[ 35.564186][ T29] audit: type=1400 audit(1733083178.482:86): avc: denied { open } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 35.587028][ T29] audit: type=1400 audit(1733083178.482:87): avc: denied { getattr } for pid=5174 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
Warning: Permanently added '10.128.0.93' (ED25519) to the list of known hosts.
[ 45.752108][ T29] audit: type=1400 audit(1733083188.722:88): avc: denied { execmem } for pid=5810 comm="syz-executor304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 45.772325][ T29] audit: type=1400 audit(1733083188.722:89): avc: denied { create } for pid=5812 comm="syz-executor304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[ 45.792785][ T29] audit: type=1400 audit(1733083188.722:90): avc: denied { read write } for pid=5812 comm="syz-executor304" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1
[ 45.793662][ T5814] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 45.816848][ T29] audit: type=1400 audit(1733083188.722:91): avc: denied { open } for pid=5812 comm="syz-executor304" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1
[ 45.824976][ T5814] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 45.854535][ T29] audit: type=1400 audit(1733083188.722:92): avc: denied { ioctl } for pid=5812 comm="syz-executor304" path="socket:[5200]" dev="sockfs" ino=5200 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[ 45.855377][ T5814] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 45.887892][ T5814] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 45.895820][ T5814] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 45.903052][ T5814] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 45.921611][ T29] audit: type=1400 audit(1733083188.882:93): avc: denied { mounton } for pid=5812 comm="syz-executor304" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 45.992068][ T5812] chnl_net:caif_netlink_parms(): no params data found
[ 46.025611][ T5812] bridge0: port 1(bridge_slave_0) entered blocking state
[ 46.032771][ T5812] bridge0: port 1(bridge_slave_0) entered disabled state
[ 46.040022][ T5812] bridge_slave_0: entered allmulticast mode
[ 46.047289][ T5812] bridge_slave_0: entered promiscuous mode
[ 46.055310][ T5812] bridge0: port 2(bridge_slave_1) entered blocking state
[ 46.062639][ T5812] bridge0: port 2(bridge_slave_1) entered disabled state
[ 46.069749][ T5812] bridge_slave_1: entered allmulticast mode
[ 46.076362][ T5812] bridge_slave_1: entered promiscuous mode
[ 46.093031][ T5812] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 46.103888][ T5812] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 46.123143][ T5812] team0: Port device team_slave_0 added
[ 46.129987][ T5812] team0: Port device team_slave_1 added
[ 46.144403][ T5812] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 46.151403][ T5812] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 46.177319][ T5812] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 46.189312][ T5812] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 46.196347][ T5812] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 46.222321][ T5812] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 46.247801][ T5812] hsr_slave_0: entered promiscuous mode
[ 46.254465][ T5812] hsr_slave_1: entered promiscuous mode
[ 46.318678][ T29] audit: type=1400 audit(1733083189.282:94): avc: denied { create } for pid=5812 comm="syz-executor304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 46.322361][ T5812] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 46.339894][ T29] audit: type=1400 audit(1733083189.282:95): avc: denied { write } for pid=5812 comm="syz-executor304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 46.367235][ T29] audit: type=1400 audit(1733083189.282:96): avc: denied { read } for pid=5812 comm="syz-executor304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 46.390101][ T5812] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 46.398780][ T5812] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 46.407653][ T5812] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 46.425405][ T5812] bridge0: port 2(bridge_slave_1) entered blocking state
