fev 15 13:09:27 botnet-redhat kernel: random: get_random_bytes called from start_kernel+0x42/0x4e6 with crng_init=0 fev 15 13:09:27 botnet-redhat kernel: Linux version 4.13.0-32-generic (buildd@lgw01-amd64-016) (gcc version 7.2.0 (Ubuntu 7.2.0-8ubuntu3)) #35-Ubuntu SMP Thu Jan 25 09:13:46 UTC 2018 (Ubuntu 4.13.0-32.35-generic 4.13.13) fev 15 13:09:27 botnet-redhat kernel: Command line: BOOT_IMAGE=/boot/vmlinuz-4.13.0-32-generic.efi.signed root=UUID=3bdb708f-d6b5-4647-b266-3701c00353e3 ro quiet splash vt.handoff=1 fev 15 13:09:27 botnet-redhat kernel: KERNEL supported cpus: fev 15 13:09:27 botnet-redhat kernel: Intel GenuineIntel fev 15 13:09:27 botnet-redhat kernel: AMD AuthenticAMD fev 15 13:09:27 botnet-redhat kernel: Centaur CentaurHauls fev 15 13:09:27 botnet-redhat kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' fev 15 13:09:27 botnet-redhat kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' fev 15 13:09:27 botnet-redhat kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' fev 15 13:09:27 botnet-redhat kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 fev 15 13:09:27 botnet-redhat kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. fev 15 13:09:27 botnet-redhat kernel: e820: BIOS-provided physical RAM map: fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000057fff] usable fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x0000000000058000-0x0000000000058fff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x0000000000059000-0x000000000009dfff] usable fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x000000000009e000-0x000000000009ffff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000cee0cfff] usable fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000cee0d000-0x00000000cee13fff] ACPI NVS fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000cee14000-0x00000000cf609fff] usable fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000cf60a000-0x00000000cf83afff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000cf83b000-0x00000000df08cfff] usable fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000df08d000-0x00000000df124fff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000df125000-0x00000000df16afff] usable fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000df16b000-0x00000000df226fff] ACPI NVS fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000df227000-0x00000000df78afff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000df78b000-0x00000000df7fefff] type 20 fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000df7ff000-0x00000000df7fffff] usable fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000f8000000-0x00000000fbffffff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000fed00000-0x00000000fed03fff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved fev 15 13:09:27 botnet-redhat kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021effffff] usable fev 15 13:09:27 botnet-redhat kernel: NX (Execute Disable) protection: active fev 15 13:09:27 botnet-redhat kernel: efi: EFI v2.31 by American Megatrends fev 15 13:09:27 botnet-redhat kernel: efi: ACPI=0xdf1f3000 ACPI 2.0=0xdf1f3000 SMBIOS=0xdf789518 fev 15 13:09:27 botnet-redhat kernel: random: fast init done fev 15 13:09:27 botnet-redhat kernel: SMBIOS 2.7 present. fev 15 13:09:27 botnet-redhat kernel: DMI: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 13:09:27 botnet-redhat kernel: tsc: Fast TSC calibration using PIT fev 15 13:09:27 botnet-redhat kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved fev 15 13:09:27 botnet-redhat kernel: e820: remove [mem 0x000a0000-0x000fffff] usable fev 15 13:09:27 botnet-redhat kernel: e820: last_pfn = 0x21f000 max_arch_pfn = 0x400000000 fev 15 13:09:27 botnet-redhat kernel: MTRR default type: uncachable fev 15 13:09:27 botnet-redhat kernel: MTRR fixed ranges enabled: fev 15 13:09:27 botnet-redhat kernel: 00000-9FFFF write-back fev 15 13:09:27 botnet-redhat kernel: A0000-EFFFF uncachable fev 15 13:09:27 botnet-redhat kernel: F0000-FFFFF write-protect fev 15 13:09:27 botnet-redhat kernel: MTRR variable ranges enabled: fev 15 13:09:27 botnet-redhat kernel: 0 base 0000000000 mask 7E00000000 write-back fev 15 13:09:27 botnet-redhat kernel: 1 base 0200000000 mask 7FF0000000 write-back fev 15 13:09:27 botnet-redhat kernel: 2 base 0210000000 mask 7FF8000000 write-back fev 15 13:09:27 botnet-redhat kernel: 3 base 0218000000 mask 7FFC000000 write-back fev 15 13:09:27 botnet-redhat kernel: 4 base 021C000000 mask 7FFE000000 write-back fev 15 13:09:27 botnet-redhat kernel: 5 base 021E000000 mask 7FFF000000 write-back fev 15 13:09:27 botnet-redhat kernel: 6 base 00E0000000 mask 7FE0000000 uncachable fev 15 13:09:27 botnet-redhat kernel: 7 disabled fev 15 13:09:27 botnet-redhat kernel: 8 disabled fev 15 13:09:27 botnet-redhat kernel: 9 disabled fev 15 13:09:27 botnet-redhat kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WC UC- WT fev 15 13:09:27 botnet-redhat kernel: total RAM covered: 8176M fev 15 13:09:27 botnet-redhat kernel: Found optimal setting for mtrr clean up fev 15 13:09:27 botnet-redhat kernel: gran_size: 64K chunk_size: 32M num_reg: 6 lose cover RAM: 0G fev 15 13:09:27 botnet-redhat kernel: e820: update [mem 0xe0000000-0xffffffff] usable ==> reserved fev 15 13:09:27 botnet-redhat kernel: e820: last_pfn = 0xdf800 max_arch_pfn = 0x400000000 fev 15 13:09:27 botnet-redhat kernel: Scanning 1 areas for low memory corruption fev 15 13:09:27 botnet-redhat kernel: Base memory trampoline at [ffff9b9700098000] 98000 size 24576 fev 15 13:09:27 botnet-redhat kernel: Using GB pages for direct mapping fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d032a000, 0x1d032afff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d032b000, 0x1d032bfff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d032c000, 0x1d032cfff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d032d000, 0x1d032dfff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d032e000, 0x1d032efff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d032f000, 0x1d032ffff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d0330000, 0x1d0330fff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d0331000, 0x1d0331fff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d0332000, 0x1d0332fff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d0333000, 0x1d0333fff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: BRK [0x1d0334000, 0x1d0334fff] PGTABLE fev 15 13:09:27 botnet-redhat kernel: Secure boot could not be determined fev 15 13:09:27 botnet-redhat kernel: RAMDISK: [mem 0x30b3b000-0x34594fff] fev 15 13:09:27 botnet-redhat kernel: ACPI: Early table checksum verification disabled fev 15 13:09:27 botnet-redhat kernel: ACPI: RSDP 0x00000000DF1F3000 000024 (v02 ALASKA) fev 15 13:09:27 botnet-redhat kernel: ACPI: XSDT 0x00000000DF1F3078 000074 (v01 ALASKA A M I 01072009 AMI 00010013) fev 15 13:09:27 botnet-redhat kernel: ACPI: FACP 0x00000000DF1FFEE8 00010C (v05 ALASKA A M I 01072009 AMI 00010013) fev 15 13:09:27 botnet-redhat kernel: ACPI: DSDT 0x00000000DF1F3188 00CD5A (v02 ALASKA A M I 00000088 INTL 20091112) fev 15 13:09:27 botnet-redhat kernel: ACPI: FACS 0x00000000DF225080 000040 fev 15 13:09:27 botnet-redhat kernel: ACPI: APIC 0x00000000DF1FFFF8 000092 (v03 ALASKA A M I 01072009 AMI 00010013) fev 15 13:09:27 botnet-redhat kernel: ACPI: FPDT 0x00000000DF200090 000044 (v01 ALASKA A M I 01072009 AMI 00010013) fev 15 13:09:27 botnet-redhat kernel: ACPI: SSDT 0x00000000DF2000D8 000539 (v01 PmRef Cpu0Ist 00003000 INTL 20120711) fev 15 13:09:27 botnet-redhat kernel: ACPI: SSDT 0x00000000DF200618 000AD8 (v01 PmRef CpuPm 00003000 INTL 20120711) fev 15 13:09:27 botnet-redhat kernel: ACPI: MCFG 0x00000000DF2010F0 00003C (v01 ALASKA A M I 01072009 MSFT 00000097) fev 15 13:09:27 botnet-redhat kernel: ACPI: HPET 0x00000000DF201130 000038 (v01 ALASKA A M I 01072009 AMI. 00000005) fev 15 13:09:27 botnet-redhat kernel: ACPI: SSDT 0x00000000DF201168 00036D (v01 SataRe SataTabl 00001000 INTL 20120711) fev 15 13:09:27 botnet-redhat kernel: ACPI: SSDT 0x00000000DF2014D8 0034E1 (v01 SaSsdt SaSsdt 00003000 INTL 20091112) fev 15 13:09:27 botnet-redhat kernel: ACPI: DMAR 0x00000000DF2049C0 000080 (v01 INTEL HSW 00000001 INTL 00000001) fev 15 13:09:27 botnet-redhat kernel: ACPI: Local APIC address 0xfee00000 fev 15 13:09:27 botnet-redhat kernel: No NUMA configuration found fev 15 13:09:27 botnet-redhat kernel: Faking a node at [mem 0x0000000000000000-0x000000021effffff] fev 15 13:09:27 botnet-redhat kernel: NODE_DATA(0) allocated [mem 0x21efd5000-0x21effffff] fev 15 13:09:27 botnet-redhat kernel: Zone ranges: fev 15 13:09:27 botnet-redhat kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] fev 15 13:09:27 botnet-redhat kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] fev 15 13:09:27 botnet-redhat kernel: Normal [mem 0x0000000100000000-0x000000021effffff] fev 15 13:09:27 botnet-redhat kernel: Device empty fev 15 13:09:27 botnet-redhat kernel: Movable zone start for each node fev 15 13:09:27 botnet-redhat kernel: Early memory node ranges fev 15 13:09:27 botnet-redhat kernel: node 0: [mem 0x0000000000001000-0x0000000000057fff] fev 15 13:09:27 botnet-redhat kernel: node 0: [mem 0x0000000000059000-0x000000000009dfff] fev 15 13:09:27 botnet-redhat kernel: node 0: [mem 0x0000000000100000-0x00000000cee0cfff] fev 15 13:09:27 botnet-redhat kernel: node 0: [mem 0x00000000cee14000-0x00000000cf609fff] fev 15 13:09:27 botnet-redhat kernel: node 0: [mem 0x00000000cf83b000-0x00000000df08cfff] fev 15 13:09:27 botnet-redhat kernel: node 0: [mem 0x00000000df125000-0x00000000df16afff] fev 15 13:09:27 botnet-redhat kernel: node 0: [mem 0x00000000df7ff000-0x00000000df7fffff] fev 15 13:09:27 botnet-redhat kernel: node 0: [mem 0x0000000100000000-0x000000021effffff] fev 15 13:09:27 botnet-redhat kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021effffff] fev 15 13:09:27 botnet-redhat kernel: On node 0 totalpages: 2088504 fev 15 13:09:27 botnet-redhat kernel: DMA zone: 64 pages used for memmap fev 15 13:09:27 botnet-redhat kernel: DMA zone: 23 pages reserved fev 15 13:09:27 botnet-redhat kernel: DMA zone: 3996 pages, LIFO batch:0 fev 15 13:09:27 botnet-redhat kernel: DMA32 zone: 14203 pages used for memmap fev 15 13:09:27 botnet-redhat kernel: DMA32 zone: 908956 pages, LIFO batch:31 fev 15 13:09:27 botnet-redhat kernel: Normal zone: 18368 pages used for memmap fev 15 13:09:27 botnet-redhat kernel: Normal zone: 1175552 pages, LIFO batch:31 fev 15 13:09:27 botnet-redhat kernel: ACPI: PM-Timer IO Port: 0x1808 fev 15 13:09:27 botnet-redhat kernel: ACPI: Local APIC address 0xfee00000 fev 15 13:09:27 botnet-redhat kernel: ACPI: LAPIC_NMI (acpi_id[0xff] high edge lint[0x1]) fev 15 13:09:27 botnet-redhat kernel: IOAPIC[0]: apic_id 8, version 32, address 0xfec00000, GSI 0-23 fev 15 13:09:27 botnet-redhat kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) fev 15 13:09:27 botnet-redhat kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) fev 15 13:09:27 botnet-redhat kernel: ACPI: IRQ0 used by override. fev 15 13:09:27 botnet-redhat kernel: ACPI: IRQ9 used by override. fev 15 13:09:27 botnet-redhat kernel: Using ACPI (MADT) for SMP configuration information fev 15 13:09:27 botnet-redhat kernel: ACPI: HPET id: 0x8086a701 base: 0xfed00000 fev 15 13:09:27 botnet-redhat kernel: [Firmware Bug]: TSC_DEADLINE disabled due to Errata; please update microcode to version: 0x22 (or later) fev 15 13:09:27 botnet-redhat kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0x00000000-0x00000fff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0x00058000-0x00058fff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0x0009e000-0x0009ffff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000fffff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xcee0d000-0xcee13fff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xcf60a000-0xcf83afff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xdf08d000-0xdf124fff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xdf16b000-0xdf226fff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xdf227000-0xdf78afff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xdf78b000-0xdf7fefff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xdf800000-0xf7ffffff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xf8000000-0xfbffffff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xfc000000-0xfebfffff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xfec00000-0xfec00fff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xfec01000-0xfecfffff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xfed00000-0xfed03fff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xfed04000-0xfed1bfff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xfed1c000-0xfed1ffff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xfed20000-0xfedfffff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xfee00000-0xfee00fff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xfee01000-0xfeffffff] fev 15 13:09:27 botnet-redhat kernel: PM: Registered nosave memory: [mem 0xff000000-0xffffffff] fev 15 13:09:27 botnet-redhat kernel: e820: [mem 0xdf800000-0xf7ffffff] available for PCI devices fev 15 13:09:27 botnet-redhat kernel: Booting paravirtualized kernel on bare hardware fev 15 13:09:27 botnet-redhat kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns fev 15 13:09:27 botnet-redhat kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 fev 15 13:09:27 botnet-redhat kernel: percpu: Embedded 45 pages/cpu @ffff9b991ec00000 s146520 r8192 d29608 u262144 fev 15 13:09:27 botnet-redhat kernel: pcpu-alloc: s146520 r8192 d29608 u262144 alloc=1*2097152 fev 15 13:09:27 botnet-redhat kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 fev 15 13:09:27 botnet-redhat kernel: Built 1 zonelists in Node order, mobility grouping on. Total pages: 2055846 fev 15 13:09:27 botnet-redhat kernel: Policy zone: Normal fev 15 13:09:27 botnet-redhat kernel: Kernel command line: BOOT_IMAGE=/boot/vmlinuz-4.13.0-32-generic.efi.signed root=UUID=3bdb708f-d6b5-4647-b266-3701c00353e3 ro quiet splash vt.handoff=1 fev 15 13:09:27 botnet-redhat kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) fev 15 13:09:27 botnet-redhat kernel: Calgary: detecting Calgary via BIOS EBDA area fev 15 13:09:27 botnet-redhat kernel: Calgary: Unable to locate Rio Grande table in EBDA - bailing! fev 15 13:09:27 botnet-redhat kernel: Memory: 8013392K/8354016K available (12300K kernel code, 2482K rwdata, 3996K rodata, 2364K init, 2368K bss, 340624K reserved, 0K cma-reserved) fev 15 13:09:27 botnet-redhat kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 fev 15 13:09:27 botnet-redhat kernel: Kernel/User page tables isolation: enabled fev 15 13:09:27 botnet-redhat kernel: ftrace: allocating 37818 entries in 148 pages fev 15 13:09:27 botnet-redhat kernel: Hierarchical RCU implementation. fev 15 13:09:27 botnet-redhat kernel: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. fev 15 13:09:27 botnet-redhat kernel: Tasks RCU enabled. fev 15 13:09:27 botnet-redhat kernel: RCU: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 fev 15 13:09:27 botnet-redhat kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 fev 15 13:09:27 botnet-redhat kernel: vt handoff: transparent VT on vt#1 fev 15 13:09:27 botnet-redhat kernel: Console: colour dummy device 80x25 fev 15 13:09:27 botnet-redhat kernel: console [tty0] enabled fev 15 13:09:27 botnet-redhat kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns fev 15 13:09:27 botnet-redhat kernel: hpet clockevent registered fev 15 13:09:27 botnet-redhat kernel: tsc: Fast TSC calibration using PIT fev 15 13:09:27 botnet-redhat kernel: spurious 8259A interrupt: IRQ7. fev 15 13:09:27 botnet-redhat kernel: tsc: Detected 3492.020 MHz processor fev 15 13:09:27 botnet-redhat kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6984.04 BogoMIPS (lpj=13968080) fev 15 13:09:27 botnet-redhat kernel: pid_max: default: 32768 minimum: 301 fev 15 13:09:27 botnet-redhat kernel: ACPI: Core revision 20170531 fev 15 13:09:27 botnet-redhat kernel: ACPI: 5 ACPI AML tables successfully acquired and loaded fev 15 13:09:27 botnet-redhat kernel: Security Framework initialized fev 15 13:09:27 botnet-redhat kernel: Yama: becoming mindful. fev 15 13:09:27 botnet-redhat kernel: AppArmor: AppArmor initialized fev 15 13:09:27 botnet-redhat kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes) fev 15 13:09:27 botnet-redhat kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes) fev 15 13:09:27 botnet-redhat kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes) fev 15 13:09:27 botnet-redhat kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes) fev 15 13:09:27 botnet-redhat kernel: CPU: Physical Processor ID: 0 fev 15 13:09:27 botnet-redhat kernel: CPU: Processor Core ID: 0 fev 15 13:09:27 botnet-redhat kernel: FEATURE SPEC_CTRL Not Present fev 15 13:09:27 botnet-redhat kernel: mce: CPU supports 9 MCE banks fev 15 13:09:27 botnet-redhat kernel: CPU0: Thermal monitoring enabled (TM1) fev 15 13:09:27 botnet-redhat kernel: process: using mwait in idle threads fev 15 13:09:27 botnet-redhat kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 fev 15 13:09:27 botnet-redhat kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 fev 15 13:09:27 botnet-redhat kernel: Freeing SMP alternatives memory: 36K fev 15 13:09:27 botnet-redhat kernel: smpboot: Max logical packages: 2 fev 15 13:09:27 botnet-redhat kernel: DMAR: Host address width 39 fev 15 13:09:27 botnet-redhat kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x1 fev 15 13:09:27 botnet-redhat kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap d2008c20660462 ecap f010da fev 15 13:09:27 botnet-redhat kernel: DMAR: RMRR base: 0x000000df6cf000 end: 0x000000df6ddfff fev 15 13:09:27 botnet-redhat kernel: DMAR-IR: IOAPIC id 8 under DRHD base 0xfed90000 IOMMU 0 fev 15 13:09:27 botnet-redhat kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed90000 fev 15 13:09:27 botnet-redhat kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. fev 15 13:09:27 botnet-redhat kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode fev 15 13:09:27 botnet-redhat kernel: x2apic enabled fev 15 13:09:27 botnet-redhat kernel: Switched APIC routing to cluster x2apic. fev 15 13:09:27 botnet-redhat kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 fev 15 13:09:27 botnet-redhat kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU E3-1241 v3 @ 3.50GHz (family: 0x6, model: 0x3c, stepping: 0x3) fev 15 13:09:27 botnet-redhat kernel: Performance Events: PEBS fmt2+, Haswell events, 16-deep LBR, full-width counters, Intel PMU driver. fev 15 13:09:27 botnet-redhat kernel: ... version: 3 fev 15 13:09:27 botnet-redhat kernel: ... bit width: 48 fev 15 13:09:27 botnet-redhat kernel: ... generic registers: 4 fev 15 13:09:27 botnet-redhat kernel: ... value mask: 0000ffffffffffff fev 15 13:09:27 botnet-redhat kernel: ... max period: 00007fffffffffff fev 15 13:09:27 botnet-redhat kernel: ... fixed-purpose events: 3 fev 15 13:09:27 botnet-redhat kernel: ... event mask: 000000070000000f fev 15 13:09:27 botnet-redhat kernel: Hierarchical SRCU implementation. fev 15 13:09:27 botnet-redhat kernel: smp: Bringing up secondary CPUs ... fev 15 13:09:27 botnet-redhat kernel: x86: Booting SMP configuration: fev 15 13:09:27 botnet-redhat kernel: .... node #0, CPUs: #1 fev 15 13:09:27 botnet-redhat kernel: NMI watchdog: enabled on all CPUs, permanently consumes one hw-PMU counter. fev 15 13:09:27 botnet-redhat kernel: #2 #3 #4 #5 #6 #7 fev 15 13:09:27 botnet-redhat kernel: smp: Brought up 1 node, 8 CPUs fev 15 13:09:27 botnet-redhat kernel: smpboot: Total of 8 processors activated (55872.32 BogoMIPS) fev 15 13:09:27 botnet-redhat kernel: devtmpfs: initialized fev 15 13:09:27 botnet-redhat kernel: x86/mm: Memory block size: 128MB fev 15 13:09:27 botnet-redhat kernel: evm: security.selinux fev 15 13:09:27 botnet-redhat kernel: evm: security.SMACK64 fev 15 13:09:27 botnet-redhat kernel: evm: security.SMACK64EXEC fev 15 13:09:27 botnet-redhat kernel: evm: security.SMACK64TRANSMUTE fev 15 13:09:27 botnet-redhat kernel: evm: security.SMACK64MMAP fev 15 13:09:27 botnet-redhat kernel: evm: security.ima fev 15 13:09:27 botnet-redhat kernel: evm: security.capability fev 15 13:09:27 botnet-redhat kernel: PM: Registering ACPI NVS region [mem 0xcee0d000-0xcee13fff] (28672 bytes) fev 15 13:09:27 botnet-redhat kernel: PM: Registering ACPI NVS region [mem 0xdf16b000-0xdf226fff] (770048 bytes) fev 15 13:09:27 botnet-redhat kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns fev 15 13:09:27 botnet-redhat kernel: futex hash table entries: 2048 (order: 5, 131072 bytes) fev 15 13:09:27 botnet-redhat kernel: pinctrl core: initialized pinctrl subsystem fev 15 13:09:27 botnet-redhat kernel: RTC time: 16:09:25, date: 02/15/18 fev 15 13:09:27 botnet-redhat kernel: NET: Registered protocol family 16 fev 15 13:09:27 botnet-redhat kernel: cpuidle: using governor ladder fev 15 13:09:27 botnet-redhat kernel: cpuidle: using governor menu fev 15 13:09:27 botnet-redhat kernel: PCCT header not found. fev 15 13:09:27 botnet-redhat kernel: ACPI FADT declares the system doesn't support PCIe ASPM, so disable it fev 15 13:09:27 botnet-redhat kernel: ACPI: bus type PCI registered fev 15 13:09:27 botnet-redhat kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 fev 15 13:09:27 botnet-redhat kernel: PCI: MMCONFIG for domain 0000 [bus 00-3f] at [mem 0xf8000000-0xfbffffff] (base 0xf8000000) fev 15 13:09:27 botnet-redhat kernel: PCI: MMCONFIG at [mem 0xf8000000-0xfbffffff] reserved in E820 fev 15 13:09:27 botnet-redhat kernel: PCI: Using configuration type 1 for base access fev 15 13:09:27 botnet-redhat kernel: core: PMU erratum BJ122, BV98, HSD29 worked around, HT is on fev 15 13:09:27 botnet-redhat kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages fev 15 13:09:27 botnet-redhat kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages fev 15 13:09:27 botnet-redhat kernel: ACPI: Added _OSI(Module Device) fev 15 13:09:27 botnet-redhat kernel: ACPI: Added _OSI(Processor Device) fev 15 13:09:27 botnet-redhat kernel: ACPI: Added _OSI(3.0 _SCP Extensions) fev 15 13:09:27 botnet-redhat kernel: ACPI: Added _OSI(Processor Aggregator Device) fev 15 13:09:27 botnet-redhat kernel: ACPI: Executed 1 blocks of module-level executable AML code fev 15 13:09:27 botnet-redhat kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored fev 15 13:09:27 botnet-redhat kernel: ACPI: Dynamic OEM Table Load: fev 15 13:09:27 botnet-redhat kernel: ACPI: SSDT 0xFFFF9B99149CB800 0003D3 (v01 PmRef Cpu0Cst 00003001 INTL 20120711) fev 15 13:09:27 botnet-redhat kernel: ACPI: Dynamic OEM Table Load: fev 15 13:09:27 botnet-redhat kernel: ACPI: SSDT 0xFFFF9B9914F30000 0005AA (v01 PmRef ApIst 00003000 INTL 20120711) fev 15 13:09:27 botnet-redhat kernel: ACPI: Dynamic OEM Table Load: fev 15 13:09:27 botnet-redhat kernel: ACPI: SSDT 0xFFFF9B9914A11400 000119 (v01 PmRef ApCst 00003000 INTL 20120711) fev 15 13:09:27 botnet-redhat kernel: ACPI: Interpreter enabled fev 15 13:09:27 botnet-redhat kernel: ACPI: (supports S0 S3 S4 S5) fev 15 13:09:27 botnet-redhat kernel: ACPI: Using IOAPIC for interrupt routing fev 15 13:09:27 botnet-redhat kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug fev 15 13:09:27 botnet-redhat kernel: ACPI: Enabled 7 GPEs in block 00 to 3F fev 15 13:09:27 botnet-redhat kernel: ACPI: Power Resource [FN00] (off) fev 15 13:09:27 botnet-redhat kernel: ACPI: Power Resource [FN01] (off) fev 15 13:09:27 botnet-redhat kernel: ACPI: Power Resource [FN02] (off) fev 15 13:09:27 botnet-redhat kernel: ACPI: Power Resource [FN03] (off) fev 15 13:09:27 botnet-redhat kernel: ACPI: Power Resource [FN04] (off) fev 15 13:09:27 botnet-redhat kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-3e]) fev 15 13:09:27 botnet-redhat kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI] fev 15 13:09:27 botnet-redhat kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug PME] fev 15 13:09:27 botnet-redhat kernel: acpi PNP0A08:00: _OSC: OS now controls [AER PCIeCapability] fev 15 13:09:27 botnet-redhat kernel: acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration fev 15 13:09:27 botnet-redhat kernel: PCI host bridge to bus 0000:00 fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000c0000-0x000c3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000c4000-0x000c7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000c8000-0x000cbfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000dc000-0x000dffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000e0000-0x000e3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000e4000-0x000e7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000e8000-0x000ebfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0x000ec000-0x000effff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [mem 0xe0000000-0xfeafffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: root bus resource [bus 00-3e] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:00.0: [8086:0c08] type 00 class 0x060000 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:01.0: [8086:0c01] type 01 class 0x060400 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:14.0: [8086:8c31] type 00 class 0x0c0330 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:14.0: reg 0x10: [mem 0xf7200000-0xf720ffff 64bit] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:16.0: [8086:8c3a] type 00 class 0x078000 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:16.0: reg 0x10: [mem 0xf7216000-0xf721600f 64bit] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1a.0: [8086:8c2d] type 00 class 0x0c0320 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1a.0: reg 0x10: [mem 0xf7214000-0xf72143ff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1a.0: PME# supported from D0 D3hot D3cold fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.0: [8086:8c10] type 01 class 0x060400 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.2: [8086:8c14] type 01 class 0x060400 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.2: PME# supported from D0 D3hot D3cold fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: [8086:244e] type 01 class 0x060401 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1d.0: [8086:8c26] type 00 class 0x0c0320 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1d.0: reg 0x10: [mem 0xf7213000-0xf72133ff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.0: [8086:8c5c] type 00 class 0x060100 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.2: [8086:8c02] type 00 class 0x010601 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.2: reg 0x10: [io 0xf070-0xf077] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.2: reg 0x14: [io 0xf060-0xf063] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.2: reg 0x18: [io 0xf050-0xf057] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.2: reg 0x1c: [io 0xf040-0xf043] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.2: reg 0x20: [io 0xf020-0xf03f] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xf7212000-0xf72127ff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.2: PME# supported from D3hot fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.3: [8086:8c22] type 00 class 0x0c0500 fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.3: reg 0x10: [mem 0xf7211000-0xf72110ff 64bit] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1f.3: reg 0x20: [io 0xf000-0xf01f] fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.0: [10de:1b80] type 00 class 0x030000 fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.0: reg 0x10: [mem 0xf6000000-0xf6ffffff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.0: reg 0x14: [mem 0xe0000000-0xefffffff 64bit pref] fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.0: reg 0x1c: [mem 0xf0000000-0xf1ffffff 64bit pref] fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.0: reg 0x24: [io 0xe000-0xe07f] fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.0: reg 0x30: [mem 0xf7000000-0xf707ffff pref] fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.1: [10de:10f0] type 00 class 0x040300 fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.1: reg 0x10: [mem 0xf7080000-0xf7083fff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:01.0: PCI bridge to [bus 01] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:01.0: bridge window [mem 0xf6000000-0xf70fffff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:01.0: bridge window [mem 0xe0000000-0xf1ffffff 64bit pref] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] fev 15 13:09:27 botnet-redhat kernel: pci 0000:03:00.0: [10ec:8168] type 00 class 0x020000 fev 15 13:09:27 botnet-redhat kernel: pci 0000:03:00.0: reg 0x10: [io 0xd000-0xd0ff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:03:00.0: reg 0x18: [mem 0xf7100000-0xf7100fff 64bit] fev 15 13:09:27 botnet-redhat kernel: pci 0000:03:00.0: reg 0x20: [mem 0xf2100000-0xf2103fff 64bit pref] fev 15 13:09:27 botnet-redhat kernel: pci 0000:03:00.0: supports D1 D2 fev 15 13:09:27 botnet-redhat kernel: pci 0000:03:00.0: PME# supported from D0 D1 D2 D3hot D3cold fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.2: PCI bridge to [bus 03] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.2: bridge window [io 0xd000-0xdfff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.2: bridge window [mem 0xf7100000-0xf71fffff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.2: bridge window [mem 0xf2100000-0xf21fffff 64bit pref] fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: [8086:244e] type 01 class 0x060401 fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: supports D1 D2 fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: PME# supported from D0 D1 D2 D3hot D3cold fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: PCI bridge to [bus 04-05] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [io 0xc000-0xcfff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [io 0x0d00-0xffff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000c0000-0x000c3fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000c4000-0x000c7fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000c8000-0x000cbfff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000dc000-0x000dffff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000e0000-0x000e3fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000e4000-0x000e7fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000e8000-0x000ebfff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0x000ec000-0x000effff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [mem 0xe0000000-0xfeafffff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:05:01.0: [13f6:8788] type 00 class 0x040100 fev 15 13:09:27 botnet-redhat kernel: pci 0000:05:01.0: reg 0x10: [io 0xc000-0xc0ff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:05:01.0: supports D1 D2 fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: PCI bridge to [bus 05] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [io 0xc000-0xcfff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [io 0xc000-0xcfff] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [io 0x0d00-0xffff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000c0000-0x000c3fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000c4000-0x000c7fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000c8000-0x000cbfff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000dc000-0x000dffff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000e0000-0x000e3fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000e4000-0x000e7fff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000e8000-0x000ebfff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0x000ec000-0x000effff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [mem 0xe0000000-0xfeafffff window] (subtractive decode) fev 15 13:09:27 botnet-redhat kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 10 11 12 14 15) *0, disabled. fev 15 13:09:27 botnet-redhat kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 10 11 12 14 15) *0, disabled. fev 15 13:09:27 botnet-redhat kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 10 11 12 14 15) *0, disabled. fev 15 13:09:27 botnet-redhat kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 6 10 11 12 14 15) *0, disabled. fev 15 13:09:27 botnet-redhat kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 10 11 12 14 15) *0, disabled. fev 15 13:09:27 botnet-redhat kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 10 11 12 14 15) *0, disabled. fev 15 13:09:27 botnet-redhat kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 10 11 12 14 15) *0, disabled. fev 15 13:09:27 botnet-redhat kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 10 11 12 14 15) *0, disabled. fev 15 13:09:27 botnet-redhat kernel: SCSI subsystem initialized fev 15 13:09:27 botnet-redhat kernel: libata version 3.00 loaded. fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.0: vgaarb: setting as boot device fev 15 13:09:27 botnet-redhat kernel: pci 0000:01:00.0: vgaarb: bridge control possible fev 15 13:09:27 botnet-redhat kernel: vgaarb: loaded fev 15 13:09:27 botnet-redhat kernel: ACPI: bus type USB registered fev 15 13:09:27 botnet-redhat kernel: usbcore: registered new interface driver usbfs fev 15 13:09:27 botnet-redhat kernel: usbcore: registered new interface driver hub fev 15 13:09:27 botnet-redhat kernel: usbcore: registered new device driver usb fev 15 13:09:27 botnet-redhat kernel: EDAC MC: Ver: 3.0.0 fev 15 13:09:27 botnet-redhat kernel: Registered efivars operations fev 15 13:09:27 botnet-redhat kernel: PCI: Using ACPI for IRQ routing fev 15 13:09:27 botnet-redhat kernel: PCI: pci_cache_line_size set to 64 bytes fev 15 13:09:27 botnet-redhat kernel: e820: reserve RAM buffer [mem 0x00058000-0x0005ffff] fev 15 13:09:27 botnet-redhat kernel: e820: reserve RAM buffer [mem 0x0009e000-0x0009ffff] fev 15 13:09:27 botnet-redhat kernel: e820: reserve RAM buffer [mem 0xcee0d000-0xcfffffff] fev 15 13:09:27 botnet-redhat kernel: e820: reserve RAM buffer [mem 0xcf60a000-0xcfffffff] fev 15 13:09:27 botnet-redhat kernel: e820: reserve RAM buffer [mem 0xdf08d000-0xdfffffff] fev 15 13:09:27 botnet-redhat kernel: e820: reserve RAM buffer [mem 0xdf16b000-0xdfffffff] fev 15 13:09:27 botnet-redhat kernel: e820: reserve RAM buffer [mem 0xdf800000-0xdfffffff] fev 15 13:09:27 botnet-redhat kernel: e820: reserve RAM buffer [mem 0x21f000000-0x21fffffff] fev 15 13:09:27 botnet-redhat kernel: NetLabel: Initializing fev 15 13:09:27 botnet-redhat kernel: NetLabel: domain hash size = 128 fev 15 13:09:27 botnet-redhat kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO fev 15 13:09:27 botnet-redhat kernel: NetLabel: unlabeled traffic allowed by default fev 15 13:09:27 botnet-redhat kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 fev 15 13:09:27 botnet-redhat kernel: hpet0: 8 comparators, 64-bit 14.318180 MHz counter fev 15 13:09:27 botnet-redhat kernel: clocksource: Switched to clocksource hpet fev 15 13:09:27 botnet-redhat kernel: VFS: Disk quotas dquot_6.6.0 fev 15 13:09:27 botnet-redhat kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) fev 15 13:09:27 botnet-redhat kernel: AppArmor: AppArmor Filesystem Enabled fev 15 13:09:27 botnet-redhat kernel: pnp: PnP ACPI init fev 15 13:09:27 botnet-redhat kernel: system 00:00: [mem 0xfed40000-0xfed44fff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:00: Plug and Play ACPI device, IDs PNP0c01 (active) fev 15 13:09:27 botnet-redhat kernel: system 00:01: [io 0x0680-0x069f] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:01: [io 0xffff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:01: [io 0xffff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:01: [io 0xffff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:01: [io 0x1c00-0x1cfe] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:01: [io 0x1d00-0x1dfe] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:01: [io 0x1e00-0x1efe] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:01: [io 0x1f00-0x1ffe] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:01: [io 0x1800-0x18fe] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:01: [io 0x164e-0x164f] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:01: Plug and Play ACPI device, IDs PNP0c02 (active) fev 15 13:09:27 botnet-redhat kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0b00 (active) fev 15 13:09:27 botnet-redhat kernel: system 00:03: [io 0x1854-0x1857] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:03: Plug and Play ACPI device, IDs INT3f0d PNP0c02 (active) fev 15 13:09:27 botnet-redhat kernel: system 00:04: [io 0x0a00-0x0a0f] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:04: [io 0x0a30-0x0a3f] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:04: [io 0x0a20-0x0a2f] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:04: Plug and Play ACPI device, IDs PNP0c02 (active) fev 15 13:09:27 botnet-redhat kernel: system 00:05: [io 0x04d0-0x04d1] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:05: Plug and Play ACPI device, IDs PNP0c02 (active) fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xfed1c000-0xfed1ffff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xf8000000-0xfbffffff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xff000000-0xffffffff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xf7fdf000-0xf7fdffff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: [mem 0xf7fe0000-0xf7feffff] has been reserved fev 15 13:09:27 botnet-redhat kernel: system 00:06: Plug and Play ACPI device, IDs PNP0c02 (active) fev 15 13:09:27 botnet-redhat kernel: pnp: PnP ACPI: found 7 devices fev 15 13:09:27 botnet-redhat kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:01.0: PCI bridge to [bus 01] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:01.0: bridge window [io 0xe000-0xefff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:01.0: bridge window [mem 0xf6000000-0xf70fffff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:01.0: bridge window [mem 0xe0000000-0xf1ffffff 64bit pref] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.0: PCI bridge to [bus 02] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.2: PCI bridge to [bus 03] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.2: bridge window [io 0xd000-0xdfff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.2: bridge window [mem 0xf7100000-0xf71fffff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.2: bridge window [mem 0xf2100000-0xf21fffff 64bit pref] fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: PCI bridge to [bus 05] fev 15 13:09:27 botnet-redhat kernel: pci 0000:04:00.0: bridge window [io 0xc000-0xcfff] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: PCI bridge to [bus 04-05] fev 15 13:09:27 botnet-redhat kernel: pci 0000:00:1c.3: bridge window [io 0xc000-0xcfff] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 7 [mem 0x000c0000-0x000c3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 8 [mem 0x000c4000-0x000c7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 9 [mem 0x000c8000-0x000cbfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 10 [mem 0x000cc000-0x000cffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 11 [mem 0x000d0000-0x000d3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 12 [mem 0x000d4000-0x000d7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 13 [mem 0x000d8000-0x000dbfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 14 [mem 0x000dc000-0x000dffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 15 [mem 0x000e0000-0x000e3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 16 [mem 0x000e4000-0x000e7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 17 [mem 0x000e8000-0x000ebfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 18 [mem 0x000ec000-0x000effff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:00: resource 19 [mem 0xe0000000-0xfeafffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:01: resource 0 [io 0xe000-0xefff] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:01: resource 1 [mem 0xf6000000-0xf70fffff] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:01: resource 2 [mem 0xe0000000-0xf1ffffff 64bit pref] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:03: resource 0 [io 0xd000-0xdfff] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:03: resource 1 [mem 0xf7100000-0xf71fffff] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:03: resource 2 [mem 0xf2100000-0xf21fffff 64bit pref] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 0 [io 0xc000-0xcfff] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 4 [io 0x0000-0x0cf7 window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 5 [io 0x0d00-0xffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 6 [mem 0x000a0000-0x000bffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 7 [mem 0x000c0000-0x000c3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 8 [mem 0x000c4000-0x000c7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 9 [mem 0x000c8000-0x000cbfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 10 [mem 0x000cc000-0x000cffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 11 [mem 0x000d0000-0x000d3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 12 [mem 0x000d4000-0x000d7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 13 [mem 0x000d8000-0x000dbfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 14 [mem 0x000dc000-0x000dffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 15 [mem 0x000e0000-0x000e3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 16 [mem 0x000e4000-0x000e7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 17 [mem 0x000e8000-0x000ebfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 18 [mem 0x000ec000-0x000effff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:04: resource 19 [mem 0xe0000000-0xfeafffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 4 [io 0xc000-0xcfff] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 5 [io 0x0000-0x0cf7 window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 6 [io 0x0d00-0xffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 7 [mem 0x000a0000-0x000bffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 8 [mem 0x000c0000-0x000c3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 9 [mem 0x000c4000-0x000c7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 10 [mem 0x000c8000-0x000cbfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 11 [mem 0x000cc000-0x000cffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 12 [mem 0x000d0000-0x000d3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 13 [mem 0x000d4000-0x000d7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 14 [mem 0x000d8000-0x000dbfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 