program:
r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000080), 0x1, 0x561, &(0x7f0000000f80)="$eJzs3U1rG0cfAPD/ylbenycOhNCWUgw9NCWNHNt9SaGH9NyGBtp7KuyNCZajYMkhdgNNDs25hF5KA6X30nOPoV+gh36GQBsIJZj20IvLyivFL5ItJ7KtVL8frJnZXWl2NPsfz2gkFMDAGs3+FCJejoivk4jjEZHkx4YjPzi6et7yk1tT2ZbEysqnfyaN87J887majzuaZ16KiF++ijhT2FxubXFptlyppPN5fqw+d32strh09upceSadSa9NTE6ef2dy4v333u1ZXd+89Pe3nzwYynMn7iVxIY7lubX1eA6312ZGYzR/TYpxYcOJ4z0orJ8kbff+tOfXwc4M5XFejKwPOB5DedQD/31fRsQKMKCSHcf/b8XduRJgbzXHAc25fY/mwS+Mxx+uToA213949b2RONSYGx1ZTtbNjLL57kgPys/K+PmP+/eyLXr3PgTAtm7fiYhzw8Ob+78k7/+e3bkuztlYhv4P9s6DbPzzVrvxT6E1/ok245+jbWL3WWwf/4VHPSimo2z890Hb8W9r0WpkKM/9rzHmKyZXrlbSrG/7f0ScjuLBLL/Ves755YcrnY6tHf9lW1Z+cyyYX8ej4YPrHzNdrpefp85rPb4T8Urb8W/Sav+kTftnr8elLss4ld5/rdOx7eu/u1Z+iHijbfs/XdFKtl6fHGvcD2PNu2Kzv+6e+rVT+ftd/6z9j2xd/5Fk7XptbedlfH/onzRa68nrrat/dH//H0g+a6QP5Ptuluv1+fGIA8nHrf2F5v6Jp49t5pvnZ/U//frW/V+7+/9wRHzeZf3vnvzx1U7H+qH9p9u2f2t2u6H9d554+NEX33Uqv7v+7+1G6nS+p5v+r9sLfJ7XDgAAAAAAAPpNISKORVIotdKFQqm0+vmOk3GkUKnW6meuVBeuTUfju7IjUSw0V7qPr/k8xHi+YtjMT2zIT0bEiYj4ZuhwI1+aqlam97vyAAAAAAAAAAAAAAAAAAAA0CeOdvj+f+b3of2+OmDX+clvGFzbxn8vfukJ6Ev+/8PgEv8wuMQ/DC7xD4NL/MPgEv8wuMQ/DC7xDwAAAAAAAAAAAAAAAAAAAAAAAAAAAD116eLFbFtZfnJrKstP31hcmK3eODud1mZLcwtTpanq/PXSTLU6U0lLU9W57Z6vUq1eH5+IhZtj9bRWH6stLl2eqy5cq1++OleeSS+nxT2pFQAAAAAAAAAAAAAAAAAAALxYaotLs+VKJZ2XkHimxHB/XIZEjxP73TMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwFP/BgAA//9q6zMB")
bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x61}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70)
lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180), &(0x7f00000001c0)=ANY=[], 0x361, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94)
mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x840041, 0x0)
socket$unix(0x1, 0x1, 0x0)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}]}, @NFT_MSG_NEWSETELEM={0x2c, 0x1d, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xb0}}, 0x0)
setxattr$security_ima(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140), &(0x7f00000013c0)=ANY=[], 0x700, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000280)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYRESHEX], 0xfe37, 0x0)
[ 68.274462][ T45] Bluetooth: hci0: command tx timeout
[ 68.296354][ T5357] loop0: detected capacity change from 0 to 1024
[ 68.323631][ T5357] =======================================================
[ 68.323631][ T5357] WARNING: The mand mount option has been deprecated and
[ 68.323631][ T5357] and is ignored by this kernel. Remove the mand
[ 68.323631][ T5357] option from the mount to silence this warning.