[ 46.432556][ T5812] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 46.440160][ T5812] bridge0: port 1(bridge_slave_0) entered blocking state
[ 46.447267][ T5812] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 46.478567][ T5812] 8021q: adding VLAN 0 to HW filter on device bond0
[ 46.494013][ T3597] bridge0: port 1(bridge_slave_0) entered disabled state
[ 46.502961][ T3597] bridge0: port 2(bridge_slave_1) entered disabled state
[ 46.516206][ T5812] 8021q: adding VLAN 0 to HW filter on device team0
[ 46.527175][ T4404] bridge0: port 1(bridge_slave_0) entered blocking state
[ 46.534249][ T4404] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 46.545282][ T3597] bridge0: port 2(bridge_slave_1) entered blocking state
[ 46.552353][ T3597] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 46.589665][ T5812] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 46.613742][ T5812] veth0_vlan: entered promiscuous mode
[ 46.622190][ T5812] veth1_vlan: entered promiscuous mode
[ 46.640420][ T5812] veth0_macvtap: entered promiscuous mode
[ 46.648990][ T5812] veth1_macvtap: entered promiscuous mode
[ 46.661445][ T5812] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 46.672754][ T5812] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 46.682677][ T5812] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 46.692346][ T5812] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 46.701035][ T5812] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 46.709767][ T5812] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
executing program
[ 46.735488][ T29] audit: type=1400 audit(1733083189.702:97): avc: denied { mounton } for pid=5812 comm="syz-executor304" path="/root/syzkaller.zDZmCl/syz-tmp" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[ 46.957032][ T5826] ubi0: attaching mtd0
[ 46.966033][ T5826] ubi0: scanning is finished
[ 46.970670][ T5826] ubi0: empty MTD device detected
executing program
[ 47.201989][ T5826] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4
[ 47.436022][ T5832] ubi0: attaching mtd0
[ 47.444393][ T5832] ubi0: scanning is finished
[ 47.451666][ T5832] ==================================================================
[ 47.459807][ T5832] BUG: KASAN: slab-use-after-free in notifier_chain_register+0x3ac/0x420
[ 47.468224][ T5832] Read of size 4 at addr ffff888029aad8d8 by task syz-executor304/5832
[ 47.476538][ T5832]
[ 47.478852][ T5832] CPU: 0 UID: 0 PID: 5832 Comm: syz-executor304 Not tainted 6.12.0-syzkaller-12113-gbcc8eda6d349 #0
[ 47.489602][ T5832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 47.499648][ T5832] Call Trace:
[ 47.502918][ T5832]
[ 47.505841][ T5832] dump_stack_lvl+0x116/0x1f0
[ 47.510531][ T5832] print_report+0xc3/0x620
[ 47.514945][ T5832] ? __virt_addr_valid+0x5e/0x590
[ 47.519969][ T5832] ? __phys_addr+0xc6/0x150
[ 47.524471][ T5832] kasan_report+0xd9/0x110
[ 47.528882][ T5832] ? notifier_chain_register+0x3ac/0x420
[ 47.534515][ T5832] ? notifier_chain_register+0x3ac/0x420
[ 47.540146][ T5832] notifier_chain_register+0x3ac/0x420
[ 47.545611][ T5832] blocking_notifier_chain_register+0x76/0xd0
[ 47.551682][ T5832] ubi_wl_init+0x1018/0x17b0
[ 47.556274][ T5832] ubi_attach+0x1b92/0x4c00
[ 47.560783][ T5832] ? __pfx___vmalloc_node_range_noprof+0x10/0x10
[ 47.567195][ T5832] ? lockdep_init_map_type+0x16d/0x7d0
[ 47.572650][ T5832] ? __pfx_ubi_attach+0x10/0x10
[ 47.577494][ T5832] ? ubi_attach_mtd_dev+0x1543/0x3590
[ 47.582863][ T5832] ubi_attach_mtd_dev+0x158f/0x3590
[ 47.588063][ T5832] ? __pfx_ubi_attach_mtd_dev+0x10/0x10
[ 47.593601][ T5832] ? __pfx_get_mtd_device+0x10/0x10
[ 47.598800][ T5832] ? ctrl_cdev_ioctl+0x182/0x3d0
[ 47.603731][ T5832] ctrl_cdev_ioctl+0x339/0x3d0
[ 47.608487][ T5832] ? __pfx_ctrl_cdev_ioctl+0x10/0x10
[ 47.613766][ T5832] ? selinux_file_ioctl+0x180/0x270
[ 47.618963][ T5832] ? selinux_file_ioctl+0xb4/0x270
[ 47.624072][ T5832] ? __pfx_ctrl_cdev_ioctl+0x10/0x10
[ 47.629351][ T5832] __x64_sys_ioctl+0x190/0x200
[ 47.634134][ T5832] do_syscall_64+0xcd/0x250
[ 47.638631][ T5832] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 47.644510][ T5832] RIP: 0033:0x7f53256e4c79
