DUID 00:04:91:bc:de:6a:11:68:5e:b9:f7:f7:da:c6:96:db:93:18 forked to background, child pid 3175 [ 27.041045][ T3176] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.050842][ T3176] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.229' (ECDSA) to the list of known hosts. syzkaller login: [ 48.593360][ T3598] chnl_net:caif_netlink_parms(): no params data found [ 48.635044][ T3598] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.642801][ T3598] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.650943][ T3598] device bridge_slave_0 entered promiscuous mode [ 48.659911][ T3598] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.667045][ T3598] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.676001][ T3598] device bridge_slave_1 entered promiscuous mode [ 48.699298][ T3598] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 48.710235][ T3598] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 48.732885][ T3598] team0: Port device team_slave_0 added [ 48.740486][ T3598] team0: Port device team_slave_1 added [ 48.757289][ T3598] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 48.764330][ T3598] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 48.790365][ T3598] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 48.803353][ T3598] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 48.810339][ T3598] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 48.836246][ T3598] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 48.862129][ T3598] device hsr_slave_0 entered promiscuous mode [ 48.869392][ T3598] device hsr_slave_1 entered promiscuous mode [ 48.952673][ T3598] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 48.964784][ T3598] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 48.974268][ T3598] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 48.983474][ T3598] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 49.005436][ T3598] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.012710][ T3598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.020993][ T3598] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.028107][ T3598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.075596][ T3598] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.088672][ T918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.099439][ T918] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.109187][ T918] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.117969][ T918] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 49.131808][ T3598] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.143204][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.152596][ T3604] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.159992][ T3604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.170972][ T918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.180094][ T918] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.187696][ T918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.209611][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.219566][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.228334][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.237322][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 49.249953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.260657][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 49.277017][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 49.285467][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 49.297476][ T3598] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.421609][ T3604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.435783][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.444585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.452627][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.463258][ T3598] device veth0_vlan entered promiscuous mode [ 49.474477][ T3598] device veth1_vlan entered promiscuous mode [ 49.493381][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 49.501792][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 49.510041][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.521143][ T3598] device veth0_macvtap entered promiscuous mode [ 49.531168][ T3598] device veth1_macvtap entered promiscuous mode [ 49.545689][ T3598] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.554833][ T918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.564602][ T918] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 49.576992][ T3598] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.585586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.596701][ T3598] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.605845][ T3598] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.615531][ T3598] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 executing program executing program [ 49.624596][ T3598] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.663328][ T3614] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program [ 49.704583][ T3615] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program executing program [ 49.748636][ T3616] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. [ 49.780332][ T3617] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program executing program [ 49.819352][ T3618] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. [ 49.849828][ T3619] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program executing program [ 49.890233][ T3620] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. [ 