[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.965524] audit: type=1800 audit(1546059458.137:25): pid=7819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 38.002262] audit: type=1800 audit(1546059458.137:26): pid=7819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 38.035543] audit: type=1800 audit(1546059458.137:27): pid=7819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.51' (ECDSA) to the list of known hosts. RTNETLINK answers: No buffer space available RTNETLINK answers: No buffer space available syzkaller login: [ 50.013072] IPVS: ftp: loaded support on port[0] = 21 RTNETLINK answers: File exists [ 50.162245] chnl_net:caif_netlink_parms(): no params data found [ 50.273199] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.280163] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.288148] device bridge_slave_0 entered promiscuous mode [ 50.306668] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.313111] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.320703] device bridge_slave_1 entered promiscuous mode [ 50.372269] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 50.392706] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 50.444553] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 50.452403] team0: Port device team_slave_0 added [ 50.470225] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 50.478098] team0: Port device team_slave_1 added Garbage instead of arguments "slave1 ...". Try "ip link help". [ 50.495991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.514808] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.576465] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 50.595322] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 50.742928] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.749408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.756316] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.762650] bridge0: port 1(bridge_slave_0) entered forwarding state RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 51.188858] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.206965] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.316172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.370701] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 51.422799] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 51.429251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.438479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.484706] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 51.491026] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.545807] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 51.552923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.562104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.570256] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.576638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.622585] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 51.630070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.639336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.647735] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.654061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.699186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 51.706028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 51.759875] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 51.767017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 51.823155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 51.830170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 51.838365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.845947] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.890584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 51.897627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 51.905411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.961738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 51.968915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 51.977898] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready Cannot find device "hsr0" Cannot find device "hsr0" [ 52.023636] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 52.031005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.039948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready Cannot find device "hsr0" Cannot find device "hsr0" Cannot find device "ip6erspan0" Cannot find device "ip6erspan0" Cannot find device "ip6erspan0" Cannot find device "ip6erspan0" RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported [ 52.364044] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready RTNETLINK answers: No such device executing program [ 52.526515] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.606819] ================================================================== [ 52.614287] BUG: KASAN: slab-out-of-bounds in batadv_interface_tx+0x160a/0x18b0 [ 52.621729] Read of size 2 at addr ffff88808e89d04b by task syz-executor402/7971 [ 52.629243] [ 52.630862] CPU: 1 PID: 7971 Comm: syz-executor402 Not tainted 4.20.0+ #251 [ 52.637944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.647285] Call Trace: [ 52.649867] dump_stack+0x1d3/0x2c6 [ 52.653486] ? dump_stack_print_info.cold.1+0x20/0x20 [ 52.658686] ? printk+0xa7/0xcf [ 52.661958] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 52.666710] print_address_description.cold.8+0x9/0x1ff [ 