[ 47.648903][ T5832] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 47.668492][ T5832] RSP: 002b:00007f5324e57218 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 47.676885][ T5832] RAX: ffffffffffffffda RBX: 00007f532576f468 RCX: 00007f53256e4c79
[ 47.684835][ T5832] RDX: 0000000020000502 RSI: 0000000040186f40 RDI: 0000000000000005
[ 47.692783][ T5832] RBP: 00007f532576f460 R08: 0000000000000000 R09: 0000000000000000
[ 47.700732][ T5832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f532573b6a4
[ 47.708679][ T5832] R13: b635773f06ebbeee R14: 006c7274635f6962 R15: 6962752f7665642f
[ 47.716634][ T5832]
[ 47.719633][ T5832]
[ 47.721933][ T5832] Allocated by task 5826:
[ 47.726238][ T5832] kasan_save_stack+0x33/0x60
[ 47.730897][ T5832] kasan_save_track+0x14/0x30
[ 47.735552][ T5832] __kasan_kmalloc+0xaa/0xb0
[ 47.740118][ T5832] ubi_attach_mtd_dev+0x3ce/0x3590
[ 47.745209][ T5832] ctrl_cdev_ioctl+0x339/0x3d0
[ 47.749951][ T5832] __x64_sys_ioctl+0x190/0x200
[ 47.754697][ T5832] do_syscall_64+0xcd/0x250
[ 47.759182][ T5832] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 47.765056][ T5832]
[ 47.767357][ T5832] Freed by task 5826:
[ 47.771318][ T5832] kasan_save_stack+0x33/0x60
[ 47.775973][ T5832] kasan_save_track+0x14/0x30
[ 47.780627][ T5832] kasan_save_free_info+0x3b/0x60
[ 47.785645][ T5832] __kasan_slab_free+0x51/0x70
[ 47.790402][ T5832] kfree+0x14f/0x4b0
[ 47.794284][ T5832] device_release+0xa1/0x240
[ 47.798861][ T5832] kobject_put+0x1e4/0x5a0
[ 47.803320][ T5832] put_device+0x1f/0x30
[ 47.807494][ T5832] ubi_attach_mtd_dev+0xe25/0x3590
[ 47.812598][ T5832] ctrl_cdev_ioctl+0x339/0x3d0
[ 47.817363][ T5832] __x64_sys_ioctl+0x190/0x200
[ 47.822112][ T5832] do_syscall_64+0xcd/0x250
[ 47.826598][ T5832] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 47.832490][ T5832]
[ 47.834792][ T5832] The buggy address belongs to the object at ffff888029aac000
[ 47.834792][ T5832] which belongs to the cache kmalloc-8k of size 8192
[ 47.848819][ T5832] The buggy address is located 6360 bytes inside of
[ 47.848819][ T5832] freed 8192-byte region [ffff888029aac000, ffff888029aae000)
[ 47.862773][ T5832]
[ 47.865073][ T5832] The buggy address belongs to the physical page:
[ 47.871457][ T5832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x29aa8
[ 47.880198][ T5832] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 47.888671][ T5832] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
[ 47.896191][ T5832] page_type: f5(slab)
[ 47.900150][ T5832] raw: 00fff00000000040 ffff88801b042280 dead000000000122 0000000000000000
[ 47.908718][ T5832] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[ 47.917279][ T5832] head: 00fff00000000040 ffff88801b042280 dead000000000122 0000000000000000
[ 47.925925][ T5832] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[ 47.934573][ T5832] head: 00fff00000000003 ffffea0000a6aa01 ffffffffffffffff 0000000000000000
[ 47.943226][ T5832] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[ 47.951869][ T5832] page dumped because: kasan: bad access detected
[ 47.958253][ T5832] page_owner tracks the page as allocated
[ 47.963953][ T5832] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x52820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 5826, tgid 5823 (syz-executor304), ts 46956066401, free_ts 46739507766
[ 47.983475][ T5832] post_alloc_hook+0x2d1/0x350
[ 47.988237][ T5832] get_page_from_freelist+0xfce/0x2f80
[ 47.993686][ T5832] __alloc_pages_noprof+0x223/0x25b0
[ 47.998948][ T5832] alloc_pages_mpol_noprof+0x2c9/0x610
[ 48.004391][ T5832] new_slab+0x2c9/0x410
[ 48.008525][ T5832] ___slab_alloc+0xdac/0x1870
[ 48.013179][ T5832] __slab_alloc.constprop.0+0x56/0xb0
[ 48.018527][ T5832] __kmalloc_cache_noprof+0xfa/0x410
[ 48.023791][ T5832] audit_log_d_path+0xce/0x1e0
[ 48.028534][ T5832] common_lsm_audit+0xa6a/0x2250
[ 48.033454][ T5832] slow_avc_audit+0x17d/0x210
[ 48.038116][ T5832] avc_has_extended_perms+0x9a1/0xf70
[ 48.043492][ T5832] ioctl_has_perm.constprop.0.isra.0+0x2ea/0x460
[ 48.049814][ T5832] selinux_file_ioctl+0x180/0x270
[ 48.054823][ T5832] security_file_ioctl+0xc6/0x240
[ 48.059828][ T5832] __x64_sys_ioctl+0xb7/0x200
[ 48.064489][ T5832] page last free pid 5812 tgid 5812 stack trace:
[ 48.070799][ T5832] free_unref_page+0x661/0x1080
[ 48.075630][ T5832] __put_partials+0x14c/0x170
[ 48.080282][ T5832] qlist_free_all+0x4e/0x120
[ 48.084849][ T5832] kasan_quarantine_reduce+0x195/0x1e0
[ 48.090285][ T5832] __kasan_slab_alloc+0x69/0x90
[ 48.095113][ T5832] __kmalloc_noprof+0x1cd/0x510
[ 48.099941][ T5832] tomoyo_realpath_from_path+0xb9/0x720
[ 48.105470][ T5832] tomoyo_mount_acl+0x66d/0x880
[ 48.110298][ T5832] tomoyo_mount_permission+0x16e/0x420
[ 48.115735][ T5832] security_sb_mount+0x9b/0x260
[ 48.120571][ T5832] path_mount+0x129/0x1f20
[ 48.124968][ T5832] __x64_sys_mount+0x294/0x320
[ 48.129710][ T5832] do_syscall_64+0xcd/0x250
[ 48.134199][ T5832] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 48.140071][ T5832]
[ 48.142371][ T5832] Memory state around the buggy address:
[ 48.147975][ T5832] ffff888029aad780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 48.156011][ T5832] ffff888029aad800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 48.164051][ T5832] >ffff888029aad880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 48.172098][ T5832] ^
[ 48.179005][ T5832] ffff888029aad900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 48.187056][ T5832] ffff888029aad980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 48.195102][ T5832] ==================================================================
[ 48.203846][ T5832] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 48.211044][ T5832] CPU: 0 UID: 0 PID: 5832 Comm: syz-executor304 Not tainted 6.12.0-syzkaller-12113-gbcc8eda6d349 #0
[ 48.221786][ T5832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 48.231820][ T5832] Call Trace:
[ 48.235077][ T5832]
[ 48.237991][ T5832] dump_stack_lvl+0x3d/0x1f0
[ 48.242571][ T5832] panic+0x71d/0x800
[ 48.246452][ T5832] ? __pfx_panic+0x10/0x10
[ 48.250857][ T5832] ? irqentry_exit+0x3b/0x90
[ 48.255429][ T5832] ? lockdep_hardirqs_on+0x7c/0x110
[ 48.260612][ T5832] ? preempt_schedule_thunk+0x1a/0x30
[ 48.265964][ T5832] ? preempt_schedule_common+0x44/0xc0
[ 48.271404][ T5832] ? check_panic_on_warn+0x1f/0xb0
[ 48.276493][ T5832] check_panic_on_warn+0xab/0xb0
[ 48.281409][ T5832] end_report+0x117/0x180
[ 48.285735][ T5832] kasan_report+0xe9/0x110
[ 48.290133][ T5832] ? notifier_chain_register+0x3ac/0x420
[ 48.295749][ T5832] ? notifier_chain_register+0x3ac/0x420
[ 48.301368][ T5832] notifier_chain_register+0x3ac/0x420
[ 48.306812][ T5832] blocking_notifier_chain_register+0x76/0xd0
[ 48.312864][ T5832] ubi_wl_init+0x1018/0x17b0
[ 48.317437][ T5832] ubi_attach+0x1b92/0x4c00
[ 48.321925][ T5832] ? __pfx___vmalloc_node_range_noprof+0x10/0x10
[ 48.328233][ T5832] ? lockdep_init_map_type+0x16d/0x7d0
[ 48.333672][ T5832] ? __pfx_ubi_attach+0x10/0x10
[ 48.338501][ T5832] ? ubi_attach_mtd_dev+0x1543/0x3590
[ 48.343858][ T5832] ubi_attach_mtd_dev+0x158f/0x3590
[ 48.349038][ T5832] ? __pfx_ubi_attach_mtd_dev+0x10/0x10
[ 48.354825][ T5832] ? __pfx_get_mtd_device+0x10/0x10
[ 48.360006][ T5832] ? ctrl_cdev_ioctl+0x182/0x3d0
[ 48.364928][ T5832] ctrl_cdev_ioctl+0x339/0x3d0
[ 48.369703][ T5832] ? __pfx_ctrl_cdev_ioctl+0x10/0x10
[ 48.374985][ T5832] ? selinux_file_ioctl+0x180/0x270
[ 48.380178][ T5832] ? selinux_file_ioctl+0xb4/0x270
[ 48.385304][ T5832] ? __pfx_ctrl_cdev_ioctl+0x10/0x10
[ 48.390582][ T5832] __x64_sys_ioctl+0x190/0x200
[ 48.395346][ T5832] do_syscall_64+0xcd/0x250
[ 48.399844][ T5832] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 48.405726][ T5832] RIP: 0033:0x7f53256e4c79
[ 48.410121][ T5832] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 48.429707][ T5832] RSP: 002b:00007f5324e57218 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 48.438100][ T5832] RAX: ffffffffffffffda RBX: 00007f532576f468 RCX: 00007f53256e4c79
[ 48.446050][ T5832] RDX: 0000000020000502 RSI: 0000000040186f40 RDI: 0000000000000005
[ 48.453999][ T5832] RBP: 00007f532576f460 R08: 0000000000000000 R09: 0000000000000000
[ 48.461949][ T5832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f532573b6a4
[ 48.469898][ T5832] R13: b635773f06ebbeee R14: 006c7274635f6962 R15: 6962752f7665642f
[ 48.477852][ T5832]
[ 48.481107][ T5832] Kernel Offset: disabled
[ 48.485407][ T5832] Rebooting in 86400 seconds..