15 [mem 0x000dc000-0x000dffff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 16 [mem 0x000e0000-0x000e3fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 17 [mem 0x000e4000-0x000e7fff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 18 [mem 0x000e8000-0x000ebfff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 19 [mem 0x000ec000-0x000effff window] fev 15 13:09:27 botnet-redhat kernel: pci_bus 0000:05: resource 20 [mem 0xe0000000-0xfeafffff window] fev 15 13:09:27 botnet-redhat kernel: NET: Registered protocol family 2 fev 15 13:09:27 botnet-redhat kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes) fev 15 13:09:27 botnet-redhat kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes) fev 15 13:09:27 botnet-redhat kernel: TCP: Hash tables configured (established 65536 bind 65536) fev 15 13:09:27 botnet-redhat kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes) fev 15 13:09:27 botnet-redhat kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes) fev 15 13:09:27 botnet-redhat kernel: NET: Registered protocol family 1 fev 15 13:09:27 botnet-redhat kernel: PCI: CLS 64 bytes, default 64 fev 15 13:09:27 botnet-redhat kernel: Unpacking initramfs... fev 15 13:09:27 botnet-redhat kernel: Freeing initrd memory: 59752K fev 15 13:09:27 botnet-redhat kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) fev 15 13:09:27 botnet-redhat kernel: software IO TLB [mem 0xd65cf000-0xda5cf000] (64MB) mapped at [ffff9b97d65cf000-ffff9b97da5cefff] fev 15 13:09:27 botnet-redhat kernel: Scanning for low memory corruption every 60 seconds fev 15 13:09:27 botnet-redhat kernel: audit: initializing netlink subsys (disabled) fev 15 13:09:27 botnet-redhat kernel: audit: type=2000 audit(1518710965.683:1): state=initialized audit_enabled=0 res=1 fev 15 13:09:27 botnet-redhat kernel: Initialise system trusted keyrings fev 15 13:09:27 botnet-redhat kernel: Key type blacklist registered fev 15 13:09:27 botnet-redhat kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 fev 15 13:09:27 botnet-redhat kernel: zbud: loaded fev 15 13:09:27 botnet-redhat kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher fev 15 13:09:27 botnet-redhat kernel: fuse init (API version 7.26) fev 15 13:09:27 botnet-redhat kernel: Key type asymmetric registered fev 15 13:09:27 botnet-redhat kernel: Asymmetric key parser 'x509' registered fev 15 13:09:27 botnet-redhat kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 247) fev 15 13:09:27 botnet-redhat kernel: io scheduler noop registered fev 15 13:09:27 botnet-redhat kernel: io scheduler deadline registered fev 15 13:09:27 botnet-redhat kernel: io scheduler cfq registered (default) fev 15 13:09:27 botnet-redhat kernel: efifb: probing for efifb fev 15 13:09:27 botnet-redhat kernel: efifb: framebuffer at 0xe0000000, using 23040k, total 23040k fev 15 13:09:27 botnet-redhat kernel: efifb: mode is 2560x1440x32, linelength=16384, pages=1 fev 15 13:09:27 botnet-redhat kernel: efifb: scrolling: redraw fev 15 13:09:27 botnet-redhat kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 fev 15 13:09:27 botnet-redhat kernel: Console: switching to colour frame buffer device 320x90 fev 15 13:09:27 botnet-redhat kernel: fb0: EFI VGA frame buffer device fev 15 13:09:27 botnet-redhat kernel: intel_idle: MWAIT substates: 0x42120 fev 15 13:09:27 botnet-redhat kernel: intel_idle: v0.4.1 model 0x3C fev 15 13:09:27 botnet-redhat kernel: intel_idle: lapic_timer_reliable_states 0xffffffff fev 15 13:09:27 botnet-redhat kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 fev 15 13:09:27 botnet-redhat kernel: ACPI: Power Button [PWRB] fev 15 13:09:27 botnet-redhat kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input1 fev 15 13:09:27 botnet-redhat kernel: ACPI: Power Button [PWRF] fev 15 13:09:27 botnet-redhat kernel: (NULL device *): hwmon_device_register() is deprecated. Please convert the driver to use hwmon_device_register_with_info(). fev 15 13:09:27 botnet-redhat kernel: thermal LNXTHERM:00: registered as thermal_zone0 fev 15 13:09:27 botnet-redhat kernel: ACPI: Thermal Zone [TZ00] (28 C) fev 15 13:09:27 botnet-redhat kernel: thermal LNXTHERM:01: registered as thermal_zone1 fev 15 13:09:27 botnet-redhat kernel: ACPI: Thermal Zone [TZ01] (30 C) fev 15 13:09:27 botnet-redhat kernel: GHES: HEST is not enabled! fev 15 13:09:27 botnet-redhat kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled fev 15 13:09:27 botnet-redhat kernel: Linux agpgart interface v0.103 fev 15 13:09:27 botnet-redhat kernel: loop: module loaded fev 15 13:09:27 botnet-redhat kernel: libphy: Fixed MDIO Bus: probed fev 15 13:09:27 botnet-redhat kernel: tun: Universal TUN/TAP device driver, 1.6 fev 15 13:09:27 botnet-redhat kernel: PPP generic driver version 2.4.2 fev 15 13:09:27 botnet-redhat kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver fev 15 13:09:27 botnet-redhat kernel: ehci-pci: EHCI PCI platform driver fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1a.0: EHCI Host Controller fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1a.0: new USB bus registered, assigned bus number 1 fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1a.0: debug port 2 fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1a.0: cache line size of 64 is not supported fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1a.0: irq 16, io mem 0xf7214000 fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1a.0: USB 2.0 started, EHCI 1.00 fev 15 13:09:27 botnet-redhat kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002 fev 15 13:09:27 botnet-redhat kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 fev 15 13:09:27 botnet-redhat kernel: usb usb1: Product: EHCI Host Controller fev 15 13:09:27 botnet-redhat kernel: usb usb1: Manufacturer: Linux 4.13.0-32-generic ehci_hcd fev 15 13:09:27 botnet-redhat kernel: usb usb1: SerialNumber: 0000:00:1a.0 fev 15 13:09:27 botnet-redhat kernel: hub 1-0:1.0: USB hub found fev 15 13:09:27 botnet-redhat kernel: hub 1-0:1.0: 2 ports detected fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1d.0: EHCI Host Controller fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1d.0: new USB bus registered, assigned bus number 2 fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1d.0: debug port 2 fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1d.0: cache line size of 64 is not supported fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1d.0: irq 23, io mem 0xf7213000 fev 15 13:09:27 botnet-redhat kernel: ehci-pci 0000:00:1d.0: USB 2.0 started, EHCI 1.00 fev 15 13:09:27 botnet-redhat kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0002 fev 15 13:09:27 botnet-redhat kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 fev 15 13:09:27 botnet-redhat kernel: usb usb2: Product: EHCI Host Controller fev 15 13:09:27 botnet-redhat kernel: usb usb2: Manufacturer: Linux 4.13.0-32-generic ehci_hcd fev 15 13:09:27 botnet-redhat kernel: usb usb2: SerialNumber: 0000:00:1d.0 fev 15 13:09:27 botnet-redhat kernel: hub 2-0:1.0: USB hub found fev 15 13:09:27 botnet-redhat kernel: hub 2-0:1.0: 2 ports detected fev 15 13:09:27 botnet-redhat kernel: ehci-platform: EHCI generic platform driver fev 15 13:09:27 botnet-redhat kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver fev 15 13:09:27 botnet-redhat kernel: ohci-pci: OHCI PCI platform driver fev 15 13:09:27 botnet-redhat kernel: ohci-platform: OHCI generic platform driver fev 15 13:09:27 botnet-redhat kernel: uhci_hcd: USB Universal Host Controller Interface driver fev 15 13:09:27 botnet-redhat kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller fev 15 13:09:27 botnet-redhat kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 3 fev 15 13:09:27 botnet-redhat kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x00009810 fev 15 13:09:27 botnet-redhat kernel: xhci_hcd 0000:00:14.0: cache line size of 64 is not supported fev 15 13:09:27 botnet-redhat kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0002 fev 15 13:09:27 botnet-redhat kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 fev 15 13:09:27 botnet-redhat kernel: usb usb3: Product: xHCI Host Controller fev 15 13:09:27 botnet-redhat kernel: usb usb3: Manufacturer: Linux 4.13.0-32-generic xhci-hcd fev 15 13:09:27 botnet-redhat kernel: usb usb3: SerialNumber: 0000:00:14.0 fev 15 13:09:27 botnet-redhat kernel: hub 3-0:1.0: USB hub found fev 15 13:09:27 botnet-redhat kernel: hub 3-0:1.0: 10 ports detected fev 15 13:09:27 botnet-redhat kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller fev 15 13:09:27 botnet-redhat kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 4 fev 15 13:09:27 botnet-redhat kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0003 fev 15 13:09:27 botnet-redhat kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 fev 15 13:09:27 botnet-redhat kernel: usb usb4: Product: xHCI Host Controller fev 15 13:09:27 botnet-redhat kernel: usb usb4: Manufacturer: Linux 4.13.0-32-generic xhci-hcd fev 15 13:09:27 botnet-redhat kernel: usb usb4: SerialNumber: 0000:00:14.0 fev 15 13:09:27 botnet-redhat kernel: hub 4-0:1.0: USB hub found fev 15 13:09:27 botnet-redhat kernel: hub 4-0:1.0: 2 ports detected fev 15 13:09:27 botnet-redhat kernel: i8042: PNP: No PS/2 controller found. fev 15 13:09:27 botnet-redhat kernel: mousedev: PS/2 mouse device common for all mice fev 15 13:09:27 botnet-redhat kernel: rtc_cmos 00:02: RTC can wake from S4 fev 15 13:09:27 botnet-redhat kernel: rtc_cmos 00:02: rtc core: registered rtc_cmos as rtc0 fev 15 13:09:27 botnet-redhat kernel: rtc_cmos 00:02: alarms up to one month, y3k, 242 bytes nvram, hpet irqs fev 15 13:09:27 botnet-redhat kernel: i2c /dev entries driver fev 15 13:09:27 botnet-redhat kernel: device-mapper: uevent: version 1.0.3 fev 15 13:09:27 botnet-redhat kernel: device-mapper: ioctl: 4.37.0-ioctl (2017-09-20) initialised: dm-devel@redhat.com fev 15 13:09:27 botnet-redhat kernel: intel_pstate: Intel P-state driver initializing fev 15 13:09:27 botnet-redhat kernel: ledtrig-cpu: registered to indicate activity on CPUs fev 15 13:09:27 botnet-redhat kernel: EFI Variables Facility v0.08 2004-May-17 fev 15 13:09:27 botnet-redhat kernel: NET: Registered protocol family 10 fev 15 13:09:27 botnet-redhat kernel: Segment Routing with IPv6 fev 15 13:09:27 botnet-redhat kernel: NET: Registered protocol family 17 fev 15 13:09:27 botnet-redhat kernel: Key type dns_resolver registered fev 15 13:09:27 botnet-redhat kernel: RAS: Correctable Errors collector initialized. fev 15 13:09:27 botnet-redhat kernel: microcode: sig=0x306c3, pf=0x2, revision=0x12 fev 15 13:09:27 botnet-redhat kernel: microcode: Microcode Update Driver: v2.2. fev 15 13:09:27 botnet-redhat kernel: sched_clock: Marking stable (739621271, 0)->(850986785, -111365514) fev 15 13:09:27 botnet-redhat kernel: registered taskstats version 1 fev 15 13:09:27 botnet-redhat kernel: Loading compiled-in X.509 certificates fev 15 13:09:27 botnet-redhat kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 1297faa01db899585c27cbaaacd5d444d1bb254f' fev 15 13:09:27 botnet-redhat kernel: Couldn't get size: 0x800000000000000e fev 15 13:09:27 botnet-redhat kernel: MODSIGN: Couldn't get UEFI db list fev 15 13:09:27 botnet-redhat kernel: Loaded UEFI:MokListRT cert 'Canonical Ltd. Master Certificate Authority: ad91990bc22ab1f517048c23b6655a268e345a63' linked to secondary sys keyring fev 15 13:09:27 botnet-redhat kernel: Couldn't get size: 0x800000000000000e fev 15 13:09:27 botnet-redhat kernel: MODSIGN: Couldn't get UEFI dbx list fev 15 13:09:27 botnet-redhat kernel: zswap: loaded using pool lzo/zbud fev 15 13:09:27 botnet-redhat kernel: Key type big_key registered fev 15 13:09:27 botnet-redhat kernel: Key type trusted registered fev 15 13:09:27 botnet-redhat kernel: Key type encrypted registered fev 15 13:09:27 botnet-redhat kernel: AppArmor: AppArmor sha1 policy hashing enabled fev 15 13:09:27 botnet-redhat kernel: ima: No TPM chip found, activating TPM-bypass! (rc=-19) fev 15 13:09:27 botnet-redhat kernel: evm: HMAC attrs: 0x1 fev 15 13:09:27 botnet-redhat kernel: Magic number: 6:415:186 fev 15 13:09:27 botnet-redhat kernel: acpi device:45: hash matches fev 15 13:09:27 botnet-redhat kernel: rtc_cmos 00:02: setting system clock to 2018-02-15 16:09:26 UTC (1518710966) fev 15 13:09:27 botnet-redhat kernel: BIOS EDD facility v0.16 2004-Jun-25, 0 devices found fev 15 13:09:27 botnet-redhat kernel: EDD information not available. fev 15 13:09:27 botnet-redhat kernel: PM: Hibernation image not present or could not be loaded. fev 15 13:09:27 botnet-redhat kernel: Freeing unused kernel memory: 2364K fev 15 13:09:27 botnet-redhat kernel: Write protecting the kernel read-only data: 18432k fev 15 13:09:27 botnet-redhat kernel: Freeing unused kernel memory: 2024K fev 15 13:09:27 botnet-redhat kernel: Freeing unused kernel memory: 100K fev 15 13:09:27 botnet-redhat kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. fev 15 13:09:27 botnet-redhat kernel: x86/mm: Checking user space page tables fev 15 13:09:27 botnet-redhat kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. fev 15 13:09:27 botnet-redhat kernel: ipmi message handler version 39.2 fev 15 13:09:27 botnet-redhat kernel: ipmi device interface fev 15 13:09:27 botnet-redhat kernel: r8169 Gigabit Ethernet driver 2.3LK-NAPI loaded fev 15 13:09:27 botnet-redhat kernel: r8169 0000:03:00.0: can't disable ASPM; OS doesn't have ASPM control fev 15 13:09:27 botnet-redhat kernel: ahci 0000:00:1f.2: version 3.0 fev 15 13:09:27 botnet-redhat kernel: ahci 0000:00:1f.2: AHCI 0001.0300 32 slots 4 ports 6 Gbps 0x23 impl SATA mode fev 15 13:09:27 botnet-redhat kernel: ahci 0000:00:1f.2: flags: 64bit ncq led clo pio slum part ems fev 15 13:09:27 botnet-redhat kernel: r8169 0000:03:00.0 eth0: RTL8168evl/8111evl at 0xffffb03a40c79000, fc:aa:14:f4:e9:d0, XID 0c900800 IRQ 26 fev 15 13:09:27 botnet-redhat kernel: r8169 0000:03:00.0 eth0: jumbo features [frames: 9200 bytes, tx checksumming: ko] fev 15 13:09:27 botnet-redhat kernel: nvidia: loading out-of-tree module taints kernel. fev 15 13:09:27 botnet-redhat kernel: nvidia: module license 'NVIDIA' taints kernel. fev 15 13:09:27 botnet-redhat kernel: Disabling lock debugging due to kernel taint fev 15 13:09:27 botnet-redhat kernel: nvidia: module verification failed: signature and/or required key missing - tainting kernel fev 15 13:09:27 botnet-redhat kernel: nvidia-nvlink: Nvlink Core is being initialized, major device number 245 fev 15 13:09:27 botnet-redhat kernel: nvidia 0000:01:00.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem fev 15 13:09:27 botnet-redhat kernel: NVRM: loading NVIDIA UNIX x86_64 Kernel Module 390.25 Wed Jan 24 20:02:43 PST 2018 (using threaded interrupts) fev 15 13:09:27 botnet-redhat kernel: r8169 0000:03:00.0 enp3s0: renamed from eth0 fev 15 13:09:27 botnet-redhat kernel: scsi host0: ahci fev 15 13:09:27 botnet-redhat kernel: scsi host1: ahci fev 15 13:09:27 botnet-redhat kernel: scsi host2: ahci fev 15 13:09:27 botnet-redhat kernel: scsi host3: ahci fev 15 13:09:27 botnet-redhat kernel: scsi host4: ahci fev 15 13:09:27 botnet-redhat kernel: scsi host5: ahci fev 15 13:09:27 botnet-redhat kernel: ata1: SATA max UDMA/133 abar m2048@0xf7212000 port 0xf7212100 irq 27 fev 15 13:09:27 botnet-redhat kernel: ata2: SATA max UDMA/133 abar m2048@0xf7212000 port 0xf7212180 irq 27 fev 15 13:09:27 botnet-redhat kernel: ata3: DUMMY fev 15 13:09:27 botnet-redhat kernel: ata4: DUMMY fev 15 13:09:27 botnet-redhat kernel: ata5: DUMMY fev 15 13:09:27 botnet-redhat kernel: ata6: SATA max UDMA/133 abar m2048@0xf7212000 port 0xf7212380 irq 27 fev 15 13:09:27 botnet-redhat kernel: nvidia-modeset: Loading NVIDIA Kernel Mode Setting Driver for UNIX platforms 390.25 Wed Jan 24 19:29:37 PST 2018 fev 15 13:09:27 botnet-redhat kernel: [drm] [nvidia-drm] [GPU ID 0x00000100] Loading driver fev 15 13:09:27 botnet-redhat kernel: [drm] Initialized nvidia-drm 0.0.0 20160202 for 0000:01:00.0 on minor 0 fev 15 13:09:27 botnet-redhat kernel: usb 1-1: new high-speed USB device number 2 using ehci-pci fev 15 13:09:27 botnet-redhat kernel: usb 2-1: new high-speed USB device number 2 using ehci-pci fev 15 13:09:27 botnet-redhat kernel: usb 3-2: new high-speed USB device number 2 using xhci_hcd fev 15 13:09:27 botnet-redhat kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) fev 15 13:09:27 botnet-redhat kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) fev 15 13:09:27 botnet-redhat kernel: ata6: SATA link up 3.0 Gbps (SStatus 123 SControl 300) fev 15 13:09:27 botnet-redhat kernel: ata2.00: ATA-10: INTEL SSDSC2KW120H6, LSF036C, max UDMA/133 fev 15 13:09:27 botnet-redhat kernel: ata2.00: 234441648 sectors, multi 16: LBA48 NCQ (depth 31/32), AA fev 15 13:09:27 botnet-redhat kernel: ata1.00: ATA-8: Hitachi HDS721050DLE630, MS1OA650, max UDMA/133 fev 15 13:09:27 botnet-redhat kernel: ata1.00: 976773168 sectors, multi 16: LBA48 NCQ (depth 31/32), AA fev 15 13:09:27 botnet-redhat kernel: ata2.00: configured for UDMA/133 fev 15 13:09:27 botnet-redhat kernel: ata1.00: configured for UDMA/133 fev 15 13:09:27 botnet-redhat kernel: scsi 0:0:0:0: Direct-Access ATA Hitachi HDS72105 A650 PQ: 0 ANSI: 5 fev 15 13:09:27 botnet-redhat kernel: ata6.00: ACPI cmd ef/10:06:00:00:00:00 (SET FEATURES) succeeded fev 15 13:09:27 botnet-redhat kernel: ata6.00: ACPI cmd f5/00:00:00:00:00:00 (SECURITY FREEZE LOCK) filtered out fev 15 13:09:27 botnet-redhat kernel: ata6.00: ACPI cmd b1/c1:00:00:00:00:00 (DEVICE CONFIGURATION OVERLAY) filtered out fev 15 13:09:27 botnet-redhat kernel: ata6.00: ATA-9: SanDisk SDSSDA480G, Z32080RL, max UDMA/133 fev 15 13:09:27 botnet-redhat kernel: ata6.00: 937703088 sectors, multi 1: LBA48 NCQ (depth 31/32), AA fev 15 13:09:27 botnet-redhat kernel: ata6.00: ACPI cmd ef/10:06:00:00:00:00 (SET FEATURES) succeeded fev 15 13:09:27 botnet-redhat kernel: ata6.00: ACPI cmd f5/00:00:00:00:00:00 (SECURITY FREEZE LOCK) filtered out fev 15 13:09:27 botnet-redhat kernel: ata6.00: ACPI cmd b1/c1:00:00:00:00:00 (DEVICE CONFIGURATION OVERLAY) filtered out fev 15 13:09:27 botnet-redhat kernel: ata6.00: configured for UDMA/133 fev 15 13:09:27 botnet-redhat kernel: sd 0:0:0:0: [sda] 976773168 512-byte logical blocks: (500 GB/466 GiB) fev 15 13:09:27 botnet-redhat kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks fev 15 13:09:27 botnet-redhat kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0 fev 15 13:09:27 botnet-redhat kernel: sd 0:0:0:0: [sda] Write Protect is off fev 15 13:09:27 botnet-redhat kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 fev 15 13:09:27 botnet-redhat kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA fev 15 13:09:27 botnet-redhat kernel: scsi 1:0:0:0: Direct-Access ATA INTEL SSDSC2KW12 036C PQ: 0 ANSI: 5 fev 15 13:09:27 botnet-redhat kernel: usb 1-1: New USB device found, idVendor=8087, idProduct=8008 fev 15 13:09:27 botnet-redhat kernel: usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 fev 15 13:09:27 botnet-redhat kernel: hub 1-1:1.0: USB hub found fev 15 13:09:27 botnet-redhat kernel: hub 1-1:1.0: 4 ports detected fev 15 13:09:27 botnet-redhat kernel: sda: sda1 fev 15 13:09:27 botnet-redhat kernel: sd 0:0:0:0: [sda] Attached SCSI disk fev 15 13:09:27 botnet-redhat kernel: usb 3-2: New USB device found, idVendor=0424, idProduct=2514 fev 15 13:09:27 botnet-redhat kernel: usb 3-2: New USB device strings: Mfr=0, Product=0, SerialNumber=0 fev 15 13:09:27 botnet-redhat kernel: hub 3-2:1.0: USB hub found fev 15 13:09:27 botnet-redhat kernel: hub 3-2:1.0: 4 ports detected fev 15 13:09:27 botnet-redhat kernel: usb 2-1: New USB device found, idVendor=8087, idProduct=8000 fev 15 13:09:27 botnet-redhat kernel: usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 fev 15 13:09:27 botnet-redhat kernel: hub 2-1:1.0: USB hub found fev 15 13:09:27 botnet-redhat kernel: hub 2-1:1.0: 6 ports detected fev 15 13:09:27 botnet-redhat kernel: sd 1:0:0:0: [sdb] 234441648 512-byte logical blocks: (120 GB/112 GiB) fev 15 13:09:27 botnet-redhat kernel: sd 1:0:0:0: [sdb] Write Protect is off fev 15 13:09:27 botnet-redhat kernel: sd 1:0:0:0: Attached scsi generic sg1 type 0 fev 15 13:09:27 botnet-redhat kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 fev 15 13:09:27 botnet-redhat kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA fev 15 13:09:27 botnet-redhat kernel: scsi 5:0:0:0: Direct-Access ATA SanDisk SDSSDA48 80RL PQ: 0 ANSI: 5 fev 15 13:09:27 botnet-redhat kernel: sdb: sdb1 sdb2 fev 15 13:09:27 botnet-redhat kernel: sd 1:0:0:0: [sdb] Attached SCSI disk fev 15 13:09:27 botnet-redhat kernel: sd 5:0:0:0: [sdc] 937703088 512-byte logical blocks: (480 GB/447 GiB) fev 15 13:09:27 botnet-redhat kernel: sd 5:0:0:0: [sdc] Write Protect is off fev 15 13:09:27 botnet-redhat kernel: sd 5:0:0:0: [sdc] Mode Sense: 00 3a 00 00 fev 15 13:09:27 botnet-redhat kernel: sd 5:0:0:0: [sdc] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA fev 15 13:09:27 botnet-redhat kernel: sd 5:0:0:0: Attached scsi generic sg2 type 0 fev 15 13:09:27 botnet-redhat kernel: sdc: sdc1 sdc2 sdc3 sdc4 fev 15 13:09:27 botnet-redhat kernel: sd 5:0:0:0: [sdc] Attached SCSI disk fev 15 13:09:27 botnet-redhat kernel: usb 3-3: new low-speed USB device number 3 using xhci_hcd fev 15 13:09:27 botnet-redhat kernel: EXT4-fs (sdb2): mounted filesystem with ordered data mode. Opts: (null) fev 15 13:09:27 botnet-redhat kernel: usb 3-3: New USB device found, idVendor=04d9, idProduct=2020 fev 15 13:09:27 botnet-redhat kernel: usb 3-3: New USB device strings: Mfr=1, Product=2, SerialNumber=0 fev 15 13:09:27 botnet-redhat kernel: usb 3-3: Product: USB Keyboard fev 15 13:09:27 botnet-redhat kernel: usb 3-3: Manufacturer: CYKB09 fev 15 13:09:27 botnet-redhat kernel: usb 3-2.1: new full-speed USB device number 4 using xhci_hcd fev 15 13:09:27 botnet-redhat kernel: ip_tables: (C) 2000-2006 Netfilter Core Team fev 15 13:09:27 botnet-redhat kernel: EXT4-fs (sdb2): re-mounted. Opts: errors=remount-ro fev 15 13:09:27 botnet-redhat kernel: usb 3-2.1: New USB device found, idVendor=046d, idProduct=c085 fev 15 13:09:27 botnet-redhat kernel: usb 3-2.