[ 68.323631][ T5357] =======================================================
[ 68.395893][ T5357] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[ 68.419825][ T5357] ==================================================================
[ 68.423433][ T5357] BUG: KASAN: slab-out-of-bounds in ext4_xattr_set_entry+0x179e/0x1e20
[ 68.427021][ T5357] Read of size 25190 at addr ffff888053054c00 by task syz.0.0/5357
[ 68.430359][ T5357]
[ 68.431388][ T5357] CPU: 0 UID: 0 PID: 5357 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full)
[ 68.431401][ T5357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
[ 68.431407][ T5357] Call Trace:
[ 68.431411][ T5357]
[ 68.431415][ T5357] dump_stack_lvl+0x189/0x250
[ 68.431429][ T5357] ? __kasan_check_byte+0x12/0x40
[ 68.431443][ T5357] ? __pfx_dump_stack_lvl+0x10/0x10
[ 68.431455][ T5357] ? lock_release+0x4b/0x3e0
[ 68.431473][ T5357] ? __virt_addr_valid+0x4a5/0x5c0
[ 68.431488][ T5357] print_report+0xca/0x240
[ 68.431498][ T5357] ? ext4_xattr_set_entry+0x179e/0x1e20
[ 68.431511][ T5357] kasan_report+0x118/0x150
[ 68.431525][ T5357] ? ext4_xattr_set_entry+0x179e/0x1e20
[ 68.431541][ T5357] kasan_check_range+0x2b0/0x2c0
[ 68.431554][ T5357] ? ext4_xattr_set_entry+0x179e/0x1e20
[ 68.431567][ T5357] __asan_memmove+0x29/0x70
[ 68.431578][ T5357] ext4_xattr_set_entry+0x179e/0x1e20
[ 68.431598][ T5357] ext4_xattr_block_set+0x872/0x2ac0
[ 68.431611][ T5357] ? __pfx_ext4_free_in_core_inode+0x10/0x10
[ 68.431624][ T5357] ? __pfx_evict+0x10/0x10
[ 68.431632][ T5357] ? do_raw_spin_unlock+0x4d/0x240
[ 68.431641][ T5357] ? _raw_spin_unlock+0x28/0x50
[ 68.431693][ T5357] ? __pfx_ext4_xattr_block_set+0x10/0x10
[ 68.431707][ T5357] ? ext4_xattr_ibody_set+0x510/0x6a0
[ 68.431723][ T5357] ext4_xattr_set_handle+0xdfb/0x1590
[ 68.431739][ T5357] ? __pfx_ext4_xattr_set_handle+0x10/0x10
[ 68.431753][ T5357] ? __ext4_journal_start_sb+0x27e/0x5c0
[ 68.431768][ T5357] ext4_xattr_set+0x230/0x320
[ 68.431784][ T5357] ? __pfx_ext4_xattr_set+0x10/0x10
[ 68.431799][ T5357] ? __pfx_evm_protect_xattr+0x10/0x10
[ 68.431812][ T5357] ? __pfx_ext4_xattr_trusted_set+0x10/0x10
[ 68.431826][ T5357] __vfs_setxattr+0x439/0x480
[ 68.431838][ T5357] __vfs_setxattr_noperm+0x12d/0x660
[ 68.431848][ T5357] vfs_setxattr+0x16b/0x2f0
[ 68.431857][ T5357] ? __pfx_vfs_setxattr+0x10/0x10
[ 68.431865][ T5357] ? mnt_get_write_access+0x223/0x2a0
[ 68.431873][ T5357] filename_setxattr+0x274/0x600
[ 68.431884][ T5357] ? __pfx_filename_setxattr+0x10/0x10
[ 68.431894][ T5357] ? getname_flags+0x1e5/0x540
[ 68.431905][ T5357] path_setxattrat+0x364/0x3a0
[ 68.431914][ T5357] ? __pfx_path_setxattrat+0x10/0x10
[ 68.431932][ T5357] ? rcu_is_watching+0x15/0xb0
[ 68.431945][ T5357] __x64_sys_lsetxattr+0xbf/0xe0
[ 68.431960][ T5357] do_syscall_64+0xfa/0x3b0
[ 68.431971][ T5357] ? lockdep_hardirqs_on+0x9c/0x150
[ 68.431981][ T5357] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 68.431992][ T5357] ? clear_bhb_loop+0x60/0xb0
