[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.202' (ECDSA) to the list of known hosts. 2020/07/05 02:14:24 parsed 1 programs 2020/07/05 02:14:24 executed programs: 0 syzkaller login: [ 1042.403795][ T27] audit: type=1400 audit(1593915264.880:8): avc: denied { execmem } for pid=6811 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 1042.436726][ T6812] IPVS: ftp: loaded support on port[0] = 21 [ 1042.541957][ T6812] chnl_net:caif_netlink_parms(): no params data found [ 1042.592461][ T6812] bridge0: port 1(bridge_slave_0) entered blocking state [ 1042.599962][ T6812] bridge0: port 1(bridge_slave_0) entered disabled state [ 1042.609354][ T6812] device bridge_slave_0 entered promiscuous mode [ 1042.619359][ T6812] bridge0: port 2(bridge_slave_1) entered blocking state [ 1042.627416][ T6812] bridge0: port 2(bridge_slave_1) entered disabled state [ 1042.635471][ T6812] device bridge_slave_1 entered promiscuous mode [ 1042.656316][ T6812] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1042.667203][ T6812] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1042.690151][ T6812] team0: Port device team_slave_0 added [ 1042.698357][ T6812] team0: Port device team_slave_1 added [ 1042.716132][ T6812] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1042.723228][ T6812] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1042.750329][ T6812] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1042.763840][ T6812] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1042.771458][ T6812] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1042.797683][ T6812] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1042.873700][ T6812] device hsr_slave_0 entered promiscuous mode [ 1042.921067][ T6812] device hsr_slave_1 entered promiscuous mode [ 1043.047426][ T6812] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1043.073917][ T6812] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1043.133523][ T6812] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1043.182901][ T6812] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1043.237753][ T6812] bridge0: port 2(bridge_slave_1) entered blocking state [ 1043.245169][ T6812] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1043.253172][ T6812] bridge0: port 1(bridge_slave_0) entered blocking state [ 1043.260251][ T6812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1043.305212][ T6812] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1043.318600][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1043.331809][ T3788] bridge0: port 1(bridge_slave_0) entered disabled state [ 1043.340069][ T3788] bridge0: port 2(bridge_slave_1) entered disabled state [ 1043.348483][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1043.362589][ T6812] 8021q: adding VLAN 0 to HW filter on device team0 [ 1043.382931][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1043.391537][ T3788] bridge0: port 1(bridge_slave_0) entered blocking state [ 1043.398728][ T3788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1043.406680][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1043.416003][ T3788] bridge0: port 2(bridge_slave_1) entered blocking state [ 1043.423138][ T3788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1043.443414][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1043.452608][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1043.464042][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1043.474035][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1043.487661][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1043.498622][ T6812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1043.518858][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1043.526973][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1043.539383][ T6812] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1043.558609][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1043.567892][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1043.588424][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1043.598466][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1043.609755][ T6812] device veth0_vlan entered promiscuous mode [ 