52.672064] kasan_report.cold.9+0x242/0x309 [ 52.676469] ? batadv_interface_tx+0x160a/0x18b0 [ 52.681225] __asan_report_load_n_noabort+0xf/0x20 [ 52.686143] batadv_interface_tx+0x160a/0x18b0 [ 52.690717] ? batadv_skb_head_push+0x3b0/0x3b0 [ 52.695375] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 52.700932] ? validate_xmit_xfrm+0x41c/0xef0 [ 52.705416] ? arch_local_save_flags+0x40/0x40 [ 52.709986] ? skb_set_owner_w+0x21d/0x320 [ 52.714210] ? validate_xmit_skb+0x849/0xf70 [ 52.718610] ? kasan_check_write+0x14/0x20 [ 52.722836] ? netif_skb_features+0xb50/0xb50 [ 52.727322] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 52.732326] ? _copy_from_iter+0x389/0xf70 [ 52.736564] ? usercopy_warn+0x110/0x110 [ 52.740627] ? dev_direct_xmit+0x225/0x6a0 [ 52.744851] dev_direct_xmit+0x36c/0x6a0 [ 52.748900] ? validate_xmit_skb_list+0x140/0x140 [ 52.753767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 52.759293] ? skb_copy_datagram_from_iter+0x445/0x650 [ 52.764565] packet_direct_xmit+0xfb/0x170 [ 52.768790] packet_sendmsg+0x298a/0x6ad0 [ 52.772927] ? mark_held_locks+0x130/0x130 [ 52.777167] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 52.782275] ? packet_getname+0x5f0/0x5f0 [ 52.786422] ? debug_object_free+0x32d/0x690 [ 52.790834] ? aa_profile_af_perm+0x410/0x410 [ 52.795340] ? ___might_sleep+0x1ed/0x300 [ 52.799477] ? cpu_cgroup_can_attach+0x80/0x170 [ 52.804137] ? __local_bh_enable_ip+0x160/0x260 [ 52.808791] ? __local_bh_enable_ip+0x160/0x260 [ 52.813455] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 52.818371] ? aa_sk_perm+0x22b/0x8e0 [ 52.822160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 52.827686] ? __fget_light+0x2e9/0x430 [ 52.831648] ? aa_af_perm+0x5a0/0x5a0 [ 52.835436] ? __local_bh_enable_ip+0x160/0x260 [ 52.840095] ? _raw_spin_unlock_bh+0x30/0x40 [ 52.844500] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 52.849437] ? apparmor_socket_sendmsg+0x29/0x30 [ 52.854181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 52.859708] ? security_socket_sendmsg+0x94/0xc0 [ 52.864465] ? packet_getname+0x5f0/0x5f0 [ 52.868607] sock_sendmsg+0xd5/0x120 [ 52.872312] __sys_sendto+0x3d7/0x670 [ 52.876108] ? aa_af_perm+0x5a0/0x5a0 [ 52.879902] ? __ia32_sys_getpeername+0xb0/0xb0 [ 52.884566] ? packet_bind+0x164/0x1b0 [ 52.888445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 52.893971] ? __sys_bind+0x1d1/0x440 [ 52.897767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 52.903290] ? __sys_setsockopt+0x254/0x3c0 [ 52.907605] ? do_syscall_64+0x9a/0x820 [ 52.911566] ? do_syscall_64+0x9a/0x820 [ 52.915527] ? lockdep_hardirqs_on+0x421/0x5c0 [ 52.920125] ? trace_hardirqs_on+0xbd/0x310 [ 52.924437] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.929790] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 52.935231] __x64_sys_sendto+0xe1/0x1a0 [ 52.939283] do_syscall_64+0x1b9/0x820 [ 52.943158] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 52.948515] ? syscall_return_slowpath+0x5e0/0x5e0 [ 52.953439] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 52.958286] ? trace_hardirqs_on_caller+0x310/0x310 [ 52.963292] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 52.968295] ? prepare_exit_to_usermode+0x291/0x3b0 [ 52.973302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 52.978138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.983314] RIP: 0033:0x441619 [ 52.986494] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 0b fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 53.005389] RSP: 002b:00007ffd85d0b218 EFLAGS: 00000216 ORIG_RAX: 000000000000002c [ 53.013090] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441619 [ 53.020356] RDX: 000000000000000e RSI: 0000000020000180 RDI: 0000000000000003 [ 53.027617] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 53.034877] R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004025e0 [ 53.042135] R13: 0000000000402670 R14: 0000000000000000 R15: 0000000000000000 [ 53.049398] [ 53.051012] Allocated by task 8046: [ 53.054629] save_stack+0x43/0xd0 [ 53.058071] kasan_kmalloc+0xc7/0xe0 [ 53.061769] kasan_slab_alloc+0x12/0x20 [ 53.065728] kmem_cache_alloc+0x12e/0x730 [ 53.069868] getname_kernel+0x54/0x370 [ 53.073741] open_exec+0x17/0x70 [ 53.077109] load_elf_binary+0x96e/0x5620 [ 53.081265] search_binary_handler+0x17d/0x570 [ 53.085833] __do_execve_file.isra.34+0x162d/0x2590 [ 53.090834] __x64_sys_execve+0x8f/0xc0 [ 53.094795] do_syscall_64+0x1b9/0x820 [ 53.098672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.103842] [ 53.105452] Freed by task 8046: [ 53.108721] save_stack+0x43/0xd0 [ 53.112158] __kasan_slab_free+0x102/0x150 [ 53.116402] kasan_slab_free+0xe/0x10 [ 53.120195] kmem_cache_free+0x83/0x290 [ 53.124155] putname+0xf2/0x130 [ 53.127421] open_exec+0x5e/0x70 [ 53.130773] load_elf_binary+0x96e/0x5620 [ 53.134905] search_binary_handler+0x17d/0x570 [ 53.139475] __do_execve_file.isra.34+0x162d/0x2590 [ 53.144498] __x64_sys_execve+0x8f/0xc0 [ 53.148461] do_syscall_64+0x1b9/0x820 [ 53.152335] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.157503] [ 53.159137] The buggy address belongs to the object at ffff88808e89c040 [ 53.159137] which belongs to the cache names_cache of size 4096 [ 53.171864] The buggy address is located 11 bytes to the right of [ 53.171864] 4096-byte region [ffff88808e89c040, ffff88808e89d040) [ 53.184238] The buggy address belongs to the page: [ 53.189152] page:ffffea00023a2700 count:1 mapcount:0 