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 fev 15 13:09:27 botnet-redhat kernel: usb 3-2.1: Product: G Pro Gaming Mouse fev 15 13:09:27 botnet-redhat kernel: usb 3-2.1: Manufacturer: Logitech fev 15 13:09:27 botnet-redhat kernel: usb 3-2.1: SerialNumber: 0C8836693634 fev 15 13:09:27 botnet-redhat kernel: lp: driver loaded but no devices found fev 15 13:09:27 botnet-redhat kernel: ppdev: user-space parallel port driver fev 15 13:09:27 botnet-redhat kernel: tsc: Refined TSC clocksource calibration: 3491.913 MHz fev 15 13:09:27 botnet-redhat kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x3255790e5ea, max_idle_ns: 440795224414 ns fev 15 13:09:27 botnet-redhat kernel: Adding 2097148k swap on /swapfile. Priority:-1 extents:6 across:2260988k SSFS fev 15 13:09:27 botnet-redhat kernel: usb 3-4: new high-speed USB device number 5 using xhci_hcd fev 15 13:09:27 botnet-redhat kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer fev 15 13:09:27 botnet-redhat kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules fev 15 13:09:27 botnet-redhat kernel: RAPL PMU: hw unit of domain package 2^-14 Joules fev 15 13:09:27 botnet-redhat kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules fev 15 13:09:27 botnet-redhat kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules fev 15 13:09:27 botnet-redhat kernel: ACPI Warning: SystemIO range 0x0000000000001828-0x000000000000182F conflicts with OpRegion 0x0000000000001800-0x000000000000187F (\PMIO) (20170531/utaddress-247) fev 15 13:09:27 botnet-redhat kernel: ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver fev 15 13:09:27 botnet-redhat kernel: ACPI Warning: SystemIO range 0x0000000000001C40-0x0000000000001C4F conflicts with OpRegion 0x0000000000001C00-0x0000000000001FFF (\GPR) (20170531/utaddress-247) fev 15 13:09:27 botnet-redhat kernel: ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver fev 15 13:09:27 botnet-redhat kernel: ACPI Warning: SystemIO range 0x0000000000001C30-0x0000000000001C3F conflicts with OpRegion 0x0000000000001C00-0x0000000000001C3F (\GPRL) (20170531/utaddress-247) fev 15 13:09:27 botnet-redhat kernel: ACPI Warning: SystemIO range 0x0000000000001C30-0x0000000000001C3F conflicts with OpRegion 0x0000000000001C00-0x0000000000001FFF (\GPR) (20170531/utaddress-247) fev 15 13:09:27 botnet-redhat kernel: ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver fev 15 13:09:27 botnet-redhat kernel: ACPI Warning: SystemIO range 0x0000000000001C00-0x0000000000001C2F conflicts with OpRegion 0x0000000000001C00-0x0000000000001C3F (\GPRL) (20170531/utaddress-247) fev 15 13:09:27 botnet-redhat kernel: ACPI Warning: SystemIO range 0x0000000000001C00-0x0000000000001C2F conflicts with OpRegion 0x0000000000001C00-0x0000000000001FFF (\GPR) (20170531/utaddress-247) fev 15 13:09:27 botnet-redhat kernel: ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver fev 15 13:09:27 botnet-redhat kernel: lpc_ich: Resource conflict(s) found affecting gpio_ich fev 15 13:09:27 botnet-redhat kernel: EDAC ie31200: No ECC support fev 15 13:09:27 botnet-redhat kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 fev 15 13:09:27 botnet-redhat kernel: AVX2 version of gcm_enc/dec engaged. fev 15 13:09:27 botnet-redhat kernel: AES CTR mode by8 optimization enabled fev 15 13:09:27 botnet-redhat kernel: usb 3-4: New USB device found, idVendor=05e3, idProduct=0608 fev 15 13:09:27 botnet-redhat kernel: usb 3-4: New USB device strings: Mfr=0, Product=1, SerialNumber=0 fev 15 13:09:27 botnet-redhat kernel: usb 3-4: Product: USB2.0 Hub fev 15 13:09:27 botnet-redhat kernel: hub 3-4:1.0: USB hub found fev 15 13:09:27 botnet-redhat kernel: hub 3-4:1.0: 4 ports detected fev 15 13:09:27 botnet-redhat kernel: nvidia-uvm: Loaded the UVM driver in 8 mode, major device number 242 fev 15 13:09:27 botnet-redhat kernel: intel_rapl: Found RAPL domain package fev 15 13:09:27 botnet-redhat kernel: intel_rapl: Found RAPL domain core fev 15 13:09:27 botnet-redhat kernel: intel_rapl: Found RAPL domain dram fev 15 13:09:27 botnet-redhat kernel: snd_oxygen 0000:05:01.0: enabling device (0000 -> 0001) fev 15 13:09:27 botnet-redhat kernel: snd_hda_intel 0000:01:00.1: enabling device (0000 -> 0002) fev 15 13:09:27 botnet-redhat kernel: snd_hda_intel 0000:01:00.1: Disabling MSI fev 15 13:09:27 botnet-redhat kernel: snd_hda_intel 0000:01:00.1: Handle vga_switcheroo audio client fev 15 13:09:27 botnet-redhat kernel: usb 3-8: new full-speed USB device number 6 using xhci_hcd fev 15 13:09:27 botnet-redhat kernel: usb 3-8: New USB device found, idVendor=1b1c, idProduct=0c08 fev 15 13:09:27 botnet-redhat kernel: usb 3-8: New USB device strings: Mfr=1, Product=2, SerialNumber=3 fev 15 13:09:27 botnet-redhat kernel: usb 3-8: Product: H80i v2 fev 15 13:09:27 botnet-redhat kernel: usb 3-8: Manufacturer: Corsair Components, Inc. fev 15 13:09:28 botnet-redhat kernel: usb 3-8: SerialNumber: 7289_2.0 fev 15 13:09:28 botnet-redhat kernel: hidraw: raw HID events driver (C) Jiri Kosina fev 15 13:09:28 botnet-redhat kernel: usbcore: registered new interface driver usbhid fev 15 13:09:28 botnet-redhat kernel: usbhid: USB HID core driver fev 15 13:09:28 botnet-redhat kernel: input: CYKB09 USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-3/3-3:1.0/0003:04D9:2020.0001/input/input2 fev 15 13:09:28 botnet-redhat kernel: hid-generic 0003:04D9:2020.0001: input,hidraw0: USB HID v1.10 Keyboard [CYKB09 USB Keyboard] on usb-0000:00:14.0-3/input0 fev 15 13:09:28 botnet-redhat kernel: input: CYKB09 USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-3/3-3:1.1/0003:04D9:2020.0002/input/input3 fev 15 13:09:28 botnet-redhat kernel: audit: type=1400 audit(1518710968.401:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-oopslash" pid=659 comm="apparmor_parser" fev 15 13:09:28 botnet-redhat kernel: audit: type=1400 audit(1518710968.401:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=658 comm="apparmor_parser" fev 15 13:09:28 botnet-redhat kernel: audit: type=1400 audit(1518710968.401:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=658 comm="apparmor_parser" fev 15 13:09:28 botnet-redhat kernel: audit: type=1400 audit(1518710968.401:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=658 comm="apparmor_parser" fev 15 13:09:28 botnet-redhat kernel: audit: type=1400 audit(1518710968.401:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-xpdfimport" pid=662 comm="apparmor_parser" fev 15 13:09:28 botnet-redhat kernel: audit: type=1400 audit(1518710968.402:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="libreoffice-senddoc" pid=660 comm="apparmor_parser" fev 15 13:09:28 botnet-redhat kernel: audit: type=1400 audit(1518710968.402:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/sbin/dhclient" pid=655 comm="apparmor_parser" fev 15 13:09:28 botnet-redhat kernel: audit: type=1400 audit(1518710968.402:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=655 comm="apparmor_parser" fev 15 13:09:28 botnet-redhat kernel: audit: type=1400 audit(1518710968.402:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=655 comm="apparmor_parser" fev 15 13:09:28 botnet-redhat kernel: hid-generic 0003:04D9:2020.0002: input,hidraw1: USB HID v1.10 Device [CYKB09 USB Keyboard] on usb-0000:00:14.0-3/input1 fev 15 13:09:28 botnet-redhat kernel: input: Logitech G Pro Gaming Mouse as /devices/pci0000:00/0000:00:14.0/usb3/3-2/3-2.1/3-2.1:1.0/0003:046D:C085.0003/input/input4 fev 15 13:09:28 botnet-redhat kernel: hid-generic 0003:046D:C085.0003: input,hidraw2: USB HID v1.11 Mouse [Logitech G Pro Gaming Mouse] on usb-0000:00:14.0-2.1/input0 fev 15 13:09:28 botnet-redhat kernel: input: Logitech G Pro Gaming Mouse as /devices/pci0000:00/0000:00:14.0/usb3/3-2/3-2.1/3-2.1:1.1/0003:046D:C085.0004/input/input5 fev 15 13:09:28 botnet-redhat kernel: clocksource: Switched to clocksource tsc fev 15 13:09:28 botnet-redhat kernel: hid-generic 0003:046D:C085.0004: input,hiddev0,hidraw3: USB HID v1.11 Keyboard [Logitech G Pro Gaming Mouse] on usb-0000:00:14.0-2.1/input1 fev 15 13:09:28 botnet-redhat wpa_supplicant[750]: Successfully initialized wpa_supplicant fev 15 13:09:28 botnet-redhat kernel: input: HDA NVidia HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input6 fev 15 13:09:28 botnet-redhat kernel: input: HDA NVidia HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input7 fev 15 13:09:28 botnet-redhat kernel: input: HDA NVidia HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input8 fev 15 13:09:28 botnet-redhat kernel: input: HDA NVidia HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:01.0/0000:01:00.1/sound/card1/input9 fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6140] NetworkManager (version 1.8.4) is starting... (for the first time) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6140] Read config: /etc/NetworkManager/NetworkManager.conf (lib: 10-dns-resolved.conf, 20-connectivity-ubuntu.conf, no-mac-addr-change.conf) (run: 10-globally-managed-devices.conf) (etc: default-wifi-powersave-on.conf) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6169] manager[0x55cb8c76d040]: monitoring kernel firmware directory '/lib/firmware'. fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6169] monitoring ifupdown state file '/run/network/ifstate'. fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6175] policy: hostname management mode: default fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6177] dns-mgr[0x55cb8c77a950]: init: dns=systemd-resolved, rc-manager=symlink, plugin=systemd-resolved fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6292] init! fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6293] interface-parser: parsing file /etc/network/interfaces fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6293] interface-parser: finished parsing file /etc/network/interfaces fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6293] management mode: unmanaged fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6295] devices added (path: /sys/devices/pci0000:00/0000:00:1c.2/0000:03:00.0/net/enp3s0, iface: enp3s0) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6295] device added (path: /sys/devices/pci0000:00/0000:00:1c.2/0000:03:00.0/net/enp3s0, iface: enp3s0): no ifupdown configuration found. fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6295] devices added (path: /sys/devices/virtual/net/lo, iface: lo) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6295] device added (path: /sys/devices/virtual/net/lo, iface: lo): no ifupdown configuration found. fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6295] end _init. fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6295] settings: loaded plugin ifupdown: (C) 2008 Canonical Ltd. To report bugs please use the NetworkManager mailing list. (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-settings-plugin-ifupdown.so) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6296] settings: loaded plugin keyfile: (c) 2007 - 2016 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6296] (-1938135168) ... get_connections. fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6296] (-1938135168) ... get_connections (managed=false): return empty list. fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.6299] get unmanaged devices count: 0 fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8014] settings: hostname: using hostnamed fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8014] settings: hostname changed from (none) to "botnet-redhat" fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8016] dhcp-init: Using DHCP client 'dhclient' fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8016] manager: rfkill: WiFi enabled by radio killswitch; enabled by state file fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8016] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8016] manager: Networking is enabled by state file fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8016] Loaded device plugin: NMBondDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8016] Loaded device plugin: NMBridgeDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8016] Loaded device plugin: NMDummyDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8016] Loaded device plugin: NMEthernetDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8016] Loaded device plugin: NMInfinibandDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8016] Loaded device plugin: NMIPTunnelDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8017] Loaded device plugin: NMMacsecDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8017] Loaded device plugin: NMMacvlanDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8017] Loaded device plugin: NMTunDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8017] Loaded device plugin: NMVethDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8017] Loaded device plugin: NMVlanDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8017] Loaded device plugin: NMVxlanDeviceFactory (internal) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8027] Loaded device plugin: NMWwanFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-wwan.so) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8040] Loaded device plugin: NMWifiFactory (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-wifi.so) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8053] Loaded device plugin: NMBluezManager (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-bluetooth.so) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8059] Loaded device plugin: NMAtmManager (/usr/lib/x86_64-linux-gnu/NetworkManager/libnm-device-plugin-adsl.so) fev 15 13:09:28 botnet-redhat NetworkManager[737]: ((src/devices/nm-device.c:1452)): assertion '' failed fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8065] device (lo): link connected fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8069] manager: (lo): new Generic device (/org/freedesktop/NetworkManager/Devices/1) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8077] manager: (enp3s0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8085] keyfile: add connection in-memory (aaf4d4fc-b531-36f9-99d3-70843b9fac03,"Conexão cabeada 1") fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8088] settings: (enp3s0): created default wired connection 'Conexão cabeada 1' fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.8093] device (enp3s0): state change: unmanaged -> unavailable (reason 'managed', internal state 'external') fev 15 13:09:28 botnet-redhat kernel: IPv6: ADDRCONF(NETDEV_UP): enp3s0: link is not ready fev 15 13:09:28 botnet-redhat kernel: r8169 0000:03:00.0 enp3s0: link down fev 15 13:09:28 botnet-redhat kernel: r8169 0000:03:00.0 enp3s0: link down fev 15 13:09:28 botnet-redhat kernel: IPv6: ADDRCONF(NETDEV_UP): enp3s0: link is not ready fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.9436] urfkill disappeared from the bus fev 15 13:09:28 botnet-redhat NetworkManager[737]: [1518710968.9468] ModemManager available in the bus fev 15 13:09:29 botnet-redhat kernel: nvidia-modeset: Allocated GPU:0 (GPU-3920a870-ac17-21ee-c7ba-7bb6459a3c38) @ PCI:0000:01:00.0 fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.8838] device (enp3s0): link connected fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.8845] device (enp3s0): state change: unavailable -> disconnected (reason 'carrier-changed', internal state 'managed') fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.8849] policy: auto-activating connection 'Conexão cabeada 1' fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.8857] device (enp3s0): Activation: starting connection 'Conexão cabeada 1' (aaf4d4fc-b531-36f9-99d3-70843b9fac03) fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.8859] device (enp3s0): state change: disconnected -> prepare (reason 'none', internal state 'managed') fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.8860] manager: NetworkManager state is now CONNECTING fev 15 13:09:30 botnet-redhat kernel: r8169 0000:03:00.0 enp3s0: link up fev 15 13:09:30 botnet-redhat kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp3s0: link becomes ready fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.8863] device (enp3s0): state change: prepare -> config (reason 'none', internal state 'managed') fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.8865] device (enp3s0): state change: config -> ip-config (reason 'none', internal state 'managed') fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.8876] dhcp4 (enp3s0): activation: beginning transaction (timeout in 45 seconds) fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.8910] dhcp4 (enp3s0): dhclient started with pid 986 fev 15 13:09:30 botnet-redhat dhclient[986]: DHCPREQUEST of 192.168.25.102 on enp3s0 to 255.255.255.255 port 67 (xid=0x3225554e) fev 15 13:09:30 botnet-redhat dhclient[986]: DHCPACK of 192.168.25.102 from 192.168.25.1 fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9436] dhcp4 (enp3s0): address 192.168.25.102 fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9436] dhcp4 (enp3s0): plen 24 (255.255.255.0) fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9436] dhcp4 (enp3s0): gateway 192.168.25.1 fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9436] dhcp4 (enp3s0): lease time 7200 fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9436] dhcp4 (enp3s0): hostname 'botnet-redhat' fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9436] dhcp4 (enp3s0): nameserver '192.168.25.1' fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9436] dhcp4 (enp3s0): domain name 'lan' fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9436] dhcp4 (enp3s0): state changed unknown -> bound fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9444] device (enp3s0): state change: ip-config -> ip-check (reason 'none', internal state 'managed') fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9447] device (enp3s0): state change: ip-check -> secondaries (reason 'none', internal state 'managed') fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9449] device (enp3s0): state change: secondaries -> activated (reason 'none', internal state 'managed') fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9450] manager: NetworkManager state is now CONNECTED_LOCAL fev 15 13:09:30 botnet-redhat dhclient[986]: bound to 192.168.25.102 -- renewal in 3267 seconds. fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9470] manager: NetworkManager state is now CONNECTED_SITE fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9471] policy: set 'Conexão cabeada 1' (enp3s0) as default for IPv4 routing and DNS fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9473] device (enp3s0): Activation: successful, device activated. fev 15 13:09:30 botnet-redhat NetworkManager[737]: [1518710970.9477] manager: startup complete fev 15 13:09:32 botnet-redhat NetworkManager[737]: [1518710972.2951] manager: NetworkManager state is now CONNECTED_GLOBAL fev 15 13:09:32 botnet-redhat NetworkManager[737]: [1518710972.7947] dhcp6 (enp3s0): activation: beginning transaction (timeout in 45 seconds) fev 15 13:09:32 botnet-redhat NetworkManager[737]: [1518710972.7947] dhcp6 (enp3s0): hostname is not a FQDN, it will be ignored fev 15 13:09:32 botnet-redhat NetworkManager[737]: [1518710972.7980] dhcp6 (enp3s0): dhclient started with pid 1170 fev 15 13:09:33 botnet-redhat dhclient[1170]: XMT: Confirm on enp3s0, interval 950ms. fev 15 13:09:33 botnet-redhat dhclient[1170]: RCV: Reply message on enp3s0 from fe80::92f6:52ff:fe55:239. fev 15 13:09:33 botnet-redhat dhclient[1170]: message status code NotOnLink. fev 15 13:09:34 botnet-redhat dhclient[1170]: XMT: Solicit on enp3s0, interval 1030ms. fev 15 13:09:34 botnet-redhat dhclient[1170]: RCV: Advertise message on enp3s0 from fe80::92f6:52ff:fe55:239. fev 15 13:09:35 botnet-redhat dhclient[1170]: XMT: Request on enp3s0, interval 1010ms. fev 15 13:09:35 botnet-redhat dhclient[1170]: RCV: Reply message on enp3s0 from fe80::92f6:52ff:fe55:239. fev 15 13:09:35 botnet-redhat NetworkManager[737]: [1518710975.3193] dhcp6 (enp3s0): valid_lft 4294967295 fev 15 13:09:35 botnet-redhat NetworkManager[737]: [1518710975.3193] dhcp6 (enp3s0): preferred_lft 4294967295 fev 15 13:09:35 botnet-redhat NetworkManager[737]: [1518710975.3193] dhcp6 (enp3s0): address fd67:c07b:f515::9ce fev 15 13:09:35 botnet-redhat NetworkManager[737]: [1518710975.3193] dhcp6 (enp3s0): nameserver 'fd67:c07b:f515::1' fev 15 13:09:35 botnet-redhat NetworkManager[737]: [1518710975.3193] dhcp6 (enp3s0): state changed unknown -> bound, event ID="14:f4:e9:d0|1518710975" fev 15 13:09:38 botnet-redhat NetworkManager[737]: [1518710978.7560] manager: rfkill: WiFi hardware radio set enabled