [ 1038.307963] CPU: 0 PID: 8380 Comm: syz-executor.0 Tainted: G B 4.19.109-syzkaller #0 [ 1038.317229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1038.326697] Call Trace: [ 1038.329307] dump_stack+0x188/0x20d [ 1038.333877] panic+0x26a/0x50e [ 1038.337254] ? __warn_printk+0xf3/0xf3 [ 1038.341164] ? preempt_schedule_common+0x4a/0xc0 [ 1038.345999] ? free_netdev+0x3b0/0x420 [ 1038.349894] ? ___preempt_schedule+0x16/0x18 [ 1038.354488] ? trace_hardirqs_on+0x55/0x210 [ 1038.358794] ? free_netdev+0x3b0/0x420 [ 1038.362678] kasan_end_report+0x43/0x49 [ 1038.366653] kasan_report.cold+0xa4/0x2b9 [ 1038.370794] free_netdev+0x3b0/0x420 [ 1038.374496] netdev_run_todo+0x5ea/0x740 [ 1038.378548] ? register_netdev+0x50/0x50 [ 1038.382620] ? __lock_is_held+0xad/0x140 [ 1038.386680] ? rtnl_link_get_net_capable.constprop.0+0x230/0x230 [ 1038.392832] rtnetlink_rcv_msg+0x460/0xaf0 [ 1038.397181] ? rtnetlink_put_metrics+0x520/0x520 [ 1038.401952] ? find_held_lock+0x2d/0x110 [ 1038.406114] netlink_rcv_skb+0x160/0x410 [ 1038.410183] ? rtnetlink_put_metrics+0x520/0x520 [ 1038.415382] ? netlink_ack+0xa60/0xa60 [ 1038.419367] netlink_unicast+0x4d7/0x6a0 [ 1038.423424] ? netlink_attachskb+0x710/0x710 [ 1038.427923] netlink_sendmsg+0x80b/0xcd0 [ 1038.431998] ? netlink_unicast+0x6a0/0x6a0 [ 1038.436232] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1038.441413] ? netlink_unicast+0x6a0/0x6a0 [ 1038.445634] sock_sendmsg+0xcf/0x120 [ 1038.449337] ___sys_sendmsg+0x803/0x920 [ 1038.453312] ? copy_msghdr_from_user+0x410/0x410 [ 1038.458231] ? __fget+0x319/0x510 [ 1038.461676] ? lock_downgrade+0x740/0x740 [ 1038.466008] ? check_preemption_disabled+0x41/0x280 [ 1038.471023] ? __fget+0x340/0x510 [ 1038.475022] ? iterate_fd+0x350/0x350 [ 1038.478815] ? __fget_light+0x1d1/0x230 [ 1038.482777] __sys_sendmsg+0xec/0x1b0 [ 1038.486576] ? __ia32_sys_shutdown+0x70/0x70 [ 1038.492384] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1038.497576] ? trace_hardirqs_off_caller+0x55/0x210 [ 1038.502592] ? do_syscall_64+0x21/0x620 [ 1038.506586] do_syscall_64+0xf9/0x620 [ 1038.510380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1038.515563] RIP: 0033:0x45c799 [ 1038.518749] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1038.538165] RSP: 002b:00007f893b7b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1038.546035] RAX: ffffffffffffffda RBX: 00007f893b7b36d4 RCX: 000000000045c799 [ 1038.553297] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 1038.560565] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1038.567824] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1038.575093] R13: 00000000000009f9 R14: 00000000004cca57 R15: 000000000076c04c [ 1038.583751] Kernel Offset: disabled [ 1038.587386] Rebooting in 86400 seconds..