[ 68.432005][ T5357] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 68.432016][ T5357] RIP: 0033:0x7f64eb78eec9
[ 68.432028][ T5357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 68.432039][ T5357] RSP: 002b:00007f64ec57a038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd
[ 68.432053][ T5357] RAX: ffffffffffffffda RBX: 00007f64eb9e5fa0 RCX: 00007f64eb78eec9
[ 68.432062][ T5357] RDX: 0000200000000100 RSI: 00002000000000c0 RDI: 0000200000000280
[ 68.432069][ T5357] RBP: 00007f64eb811f91 R08: 0000000000000000 R09: 0000000000000000
[ 68.432073][ T5357] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000
[ 68.432077][ T5357] R13: 00007f64eb9e6038 R14: 00007f64eb9e5fa0 R15: 00007fff4262b5f8
[ 68.432085][ T5357]
[ 68.432087][ T5357]
[ 68.576662][ T5357] Allocated by task 5357:
[ 68.578649][ T5357] kasan_save_track+0x3e/0x80
[ 68.580956][ T5357] __kasan_kmalloc+0x93/0xb0
[ 68.582896][ T5357] __kmalloc_node_track_caller_noprof+0x271/0x4e0
[ 68.585820][ T5357] kmemdup_noprof+0x2b/0x70
[ 68.587839][ T5357] ext4_xattr_block_set+0x781/0x2ac0
[ 68.590126][ T5357] ext4_xattr_set_handle+0xdfb/0x1590
[ 68.592539][ T5357] ext4_xattr_set+0x230/0x320
[ 68.594537][ T5357] __vfs_setxattr+0x439/0x480
[ 68.596545][ T5357] __vfs_setxattr_noperm+0x12d/0x660
[ 68.598807][ T5357] vfs_setxattr+0x16b/0x2f0
[ 68.600971][ T5357] filename_setxattr+0x274/0x600
[ 68.603253][ T5357] path_setxattrat+0x364/0x3a0
[ 68.605350][ T5357] __x64_sys_lsetxattr+0xbf/0xe0
[ 68.607534][ T5357] do_syscall_64+0xfa/0x3b0
[ 68.609575][ T5357] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 68.612153][ T5357]
[ 68.613286][ T5357] The buggy address belongs to the object at ffff888053054800
[ 68.613286][ T5357] which belongs to the cache kmalloc-1k of size 1024
[ 68.619295][ T5357] The buggy address is located 0 bytes to the right of
[ 68.619295][ T5357] allocated 1024-byte region [ffff888053054800, ffff888053054c00)
[ 68.625735][ T5357]
[ 68.626811][ T5357] The buggy address belongs to the physical page:
[ 68.629466][ T5357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x53054
[ 68.633252][ T5357] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 68.636827][ T5357] flags: 0x4fff00000000040(head|node=1|zone=1|lastcpupid=0x7ff)
[ 68.640012][ T5357] page_type: f5(slab)
[ 68.641925][ T5357] raw: 04fff00000000040 ffff88801a841dc0 dead000000000122 0000000000000000
[ 68.645640][ T5357] raw: 0000000000000000 0000000080080008 00000000f5000000 0000000000000000
[ 68.649400][ T5357] head: 04fff00000000040 ffff88801a841dc0 dead000000000122 0000000000000000
[ 68.653356][ T5357] head: 0000000000000000 0000000080080008 00000000f5000000 0000000000000000
[ 68.657288][ T5357] head: 04fff00000000002 ffffea00014c1501 00000000ffffffff 00000000ffffffff
[ 68.661237][ T5357] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[ 68.665123][ T5357] page dumped because: kasan: bad access detected