fev 15 13:09:38 botnet-redhat NetworkManager[737]: [1518710978.7560] manager: rfkill: WWAN hardware radio set enabled fev 15 13:09:40 botnet-redhat kernel: rfkill: input handler disabled fev 15 13:09:45 botnet-redhat kernel: random: crng init done fev 15 14:03:57 botnet-redhat dhclient[986]: DHCPREQUEST of 192.168.25.102 on enp3s0 to 192.168.25.1 port 67 (xid=0x3225554e) fev 15 14:03:57 botnet-redhat dhclient[986]: DHCPACK of 192.168.25.102 from 192.168.25.1 fev 15 14:03:57 botnet-redhat NetworkManager[737]: [1518714237.6745] dhcp4 (enp3s0): address 192.168.25.102 fev 15 14:03:57 botnet-redhat NetworkManager[737]: [1518714237.6745] dhcp4 (enp3s0): plen 24 (255.255.255.0) fev 15 14:03:57 botnet-redhat NetworkManager[737]: [1518714237.6745] dhcp4 (enp3s0): gateway 192.168.25.1 fev 15 14:03:57 botnet-redhat NetworkManager[737]: [1518714237.6745] dhcp4 (enp3s0): lease time 7200 fev 15 14:03:57 botnet-redhat NetworkManager[737]: [1518714237.6745] dhcp4 (enp3s0): hostname 'botnet-redhat' fev 15 14:03:57 botnet-redhat NetworkManager[737]: [1518714237.6745] dhcp4 (enp3s0): nameserver '192.168.25.1' fev 15 14:03:57 botnet-redhat NetworkManager[737]: [1518714237.6746] dhcp4 (enp3s0): domain name 'lan' fev 15 14:03:57 botnet-redhat NetworkManager[737]: [1518714237.6746] dhcp4 (enp3s0): state changed bound -> bound fev 15 14:03:57 botnet-redhat dhclient[986]: bound to 192.168.25.102 -- renewal in 2789 seconds. fev 15 14:09:35 botnet-redhat dhclient[1170]: PRC: Renewing lease on enp3s0. fev 15 14:09:35 botnet-redhat dhclient[1170]: XMT: Renew on enp3s0, interval 9160ms. fev 15 14:09:35 botnet-redhat dhclient[1170]: RCV: Reply message on enp3s0 from fe80::92f6:52ff:fe55:239. fev 15 14:09:35 botnet-redhat NetworkManager[737]: [1518714575.4292] dhcp6 (enp3s0): valid_lft 4294967295 fev 15 14:09:35 botnet-redhat NetworkManager[737]: [1518714575.4293] dhcp6 (enp3s0): preferred_lft 4294967295 fev 15 14:09:35 botnet-redhat NetworkManager[737]: [1518714575.4293] dhcp6 (enp3s0): address fd67:c07b:f515::9ce fev 15 14:09:35 botnet-redhat NetworkManager[737]: [1518714575.4293] dhcp6 (enp3s0): nameserver 'fd67:c07b:f515::1' fev 15 14:09:35 botnet-redhat NetworkManager[737]: [1518714575.4293] dhcp6 (enp3s0): state changed bound -> bound, event ID="14:f4:e9:d0|1518714575" fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:dacfc067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9888b9caf0 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 6 PID: 15015 Comm: make Tainted: P OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfa5af50 RDI: 0000562fcf070210 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf9b0a70 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa5af50 R14: 0000562fcf070210 R15: 0000562fcfa5af50 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:dad1f067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98404ce690 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 1 PID: 15019 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfa5d380 RDI: 0000562fcf070210 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa5d380 R14: 0000562fcf070210 R15: 0000562fcfa5d380 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:31c2b067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98b9054f50 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 6 PID: 15044 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfa5d360 RDI: 0000562fcefbae60 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa5d360 R14: 0000562fcefbae60 R15: 0000562fcfa5d360 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:daf96067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98404ce410 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 1 PID: 15054 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfa5dba0 RDI: 0000562fcefbae60 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa2cd60 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa5dba0 R14: 0000562fcefbae60 R15: 0000562fcfa5dba0 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d39c5067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b984c07f640 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 7 PID: 15070 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf6e94f0 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcf6e94f0 RSI: 0000562fcfa5dff0 RDI: 0000562fcf070210 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf6e94f0 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf6e94f0 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa5dff0 R14: 0000562fcf070210 R15: 0000562fcfa5dff0 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:daf11067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9908a72820 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 0 PID: 15075 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa5dc80 RDI: 0000562fcf070210 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa5dc80 R14: 0000562fcf070210 R15: 0000562fcfa5dc80 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:daf76067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9840495f00 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 2 PID: 15083 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfa5ec80 RDI: 0000562fcf070210 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf03fdf0 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa5ec80 R14: 0000562fcf070210 R15: 0000562fcfa5ec80 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d1053067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:3 mapcount:-254 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000003ffffff01 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9908a72960 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 7 PID: 15111 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfa5f0a0 RDI: 0000562fcefbae60 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa5f0a0 R14: 0000562fcefbae60 R15: 0000562fcfa5f0a0 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:188af3067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98404ce1e0 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 7 PID: 15110 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfa5f0e0 RDI: 0000562fcfa5c7b0 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa5f0e0 R14: 0000562fcfa5c7b0 R15: 0000562fcfa5f0e0 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:342c4067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b984c07f0a0 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 5 PID: 15116 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfa5f8e0 RDI: 0000562fcefbae60 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa2cd60 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa5f8e0 R14: 0000562fcefbae60 R15: 0000562fcfa5f8e0 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:daeab067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:3 mapcount:-254 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000003ffffff01 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98da42f730 mapping: (null) index:562fcf54b fev 15 14:21:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:38 botnet-redhat kernel: CPU: 4 PID: 15149 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:38 botnet-redhat kernel: Call Trace: fev 15 14:21:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:38 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa60120 RDI: 0000562fcefbae60 fev 15 14:21:38 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa29c60 fev 15 14:21:38 botnet-redhat kernel: R13: 0000562fcfa60120 R14: 0000562fcefbae60 R15: 0000562fcfa60120 fev 15 14:21:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:dacde067 fev 15 14:21:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98b9054d70 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 4 PID: 15148 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfa5f8e0 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa5f8e0 R14: 0000562fcefbae60 R15: 0000562fcfa5f8e0 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:196c50067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:3 mapcount:-254 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000003ffffff01 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b984e7c1640 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 2 PID: 15159 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfa60570 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf932ce0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa60570 R14: 0000562fcf070210 R15: 0000562fcfa60570 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d39d0067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b984e7c1fa0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 5 PID: 15162 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfa609a0 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf9b0a70 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa609a0 R14: 0000562fcf070210 R15: 0000562fcfa609a0 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d395f067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:3 mapcount:-254 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000003ffffff01 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b99091c5e10 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 1 PID: 15169 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf6e94f0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf6e94f0 RSI: 0000562fcfa61200 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf6e94f0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf6e94f0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa61200 R14: 0000562fcf070210 R15: 0000562fcfa61200 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d393e067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98b9054730 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 1 PID: 15170 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfa61630 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa61630 R14: 0000562fcf070210 R15: 0000562fcfa61630 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d1001067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98ba012a50 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 4 PID: 15179 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfa612d0 RDI: 0000562fcfa16a90 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa612d0 R14: 0000562fcfa16a90 R15: 0000562fcfa612d0 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:342fa067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9912883eb0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 0 PID: 15182 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfa61a50 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa2cd60 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa61a50 R14: 0000562fcefbae60 R15: 0000562fcfa61a50 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:34353067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b988889f280 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 7 PID: 15193 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfa62350 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa62350 R14: 0000562fcf070210 R15: 0000562fcfa62350 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:dacc2067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98da42f9b0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 7 PID: 15200 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfa62780 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf932ce0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa62780 R14: 0000562fcf070210 R15: 0000562fcfa62780 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:dacab067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b988889fdc0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 7 PID: 15204 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfa62fe0 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa2cd60 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa62fe0 R14: 0000562fcf070210 R15: 0000562fcfa62fe0 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:dad1b067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98a5a19f00 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 5 PID: 15206 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfa63400 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf03fdf0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa63400 R14: 0000562fcf070210 R15: 0000562fcfa63400 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:34382067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98da42f5f0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 2 PID: 15208 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa63830 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa63830 R14: 0000562fcf070210 R15: 0000562fcfa63830 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:daf4c067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:3 mapcount:-254 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000003ffffff01 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98a5a195f0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 5 PID: 15219 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfa63c40 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf9b0a70 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa63c40 R14: 0000562fcefbae60 R15: 0000562fcfa63c40 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d39dd067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98a5a191e0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 5 PID: 15217 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf6e94f0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf6e94f0 RSI: 0000562fcfa63c60 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf6e94f0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf6e94f0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa63c60 R14: 0000562fcf070210 R15: 0000562fcfa63c60 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:34212067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b986ac84b90 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 3 PID: 15235 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfa644c0 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa644c0 R14: 0000562fcf070210 R15: 0000562fcfa644c0 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:31c20067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b986ac84e60 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 4 PID: 15242 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa648f0 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa648f0 R14: 0000562fcf070210 R15: 0000562fcfa648f0 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:daefa067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b991300dfa0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 0 PID: 15307 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfa66d10 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf9b0a70 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa66d10 R14: 0000562fcefbae60 R15: 0000562fcfa66d10 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:31c46067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b988889f7d0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 7 PID: 15327 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfa67530 RDI: 0000562fcf85b680 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa67530 R14: 0000562fcf85b680 R15: 0000562fcfa67530 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d10f4067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:3 mapcount:-254 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000003ffffff01 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98b90543c0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 4 PID: 15332 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf6e94f0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf6e94f0 RSI: 0000562fcfa67a10 RDI: 0000562fcfa63090 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf6e94f0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf6e94f0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa67a10 R14: 0000562fcfa63090 R15: 0000562fcfa67a10 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d3994067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b986ac847d0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 4 PID: 15335 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa679a0 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa29c60 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa679a0 R14: 0000562fcefbae60 R15: 0000562fcfa679a0 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:34006067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b988889ff00 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 7 PID: 15356 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfa68220 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa68220 R14: 0000562fcf070210 R15: 0000562fcfa68220 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d1072067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:3 mapcount:-254 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000003ffffff01 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98a5a19690 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 7 PID: 15391 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfa68640 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf9b0a70 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa68640 R14: 0000562fcefbae60 R15: 0000562fcfa68640 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d394e067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98a5a19c80 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 6 PID: 15383 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf6e94f0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf6e94f0 RSI: 0000562fcfa67eb0 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf6e94f0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf6e94f0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa67eb0 R14: 0000562fcf070210 R15: 0000562fcfa67eb0 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:340e7067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98404ce190 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 7 PID: 15455 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfa68f20 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf03fdf0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa68f20 R14: 0000562fcf070210 R15: 0000562fcfa68f20 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:3430b067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9840495910 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 3 PID: 15461 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa69380 RDI: 0000562fcfa638f0 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa29c60 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa69380 R14: 0000562fcfa638f0 R15: 0000562fcfa69380 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:16acb3067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b990aa9baf0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 5 PID: 15489 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa69400 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa29c60 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa69400 R14: 0000562fcefbae60 R15: 0000562fcfa69400 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d103c067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98b9054d70 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 6 PID: 15504 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfa69b80 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf9b0a70 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa69b80 R14: 0000562fcefbae60 R15: 0000562fcfa69b80 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:19024c067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98404957d0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 2 PID: 15511 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfa6a450 RDI: 0000562fcfa61ba0 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa6a450 R14: 0000562fcfa61ba0 R15: 0000562fcfa6a450 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:daefc067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b989725ce60 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 5 PID: 15521 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfa6a400 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa2cd60 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa6a400 R14: 0000562fcefbae60 R15: 0000562fcfa6a400 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:14059e067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b990bdc95a0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 1 PID: 15524 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa6ac50 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa29c60 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa6ac50 R14: 0000562fcefbae60 R15: 0000562fcfa6ac50 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:1a5a17067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b984c0cae60 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 6 PID: 15554 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfa6b090 RDI: 0000562fcf070210 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf9b0a70 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa6b090 R14: 0000562fcf070210 R15: 0000562fcfa6b090 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:196c0c067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b989725c500 