1043.617558][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1043.626286][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1043.641094][ T6812] device veth1_vlan entered promiscuous mode [ 1043.661318][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1043.669290][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1043.679646][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1043.688822][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1043.700466][ T6812] device veth0_macvtap entered promiscuous mode [ 1043.711133][ T6812] device veth1_macvtap entered promiscuous mode [ 1043.728916][ T6812] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1043.737086][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1043.745436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1043.753946][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1043.763951][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1043.777228][ T6812] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1043.784992][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1043.795376][ T3788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1046.277631][ T7134] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.467892][ T7134] device bridge_slave_0 left promiscuous mode [ 1046.474695][ T7134] bridge0: port 1(bridge_slave_0) entered disabled state [ 1047.011271][ T7152] bond0: (slave bond_slave_0): Releasing backup interface [ 1047.596353][ T7170] team0: Port device team_slave_0 removed 2020/07/05 02:14:30 executed programs: 10 [ 1047.823216][ T7188] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1048.146187][ T7188] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1048.708781][ T7206] device hsr_slave_0 left promiscuous mode 2020/07/05 02:14:35 executed programs: 20 [ 1055.980039][ T7586] ================================================================== [ 1055.988601][ T7586] BUG: KASAN: use-after-free in free_netdev+0x3fb/0x480 [ 1055.995648][ T7586] Read of size 8 at addr ffff88809fe406f8 by task syz-executor.0/7586 [ 1056.003779][ T7586] [ 1056.006099][ T7586] CPU: 1 PID: 7586 Comm: syz-executor.0 Not tainted 5.8.0-rc3-syzkaller #0 [ 1056.014768][ T7586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1056.024898][ T7586] Call Trace: [ 1056.028269][ T7586] dump_stack+0x18f/0x20d [ 1056.032585][ T7586] ? free_netdev+0x3fb/0x480 [ 1056.037217][ T7586] ? free_netdev+0x3fb/0x480 [ 1056.041884][ T7586] print_address_description.constprop.0.cold+0xae/0x436 [ 1056.048924][ T7586] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1056.054980][ T7586] ? lockdep_hardirqs_off+0x66/0xa0 [ 1056.060334][ T7586] ? vprintk_func+0x97/0x1a6 [ 1056.064913][ T7586] ? free_netdev+0x3fb/0x480 [ 1056.069574][ T7586] kasan_report.cold+0x1f/0x37 [ 1056.074339][ T7586] ? free_netdev+0x3fb/0x480 [ 1056.078918][ T7586] free_netdev+0x3fb/0x480 [ 1056.083769][ T7586] netdev_run_todo+0x88e/0xac0 [ 1056.088522][ T7586] ? default_device_exit_batch+0x3d0/0x3d0 [ 1056.094504][ T7586] ? lock_is_held_type+0xb0/0xe0 [ 1056.099503][ T7586] ? rtnl_link_get_net_capable.constprop.0+0x390/0x390 [ 1056.106384][ T7586] rtnetlink_rcv_msg+0x45b/0xad0 [ 1056.111305][ T7586] ? rtnetlink_put_metrics+0x510/0x510 [ 1056.116749][ T7586] ? lock_acquire+0x1f1/0xad0 [ 1056.121727][ T7586] ? netlink_deliver_tap+0x146/0xb70 [ 1056.127021][ T7586] netlink_rcv_skb+0x15a/0x430 [ 1056.131784][ T7586] ? rtnetlink_put_metrics+0x510/0x510 [ 1056.137223][ T7586] ? netlink_ack+0xa10/0xa10 [ 1056.141878][ T7586] netlink_unicast+0x533/0x7d0 [ 1056.146697][ T7586] ? netlink_attachskb+0x810/0x810 [ 1056.151846][ T7586] ? _copy_from_iter_full+0x247/0x890 [ 1056.157314][ T7586] netlink_sendmsg+0x856/0xd90 [ 1056.162065][ T7586] ? netlink_unicast+0x7d0/0x7d0 [ 1056.166987][ T7586] ? netlink_unicast+0x7d0/0x7d0 [ 1056.172002][ T7586] sock_sendmsg+0xcf/0x120 [ 1056.176454][ T7586] ____sys_sendmsg+0x6e8/0x810 [ 1056.181221][ T7586] ? kernel_sendmsg+0x50/0x50 [ 1056.185883][ T7586] ? do_recvmmsg+0x6d0/0x6d0 [ 1056.190750][ T7586] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 1056.197006][ T7586] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 1056.202990][ T7586] ? lock_acquire+0x1f1/0xad0 [ 1056.207814][ T7586] ___sys_sendmsg+0xf3/0x170 [ 1056.212391][ T7586] ? sendmsg_copy_msghdr+0x160/0x160 [ 1056.217764][ T7586] ? __fget_files+0x272/0x400 [ 1056.222428][ T7586] ? lock_downgrade+0x820/0x820 [ 1056.227295][ T7586] ? find_held_lock+0x2d/0x110 [ 1056.232188][ T7586] ? __might_fault+0x11f/0x1d0 [ 1056.237399][ T7586] ? __fget_files+0x294/0x400 [ 1056.242328][ T7586] ? __fget_light+0xea/0x280 [ 1056.247038][ T7586] __sys_sendmsg+0xe5/0x1b0 [ 1056.251613][ T7586] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1056.256771][ T7586] ? __x64_sys_futex+0x382/0x4e0 [ 1056.261698][ T7586] ? do_syscall_64+0x1c/0xe0 [ 1056.266306][ T7586] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1056.272266][ T7586] do_syscall_64+0x60/0xe0 [ 1056.276725][ T7586] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1056.282777][ T7586] RIP: 0033:0x45cb29 [ 1056.286652][ T7586] Code: Bad RIP value. [ 1056.290883][ T7586] RSP: 002b:00007fb7fb431c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1056.299275][ T7586] RAX: ffffffffffffffda RBX: 0000000000502760 RCX: 000000000045cb29 [ 1056.307410][ T7586] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 1056.315544][ T7586] RBP: 000000000078c040 R08: 0000000000000000 R09: 0000000000000000 [ 1056.323586][ T7586] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1056.331724][ T7586] R13: 0000000000000a43 R14: 00000000004cd2a1 R15: 00007fb7fb4326d4 [ 1056.339699][ T7586] [ 1056.342070][ T7586] Allocated by task 7578: [ 1056.346415][ T7586] save_stack+0x1b/0x40 [ 1056.350553][ T7586] __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1056.356261][ T7586] __kmalloc+0x17a/0x340 [ 1056.360936][ T7586] sk_prot_alloc+0x17a/0x300 [ 1056.365792][ T7586] sk_alloc+0x32/0xbd0 [ 1056.369944][ T7586] tun_chr_open+0x7b/0x540 [ 1056.374457][ T7586] misc_open+0x372/0x4a0 [ 1056.378710][ T7586] chrdev_open+0x266/0x770 [ 1056.383171][ T7586] do_dentry_open+0x501/0x1290 [ 1056.388050][ T7586] path_openat+0x1bb9/0x2750 [ 1056.392716][ T7586] do_filp_open+0x17e/0x3c0 [ 1056.397202][ T7586] do_sys_openat2+0x16f/0x3b0 [ 1056.401870][ T7586] __x64_sys_openat+0x13f/0x1f0 [ 1056.406716][ T7586] do_syscall_64+0x60/0xe0 [ 1056.411115][ T7586] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1056.416978][ T7586] [ 1056.419293][ T7586] Freed by task 7577: [ 1056.423280][ T7586] save_stack+0x1b/0x40 [ 1056.427440][ T7586] __kasan_slab_free+0xf5/0x140 [ 1056.432273][ T7586] kfree+0x103/0x2c0 [ 1056.436147][ T7586] __sk_destruct+0x63b/0x860 [ 1056.440714][ T7586] sk_destruct+0xbd/0xe0 [ 1056.444934][ T7586] __sk_free+0xef/0x3d0 [ 1056.449063][ T7586] sk_free+0x78/0xa0 [ 1056.452933][ T7586] __tun_detach+0xd69/0x1310 [ 1056.458470][ T7586] tun_chr_close+0x10e/0x180 [ 1056.463051][ T7586] __fput+0x33c/0x880 [ 1056.467120][ T7586] task_work_run+0xdd/0x190 [ 1056.471727][ T7586] __prepare_exit_to_usermode+0x1e9/0x1f0 [ 1056.477456][ T7586] do_syscall_64+0x6c/0xe0 [ 1056.481869][ T7586] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1056.487733][ T7586] [ 1056.490041][ T7586] The buggy address belongs to the object at ffff88809fe40000 [ 1056.490041][ T7586] which belongs to the cache kmalloc-4k of size 4096 [ 1056.504679][ T7586] The buggy address is located 1784 bytes inside of [ 1056.504679][ T7586] 4096-byte region [ffff88809fe40000, ffff88809fe41000) [ 1056.518715][ T7586] The buggy address belongs to the page: [ 1056.524469][ T7586] page:ffffea00027f9000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 head:ffffea00027f9000 order:1 compound_mapcount:0 [ 1056.539261][ T7586] flags: 0xfffe0000010200(slab|head) [ 1056.545152][ T7586] raw: 00fffe0000010200 ffffea0002a2ae08 ffffea000239a288 ffff8880aa002000 [ 1056.553720][ T7586] raw: 0000000000000000 ffff88809fe40000 0000000100000001 0000000000000000 [ 1056.562290][ T7586] page dumped because: kasan: bad access detected [ 1056.569407][ T7586] [ 1056.571981][ T7586] Memory state around the buggy address: [ 1056.577687][ T7586] ffff88809fe40580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1056.585823][ T7586] ffff88809fe40600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1056.593952][ T7586] >ffff88809fe40680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1056.602022][ T7586] ^ [ 1056.610185][ T7586] ffff88809fe40700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1056.618275][ T7586] ffff88809fe40780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1056.626337][ T7586] ================================================================== [ 1056.634393][ T7586] Disabling lock debugging due to kernel taint [ 1056.649475][ T7586] Kernel panic - not syncing: panic_on_warn set ... [ 1056.656219][ T7586] CPU: 1 PID: 7586 Comm: syz-executor.0 Tainted: G B 5.8.0-rc3-syzkaller #0 [ 1056.666620][ T7586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1056.676674][ T7586] Call Trace: [ 1056.680226][ T7586] dump_stack+0x18f/0x20d [ 1056.684556][ T7586] ? free_netdev+0x350/0x480 [ 1056.689246][ T7586] panic+0x2e3/0x75c [ 1056.693300][ T7586] ? __warn_printk+0xf3/0xf3 [ 1056.697872][ T7586] ? preempt_schedule_common+0x59/0xc0 [ 1056.703310][ T7586] ? free_netdev+0x3fb/0x480 [ 1056.707879][ T7586] ? preempt_schedule_thunk+0x16/0x18 [ 1056.713314][ T7586] ? trace_hardirqs_on+0x55/0x220 [ 1056.718320][ T7586] ? free_netdev+0x3fb/0x480 [ 1056.722886][ T7586] ? free_netdev+0x3fb/0x480 [ 1056.727455][ T7586] end_report+0x4d/0x53 [ 1056.731609][ T7586] kasan_report.cold+0xd/0x37 [ 1056.736283][ T7586] ? free_netdev+0x3fb/0x480 [ 1056.740872][ T7586] free_netdev+0x3fb/0x480 [ 1056.745440][ T7586] netdev_run_todo+0x88e/0xac0 [ 1056.750205][ T7586] ? default_device_exit_batch+0x3d0/0x3d0 [ 1056.755995][ T7586] ? lock_is_held_type+0xb0/0xe0 [ 1056.760966][ T7586] ? rtnl_link_get_net_capable.constprop.0+0x390/0x390 [ 1056.767829][ T7586] rtnetlink_rcv_msg+0x45b/0xad0 [ 1056.772754][ T7586] ? rtnetlink_put_metrics+0x510/0x510 [ 1056.778192][ T7586] ? lock_acquire+0x1f1/0xad0 [ 1056.782952][ T7586] ? netlink_deliver_tap+0x146/0xb70 [ 1056.788218][ T7586] netlink_rcv_skb+0x15a/0x430 [ 1056.792962][ T7586] ? rtnetlink_put_metrics+0x510/0x510 [ 1056.798516][ T7586] ? netlink_ack+0xa10/0xa10 [ 1056.803104][ T7586] netlink_unicast+0x533/0x7d0 [ 1056.807843][ T7586] ? netlink_attachskb+0x810/0x810 [ 1056.812931][ T7586] ? _copy_from_iter_full+0x247/0x890 [ 1056.819239][ T7586] netlink_sendmsg+0x856/0xd90 [ 1056.824106][ T7586] ? netlink_unicast+0x7d0/0x7d0 [ 1056.830855][ T7586] ? netlink_unicast+0x7d0/0x7d0 [ 1056.838117][ T7586] sock_sendmsg+0xcf/0x120 [ 1056.842515][ T7586] ____sys_sendmsg+0x6e8/0x810 [ 1056.847372][ T7586] ? kernel_sendmsg+0x50/0x50 [ 1056.852116][ T7586] ? do_recvmmsg+0x6d0/0x6d0 [ 1056.856688][ T7586] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 1056.862650][ T7586] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 1056.868607][ T7586] ? lock_acquire+0x1f1/0xad0 [ 1056.873377][ T7586] ___sys_sendmsg+0xf3/0x170 [ 1056.877944][ T7586] ? sendmsg_copy_msghdr+0x160/0x160 [ 1056.883297][ T7586] ? __fget_files+0x272/0x400 [ 1056.888232][ T7586] ? lock_downgrade+0x820/0x820 [ 1056.893057][ T7586] ? find_held_lock+0x2d/0x110 [ 1056.897794][ T7586] ? __might_fault+0x11f/0x1d0 [ 1056.902537][ T7586] ? __fget_files+0x294/0x400 [ 1056.907461][ T7586] ? __fget_light+0xea/0x280 [ 1056.912182][ T7586] __sys_sendmsg+0xe5/0x1b0 [ 1056.916665][ T7586] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1056.921666][ T7586] ? __x64_sys_futex+0x382/0x4e0 [ 1056.926685][ T7586] ? do_syscall_64+0x1c/0xe0 [ 1056.931268][ T7586] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1056.937228][ T7586] do_syscall_64+0x60/0xe0 [ 1056.941661][ T7586] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1056.947555][ T7586] RIP: 0033:0x45cb29 [ 1056.951597][ T7586] Code: Bad RIP value. [ 1056.955635][ T7586] RSP: 002b:00007fb7fb431c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1056.964679][ T7586] RAX: ffffffffffffffda RBX: 0000000000502760 RCX: 000000000045cb29 [ 1056.972625][ T7586] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 1056.980571][ T7586] RBP: 000000000078c040 R08: 0000000000000000 R09: 0000000000000000 [ 1056.988519][ T7586] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1056.996465][ T7586] R13: 0000000000000a43 R14: 00000000004cd2a1 R15: 00007fb7fb4326d4 [ 1057.006154][ T7586] Kernel Offset: disabled [ 1057.010471][ T7586] Rebooting in 86400 seconds..