[ 68.668144][ T5357] page_owner tracks the page as allocated
[ 68.670707][ T5357] page last allocated via order 2, migratetype Unmovable, gfp_mask 0x52820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 43, tgid 43 (kworker/u4:3), ts 68413295891, free_ts 0
[ 68.678204][ T5357] post_alloc_hook+0x240/0x2a0
[ 68.680365][ T5357] get_page_from_freelist+0x21e4/0x22c0
[ 68.683003][ T5357] __alloc_frozen_pages_noprof+0x181/0x370
[ 68.685519][ T5357] alloc_pages_mpol+0x232/0x4a0
[ 68.688126][ T5357] allocate_slab+0x8a/0x370
[ 68.690710][ T5357] ___slab_alloc+0xbeb/0x1420
[ 68.692763][ T5357] __kmalloc_noprof+0x305/0x4f0
[ 68.694926][ T5357] ieee802_11_parse_elems_full+0x152/0x2ab0
[ 68.697703][ T5357] ieee80211_inform_bss+0x10c/0x10a0
[ 68.699941][ T5357] cfg80211_inform_single_bss_data+0xd05/0x1ac0
[ 68.702677][ T5357] cfg80211_inform_bss_data+0x1fb/0x3b30
[ 68.705128][ T5357] cfg80211_inform_bss_frame_data+0x3d7/0x730
[ 68.707740][ T5357] ieee80211_bss_info_update+0x746/0x9e0
[ 68.710416][ T5357] ieee80211_ibss_rx_queued_mgmt+0xa36/0x2ae0
[ 68.713080][ T5357] ieee80211_iface_work+0x85f/0x12d0
[ 68.715375][ T5357] cfg80211_wiphy_work+0x2bb/0x470
[ 68.717610][ T5357] page_owner free stack trace missing
[ 68.719942][ T5357]
[ 68.721036][ T5357] Memory state around the buggy address:
[ 68.723496][ T5357] ffff888053054b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 68.727483][ T5357] ffff888053054b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 68.731239][ T5357] >ffff888053054c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 68.735240][ T5357] ^
[ 68.737251][ T5357] ffff888053054c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 68.740735][ T5357] ffff888053054d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 68.744298][ T5357] ==================================================================
[ 68.762426][ T5357] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 68.765866][ T5357] CPU: 0 UID: 0 PID: 5357 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full)
[ 68.770623][ T5357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
[ 68.775044][ T5357] Call Trace:
[ 68.776486][ T5357]
[ 68.778002][ T5357] dump_stack_lvl+0x99/0x250
[ 68.780384][ T5357] ? __asan_memcpy+0x40/0x70
[ 68.782528][ T5357] ? __pfx_dump_stack_lvl+0x10/0x10
[ 68.784903][ T5357] ? __pfx__printk+0x10/0x10
[ 68.786931][ T5357] vpanic+0x281/0x750
[ 68.788708][ T5357] ? preempt_schedule+0xae/0xc0
[ 68.790868][ T5357] ? __pfx_vpanic+0x10/0x10
[ 68.792874][ T5357] ? preempt_schedule_common+0x83/0xd0
[ 68.795227][ T5357] ? preempt_schedule+0xae/0xc0
[ 68.797364][ T5357] ? __pfx_preempt_schedule+0x10/0x10
[ 68.799777][ T5357] panic+0xb9/0xc0
[ 68.801611][ T5357] ? __pfx_panic+0x10/0x10
[ 68.803788][ T5357] ? _raw_spin_unlock_irqrestore+0xfd/0x110
[ 68.806387][ T5357] ? ext4_xattr_set_entry+0x179e/0x1e20