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 6 PID: 15567 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfa6b490 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa2cd60 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa6b490 R14: 0000562fcefbae60 R15: 0000562fcfa6b490 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:1405a2067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9840495eb0 mapping: (null) index:562fcf54b fev 15 14:21:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:39 botnet-redhat kernel: CPU: 2 PID: 15580 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:39 botnet-redhat kernel: Call Trace: fev 15 14:21:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:21:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfa6b8b0 RDI: 0000562fcefbae60 fev 15 14:21:39 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:21:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:21:39 botnet-redhat kernel: R13: 0000562fcfa6b8b0 R14: 0000562fcefbae60 R15: 0000562fcfa6b8b0 fev 15 14:21:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:dae97067 fev 15 14:21:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b990832e640 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 6 PID: 15594 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa6bd00 RDI: 0000562fcf070210 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa6bd00 R14: 0000562fcf070210 R15: 0000562fcfa6bd00 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:1ba3fc067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b990bdc9640 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 1 PID: 15602 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf6e94f0 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcf6e94f0 RSI: 0000562fcfa6c550 RDI: 0000562fcefbae60 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf6e94f0 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf6e94f0 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa6c550 R14: 0000562fcefbae60 R15: 0000562fcfa6c550 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:dace8067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9840495500 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 6 PID: 15620 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfa6c540 RDI: 0000562fcefbae60 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa6c540 R14: 0000562fcefbae60 R15: 0000562fcfa6c540 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:1a7ac0067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9840495460 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 2 PID: 15627 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa6cdb0 RDI: 0000562fcefbae60 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa29c60 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa6cdb0 R14: 0000562fcefbae60 R15: 0000562fcfa6cdb0 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:172015067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98ba0124b0 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 3 PID: 15638 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfa6cda0 RDI: 0000562fcefbae60 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf9b0a70 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa6cda0 R14: 0000562fcefbae60 R15: 0000562fcfa6cda0 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d107f067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9888a38e10 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 2 PID: 15658 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfa6d620 RDI: 0000562fcf070210 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa2cd60 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa6d620 R14: 0000562fcf070210 R15: 0000562fcfa6d620 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d10ec067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b990bdc9af0 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 1 PID: 15671 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfa6da50 RDI: 0000562fcf070210 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf9b0a70 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa6da50 R14: 0000562fcf070210 R15: 0000562fcfa6da50 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:140a49067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98b9054910 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 3 PID: 15684 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfa6e330 RDI: 0000562fcfa6b560 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa6e330 R14: 0000562fcfa6b560 R15: 0000562fcfa6e330 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:daeb8067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9888a38320 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 2 PID: 15698 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa702d0 RDI: 0000562fcefbae60 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa29c60 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa702d0 R14: 0000562fcefbae60 R15: 0000562fcfa702d0 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:196fae067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98404cef00 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 7 PID: 15706 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfa70b20 RDI: 0000562fcefbae60 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa70b20 R14: 0000562fcefbae60 R15: 0000562fcfa70b20 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d3950067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98889da370 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 0 PID: 15721 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf6e94f0 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcf6e94f0 RSI: 0000562fcfa70f60 RDI: 0000562fcf070210 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf6e94f0 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf6e94f0 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa70f60 R14: 0000562fcf070210 R15: 0000562fcfa70f60 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d10b5067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98b9054000 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 6 PID: 15737 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfa71390 RDI: 0000562fcf070210 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf932ce0 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa71390 R14: 0000562fcf070210 R15: 0000562fcfa71390 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:1902f7067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b990aa9b4b0 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 1 PID: 15745 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfa717f0 RDI: 0000562fcfa6ce80 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf9b0a70 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa717f0 R14: 0000562fcfa6ce80 R15: 0000562fcfa717f0 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d110c067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b986ac84fa0 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 4 PID: 15764 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfa71c00 RDI: 0000562fcf070210 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa71c00 R14: 0000562fcf070210 R15: 0000562fcfa71c00 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:dafbe067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9840495e10 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 0 PID: 15776 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfa72030 RDI: 0000562fcf070210 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa72030 R14: 0000562fcf070210 R15: 0000562fcfa72030 fev 15 14:21:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:18f8db067 fev 15 14:21:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:21:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:21:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:21:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:21:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:21:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9840495a00 mapping: (null) index:562fcf54b fev 15 14:21:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:21:40 botnet-redhat kernel: CPU: 2 PID: 15777 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:21:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:21:40 botnet-redhat kernel: Call Trace: fev 15 14:21:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:21:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:21:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:21:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:21:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:21:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:21:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:21:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:21:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:21:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:21:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:21:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:21:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:21:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:21:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:21:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:21:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:21:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b3e8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:21:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:21:40 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfa72890 RDI: 0000562fcf070210 fev 15 14:21:40 botnet-redhat kernel: RBP: 00007fff0cd9b490 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:21:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa2cd60 fev 15 14:21:40 botnet-redhat kernel: R13: 0000562fcfa72890 R14: 0000562fcf070210 R15: 0000562fcfa72890 fev 15 14:22:08 botnet-redhat kernel: BUG: Bad page state in process cc1 pfn:b4867 fev 15 14:22:08 botnet-redhat kernel: page:ffffdda9c2d219c0 count:0 mapcount:-256 mapping: (null) index:0x1 fev 15 14:22:08 botnet-redhat kernel: flags: 0xfffffc0000000() fev 15 14:22:08 botnet-redhat kernel: raw: 000fffffc0000000 0000000000000000 0000000000000001 00000000fffffeff fev 15 14:22:08 botnet-redhat kernel: raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000 fev 15 14:22:08 botnet-redhat kernel: page dumped because: nonzero mapcount fev 15 14:22:08 botnet-redhat kernel: Modules linked in: joydev input_leds nls_iso8859_1 hid_generic usbhid hid snd_hda_codec_hdmi snd_hda_intel snd_oxygen snd_hda_codec snd_oxygen_lib snd_mpu401_uart snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi intel_rapl x86_pkg_temp_thermal snd_seq intel_powerclamp coretemp kvm_intel snd_seq_device snd_timer nvidia_uvm(POE) kvm irqbypass crct10dif_pclmul snd crc32_pclmul ghash_clmulni_intel pcbc soundcore aesni_intel aes_x86_64 crypto_simd glue_helper cryptd mei_me shpchp mei intel_cstate ie31200_edac lpc_ich intel_rapl_perf tpm_infineon mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 nvidia_drm(POE) nvidia_modeset(POE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm nvidia(POE) ahci r8169 libahci mii ipmi_devintf fev 15 14:22:08 botnet-redhat kernel: ipmi_msghandler video fev 15 14:22:08 botnet-redhat kernel: CPU: 6 PID: 18032 Comm: cc1 Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:08 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:08 botnet-redhat kernel: Call Trace: fev 15 14:22:08 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:08 botnet-redhat kernel: bad_page+0xcb/0x120 fev 15 14:22:08 botnet-redhat kernel: free_pages_check_bad+0x5f/0x70 fev 15 14:22:08 botnet-redhat kernel: free_pcppages_bulk+0x447/0x4e0 fev 15 14:22:08 botnet-redhat kernel: free_hot_cold_page+0x24b/0x260 fev 15 14:22:08 botnet-redhat kernel: free_hot_cold_page_list+0x43/0xa0 fev 15 14:22:08 botnet-redhat kernel: release_pages+0x2c1/0x370 fev 15 14:22:08 botnet-redhat kernel: free_pages_and_swap_cache+0xba/0xd0 fev 15 14:22:08 botnet-redhat kernel: tlb_flush_mmu_free+0x36/0x60 fev 15 14:22:08 botnet-redhat kernel: unmap_page_range+0x6ca/0x9a0 fev 15 14:22:08 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:08 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:08 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:08 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:08 botnet-redhat kernel: do_exit+0x27f/0xae0 fev 15 14:22:08 botnet-redhat kernel: ? __do_page_fault+0x27b/0x4d0 fev 15 14:22:08 botnet-redhat kernel: do_group_exit+0x43/0xb0 fev 15 14:22:08 botnet-redhat kernel: SyS_exit_group+0x14/0x20 fev 15 14:22:08 botnet-redhat kernel: entry_SYSCALL_64_fastpath+0x33/0xa3 fev 15 14:22:08 botnet-redhat kernel: RIP: 0033:0x7f8e455fef78 fev 15 14:22:08 botnet-redhat kernel: RSP: 002b:00007ffc93d10248 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 fev 15 14:22:08 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8e455fef78 fev 15 14:22:08 botnet-redhat kernel: RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 fev 15 14:22:08 botnet-redhat kernel: RBP: 00007f8e458fc878 R08: 00000000000000e7 R09: fffffffffffffc00 fev 15 14:22:08 botnet-redhat kernel: R10: 000000000000000a R11: 0000000000000246 R12: 00007f8e458fc878 fev 15 14:22:08 botnet-redhat kernel: R13: 00007f8e45901d40 R14: 0000000000000000 R15: 0000000000000000 fev 15 14:22:27 botnet-redhat kernel: BUG: Bad page state in process cc1 pfn:bf683 fev 15 14:22:27 botnet-redhat kernel: page:ffffdda9c2fda0c0 count:0 mapcount:-256 mapping: (null) index:0x1 fev 15 14:22:27 botnet-redhat kernel: flags: 0xfffffc0000000() fev 15 14:22:27 botnet-redhat kernel: raw: 000fffffc0000000 0000000000000000 0000000000000001 00000000fffffeff fev 15 14:22:27 botnet-redhat kernel: raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000 fev 15 14:22:27 botnet-redhat kernel: page dumped because: nonzero mapcount fev 15 14:22:27 botnet-redhat kernel: Modules linked in: joydev input_leds nls_iso8859_1 hid_generic usbhid hid snd_hda_codec_hdmi snd_hda_intel snd_oxygen snd_hda_codec snd_oxygen_lib snd_mpu401_uart snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi intel_rapl x86_pkg_temp_thermal snd_seq intel_powerclamp coretemp kvm_intel snd_seq_device snd_timer nvidia_uvm(POE) kvm irqbypass crct10dif_pclmul snd crc32_pclmul ghash_clmulni_intel pcbc soundcore aesni_intel aes_x86_64 crypto_simd glue_helper cryptd mei_me shpchp mei intel_cstate ie31200_edac lpc_ich intel_rapl_perf tpm_infineon mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 nvidia_drm(POE) nvidia_modeset(POE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm nvidia(POE) ahci r8169 libahci mii ipmi_devintf fev 15 14:22:27 botnet-redhat kernel: ipmi_msghandler video fev 15 14:22:27 botnet-redhat kernel: CPU: 6 PID: 19089 Comm: cc1 Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:27 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:27 botnet-redhat kernel: Call Trace: fev 15 14:22:27 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:27 botnet-redhat kernel: bad_page+0xcb/0x120 fev 15 14:22:27 botnet-redhat kernel: free_pages_check_bad+0x5f/0x70 fev 15 14:22:27 botnet-redhat kernel: free_pcppages_bulk+0x447/0x4e0 fev 15 14:22:27 botnet-redhat kernel: ? update_load_avg+0x426/0x5a0 fev 15 14:22:27 botnet-redhat kernel: free_hot_cold_page+0x24b/0x260 fev 15 14:22:27 botnet-redhat kernel: free_hot_cold_page_list+0x43/0xa0 fev 15 14:22:27 botnet-redhat kernel: release_pages+0x2c1/0x370 fev 15 14:22:27 botnet-redhat kernel: free_pages_and_swap_cache+0xba/0xd0 fev 15 14:22:27 botnet-redhat kernel: tlb_flush_mmu_free+0x36/0x60 fev 15 14:22:27 botnet-redhat kernel: arch_tlb_finish_mmu+0x47/0x80 fev 15 14:22:27 botnet-redhat kernel: tlb_finish_mmu+0x23/0x30 fev 15 14:22:27 botnet-redhat kernel: exit_mmap+0xca/0x160 fev 15 14:22:27 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:27 botnet-redhat kernel: do_exit+0x27f/0xae0 fev 15 14:22:27 botnet-redhat kernel: ? __do_page_fault+0x27b/0x4d0 fev 15 14:22:27 botnet-redhat kernel: do_group_exit+0x43/0xb0 fev 15 14:22:27 botnet-redhat kernel: SyS_exit_group+0x14/0x20 fev 15 14:22:27 botnet-redhat kernel: entry_SYSCALL_64_fastpath+0x33/0xa3 fev 15 14:22:27 botnet-redhat kernel: RIP: 0033:0x7fb734accf78 fev 15 14:22:27 botnet-redhat kernel: RSP: 002b:00007ffeb3511738 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 fev 15 14:22:27 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb734accf78 fev 15 14:22:27 botnet-redhat kernel: RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 fev 15 14:22:27 botnet-redhat kernel: RBP: 00007fb734dca878 R08: 00000000000000e7 R09: fffffffffffffc00 fev 15 14:22:27 botnet-redhat kernel: R10: 000000000000000a R11: 0000000000000246 R12: 00007fb734dca878 fev 15 14:22:27 botnet-redhat kernel: R13: 00007fb734dcfd40 R14: 0000000000000000 R15: 0000000000000000 fev 15 14:22:27 botnet-redhat kernel: BUG: Bad page state in process kernel_oops pfn:a97ec fev 15 14:22:27 botnet-redhat kernel: page:ffffdda9c2a5fb00 count:0 mapcount:-256 mapping: (null) index:0x1 fev 15 14:22:27 botnet-redhat kernel: flags: 0xfffffc0000000() fev 15 14:22:27 botnet-redhat kernel: raw: 000fffffc0000000 0000000000000000 0000000000000001 00000000fffffeff fev 15 14:22:27 botnet-redhat kernel: raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000 fev 15 14:22:27 botnet-redhat kernel: page dumped because: nonzero mapcount fev 15 14:22:27 botnet-redhat kernel: Modules linked in: joydev input_leds nls_iso8859_1 hid_generic usbhid hid snd_hda_codec_hdmi snd_hda_intel snd_oxygen snd_hda_codec snd_oxygen_lib snd_mpu401_uart snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi intel_rapl x86_pkg_temp_thermal snd_seq intel_powerclamp coretemp kvm_intel snd_seq_device snd_timer nvidia_uvm(POE) kvm irqbypass crct10dif_pclmul snd crc32_pclmul ghash_clmulni_intel pcbc soundcore aesni_intel aes_x86_64 crypto_simd glue_helper cryptd mei_me shpchp mei intel_cstate ie31200_edac lpc_ich intel_rapl_perf tpm_infineon mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 nvidia_drm(POE) nvidia_modeset(POE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm nvidia(POE) ahci r8169 libahci mii ipmi_devintf fev 15 14:22:27 botnet-redhat kernel: ipmi_msghandler video fev 15 14:22:27 botnet-redhat kernel: CPU: 2 PID: 19058 Comm: kernel_oops Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:27 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:27 botnet-redhat kernel: Call Trace: fev 15 14:22:27 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:27 botnet-redhat kernel: bad_page+0xcb/0x120 fev 15 14:22:27 botnet-redhat kernel: free_pages_check_bad+0x5f/0x70 fev 15 14:22:27 botnet-redhat kernel: free_pcppages_bulk+0x447/0x4e0 fev 15 14:22:27 botnet-redhat kernel: free_hot_cold_page+0x24b/0x260 fev 15 14:22:27 botnet-redhat kernel: free_hot_cold_page_list+0x43/0xa0 fev 15 14:22:27 botnet-redhat kernel: release_pages+0x2c1/0x370 fev 15 14:22:27 botnet-redhat kernel: free_pages_and_swap_cache+0xba/0xd0 fev 15 14:22:27 botnet-redhat kernel: tlb_flush_mmu_free+0x36/0x60 fev 15 14:22:27 botnet-redhat kernel: arch_tlb_finish_mmu+0x47/0x80 fev 15 14:22:27 botnet-redhat kernel: tlb_finish_mmu+0x23/0x30 fev 15 14:22:27 botnet-redhat kernel: exit_mmap+0xca/0x160 fev 15 14:22:27 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:27 botnet-redhat kernel: do_exit+0x27f/0xae0 fev 15 14:22:27 botnet-redhat kernel: ? __do_page_fault+0x27b/0x4d0 fev 15 14:22:27 botnet-redhat kernel: do_group_exit+0x43/0xb0 fev 15 14:22:27 botnet-redhat kernel: SyS_exit_group+0x14/0x20 fev 15 14:22:27 botnet-redhat kernel: entry_SYSCALL_64_fastpath+0x33/0xa3 fev 15 14:22:27 botnet-redhat kernel: RIP: 0033:0x7fdfff88ff78 fev 15 14:22:27 botnet-redhat kernel: RSP: 002b:00007ffe4e4c8c58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 fev 15 14:22:27 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdfff88ff78 fev 15 14:22:27 botnet-redhat kernel: RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 fev 15 14:22:27 botnet-redhat kernel: RBP: 00007fdfffb8d878 R08: 00000000000000e7 R09: ffffffffffffff80 fev 15 14:22:27 botnet-redhat kernel: R10: 00007fe00095e280 R11: 0000000000000246 R12: 00007fdfffb8d878 fev 15 14:22:27 botnet-redhat kernel: R13: 00007fdfffb92d40 R14: 0000000000000000 R15: 0000000000000000 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map: 1305 messages suppressed fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:daebe067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b981a801460 mapping: (null) index:562fcf370 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 2 PID: 19788 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf2020 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf2020 R14: 0000562fcefbae60 R15: 0000562fcfbf2020 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:dad50067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b981a801460 mapping: (null) index:562fcf54b fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 2 PID: 19788 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf2020 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf2020 R14: 0000562fcefbae60 R15: 0000562fcfbf2020 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:342f9067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b981a801460 mapping: (null) index:562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 2 PID: 19788 