./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor734032386 <...> Warning: Permanently added '10.128.1.33' (ED25519) to the list of known hosts. execve("./syz-executor734032386", ["./syz-executor734032386"], 0x7ffe7eb32e10 /* 10 vars */) = 0 brk(NULL) = 0x555555b2b000 brk(0x555555b2bd00) = 0x555555b2bd00 arch_prctl(ARCH_SET_FS, 0x555555b2b380) = 0 set_tid_address(0x555555b2b650) = 5057 set_robust_list(0x555555b2b660, 24) = 0 rseq(0x555555b2bca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor734032386", 4096) = 27 getrandom("\x8c\x79\x4f\x83\xc5\x77\x33\xc1", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555555b2bd00 brk(0x555555b4cd00) = 0x555555b4cd00 brk(0x555555b4d000) = 0x555555b4d000 mprotect(0x7f5837492000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 openat(AT_FDCWD, "/sys/kernel/profiling", O_RDWR|O_DSYNC|O_CLOEXEC) = 3 [ 55.200726][ T5057] kernel profiling enabled (shift: 0) [ 55.274161][ C1] ================================================================== [ 55.282329][ C1] BUG: KASAN: stack-out-of-bounds in profile_pc+0xd2/0x170 [ 55.289527][ C1] Read of size 8 at addr ffffc90003ac6f20 by task syz-executor734/5057 [ 55.297743][ C1] [ 55.300049][ C1] CPU: 1 PID: 5057 Comm: syz-executor734 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 [ 55.310188][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 55.320220][ C1] Call Trace: [ 55.323480][ C1] [ 55.326304][ C1] dump_stack_lvl+0x241/0x360 [ 55.330979][ C1] ? __pfx_dump_stack_lvl+0x10/0x10 [ 55.336151][ C1] ? __pfx__printk+0x10/0x10 [ 55.340724][ C1] ? _printk+0xd5/0x120 [ 55.344861][ C1] print_report+0x169/0x550 [ 55.349343][ C1] ? rcu_read_lock_sched_held+0x8d/0x130 [ 55.354953][ C1] ? __virt_addr_valid+0xbd/0x520 [ 55.359971][ C1] ? profile_pc+0xd2/0x170 [ 55.364396][ C1] kasan_report+0x143/0x180 [ 55.368890][ C1] ? profile_pc+0xd2/0x170 [ 55.373309][ C1] ? _raw_spin_unlock_irqrestore+0xd8/0x140 [ 55.379185][ C1] profile_pc+0xd2/0x170 [ 55.383410][ C1] profile_tick+0xd7/0x150 [ 55.387808][ C1] tick_nohz_handler+0x3a8/0x540 [ 55.392732][ C1] ? __pfx_tick_nohz_handler+0x10/0x10 [ 55.398216][ C1] __hrtimer_run_queues+0x54b/0xd00 [ 55.403494][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 55.409251][ C1] ? ktime_get_update_offsets_now+0x411/0x430 [ 55.415310][ C1] hrtimer_interrupt+0x396/0x990 [ 55.420237][ C1] __sysvec_apic_timer_interrupt+0x107/0x3a0 [ 55.426230][ C1] sysvec_apic_timer_interrupt+0xa1/0xc0 [ 55.431856][ C1] [ 55.434767][ C1] [ 55.437681][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 55.443646][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0xd8/0x140 [ 55.450136][ C1] Code: 9c 8f 44 24 20 42 80 3c 23 00 74 08 4c 89 f7 e8 fe 9e 7e f6 f6 44 24 21 02 75 52 41 f7 c7 00 02 00 00 74 01 fb bf 01 00 00 00 c3 94 ee f5 65 8b 05 d4 79 8d 74 85 c0 74 43 48 c7 04 24 0e 36 [ 55.469824][ C1] RSP: 0018:ffffc90003ac6f20 EFLAGS: 00000206 [ 55.475878][ C1] RAX: 75ad09f789338600 RBX: 1ffff92000758de8 RCX: ffffffff81720b2a [ 55.483829][ C1] RDX: dffffc0000000000 RSI: ffffffff8baac1e0 RDI: 0000000000000001 [ 55.491780][ C1] RBP: ffffc90003ac6fb0 R08: ffffffff92cae507 R09: 1ffffffff2595ca0 [ 55.499729][ C1] R10: dffffc0000000000 R11: fffffbfff2595ca1 R12: dffffc0000000000 [ 55.507687][ C1] R13: 1ffff92000758de4 R14: ffffc90003ac6f40 R15: 0000000000000246 [ 55.515638][ C1] ? mark_lock+0x9a/0x350 [ 55.519983][ C1] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 55.526294][ C1] ? __mod_zone_page_state+0xda/0x150 [ 55.531729][ C1] __rmqueue_pcplist+0x20a5/0x2560 [ 55.536849][ C1] ? __pfx___rmqueue_pcplist+0x10/0x10 [ 55.542314][ C1] get_page_from_freelist+0x896/0x3580 [ 55.547771][ C1] ? __pfx___might_resched+0x10/0x10 [ 55.553052][ C1] ? fs_reclaim_acquire+0x93/0x130 [ 55.558152][ C1] ? __pfx_get_page_from_freelist+0x10/0x10 [ 55.564033][ C1] ? prepare_alloc_pages+0x1da/0x5b0 [ 55.569303][ C1] __alloc_pages+0x256/0x680 [ 55.573879][ C1] ? __pfx___alloc_pages+0x10/0x10 [ 55.578978][ C1] ? policy_nodemask+0x1ec/0x720 [ 55.583898][ C1] alloc_pages_mpol+0x3de/0x650 [ 55.588732][ C1] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 55.594099][ C1] ? __pfx___pte_alloc_kernel+0x10/0x10 [ 55.599620][ C1] ? alloc_pages+0xef/0x170 [ 55.604115][ C1] __get_free_pages+0xc/0x30 [ 55.608687][ C1] kasan_populate_vmalloc_pte+0x38/0xe0 [ 55.614222][ C1] __apply_to_page_range+0x8ec/0xe40 [ 55.619488][ C1] ? __pfx_kasan_populate_vmalloc_pte+0x10/0x10 [ 55.625708][ C1] ? __pfx___apply_to_page_range+0x10/0x10 [ 55.631509][ C1] ? do_raw_spin_unlock+0x13c/0x8b0 [ 55.636691][ C1] alloc_vmap_area+0x1ad5/0x1c10 [ 55.641629][ C1] ? __pfx_alloc_vmap_area+0x10/0x10 [ 55.646980][ C1] ? kmalloc_node_trace+0x1fd/0x3a0 [ 55.652157][ C1] ? __get_vm_area_node+0x125/0x370 [ 55.657424][ C1] __get_vm_area_node+0x16e/0x370 [ 55.662427][ C1] __vmalloc_node_range+0x3df/0x14a0 [ 55.667690][ C1] ? profile_init+0xee/0x130 [ 55.672257][ C1] ? _printk+0xd5/0x120 [ 55.676392][ C1] ? policy_nodemask+0x1ec/0x720 [ 55.681308][ C1] ? __pfx___vmalloc_node_range+0x10/0x10 [ 55.687010][ C1] ? rcu_is_watching+0x15/0xb0 [ 55.691753][ C1] ? trace_kmalloc+0x1f/0xb0 [ 55.696320][ C1] ? __kmalloc+0x251/0x4a0 [ 55.700714][ C1] ? profile_init+0xee/0x130 [ 55.705368][ C1] ? __pfx_sysfs_kf_write+0x10/0x10 [ 55.710541][ C1] vzalloc+0x79/0x90 [ 55.714415][ C1] ? profile_init+0xee/0x130 [ 55.718978][ C1] profile_init+0xee/0x130 [ 55.723368][ C1] profiling_store+0x5e/0xc0 [ 55.727960][ C1] kernfs_fop_write_iter+0x3a4/0x500 [ 55.733220][ C1] vfs_write+0xa84/0xcb0 [ 55.737440][ C1] ? __pfx_vfs_write+0x10/0x10 [ 55.742182][ C1] ? lockdep_hardirqs_on+0x99/0x150 [ 55.747369][ C1] ? __fdget_pos+0x272/0x320 [ 55.751937][ C1] ksys_write+0x1a0/0x2c0 [ 55.756350][ C1] ? __pfx_ksys_write+0x10/0x10 [ 55.761175][ C1] ? do_syscall_64+0x10a/0x240 [ 55.765926][ C1] ? syscall_trace_enter+0x5f/0x150 [ 55.771099][ C1] do_syscall_64+0xfb/0x240 [ 55.775574][ C1] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 55.781443][ C1] RIP: 0033:0x7f583741f2e9 [ 55.785835][ C1] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 55.805416][ C1] RSP: 002b:00007ffd8b37a178 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 55.813819][ C1] RAX: ffffffffffffffda RBX: 00007ffd8b37a348 RCX: 00007f583741f2e9 [ 55.821797][ C1] RDX: 000000000000000f RSI: 0000000020000000 RDI: 0000000000000003 [ 55.829744][ C1] RBP: 00007f5837492610 R08: 0000000000000000 R09: 00007ffd8b37a348 [ 55.837692][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.845634][ C1] R13: 00007ffd8b37a338 R14: 0000000000000001 R15: 0000000000000001 [ 55.853585][ C1] [ 55.856580][ C1] [ 55.858880][ C1] The buggy address belongs to stack of task syz-executor734/5057 [ 55.866663][ C1] and is located at offset 0 in frame: [ 55.872175][ C1] _raw_spin_unlock_irqrestore+0x0/0x140 [ 55.877785][ C1] [ 55.880084][ C1] This frame has 1 object: [ 55.884468][ C1] [32, 40) 'flags.i.i.i.i' [ 55.884474][ C1] [ 55.891244][ C1] The buggy address belongs to the virtual mapping at [ 55.891244][ C1] [ffffc90003ac0000, ffffc90003ac9000) created by: [ 55.891244][ C1] copy_process+0x5d1/0x3df0 [ 55.909188][ C1] [ 55.911509][ C1] The buggy address belongs to the physical page: [ 55.917890][ C1] page:ffffea00007c79c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1f1e7 [ 55.928023][ C1] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 55.935108][ C1] page_type: 0xffffffff() [ 55.939410][ C1] raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000 [ 55.947967][ C1] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 55.956516][ C1] page dumped because: kasan: bad access detected [ 55.962900][ C1] page_owner tracks the page as allocated [ 55.968584][ C1] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2dc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), pid 5003, tgid 5003 (dhcpcd-run-hook), ts 46199855572, free_ts 45906945818 [ 55.988086][ C1] post_alloc_hook+0x1ea/0x210 [ 55.992842][ C1] get_page_from_freelist+0x33ea/0x3580 [ 55.998360][ C1] __alloc_pages+0x256/0x680 [ 56.002923][ C1] alloc_pages_mpol+0x3de/0x650 [ 56.007752][ C1] __vmalloc_node_range+0x9a4/0x14a0 [ 56.013015][ C1] dup_task_struct+0x3e9/0x7d0 [ 56.017754][ C1] copy_process+0x5d1/0x3df0 [ 56.022315][ C1] kernel_clone+0x223/0x840 [ 56.026792][ C1] __x64_sys_clone+0x258/0x2a0 [ 56.031537][ C1] do_syscall_64+0xfb/0x240 [ 56.036011][ C1] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 56.041880][ C1] page last free pid 4992 tgid 4992 stack trace: [ 56.048177][ C1] free_unref_page_prepare+0x95d/0xa80 [ 56.053624][ C1] free_unref_page+0x37/0x3f0 [ 56.058279][ C1] __put_partials+0xeb/0x130 [ 56.062844][ C1] put_cpu_partial+0x17c/0x250 [ 56.067581][ C1] __slab_free+0x2ea/0x3d0 [ 56.071973][ C1] qlist_free_all+0x5e/0xc0 [ 56.076454][ C1] kasan_quarantine_reduce+0x14f/0x170 [ 56.081888][ C1] __kasan_slab_alloc+0x23/0x80 [ 56.086733][ C1] kmem_cache_alloc+0x174/0x340 [ 56.091555][ C1] getname_flags+0xbd/0x4f0 [ 56.096038][ C1] vfs_fstatat+0x11c/0x190 [ 56.100428][ C1] __x64_sys_newfstatat+0x117/0x190 [ 56.105601][ C1] do_syscall_64+0xfb/0x240 [ 56.110084][ C1] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 56.115964][ C1] [ 56.118263][ C1] Memory state around the buggy address: [ 56.123866][ C1] ffffc90003ac6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.131898][ C1] ffffc90003ac6e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.139950][ C1] >ffffc90003ac6f00: 00 00 00 00 f1 f1 f1 f1 00 f3 f3 f3 00 00 00 00 [ 56.147989][ C1] ^ [ 56.153070][ C1] ffffc90003ac6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.161101][ C1] ffffc90003ac7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.169130][ C1] ================================================================== [ 56.177165][ C1] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 56.184328][ C1] CPU: 1 PID: 5057 Comm: syz-executor734 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 [ 56.194370][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 56.204411][ C1] Call Trace: [ 56.207672][ C1] [ 56.210496][ C1] dump_stack_lvl+0x241/0x360 [ 56.215149][ C1] ? __pfx_dump_stack_lvl+0x10/0x10 [ 56.220327][ C1] ? __pfx__printk+0x10/0x10 [ 56.224896][ C1] ? rcu_is_watching+0x15/0xb0 [ 56.229647][ C1] ? vscnprintf+0x5d/0x90 [ 56.233952][ C1] panic+0x349/0x860 [ 56.237837][ C1] ? __pfx_lock_release+0x10/0x10 [ 56.242835][ C1] ? check_panic_on_warn+0x21/0xb0 [ 56.247923][ C1] ? __pfx_panic+0x10/0x10 [ 56.252327][ C1] ? do_raw_spin_unlock+0x13c/0x8b0 [ 56.257503][ C1] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 56.263375][ C1] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 56.269678][ C1] check_panic_on_warn+0x86/0xb0 [ 56.274589][ C1] ? profile_pc+0xd2/0x170 [ 56.278982][ C1] end_report+0x6e/0x140 [ 56.283204][ C1] kasan_report+0x154/0x180 [ 56.287684][ C1] ? profile_pc+0xd2/0x170 [ 56.292077][ C1] ? _raw_spin_unlock_irqrestore+0xd8/0x140 [ 56.297943][ C1] profile_pc+0xd2/0x170 [ 56.302163][ C1] profile_tick+0xd7/0x150 [ 56.306555][ C1] tick_nohz_handler+0x3a8/0x540 [ 56.311472][ C1] ? __pfx_tick_nohz_handler+0x10/0x10 [ 56.316907][ C1] __hrtimer_run_queues+0x54b/0xd00 [ 56.322088][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 56.327796][ C1] ? ktime_get_update_offsets_now+0x411/0x430 [ 56.333851][ C1] hrtimer_interrupt+0x396/0x990 [ 56.338769][ C1] __sysvec_apic_timer_interrupt+0x107/0x3a0 [ 56.344727][ C1] sysvec_apic_timer_interrupt+0xa1/0xc0 [ 56.350336][ C1] [ 56.353244][ C1] [ 56.356217][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 56.362186][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0xd8/0x140 [ 56.368671][ C1] Code: 9c 8f 44 24 20 42 80 3c 23 00 74 08 4c 89 f7 e8 fe 9e 7e f6 f6 44 24 21 02 75 52 41 f7 c7 00 02 00 00 74 01 fb bf 01 00 00 00 c3 94 ee f5 65 8b 05 d4 79 8d 74 85 c0 74 43 48 c7 04 24 0e 36 [ 56.388261][ C1] RSP: 0018:ffffc90003ac6f20 EFLAGS: 00000206 [ 56.394310][ C1] RAX: 75ad09f789338600 RBX: 1ffff92000758de8 RCX: ffffffff81720b2a [ 56.402269][ C1] RDX: dffffc0000000000 RSI: ffffffff8baac1e0 RDI: 0000000000000001 [ 56.410218][ C1] RBP: ffffc90003ac6fb0 R08: ffffffff92cae507 R09: 1ffffffff2595ca0 [ 56.418177][ C1] R10: dffffc0000000000 R11: fffffbfff2595ca1 R12: dffffc0000000000 [ 56.426134][ C1] R13: 1ffff92000758de4 R14: ffffc90003ac6f40 R15: 0000000000000246 [ 56.434087][ C1] ? mark_lock+0x9a/0x350 [ 56.438397][ C1] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 56.444709][ C1] ? __mod_zone_page_state+0xda/0x150 [ 56.450079][ C1] __rmqueue_pcplist+0x20a5/0x2560 [ 56.455211][ C1] ? __pfx___rmqueue_pcplist+0x10/0x10 [ 56.460664][ C1] get_page_from_freelist+0x896/0x3580 [ 56.466114][ C1] ? __pfx___might_resched+0x10/0x10 [ 56.471394][ C1] ? fs_reclaim_acquire+0x93/0x130 [ 56.476486][ C1] ? __pfx_get_page_from_freelist+0x10/0x10 [ 56.482357][ C1] ? prepare_alloc_pages+0x1da/0x5b0 [ 56.487622][ C1] __alloc_pages+0x256/0x680 [ 56.492190][ C1] ? __pfx___alloc_pages+0x10/0x10 [ 56.497278][ C1] ? policy_nodemask+0x1ec/0x720 [ 56.502192][ C1] alloc_pages_mpol+0x3de/0x650 [ 56.507020][ C1] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 56.512476][ C1] ? __pfx___pte_alloc_kernel+0x10/0x10 [ 56.518035][ C1] ? alloc_pages+0xef/0x170 [ 56.522532][ C1] __get_free_pages+0xc/0x30 [ 56.527120][ C1] kasan_populate_vmalloc_pte+0x38/0xe0 [ 56.532663][ C1] __apply_to_page_range+0x8ec/0xe40 [ 56.537961][ C1] ? __pfx_kasan_populate_vmalloc_pte+0x10/0x10 [ 56.544221][ C1] ? __pfx___apply_to_page_range+0x10/0x10 [ 56.550013][ C1] ? do_raw_spin_unlock+0x13c/0x8b0 [ 56.555203][ C1] alloc_vmap_area+0x1ad5/0x1c10 [ 56.560129][ C1] ? __pfx_alloc_vmap_area+0x10/0x10 [ 56.565399][ C1] ? kmalloc_node_trace+0x1fd/0x3a0 [ 56.570577][ C1] ? __get_vm_area_node+0x125/0x370 [ 56.575756][ C1] __get_vm_area_node+0x16e/0x370 [ 56.580763][ C1] __vmalloc_node_range+0x3df/0x14a0 [ 56.586028][ C1] ? profile_init+0xee/0x130 [ 56.590595][ C1] ? _printk+0xd5/0x120 [ 56.594728][ C1] ? policy_nodemask+0x1ec/0x720 [ 56.599663][ C1] ? __pfx___vmalloc_node_range+0x10/0x10 [ 56.605370][ C1] ? rcu_is_watching+0x15/0xb0 [ 56.610115][ C1] ? trace_kmalloc+0x1f/0xb0 [ 56.614690][ C1] ? __kmalloc+0x251/0x4a0 [ 56.619099][ C1] ? profile_init+0xee/0x130 [ 56.623674][ C1] ? __pfx_sysfs_kf_write+0x10/0x10 [ 56.628868][ C1] vzalloc+0x79/0x90 [ 56.632777][ C1] ? profile_init+0xee/0x130 [ 56.637448][ C1] profile_init+0xee/0x130 [ 56.641866][ C1] profiling_store+0x5e/0xc0 [ 56.646440][ C1] kernfs_fop_write_iter+0x3a4/0x500 [ 56.651721][ C1] vfs_write+0xa84/0xcb0 [ 56.655943][ C1] ? __pfx_vfs_write+0x10/0x10 [ 56.660683][ C1] ? lockdep_hardirqs_on+0x99/0x150 [ 56.665862][ C1] ? __fdget_pos+0x272/0x320 [ 56.670429][ C1] ksys_write+0x1a0/0x2c0 [ 56.674747][ C1] ? __pfx_ksys_write+0x10/0x10 [ 56.679573][ C1] ? do_syscall_64+0x10a/0x240 [ 56.684323][ C1] ? syscall_trace_enter+0x5f/0x150 [ 56.689497][ C1] do_syscall_64+0xfb/0x240 [ 56.693978][ C1] entry_SYSCALL_64_after_hwframe+0x6d/0x75 [ 56.699849][ C1] RIP: 0033:0x7f583741f2e9 [ 56.704238][ C1] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 56.723833][ C1] RSP: 002b:00007ffd8b37a178 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 56.732221][ C1] RAX: ffffffffffffffda RBX: 00007ffd8b37a348 RCX: 00007f583741f2e9 [ 56.740168][ C1] RDX: 000000000000000f RSI: 0000000020000000 RDI: 0000000000000003 [ 56.748115][ C1] RBP: 00007f5837492610 R08: 0000000000000000 R09: 00007ffd8b37a348 [ 56.756060][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.764004][ C1] R13: 00007ffd8b37a338 R14: 0000000000000001 R15: 0000000000000001 [ 56.772047][ C1] [ 56.775346][ C1] Kernel Offset: disabled [ 56.779657][ C1] Rebooting in 86400 seconds..