[ 68.808868][ T5357] check_panic_on_warn+0x89/0xb0
[ 68.811031][ T5357] ? ext4_xattr_set_entry+0x179e/0x1e20
[ 68.813414][ T5357] end_report+0x78/0x160
[ 68.815345][ T5357] kasan_report+0x129/0x150
[ 68.817428][ T5357] ? ext4_xattr_set_entry+0x179e/0x1e20
[ 68.819888][ T5357] kasan_check_range+0x2b0/0x2c0
[ 68.822158][ T5357] ? ext4_xattr_set_entry+0x179e/0x1e20
[ 68.824584][ T5357] __asan_memmove+0x29/0x70
[ 68.827148][ T5357] ext4_xattr_set_entry+0x179e/0x1e20
[ 68.829594][ T5357] ext4_xattr_block_set+0x872/0x2ac0
[ 68.831900][ T5357] ? __pfx_ext4_free_in_core_inode+0x10/0x10
[ 68.834471][ T5357] ? __pfx_evict+0x10/0x10
[ 68.836452][ T5357] ? do_raw_spin_unlock+0x4d/0x240
[ 68.838648][ T5357] ? _raw_spin_unlock+0x28/0x50
[ 68.840785][ T5357] ? __pfx_ext4_xattr_block_set+0x10/0x10
[ 68.843232][ T5357] ? ext4_xattr_ibody_set+0x510/0x6a0
[ 68.845585][ T5357] ext4_xattr_set_handle+0xdfb/0x1590
[ 68.847858][ T5357] ? __pfx_ext4_xattr_set_handle+0x10/0x10
[ 68.850437][ T5357] ? __ext4_journal_start_sb+0x27e/0x5c0
[ 68.852966][ T5357] ext4_xattr_set+0x230/0x320
[ 68.854974][ T5357] ? __pfx_ext4_xattr_set+0x10/0x10
[ 68.857284][ T5357] ? __pfx_evm_protect_xattr+0x10/0x10
[ 68.859540][ T5357] ? __pfx_ext4_xattr_trusted_set+0x10/0x10
[ 68.862328][ T5357] __vfs_setxattr+0x439/0x480
[ 68.864532][ T5357] __vfs_setxattr_noperm+0x12d/0x660
[ 68.866905][ T5357] vfs_setxattr+0x16b/0x2f0
[ 68.868999][ T5357] ? __pfx_vfs_setxattr+0x10/0x10
[ 68.871218][ T5357] ? mnt_get_write_access+0x223/0x2a0
[ 68.873638][ T5357] filename_setxattr+0x274/0x600
[ 68.875915][ T5357] ? __pfx_filename_setxattr+0x10/0x10
[ 68.878416][ T5357] ? getname_flags+0x1e5/0x540
[ 68.880496][ T5357] path_setxattrat+0x364/0x3a0
[ 68.882606][ T5357] ? __pfx_path_setxattrat+0x10/0x10
[ 68.885061][ T5357] ? rcu_is_watching+0x15/0xb0
[ 68.887244][ T5357] __x64_sys_lsetxattr+0xbf/0xe0
[ 68.889495][ T5357] do_syscall_64+0xfa/0x3b0
[ 68.891652][ T5357] ? lockdep_hardirqs_on+0x9c/0x150
[ 68.893992][ T5357] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 68.896595][ T5357] ? clear_bhb_loop+0x60/0xb0
[ 68.898567][ T5357] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 68.901141][ T5357] RIP: 0033:0x7f64eb78eec9
[ 68.903176][ T5357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 68.911553][ T5357] RSP: 002b:00007f64ec57a038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd
[ 68.915253][ T5357] RAX: ffffffffffffffda RBX: 00007f64eb9e5fa0 RCX: 00007f64eb78eec9
[ 68.918647][ T5357] RDX: 0000200000000100 RSI: 00002000000000c0 RDI: 0000200000000280
[ 68.922025][ T5357] RBP: 00007f64eb811f91 R08: 0000000000000000 R09: 0000000000000000
[ 68.925570][ T5357] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000000
[ 68.929103][ T5357] R13: 00007f64eb9e6038 R14: 00007f64eb9e5fa0 R15: 00007fff4262b5f8
[ 68.932607][ T5357]
[ 68.934292][ T5357] Kernel Offset: disabled
[ 68.936216][ T5357] Rebooting in 86400 seconds..