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf2020 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf2020 R14: 0000562fcefbae60 R15: 0000562fcfbf2020 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:d3933067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b98404cee10 mapping: (null) index:562fcf370 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 2 PID: 19808 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf2bf0 RDI: 0000562fcf070210 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf2bf0 R14: 0000562fcf070210 R15: 0000562fcfbf2bf0 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:340f8067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98404cee10 mapping: (null) index:562fcf54b fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 2 PID: 19808 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf2bf0 RDI: 0000562fcf070210 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf2bf0 R14: 0000562fcf070210 R15: 0000562fcfbf2bf0 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:342da067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b98404cee10 mapping: (null) index:562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 2 PID: 19808 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf2bf0 RDI: 0000562fcf070210 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf2bf0 R14: 0000562fcf070210 R15: 0000562fcfbf2bf0 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:1316f5067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b989725c9b0 mapping: (null) index:562fcf370 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 0 PID: 19852 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf3020 RDI: 0000562fcf070210 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf3020 R14: 0000562fcf070210 R15: 0000562fcfbf3020 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:131016067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b989725c9b0 mapping: (null) index:562fcf54b fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 0 PID: 19852 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf3020 RDI: 0000562fcf070210 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf3020 R14: 0000562fcf070210 R15: 0000562fcfbf3020 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:196cb3067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b989725c9b0 mapping: (null) index:562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 0 PID: 19852 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf3020 RDI: 0000562fcf070210 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf3020 R14: 0000562fcf070210 R15: 0000562fcfbf3020 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:1b45d7067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b981a8017d0 mapping: (null) index:562fcf370 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 4 PID: 19875 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfbf3420 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf9b0a70 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf3420 R14: 0000562fcefbae60 R15: 0000562fcfbf3420 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:140a34067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b981a8017d0 mapping: (null) index:562fcf54b fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 4 PID: 19875 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfbf3420 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf9b0a70 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf3420 R14: 0000562fcefbae60 R15: 0000562fcfbf3420 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:16ac3a067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b981a8017d0 mapping: (null) index:562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 4 PID: 19875 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfbf3420 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf9b0a70 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf3420 R14: 0000562fcefbae60 R15: 0000562fcfbf3420 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:158941067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b99142be140 mapping: (null) index:562fcf370 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 5 PID: 19888 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf3c70 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf3c70 R14: 0000562fcefbae60 R15: 0000562fcfbf3c70 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:1b4627067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b99142be140 mapping: (null) index:562fcf54b fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 5 PID: 19888 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf3c70 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf3c70 R14: 0000562fcefbae60 R15: 0000562fcfbf3c70 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:172091067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b99142be140 mapping: (null) index:562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 5 PID: 19888 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf3c70 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf3c70 R14: 0000562fcefbae60 R15: 0000562fcfbf3c70 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:1315e4067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b98b90c2230 mapping: (null) index:562fcf370 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 3 PID: 19907 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfbf40f0 RDI: 0000562fcfbf2ca0 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf40f0 R14: 0000562fcfbf2ca0 R15: 0000562fcfbf40f0 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:2062bc067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98b90c2230 mapping: (null) index:562fcf54b fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 3 PID: 19907 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfbf40f0 RDI: 0000562fcfbf2ca0 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf40f0 R14: 0000562fcfbf2ca0 R15: 0000562fcfbf40f0 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:188af3067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b98b90c2230 mapping: (null) index:562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 3 PID: 19907 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfbf40f0 RDI: 0000562fcfbf2ca0 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf40f0 R14: 0000562fcfbf2ca0 R15: 0000562fcfbf40f0 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:1b44f6067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b989725c280 mapping: (null) index:562fcf370 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 0 PID: 19975 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf40a0 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa24f00 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf40a0 R14: 0000562fcefbae60 R15: 0000562fcfbf40a0 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:20aadc067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b989725c280 mapping: (null) index:562fcf54b fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 0 PID: 19975 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf40a0 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa24f00 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf40a0 R14: 0000562fcefbae60 R15: 0000562fcfbf40a0 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:1720cb067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:38 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:38 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:38 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:38 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b989725c280 mapping: (null) index:562fcf7c7 fev 15 14:22:38 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:38 botnet-redhat kernel: CPU: 0 PID: 19975 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:38 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:38 botnet-redhat kernel: Call Trace: fev 15 14:22:38 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:38 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:38 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:38 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:38 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:38 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:38 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:38 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:38 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:38 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:38 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:38 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:38 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:38 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:38 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:38 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:38 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:38 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:38 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:38 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf40a0 RDI: 0000562fcefbae60 fev 15 14:22:38 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:38 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa24f00 fev 15 14:22:38 botnet-redhat kernel: R13: 0000562fcfbf40a0 R14: 0000562fcefbae60 R15: 0000562fcfbf40a0 fev 15 14:22:38 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:1a593a067 fev 15 14:22:38 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:38 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b9908262fa0 mapping: (null) index:562fcf370 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 4 PID: 20007 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf4970 RDI: 0000562fcfbf30c0 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf4970 R14: 0000562fcfbf30c0 R15: 0000562fcfbf4970 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:14c11b067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9908262fa0 mapping: (null) index:562fcf54b fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 4 PID: 20007 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf4970 RDI: 0000562fcfbf30c0 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf4970 R14: 0000562fcfbf30c0 R15: 0000562fcfbf4970 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:188aca067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b9908262fa0 mapping: (null) index:562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 4 PID: 20007 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf4970 RDI: 0000562fcfbf30c0 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf4970 R14: 0000562fcfbf30c0 R15: 0000562fcfbf4970 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:14e1f2067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b9908262870 mapping: (null) index:562fcf370 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 4 PID: 20038 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf45c0 RDI: 0000562fcefbae60 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf45c0 R14: 0000562fcefbae60 R15: 0000562fcfbf45c0 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:196c17067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9908262870 mapping: (null) index:562fcf54b fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 4 PID: 20038 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf45c0 RDI: 0000562fcefbae60 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf45c0 R14: 0000562fcefbae60 R15: 0000562fcfbf45c0 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:1b4684067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b9908262870 mapping: (null) index:562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 4 PID: 20038 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf45c0 RDI: 0000562fcefbae60 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf932ce0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf45c0 R14: 0000562fcefbae60 R15: 0000562fcfbf45c0 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:1314ba067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b98b90c2050 mapping: (null) index:562fcf370 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 2 PID: 20047 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfbf5590 RDI: 0000562fcefbae60 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf5590 R14: 0000562fcefbae60 R15: 0000562fcfbf5590 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:14e0df067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b98b90c2050 mapping: (null) index:562fcf54b fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 2 PID: 20047 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfbf5590 RDI: 0000562fcefbae60 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf5590 R14: 0000562fcefbae60 R15: 0000562fcfbf5590 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:20e8c2067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b98b90c2050 mapping: (null) index:562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 2 PID: 20047 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfbf5590 RDI: 0000562fcefbae60 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf5590 R14: 0000562fcefbae60 R15: 0000562fcfbf5590 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:1b4605067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b991264a690 mapping: (null) index:562fcf370 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 2 PID: 20075 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfbf59e0 RDI: 0000562fcf070210 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf59e0 R14: 0000562fcf070210 R15: 0000562fcfbf59e0 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:17210a067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b991264a690 mapping: (null) index:562fcf54b fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 2 PID: 20075 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfbf59e0 RDI: 0000562fcf070210 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf59e0 R14: 0000562fcf070210 R15: 0000562fcfbf59e0 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:14eb72067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b991264a690 mapping: (null) index:562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 2 PID: 20075 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfbf59e0 RDI: 0000562fcf070210 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf59e0 R14: 0000562fcf070210 R15: 0000562fcfbf59e0 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:d1058067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b984c9d88c0 mapping: (null) index:562fcf370 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 5 PID: 20129 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfbf5e30 RDI: 0000562fcf070210 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf5e30 R14: 0000562fcf070210 R15: 0000562fcfbf5e30 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:31c4e067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b984c9d88c0 mapping: (null) index:562fcf54b fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 5 PID: 20129 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfbf5e30 RDI: 0000562fcf070210 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf5e30 R14: 0000562fcf070210 R15: 0000562fcfbf5e30 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:dad57067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b984c9d88c0 mapping: (null) index:562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 5 PID: 20129 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa29c60 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcfa29c60 RSI: 0000562fcfbf5e30 RDI: 0000562fcf070210 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa29c60 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa29c60 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf5e30 R14: 0000562fcf070210 R15: 0000562fcfbf5e30 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:d1086067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b9908262870 mapping: (null) index:562fcf370 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 5 PID: 20162 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf6240 RDI: 0000562fcf070210 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf932ce0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf6240 R14: 0000562fcf070210 R15: 0000562fcfbf6240 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:3424b067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9908262870 mapping: (null) index:562fcf54b fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 5 PID: 20162 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf6240 RDI: 0000562fcf070210 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf932ce0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf6240 R14: 0000562fcf070210 R15: 0000562fcfbf6240 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:34285067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b9908262870 mapping: (null) index:562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 5 PID: 20162 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf932ce0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf932ce0 RSI: 0000562fcfbf6240 RDI: 0000562fcf070210 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf932ce0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf932ce0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf6240 R14: 0000562fcf070210 R15: 0000562fcfbf6240 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:d1097067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b981a801780 mapping: (null) index:562fcf370 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 7 PID: 20193 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfbf66a0 RDI: 0000562fcfbf3490 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf66a0 R14: 0000562fcfbf3490 R15: 0000562fcfbf66a0 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:340da067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b981a801780 mapping: (null) index:562fcf54b fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 7 PID: 20193 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfbf66a0 RDI: 0000562fcfbf3490 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf66a0 R14: 0000562fcfbf3490 R15: 0000562fcfbf66a0 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:d1144067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b981a801780 mapping: (null) index:562fcf7c7 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 7 PID: 20193 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf03fdf0 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcf03fdf0 RSI: 0000562fcfbf66a0 RDI: 0000562fcfbf3490 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf03fdf0 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcf03fdf0 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf66a0 R14: 0000562fcfbf3490 R15: 0000562fcfbf66a0 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:1a5a17067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:39 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b986ad13280 mapping: (null) index:562fcf370 fev 15 14:22:39 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:39 botnet-redhat kernel: CPU: 4 PID: 20224 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:39 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:39 botnet-redhat kernel: Call Trace: fev 15 14:22:39 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:39 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:39 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:39 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:39 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:39 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:39 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:39 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:39 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:39 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:39 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:39 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:39 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:39 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:39 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:39 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:39 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:39 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:39 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:39 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf6680 RDI: 0000562fcf070210 fev 15 14:22:39 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:39 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:22:39 botnet-redhat kernel: R13: 0000562fcfbf6680 R14: 0000562fcf070210 R15: 0000562fcfbf6680 fev 15 14:22:39 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:1a5875067 fev 15 14:22:39 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:39 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:39 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:39 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:39 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b986ad13280 mapping: (null) index:562fcf54b fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 4 PID: 20224 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf6680 RDI: 0000562fcf070210 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf6680 R14: 0000562fcf070210 R15: 0000562fcfbf6680 