[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 76.795840][ T25] kauditd_printk_skb: 9 callbacks suppressed [ 76.795855][ T25] audit: type=1400 audit(1575144035.348:41): avc: denied { map } for pid=9810 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.27' (ECDSA) to the list of known hosts. [ 83.365084][ T25] audit: type=1400 audit(1575144041.918:42): avc: denied { map } for pid=9822 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/11/30 20:00:42 parsed 1 programs [ 85.253190][ T25] audit: type=1400 audit(1575144043.808:43): avc: denied { map } for pid=9822 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=19134 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2019/11/30 20:00:43 executed programs: 0 [ 85.508599][ T9837] IPVS: ftp: loaded support on port[0] = 21 [ 85.576860][ T9837] chnl_net:caif_netlink_parms(): no params data found [ 85.607083][ T9837] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.614850][ T9837] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.622749][ T9837] device bridge_slave_0 entered promiscuous mode [ 85.631072][ T9837] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.638386][ T9837] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.646139][ T9837] device bridge_slave_1 entered promiscuous mode [ 85.664900][ T9837] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.675975][ T9837] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.696779][ T9837] team0: Port device team_slave_0 added [ 85.705136][ T9837] team0: Port device team_slave_1 added [ 85.775480][ T9837] device hsr_slave_0 entered promiscuous mode [ 85.843023][ T9837] device hsr_slave_1 entered promiscuous mode [ 85.938229][ T25] audit: type=1400 audit(1575144044.488:44): avc: denied { create } for pid=9837 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 85.956623][ T9837] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 85.963123][ T25] audit: type=1400 audit(1575144044.508:45): avc: denied { write } for pid=9837 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 85.995265][ T25] audit: type=1400 audit(1575144044.508:46): avc: denied { read } for pid=9837 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 86.075341][ T9837] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 86.134951][ T9837] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 86.185874][ T9837] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 86.243933][ T9837] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.251220][ T9837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.259200][ T9837] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.266412][ T9837] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.306210][ T9837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.318492][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.329608][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.339047][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.347576][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 86.361157][ T9837] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.371415][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.381090][ T3517] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.388217][ T3517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.400267][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.409357][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.416472][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.444349][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.453905][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.462366][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 86.471671][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 86.480439][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.491182][ T9837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 86.508386][ T9839] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 86.516417][ T9839] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 86.528362][ T9837] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.541096][ T25] audit: type=1400 audit(1575144045.088:47): avc: denied { associate } for pid=9837 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 86.788078][ T9869] [ 86.790535][ T9869] ===================================== [ 86.796053][ T9869] WARNING: bad unlock balance detected! [ 86.801573][ T9869] 5.4.0-syzkaller #0 Not tainted [ 86.806477][ T9869] ------------------------------------- [ 86.811992][ T9869] syz-executor.0/9869 is trying to release lock (&file->mut) at: [ 86.819729][ T9869] [] ucma_destroy_id+0x24a/0x490 [ 86.826244][ T9869] but there are no more locks to release! [ 86.831982][ T9869] [ 86.831982][ T9869] other info that might help us debug this: [ 86.840626][ T9869] 1 lock held by syz-executor.0/9869: [ 86.845967][ T9869] #0: ffff888096325a60 (&file->mut){+.+.}, at: ucma_destroy_id+0x1e7/0x490 [ 86.854622][ T9869] [ 86.854622][ T9869] stack backtrace: [ 86.860537][ T9869] CPU: 0 PID: 9869 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 86.868900][ T9869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.878937][ T9869] Call Trace: [ 86.882212][ T9869] dump_stack+0x197/0x210 [ 86.886536][ T9869] ? ucma_destroy_id+0x24a/0x490 [ 86.891453][ T9869] print_unlock_imbalance_bug.cold+0x114/0x123 [ 86.897584][ T9869] ? ucma_destroy_id+0x24a/0x490 [ 86.902938][ T9869] lock_release+0x5f2/0x960 [ 86.907425][ T9869] ? lock_downgrade+0x920/0x920 [ 86.912259][ T9869] ? ucma_destroy_id+0x1e7/0x490 [ 86.917173][ T9869] ? ucma_destroy_id+0x1c0/0x490 [ 86.922087][ T9869] ? mutex_trylock+0x2f0/0x2f0 [ 86.926836][ T9869] ? ucma_destroy_id+0x1c0/0x490 [ 86.931749][ T9869] __mutex_unlock_slowpath+0x86/0x6a0 [ 86.937095][ T9869] ? lock_downgrade+0x920/0x920 [ 86.941919][ T9869] ? wait_for_completion+0x440/0x440 [ 86.947180][ T9869] mutex_unlock+0x1b/0x30 [ 86.951491][ T9869] ucma_destroy_id+0x24a/0x490 [ 86.956230][ T9869] ? ucma_close+0x310/0x310 [ 86.960718][ T9869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 86.966937][ T9869] ? _copy_from_user+0x12c/0x1a0 [ 86.971848][ T9869] ucma_write+0x2d7/0x3c0 [ 86.976153][ T9869] ? ucma_close+0x310/0x310 [ 86.980627][ T9869] ? ucma_open+0x290/0x290 [ 86.985038][ T9869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 86.991283][ T9869] ? security_file_permission+0x8f/0x380 [ 86.996910][ T9869] __vfs_write+0x8a/0x110 [ 87.001223][ T9869] ? ucma_open+0x290/0x290 [ 87.005619][ T9869] vfs_write+0x268/0x5d0 [ 87.009835][ T9869] ksys_write+0x220/0x290 [ 87.014139][ T9869] ? __ia32_sys_read+0xb0/0xb0 [ 87.018876][ T9869] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 87.024315][ T9869] ? do_syscall_64+0x26/0x790 [ 87.028972][ T9869] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.035019][ T9869] ? do_syscall_64+0x26/0x790 [ 87.039726][ T9869] __x64_sys_write+0x73/0xb0 [ 87.044338][ T9869] do_syscall_64+0xfa/0x790 [ 87.048839][ T9869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.054719][ T9869] RIP: 0033:0x45a679 [ 87.058594][ T9869] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 87.078174][ T9869] RSP: 002b:00007f6d4e08ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 87.086570][ T9869] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 87.094516][ T9869] RDX: 0000000000000018 RSI: 0000000020000140 RDI: 0000000000000003 [ 87.102460][ T9869] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 87.110406][ T9869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d4e08f6d4 [ 87.118364][ T9869] R13: 00000000004d2b38 R14: 00000000004e3be0 R15: 00000000ffffffff [ 87.129081][ T9869] ================================================================== [ 87.137336][ T9869] BUG: KASAN: use-after-free in __mutex_unlock_slowpath+0x93/0x6a0 [ 87.145212][ T9869] Read of size 8 at addr ffff888096325600 by task syz-executor.0/9869 [ 87.153344][ T9869] [ 87.155656][ T9869] CPU: 0 PID: 9869 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 87.163876][ T9869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.173907][ T9869] Call Trace: [ 87.177195][ T9869] dump_stack+0x197/0x210 [ 87.181507][ T9869] ? __mutex_unlock_slowpath+0x93/0x6a0 [ 87.187044][ T9869] print_address_description.constprop.0.cold+0xd4/0x30b [ 87.194051][ T9869] ? __mutex_unlock_slowpath+0x93/0x6a0 [ 87.199574][ T9869] ? __mutex_unlock_slowpath+0x93/0x6a0 [ 87.205197][ T9869] __kasan_report.cold+0x1b/0x41 [ 87.210116][ T9869] ? __mutex_unlock_slowpath+0x93/0x6a0 [ 87.215637][ T9869] kasan_report+0x12/0x20 [ 87.219945][ T9869] check_memory_region+0x134/0x1a0 [ 87.225046][ T9869] __kasan_check_read+0x11/0x20 [ 87.229876][ T9869] __mutex_unlock_slowpath+0x93/0x6a0 [ 87.235226][ T9869] ? lock_downgrade+0x920/0x920 [ 87.240055][ T9869] ? wait_for_completion+0x440/0x440 [ 87.245329][ T9869] mutex_unlock+0x1b/0x30 [ 87.249656][ T9869] ucma_destroy_id+0x24a/0x490 [ 87.254406][ T9869] ? ucma_close+0x310/0x310 [ 87.258889][ T9869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 87.265122][ T9869] ? _copy_from_user+0x12c/0x1a0 [ 87.270047][ T9869] ucma_write+0x2d7/0x3c0 [ 87.274365][ T9869] ? ucma_close+0x310/0x310 [ 87.278844][ T9869] ? ucma_open+0x290/0x290 [ 87.283242][ T9869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.289473][ T9869] ? security_file_permission+0x8f/0x380 [ 87.295091][ T9869] __vfs_write+0x8a/0x110 [ 87.299405][ T9869] ? ucma_open+0x290/0x290 [ 87.303802][ T9869] vfs_write+0x268/0x5d0 [ 87.308025][ T9869] ksys_write+0x220/0x290 [ 87.312336][ T9869] ? __ia32_sys_read+0xb0/0xb0 [ 87.317085][ T9869] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 87.322526][ T9869] ? do_syscall_64+0x26/0x790 [ 87.327191][ T9869] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.333254][ T9869] ? do_syscall_64+0x26/0x790 [ 87.337920][ T9869] __x64_sys_write+0x73/0xb0 [ 87.342493][ T9869] do_syscall_64+0xfa/0x790 [ 87.346975][ T9869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.352841][ T9869] RIP: 0033:0x45a679 [ 87.356718][ T9869] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 87.376298][ T9869] RSP: 002b:00007f6d4e08ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 87.384699][ T9869] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 87.392660][ T9869] RDX: 0000000000000018 RSI: 0000000020000140 RDI: 0000000000000003 [ 87.400619][ T9869] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 87.408613][ T9869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d4e08f6d4 [ 87.416564][ T9869] R13: 00000000004d2b38 R14: 00000000004e3be0 R15: 00000000ffffffff [ 87.424522][ T9869] [ 87.426832][ T9869] Allocated by task 9872: [ 87.431153][ T9869] save_stack+0x23/0x90 [ 87.435289][ T9869] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 87.440941][ T9869] kasan_kmalloc+0x9/0x10 [ 87.445280][ T9869] kmem_cache_alloc_trace+0x158/0x790 [ 87.450641][ T9869] ucma_open+0x4f/0x290 [ 87.454851][ T9869] misc_open+0x395/0x4c0 [ 87.459075][ T9869] chrdev_open+0x245/0x6b0 [ 87.463471][ T9869] do_dentry_open+0x4e6/0x1380 [ 87.468240][ T9869] vfs_open+0xa0/0xd0 [ 87.472270][ T9869] path_openat+0x10e4/0x46d0 [ 87.476884][ T9869] do_filp_open+0x1a1/0x280 [ 87.481376][ T9869] do_sys_open+0x3fe/0x5d0 [ 87.485834][ T9869] __x64_sys_openat+0x9d/0x100 [ 87.490576][ T9869] do_syscall_64+0xfa/0x790 [ 87.495068][ T9869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.500929][ T9869] [ 87.503233][ T9869] Freed by task 9864: [ 87.507198][ T9869] save_stack+0x23/0x90 [ 87.511328][ T9869] __kasan_slab_free+0x102/0x150 [ 87.516241][ T9869] kasan_slab_free+0xe/0x10 [ 87.520731][ T9869] kfree+0x10a/0x2c0 [ 87.524600][ T9869] ucma_close+0x275/0x310 [ 87.528913][ T9869] __fput+0x2ff/0x890 [ 87.532883][ T9869] ____fput+0x16/0x20 [ 87.536841][ T9869] task_work_run+0x145/0x1c0 [ 87.541409][ T9869] exit_to_usermode_loop+0x316/0x380 [ 87.546667][ T9869] do_syscall_64+0x676/0x790 [ 87.551290][ T9869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.557152][ T9869] [ 87.559458][ T9869] The buggy address belongs to the object at ffff888096325600 [ 87.559458][ T9869] which belongs to the cache kmalloc-256 of size 256 [ 87.573493][ T9869] The buggy address is located 0 bytes inside of [ 87.573493][ T9869] 256-byte region [ffff888096325600, ffff888096325700) [ 