mapping:ffff88812c2bbc40 index:0x0 compound_mapcount: 0 [ 53.199109] flags: 0x1fffc0000010200(slab|head) [ 53.203764] raw: 01fffc0000010200 ffffea00023a2608 ffffea0002346408 ffff88812c2bbc40 [ 53.211633] raw: 0000000000000000 ffff88808e89c040 0000000100000001 0000000000000000 [ 53.219519] page dumped because: kasan: bad access detected [ 53.225241] [ 53.226849] Memory state around the buggy address: [ 53.231776] ffff88808e89cf00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.239126] ffff88808e89cf80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.246478] >ffff88808e89d000: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.253819] ^ [ 53.259513] ffff88808e89d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.266882] ffff88808e89d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.274234] ================================================================== [ 53.281573] Disabling lock debugging due to kernel taint [ 53.287047] Kernel panic - not syncing: panic_on_warn set ... [ 53.292937] CPU: 1 PID: 7971 Comm: syz-executor402 Tainted: G B 4.20.0+ #251 [ 53.301406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 53.310738] Call Trace: [ 53.313313] dump_stack+0x1d3/0x2c6 [ 53.316927] ? dump_stack_print_info.cold.1+0x20/0x20 [ 53.322110] panic+0x2ad/0x55f [ 53.325286] ? add_taint.cold.5+0x16/0x16 [ 53.329439] ? trace_hardirqs_on+0xb4/0x310 [ 53.333764] kasan_end_report+0x47/0x4f [ 53.337728] kasan_report.cold.9+0x76/0x309 [ 53.342035] ? batadv_interface_tx+0x160a/0x18b0 [ 53.346782] __asan_report_load_n_noabort+0xf/0x20 [ 53.351694] batadv_interface_tx+0x160a/0x18b0 [ 53.356271] ? batadv_skb_head_push+0x3b0/0x3b0 [ 53.360939] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 53.366464] ? validate_xmit_xfrm+0x41c/0xef0 [ 53.370941] ? arch_local_save_flags+0x40/0x40 [ 53.375507] ? skb_set_owner_w+0x21d/0x320 [ 53.379731] ? validate_xmit_skb+0x849/0xf70 [ 53.384126] ? kasan_check_write+0x14/0x20 [ 53.388347] ? netif_skb_features+0xb50/0xb50 [ 53.392826] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 53.397830] ? _copy_from_iter+0x389/0xf70 [ 53.402048] ? usercopy_warn+0x110/0x110 [ 53.406091] ? dev_direct_xmit+0x225/0x6a0 [ 53.410329] dev_direct_xmit+0x36c/0x6a0 [ 53.414378] ? validate_xmit_skb_list+0x140/0x140 [ 53.419225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.424749] ? skb_copy_datagram_from_iter+0x445/0x650 [ 53.430013] packet_direct_xmit+0xfb/0x170 [ 53.434233] packet_sendmsg+0x298a/0x6ad0 [ 53.438367] ? mark_held_locks+0x130/0x130 [ 53.442605] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 53.447703] ? packet_getname+0x5f0/0x5f0 [ 53.451839] ? debug_object_free+0x32d/0x690 [ 53.456243] ? aa_profile_af_perm+0x410/0x410 [ 53.460740] ? ___might_sleep+0x1ed/0x300 [ 53.464870] ? cpu_cgroup_can_attach+0x80/0x170 [ 53.469525] ? __local_bh_enable_ip+0x160/0x260 [ 53.474182] ? __local_bh_enable_ip+0x160/0x260 [ 53.478838] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 53.483750] ? aa_sk_perm+0x22b/0x8e0 [ 53.487543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.493082] ? __fget_light+0x2e9/0x430 [ 53.497046] ? aa_af_perm+0x5a0/0x5a0 [ 53.500851] ? __local_bh_enable_ip+0x160/0x260 [ 53.505522] ? _raw_spin_unlock_bh+0x30/0x40 [ 53.509926] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 53.514837] ? apparmor_socket_sendmsg+0x29/0x30 [ 53.519580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.525106] ? security_socket_sendmsg+0x94/0xc0 [ 53.529846] ? packet_getname+0x5f0/0x5f0 [ 53.533979] sock_sendmsg+0xd5/0x120 [ 53.537682] __sys_sendto+0x3d7/0x670 [ 53.541466] ? aa_af_perm+0x5a0/0x5a0 [ 53.545271] ? __ia32_sys_getpeername+0xb0/0xb0 [ 53.549930] ? packet_bind+0x164/0x1b0 [ 53.553801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.559324] ? __sys_bind+0x1d1/0x440 [ 53.563116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 53.568640] ? __sys_setsockopt+0x254/0x3c0 [ 53.572946] ? do_syscall_64+0x9a/0x820 [ 53.576904] ? do_syscall_64+0x9a/0x820 [ 53.580863] ? lockdep_hardirqs_on+0x421/0x5c0 [ 53.585426] ? trace_hardirqs_on+0xbd/0x310 [ 53.589736] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.595080] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 53.600516] __x64_sys_sendto+0xe1/0x1a0 [ 53.604568] do_syscall_64+0x1b9/0x820 [ 53.608442] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 53.613789] ? syscall_return_slowpath+0x5e0/0x5e0 [ 53.618701] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 53.623527] ? trace_hardirqs_on_caller+0x310/0x310 [ 53.628542] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 53.633549] ? prepare_exit_to_usermode+0x291/0x3b0 [ 53.638558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 53.643388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 53.648568] RIP: 0033:0x441619 [ 53.651747] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 0b fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 53.670646] RSP: 002b:00007ffd85d0b218 EFLAGS: 00000216 ORIG_RAX: 000000000000002c [ 53.678339] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441619 [ 53.685612] RDX: 000000000000000e RSI: 0000000020000180 RDI: 0000000000000003 [ 53.692883] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 53.700137] R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004025e0 [ 53.707388] R13: 0000000000402670 R14: 0000000000000000 R15: 0000000000000000 [ 53.715577] Kernel Offset: disabled [ 53.719204] Rebooting in 86400 seconds..