49.919191][ T3621] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program executing program [ 49.950168][ T3622] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. [ 49.989332][ T3623] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 54.738992][ T3682] __nla_validate_parse: 58 callbacks suppressed [ 54.739005][ T3682] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program [ 54.820210][ T3683] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program [ 54.902526][ T3684] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program [ 54.979471][ T3685] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program [ 55.059117][ T3686] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program [ 55.138588][ T3687] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program [ 55.229075][ T3688] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program [ 55.379548][ T3689] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program [ 55.458813][ T3690] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program [ 55.539271][ T3691] netlink: 244 bytes leftover after parsing attributes in process `syz-executor390'. executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 59.055603][ T3700] ================================================================== [ 59.063932][ T3700] BUG: KASAN: slab-out-of-bounds in packet_recvmsg+0x56c/0x1150 [ 59.071589][ T3700] Read of size 202 at addr ffff88801dfbb168 by task syz-executor390/3700 [ 59.079988][ T3700] [ 59.082297][ T3700] CPU: 0 PID: 3700 Comm: syz-executor390 Not tainted 5.17.0-rc7-syzkaller-00198-g46b348fd2d81 #0 [ 59.092796][ T3700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.102850][ T3700] Call Trace: [ 59.106129][ T3700] [ 59.109050][ T3700] dump_stack_lvl+0xcd/0x134 [ 59.113636][ T3700] print_address_description.constprop.0.cold+0x8d/0x336 [ 59.120652][ T3700] ? packet_recvmsg+0x56c/0x1150 [ 59.125578][ T3700] ? packet_recvmsg+0x56c/0x1150 [ 59.130586][ T3700] kasan_report.cold+0x83/0xdf [ 59.135341][ T3700] ? packet_recvmsg+0x56c/0x1150 [ 59.140266][ T3700] kasan_check_range+0x13d/0x180 [ 59.145190][ T3700] memcpy+0x20/0x60 [ 59.148985][ T3700] packet_recvmsg+0x56c/0x1150 [ 59.153741][ T3700] ? __packet_rcv_has_room+0x700/0x700 [ 59.159201][ T3700] ? __might_fault+0xd1/0x170 [ 59.163894][ T3700] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 59.170138][ T3700] ? security_socket_recvmsg+0x8f/0xc0 [ 59.175602][ T3700] ? __packet_rcv_has_room+0x700/0x700 [ 59.181117][ T3700] ____sys_recvmsg+0x2c4/0x600 [ 59.185920][ T3700] ? kernel_recvmsg+0x160/0x160 [ 59.190767][ T3700] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 59.197020][ T3700] ? __import_iovec+0x293/0x590 [ 59.201873][ T3700] ? import_iovec+0x10c/0x150 [ 59.206541][ T3700] ___sys_recvmsg+0x127/0x200 [ 59.211223][ T3700] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 59.216849][ T3700] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 59.222817][ T3700] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 59.228789][ T3700] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 59.235017][ T3700] ? __fget_light+0x215/0x280 [ 59.239681][ T3700] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 59.245911][ T3700] __sys_recvmsg+0xe2/0x1a0 [ 59.250577][ T3700] ? __sys_recvmsg_sock+0x40/0x40 [ 59.255604][ T3700] ? syscall_enter_from_user_mode+0x21/0x70 [ 59.261612][ T3700] do_syscall_64+0x35/0xb0 [ 59.266032][ T3700] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 59.271915][ T3700] RIP: 0033:0x7f629f10cc29 [ 59.276321][ T3700] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 59.295919][ T3700] RSP: 002b:00007ffd00c16e18 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 59.304318][ T3700] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f629f10cc29 [ 59.312272][ T3700] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000005 [ 59.320398][ T3700] RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d [ 59.328350][ T3700] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd00c16e30 [ 59.336304][ T3700] R13: 00000000000f4240 R14: 000000000000e29c R15: 00007ffd00c16e24 [ 59.344289][ T3700] [ 59.347291][ T3700] [ 59.349595][ T3700] Allocated by task 3605: [ 59.353906][ T3700] kasan_save_stack+0x1e/0x40 [ 59.358592][ T3700] __kasan_slab_alloc+0x90/0xc0 [ 59.363426][ T3700] kmem_cache_alloc+0x271/0x4b0 [ 59.368259][ T3700] skb_clone+0x170/0x3c0 [ 59.372481][ T3700] dev_queue_xmit_nit+0x38c/0xa90 [ 59.377494][ T3700] dev_hard_start_xmit+0xad/0x920 [ 59.382514][ T3700] sch_direct_xmit+0x19f/0xbe0 [ 59.387274][ T3700] __qdisc_run+0x4c0/0x1720 [ 59.391772][ T3700] net_tx_action+0x790/0xd30 [ 59.396343][ T3700] __do_softirq+0x29b/0x9c2 [ 59.400829][ T3700] [ 59.403133][ T3700] The buggy address belongs to the object at ffff88801dfbb140 [ 59.403133][ T3700] which belongs to the cache skbuff_head_cache of size 232 [ 59.417683][ T3700] The buggy address is located 40 bytes inside of [ 59.417683][ T3700] 232-byte region [ffff88801dfbb140, ffff88801dfbb228) [ 59.430853][ T3700] The buggy address belongs to the page: [ 59.436459][ T3700] page:ffffea000077eec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1dfbb [ 59.446588][ T3700] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 59.454128][ T3700] raw: 00fff00000000200 0000000000000000 dead000000000122 ffff888140758640 [ 59.462778][ T3700] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000 [ 59.471338][ T3700] page dumped because: kasan: bad access detected [ 59.477727][ T3700] page_owner tracks the page as allocated [ 59.483418][ T3700] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY), pid 0, ts 59048377184, free_ts 59039581932 [ 59.499209][ T3700] get_page_from_freelist+0xa72/0x2f50 [ 59.504655][ T3700] __alloc_pages+0x1b2/0x500 [ 59.509226][ T3700] alloc_pages+0x1aa/0x310 [ 59.513642][ T3700] allocate_slab+0x27f/0x3c0 [ 59.518219][ T3700] ___slab_alloc+0xbe1/0x12b0 [ 59.522878][ T3700] __slab_alloc.constprop.0+0x4d/0xa0 [ 59.528240][ T3700] kmem_cache_alloc_node+0x190/0x4f0 [ 59.533512][ T3700] __alloc_skb+0x215/0x340 [ 59.537916][ T3700] wg_packet_send_keepalive+0x6e/0x300 [ 59.543360][ T3700] wg_expired_send_persistent_keepalive+0x5a/0x70 [ 59.549757][ T3700] call_timer_fn+0x1a5/0x6b0 [ 59.554330][ T3700] __run_timers.part.0+0x67c/0xa30 [ 59.559421][ T3700] run_timer_softirq+0xb3/0x1d0 [ 59.564252][ T3700] __do_softirq+0x29b/0x9c2 [ 59.568743][ T3700] page last free stack trace: [ 59.573399][ T3700] free_pcp_prepare+0x374/0x870 [ 59.579775][ T3700] free_unref_page+0x19/0x690 [ 59.584442][ T3700] __unfreeze_partials+0x320/0x340 [ 59.589603][ T3700] qlist_free_all+0x6d/0x160 [ 59.594199][ T3700] kasan_quarantine_reduce+0x180/0x200 [ 59.599659][ T3700] __kasan_slab_alloc+0xa2/0xc0 [ 59.604500][ T3700] kmem_cache_alloc_node+0x2c3/0x4f0 [ 59.609770][ T3700] __alloc_skb+0x215/0x340 [ 59.614174][ T3700] alloc_skb_with_frags+0x93/0x620 [ 59.619265][ T3700] sock_alloc_send_pskb+0x793/0x920 [ 59.624444][ T3700] unix_dgram_sendmsg+0x414/0x1a10 [ 59.629538][ T3700] sock_sendmsg+0xcf/0x120 [ 59.633941][ T3700] sock_write_iter+0x289/0x3c0 [ 59.638690][ T3700] new_sync_write+0x431/0x660 [ 59.643362][ T3700] vfs_write+0x7cd/0xae0 [ 59.647600][ T3700] ksys_write+0x1ee/0x250 [ 59.651949][ T3700] [ 59.654255][ T3700] Memory state around the buggy address: [ 59.659872][ T3700] ffff88801dfbb100: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 59.667963][ T3700] ffff88801dfbb180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.676010][ T3700] >ffff88801dfbb200: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 59.684052][ T3700] ^ [ 59.689416][ T3700] ffff88801dfbb280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.697457][ T3700] ffff88801dfbb300: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 59.705650][ T3700] ================================================================== [ 59.713716][ T3700] Disabling lock debugging due to kernel taint [ 59.721226][ T3700] Kernel panic - not syncing: panic_on_warn set ... [ 59.727834][ T3700] CPU: 0 PID: 3700 Comm: syz-executor390 Tainted: G B 5.17.0-rc7-syzkaller-00198-g46b348fd2d81 #0 [ 59.739716][ T3700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.749761][ T3700] Call Trace: [ 59.753028][ T3700] [ 59.755951][ T3700] dump_stack_lvl+0xcd/0x134 [ 59.760552][ T3700] panic+0x2b0/0x6dd [ 59.764438][ T3700] ? __warn_printk+0xf3/0xf3 [ 59.769019][ T3700] ? preempt_schedule_common+0x59/0xc0 [ 59.774485][ T3700] ? packet_recvmsg+0x56c/0x1150 [ 59.779418][ T3700] ? preempt_schedule_thunk+0x16/0x18 [ 59.784800][ T3700] ? trace_hardirqs_on+0x38/0x1c0 [ 59.789815][ T3700] ? trace_hardirqs_on+0x51/0x1c0 [ 59.794835][ T3700] ? packet_recvmsg+0x56c/0x1150 [ 59.799764][ T3700] ? packet_recvmsg+0x56c/0x1150 [ 59.804705][ T3700] end_report.cold+0x63/0x6f [ 59.809305][ T3700] kasan_report.cold+0x71/0xdf [ 59.814077][ T3700] ? packet_recvmsg+0x56c/0x1150 [ 59.819019][ T3700] kasan_check_range+0x13d/0x180 [ 59.823953][ T3700] memcpy+0x20/0x60 [ 59.827755][ T3700] packet_recvmsg+0x56c/0x1150 [ 59.832532][ T3700] ? __packet_rcv_has_room+0x700/0x700 [ 59.837994][ T3700] ? __might_fault+0xd1/0x170 [ 59.842681][ T3700] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 59.848944][ T3700] ? security_socket_recvmsg+0x8f/0xc0 [ 59.854415][ T3700] ? __packet_rcv_has_room+0x700/0x700 [ 59.859891][ T3700] ____sys_recvmsg+0x2c4/0x600 [ 59.864663][ T3700] ? kernel_recvmsg+0x160/0x160 [ 59.869510][ T3700] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 59.875748][ T3700] ? __import_iovec+0x293/0x590 [ 59.880595][ T3700] ? import_iovec+0x10c/0x150 [ 59.885265][ T3700] ___sys_recvmsg+0x127/0x200 [ 59.889937][ T3700] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 59.895565][ T3700] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 59.901552][ T3700] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 59.907574][ T3700] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 59.913834][ T3700] ? __fget_light+0x215/0x280 [ 59.918511][ T3700] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 59.924750][ T3700] __sys_recvmsg+0xe2/0x1a0 [ 59.929250][ T3700] ? __sys_recvmsg_sock+0x40/0x40 [ 59.934268][ T3700] ? syscall_enter_from_user_mode+0x21/0x70 [ 59.940175][ T3700] do_syscall_64+0x35/0xb0 [ 59.944587][ T3700] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 59.950473][ T3700] RIP: 0033:0x7f629f10cc29 [ 59.954878][ T3700] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 59.974474][ T3700] RSP: 002b:00007ffd00c16e18 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 59.982876][ T3700] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f629f10cc29 [ 59.990836][ T3700] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000005 [ 59.998795][ T3700] RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d [ 60.006755][ T3700] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd00c16e30 [ 60.014714][ T3700] R13: 00000000000f4240 R14: 000000000000e29c R15: 00007ffd00c16e24 [ 60.022696][ T3700] [ 60.025888][ T3700] Kernel Offset: disabled [ 60.030201][ T3700] Rebooting in 86400 seconds..