87.586569][ T9869] The buggy address belongs to the page: [ 87.592189][ T9869] page:ffffea000258c940 refcount:1 mapcount:0 mapping:ffff8880aa4008c0 index:0x0 [ 87.601278][ T9869] raw: 00fffe0000000200 ffffea00022e90c8 ffff8880aa401648 ffff8880aa4008c0 [ 87.609905][ T9869] raw: 0000000000000000 ffff888096325000 0000000100000008 0000000000000000 [ 87.618472][ T9869] page dumped because: kasan: bad access detected [ 87.624907][ T9869] [ 87.627214][ T9869] Memory state around the buggy address: [ 87.632830][ T9869] ffff888096325500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.641486][ T9869] ffff888096325580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.649641][ T9869] >ffff888096325600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.657691][ T9869] ^ [ 87.661748][ T9869] ffff888096325680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.669785][ T9869] ffff888096325700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.677821][ T9869] ================================================================== [ 87.690866][ T9869] Kernel panic - not syncing: panic_on_warn set ... [ 87.697593][ T9869] CPU: 0 PID: 9869 Comm: syz-executor.0 Tainted: G B 5.4.0-syzkaller #0 [ 87.707320][ T9869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.717367][ T9869] Call Trace: [ 87.720695][ T9869] dump_stack+0x197/0x210 [ 87.725037][ T9869] panic+0x2e3/0x75c [ 87.728930][ T9869] ? add_taint.cold+0x16/0x16 [ 87.733600][ T9869] ? __mutex_unlock_slowpath+0x93/0x6a0 [ 87.739138][ T9869] ? preempt_schedule+0x4b/0x60 [ 87.743994][ T9869] ? ___preempt_schedule+0x16/0x18 [ 87.749089][ T9869] ? trace_hardirqs_on+0x5e/0x240 [ 87.754095][ T9869] ? __mutex_unlock_slowpath+0x93/0x6a0 [ 87.759627][ T9869] end_report+0x47/0x4f [ 87.763764][ T9869] ? __mutex_unlock_slowpath+0x93/0x6a0 [ 87.769420][ T9869] __kasan_report.cold+0xe/0x41 [ 87.774260][ T9869] ? __mutex_unlock_slowpath+0x93/0x6a0 [ 87.779842][ T9869] kasan_report+0x12/0x20 [ 87.784162][ T9869] check_memory_region+0x134/0x1a0 [ 87.789731][ T9869] __kasan_check_read+0x11/0x20 [ 87.794608][ T9869] __mutex_unlock_slowpath+0x93/0x6a0 [ 87.800009][ T9869] ? lock_downgrade+0x920/0x920 [ 87.804852][ T9869] ? wait_for_completion+0x440/0x440 [ 87.810206][ T9869] mutex_unlock+0x1b/0x30 [ 87.814525][ T9869] ucma_destroy_id+0x24a/0x490 [ 87.819456][ T9869] ? ucma_close+0x310/0x310 [ 87.824114][ T9869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 87.830356][ T9869] ? _copy_from_user+0x12c/0x1a0 [ 87.835303][ T9869] ucma_write+0x2d7/0x3c0 [ 87.839616][ T9869] ? ucma_close+0x310/0x310 [ 87.844100][ T9869] ? ucma_open+0x290/0x290 [ 87.848504][ T9869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.854759][ T9869] ? security_file_permission+0x8f/0x380 [ 87.860391][ T9869] __vfs_write+0x8a/0x110 [ 87.864700][ T9869] ? ucma_open+0x290/0x290 [ 87.869217][ T9869] vfs_write+0x268/0x5d0 [ 87.873466][ T9869] ksys_write+0x220/0x290 [ 87.877794][ T9869] ? __ia32_sys_read+0xb0/0xb0 [ 87.882563][ T9869] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 87.888095][ T9869] ? do_syscall_64+0x26/0x790 [ 87.892819][ T9869] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.898896][ T9869] ? do_syscall_64+0x26/0x790 [ 87.903563][ T9869] __x64_sys_write+0x73/0xb0 [ 87.908143][ T9869] do_syscall_64+0xfa/0x790 [ 87.912642][ T9869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.918527][ T9869] RIP: 0033:0x45a679 [ 87.922414][ T9869] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 87.942054][ T9869] RSP: 002b:00007f6d4e08ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 87.950483][ T9869] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 87.958502][ T9869] RDX: 0000000000000018 RSI: 0000000020000140 RDI: 0000000000000003 [ 87.966462][ T9869] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 87.974420][ T9869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d4e08f6d4 [ 87.982403][ T9869] R13: 00000000004d2b38 R14: 00000000004e3be0 R15: 00000000ffffffff [ 87.991898][ T9869] Kernel Offset: disabled [ 87.996298][ T9869] Rebooting in 86400 seconds..