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:188bbe067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b986ad13280 mapping: (null) index:562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 4 PID: 20224 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf6680 RDI: 0000562fcf070210 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa24f00 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf6680 R14: 0000562fcf070210 R15: 0000562fcfbf6680 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:188986067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b986ad13e10 mapping: (null) index:562fcf370 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 4 PID: 20255 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf70c0 RDI: 0000562fcfbf6050 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa24f00 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf70c0 R14: 0000562fcfbf6050 R15: 0000562fcfbf70c0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:19da3a067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b986ad13e10 mapping: (null) index:562fcf54b fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 4 PID: 20255 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf70c0 RDI: 0000562fcfbf6050 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa24f00 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf70c0 R14: 0000562fcfbf6050 R15: 0000562fcfbf70c0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:2096c7067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b986ad13e10 mapping: (null) index:562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 4 PID: 20255 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf70c0 RDI: 0000562fcfbf6050 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa24f00 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf70c0 R14: 0000562fcfbf6050 R15: 0000562fcfbf70c0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:dae97067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b986ad13230 mapping: (null) index:562fcf370 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 4 PID: 20286 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf6bf0 RDI: 0000562fcefbae60 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa24f00 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf6bf0 R14: 0000562fcefbae60 R15: 0000562fcfbf6bf0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:d108e067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b986ad13230 mapping: (null) index:562fcf54b fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 4 PID: 20286 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf6bf0 RDI: 0000562fcefbae60 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa24f00 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf6bf0 R14: 0000562fcefbae60 R15: 0000562fcfbf6bf0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:daebf067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b986ad13230 mapping: (null) index:562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 4 PID: 20286 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000206 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa24f00 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa24f00 RSI: 0000562fcfbf6bf0 RDI: 0000562fcefbae60 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa24f00 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 0000562fcfa24f00 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf6bf0 R14: 0000562fcefbae60 R15: 0000562fcfbf6bf0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:1315a8067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b981a801730 mapping: (null) index:562fcf370 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 7 PID: 20318 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfbf79c0 RDI: 0000562fcf070210 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf9b0a70 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf79c0 R14: 0000562fcf070210 R15: 0000562fcfbf79c0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:14e134067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b981a801730 mapping: (null) index:562fcf54b fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 7 PID: 20318 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfbf79c0 RDI: 0000562fcf070210 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf9b0a70 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf79c0 R14: 0000562fcf070210 R15: 0000562fcfbf79c0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:196f6b067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b981a801730 mapping: (null) index:562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 7 PID: 20318 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcf9b0a70 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcf9b0a70 RSI: 0000562fcfbf79c0 RDI: 0000562fcf070210 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcf9b0a70 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcf9b0a70 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf79c0 R14: 0000562fcf070210 R15: 0000562fcfbf79c0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:14e340067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b9908262640 mapping: (null) index:562fcf370 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 5 PID: 20327 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfbf9e20 RDI: 0000562fcfbe1e70 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa2cd60 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf9e20 R14: 0000562fcfbe1e70 R15: 0000562fcfbf9e20 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:188968067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b9908262640 mapping: (null) index:562fcf54b fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 5 PID: 20327 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfbf9e20 RDI: 0000562fcfbe1e70 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa2cd60 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf9e20 R14: 0000562fcfbe1e70 R15: 0000562fcfbf9e20 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:11a8d2067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b9908262640 mapping: (null) index:562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 5 PID: 20327 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfbf9e20 RDI: 0000562fcfbe1e70 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa2cd60 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf9e20 R14: 0000562fcfbe1e70 R15: 0000562fcfbf9e20 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d5c7b845 pmd:1314a0067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c3571ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf370 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf370 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c3571ea0 ffffdda9c36edda0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf370000 vm_flags:08100073 anon_vma:ffff9b991264a550 mapping: (null) index:562fcf370 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 2 PID: 20380 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfbf9ec0 RDI: 0000562fcf070210 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa2cd60 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf9ec0 R14: 0000562fcf070210 R15: 0000562fcfbf9ec0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000cddbb845 pmd:1b47a1067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c3376ec0 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf54b fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf54b 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c3376ea0 ffffdda9c3439620 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf54b000 vm_flags:08100073 anon_vma:ffff9b991264a550 mapping: (null) index:562fcf54b fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 2 PID: 20380 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfbf9ec0 RDI: 0000562fcf070210 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa2cd60 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf9ec0 R14: 0000562fcf070210 R15: 0000562fcfbf9ec0 fev 15 14:22:40 botnet-redhat kernel: BUG: Bad page map in process make pte:80000000d0fd2845 pmd:197205067 fev 15 14:22:40 botnet-redhat kernel: page:ffffdda9c343f480 count:2 mapcount:-255 mapping:ffff9b98a5ab4b91 index:0x562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: flags: 0xfffffc0040068(uptodate|lru|active|swapbacked) fev 15 14:22:40 botnet-redhat kernel: raw: 000fffffc0040068 ffff9b98a5ab4b91 0000000562fcf7c7 00000002ffffff00 fev 15 14:22:40 botnet-redhat kernel: raw: ffffdda9c343f460 ffffdda9c343f4e0 0000000000000000 ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: page dumped because: bad pte fev 15 14:22:40 botnet-redhat kernel: page->mem_cgroup:ffff9b991600c800 fev 15 14:22:40 botnet-redhat kernel: addr:0000562fcf7c7000 vm_flags:08100073 anon_vma:ffff9b991264a550 mapping: (null) index:562fcf7c7 fev 15 14:22:40 botnet-redhat kernel: file: (null) fault: (null) mmap: (null) readpage: (null) fev 15 14:22:40 botnet-redhat kernel: CPU: 2 PID: 20380 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:22:40 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:22:40 botnet-redhat kernel: Call Trace: fev 15 14:22:40 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:22:40 botnet-redhat kernel: print_bad_pte+0x1e5/0x2b0 fev 15 14:22:40 botnet-redhat kernel: ? __dec_node_page_state+0x1d/0x20 fev 15 14:22:40 botnet-redhat kernel: unmap_page_range+0x82e/0x9a0 fev 15 14:22:40 botnet-redhat kernel: unmap_single_vma+0x7d/0xf0 fev 15 14:22:40 botnet-redhat kernel: unmap_vmas+0x51/0xb0 fev 15 14:22:40 botnet-redhat kernel: exit_mmap+0xa2/0x160 fev 15 14:22:40 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:22:40 botnet-redhat kernel: flush_old_exec+0x4fe/0x6e0 fev 15 14:22:40 botnet-redhat kernel: load_elf_binary+0x261/0x1080 fev 15 14:22:40 botnet-redhat kernel: ? get_user_pages_remote+0x127/0x1b0 fev 15 14:22:40 botnet-redhat kernel: ? get_acl+0x1d/0x100 fev 15 14:22:40 botnet-redhat kernel: search_binary_handler+0x92/0x1c0 fev 15 14:22:40 botnet-redhat kernel: do_execveat_common.isra.35+0x623/0x780 fev 15 14:22:40 botnet-redhat kernel: SyS_execve+0x31/0x40 fev 15 14:22:40 botnet-redhat kernel: do_syscall_64+0x5b/0xc0 fev 15 14:22:40 botnet-redhat kernel: entry_SYSCALL64_slow_path+0x8/0x8 fev 15 14:22:40 botnet-redhat kernel: RIP: 0033:0x7fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RSP: 002b:00007fff0cd9b108 EFLAGS: 00000202 ORIG_RAX: 000000000000003b fev 15 14:22:40 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000562fcfa2cd60 RCX: 00007fd4dab21fa7 fev 15 14:22:40 botnet-redhat kernel: RDX: 0000562fcfa2cd60 RSI: 0000562fcfbf9ec0 RDI: 0000562fcf070210 fev 15 14:22:40 botnet-redhat kernel: RBP: 00007fff0cd9b1b0 R08: 0000562fcfa2cd60 R09: 000000000000000b fev 15 14:22:40 botnet-redhat kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000562fcfa2cd60 fev 15 14:22:40 botnet-redhat kernel: R13: 0000562fcfbf9ec0 R14: 0000562fcf070210 R15: 0000562fcfbf9ec0 fev 15 14:23:17 botnet-redhat kernel: BUG: Bad page state in process make pfn:13c673 fev 15 14:23:17 botnet-redhat kernel: page:ffffdda9c4f19cc0 count:0 mapcount:-256 mapping: (null) index:0x1 fev 15 14:23:17 botnet-redhat kernel: flags: 0x17ffffc0000000() fev 15 14:23:17 botnet-redhat kernel: raw: 0017ffffc0000000 0000000000000000 0000000000000001 00000000fffffeff fev 15 14:23:17 botnet-redhat kernel: raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000 fev 15 14:23:17 botnet-redhat kernel: page dumped because: nonzero mapcount fev 15 14:23:17 botnet-redhat kernel: Modules linked in: joydev input_leds nls_iso8859_1 hid_generic usbhid hid snd_hda_codec_hdmi snd_hda_intel snd_oxygen snd_hda_codec snd_oxygen_lib snd_mpu401_uart snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi intel_rapl x86_pkg_temp_thermal snd_seq intel_powerclamp coretemp kvm_intel snd_seq_device snd_timer nvidia_uvm(POE) kvm irqbypass crct10dif_pclmul snd crc32_pclmul ghash_clmulni_intel pcbc soundcore aesni_intel aes_x86_64 crypto_simd glue_helper cryptd mei_me shpchp mei intel_cstate ie31200_edac lpc_ich intel_rapl_perf tpm_infineon mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 nvidia_drm(POE) nvidia_modeset(POE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm nvidia(POE) ahci r8169 libahci mii ipmi_devintf fev 15 14:23:17 botnet-redhat kernel: ipmi_msghandler video fev 15 14:23:17 botnet-redhat kernel: CPU: 6 PID: 12547 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:23:17 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:23:17 botnet-redhat kernel: Call Trace: fev 15 14:23:17 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:23:17 botnet-redhat kernel: bad_page+0xcb/0x120 fev 15 14:23:17 botnet-redhat kernel: free_pages_check_bad+0x5f/0x70 fev 15 14:23:17 botnet-redhat kernel: free_pcppages_bulk+0x447/0x4e0 fev 15 14:23:17 botnet-redhat kernel: free_hot_cold_page+0x24b/0x260 fev 15 14:23:17 botnet-redhat kernel: free_hot_cold_page_list+0x43/0xa0 fev 15 14:23:17 botnet-redhat kernel: release_pages+0x2c1/0x370 fev 15 14:23:17 botnet-redhat kernel: free_pages_and_swap_cache+0xba/0xd0 fev 15 14:23:17 botnet-redhat kernel: tlb_flush_mmu_free+0x36/0x60 fev 15 14:23:17 botnet-redhat kernel: arch_tlb_finish_mmu+0x47/0x80 fev 15 14:23:17 botnet-redhat kernel: tlb_finish_mmu+0x23/0x30 fev 15 14:23:17 botnet-redhat kernel: exit_mmap+0xca/0x160 fev 15 14:23:17 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:23:17 botnet-redhat kernel: do_exit+0x27f/0xae0 fev 15 14:23:17 botnet-redhat kernel: ? __do_page_fault+0x27b/0x4d0 fev 15 14:23:17 botnet-redhat kernel: do_group_exit+0x43/0xb0 fev 15 14:23:17 botnet-redhat kernel: SyS_exit_group+0x14/0x20 fev 15 14:23:17 botnet-redhat kernel: entry_SYSCALL_64_fastpath+0x33/0xa3 fev 15 14:23:17 botnet-redhat kernel: RIP: 0033:0x7fd4dab21f78 fev 15 14:23:17 botnet-redhat kernel: RSP: 002b:00007fff0cd9c3d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 fev 15 14:23:17 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4dab21f78 fev 15 14:23:17 botnet-redhat kernel: RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 fev 15 14:23:17 botnet-redhat kernel: RBP: 00007fd4dae1f878 R08: 00000000000000e7 R09: ffffffffffffff80 fev 15 14:23:17 botnet-redhat kernel: R10: 0000000000000004 R11: 0000000000000246 R12: 00007fd4dae1f878 fev 15 14:23:17 botnet-redhat kernel: R13: 00007fd4dae24d40 R14: 0000000000000000 R15: 0000562fcefba0a0 fev 15 14:23:17 botnet-redhat kernel: BUG: Bad page state in process make pfn:cddbb fev 15 14:23:17 botnet-redhat kernel: page:ffffdda9c3376ec0 count:0 mapcount:-256 mapping: (null) index:0x1 fev 15 14:23:17 botnet-redhat kernel: flags: 0xfffffc0000000() fev 15 14:23:17 botnet-redhat kernel: raw: 000fffffc0000000 0000000000000000 0000000000000001 00000000fffffeff fev 15 14:23:17 botnet-redhat kernel: raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000 fev 15 14:23:17 botnet-redhat kernel: page dumped because: nonzero mapcount fev 15 14:23:17 botnet-redhat kernel: Modules linked in: joydev input_leds nls_iso8859_1 hid_generic usbhid hid snd_hda_codec_hdmi snd_hda_intel snd_oxygen snd_hda_codec snd_oxygen_lib snd_mpu401_uart snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi intel_rapl x86_pkg_temp_thermal snd_seq intel_powerclamp coretemp kvm_intel snd_seq_device snd_timer nvidia_uvm(POE) kvm irqbypass crct10dif_pclmul snd crc32_pclmul ghash_clmulni_intel pcbc soundcore aesni_intel aes_x86_64 crypto_simd glue_helper cryptd mei_me shpchp mei intel_cstate ie31200_edac lpc_ich intel_rapl_perf tpm_infineon mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 nvidia_drm(POE) nvidia_modeset(POE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm nvidia(POE) ahci r8169 libahci mii ipmi_devintf fev 15 14:23:17 botnet-redhat kernel: ipmi_msghandler video fev 15 14:23:17 botnet-redhat kernel: CPU: 6 PID: 12547 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:23:17 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:23:17 botnet-redhat kernel: Call Trace: fev 15 14:23:17 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:23:17 botnet-redhat kernel: bad_page+0xcb/0x120 fev 15 14:23:17 botnet-redhat kernel: free_pages_check_bad+0x5f/0x70 fev 15 14:23:17 botnet-redhat kernel: free_pcppages_bulk+0x447/0x4e0 fev 15 14:23:17 botnet-redhat kernel: free_hot_cold_page+0x24b/0x260 fev 15 14:23:17 botnet-redhat kernel: free_hot_cold_page_list+0x43/0xa0 fev 15 14:23:17 botnet-redhat kernel: release_pages+0x2c1/0x370 fev 15 14:23:17 botnet-redhat kernel: free_pages_and_swap_cache+0xba/0xd0 fev 15 14:23:17 botnet-redhat kernel: tlb_flush_mmu_free+0x36/0x60 fev 15 14:23:17 botnet-redhat kernel: arch_tlb_finish_mmu+0x47/0x80 fev 15 14:23:17 botnet-redhat kernel: tlb_finish_mmu+0x23/0x30 fev 15 14:23:17 botnet-redhat kernel: exit_mmap+0xca/0x160 fev 15 14:23:17 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:23:17 botnet-redhat kernel: do_exit+0x27f/0xae0 fev 15 14:23:17 botnet-redhat kernel: ? __do_page_fault+0x27b/0x4d0 fev 15 14:23:17 botnet-redhat kernel: do_group_exit+0x43/0xb0 fev 15 14:23:17 botnet-redhat kernel: SyS_exit_group+0x14/0x20 fev 15 14:23:17 botnet-redhat kernel: entry_SYSCALL_64_fastpath+0x33/0xa3 fev 15 14:23:17 botnet-redhat kernel: RIP: 0033:0x7fd4dab21f78 fev 15 14:23:17 botnet-redhat kernel: RSP: 002b:00007fff0cd9c3d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 fev 15 14:23:17 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4dab21f78 fev 15 14:23:17 botnet-redhat kernel: RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 fev 15 14:23:17 botnet-redhat kernel: RBP: 00007fd4dae1f878 R08: 00000000000000e7 R09: ffffffffffffff80 fev 15 14:23:17 botnet-redhat kernel: R10: 0000000000000004 R11: 0000000000000246 R12: 00007fd4dae1f878 fev 15 14:23:17 botnet-redhat kernel: R13: 00007fd4dae24d40 R14: 0000000000000000 R15: 0000562fcefba0a0 fev 15 14:23:17 botnet-redhat kernel: BUG: Bad page state in process make pfn:d5c7b fev 15 14:23:17 botnet-redhat kernel: page:ffffdda9c3571ec0 count:0 mapcount:-256 mapping: (null) index:0x1 fev 15 14:23:17 botnet-redhat kernel: flags: 0xfffffc0000000() fev 15 14:23:17 botnet-redhat kernel: raw: 000fffffc0000000 0000000000000000 0000000000000001 00000000fffffeff fev 15 14:23:17 botnet-redhat kernel: raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000 fev 15 14:23:17 botnet-redhat kernel: page dumped because: nonzero mapcount fev 15 14:23:17 botnet-redhat kernel: Modules linked in: joydev input_leds nls_iso8859_1 hid_generic usbhid hid snd_hda_codec_hdmi snd_hda_intel snd_oxygen snd_hda_codec snd_oxygen_lib snd_mpu401_uart snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi intel_rapl x86_pkg_temp_thermal snd_seq intel_powerclamp coretemp kvm_intel snd_seq_device snd_timer nvidia_uvm(POE) kvm irqbypass crct10dif_pclmul snd crc32_pclmul ghash_clmulni_intel pcbc soundcore aesni_intel aes_x86_64 crypto_simd glue_helper cryptd mei_me shpchp mei intel_cstate ie31200_edac lpc_ich intel_rapl_perf tpm_infineon mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 nvidia_drm(POE) nvidia_modeset(POE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm nvidia(POE) ahci r8169 libahci mii ipmi_devintf fev 15 14:23:18 botnet-redhat kernel: ipmi_msghandler video fev 15 14:23:18 botnet-redhat kernel: CPU: 6 PID: 12547 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:23:18 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:23:18 botnet-redhat kernel: Call Trace: fev 15 14:23:18 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:23:18 botnet-redhat kernel: bad_page+0xcb/0x120 fev 15 14:23:18 botnet-redhat kernel: free_pages_check_bad+0x5f/0x70 fev 15 14:23:18 botnet-redhat kernel: free_pcppages_bulk+0x447/0x4e0 fev 15 14:23:18 botnet-redhat kernel: free_hot_cold_page+0x24b/0x260 fev 15 14:23:18 botnet-redhat kernel: free_hot_cold_page_list+0x43/0xa0 fev 15 14:23:18 botnet-redhat kernel: release_pages+0x2c1/0x370 fev 15 14:23:18 botnet-redhat kernel: free_pages_and_swap_cache+0xba/0xd0 fev 15 14:23:18 botnet-redhat kernel: tlb_flush_mmu_free+0x36/0x60 fev 15 14:23:18 botnet-redhat kernel: arch_tlb_finish_mmu+0x47/0x80 fev 15 14:23:18 botnet-redhat kernel: tlb_finish_mmu+0x23/0x30 fev 15 14:23:18 botnet-redhat kernel: exit_mmap+0xca/0x160 fev 15 14:23:18 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:23:18 botnet-redhat kernel: do_exit+0x27f/0xae0 fev 15 14:23:18 botnet-redhat kernel: ? __do_page_fault+0x27b/0x4d0 fev 15 14:23:18 botnet-redhat kernel: do_group_exit+0x43/0xb0 fev 15 14:23:18 botnet-redhat kernel: SyS_exit_group+0x14/0x20 fev 15 14:23:18 botnet-redhat kernel: entry_SYSCALL_64_fastpath+0x33/0xa3 fev 15 14:23:18 botnet-redhat kernel: RIP: 0033:0x7fd4dab21f78 fev 15 14:23:18 botnet-redhat kernel: RSP: 002b:00007fff0cd9c3d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 fev 15 14:23:18 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4dab21f78 fev 15 14:23:18 botnet-redhat kernel: RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 fev 15 14:23:18 botnet-redhat kernel: RBP: 00007fd4dae1f878 R08: 00000000000000e7 R09: ffffffffffffff80 fev 15 14:23:18 botnet-redhat kernel: R10: 0000000000000004 R11: 0000000000000246 R12: 00007fd4dae1f878 fev 15 14:23:18 botnet-redhat kernel: R13: 00007fd4dae24d40 R14: 0000000000000000 R15: 0000562fcefba0a0 fev 15 14:23:18 botnet-redhat kernel: BUG: Bad page state in process make pfn:160386 fev 15 14:23:18 botnet-redhat kernel: page:ffffdda9c580e180 count:0 mapcount:-256 mapping: (null) index:0x1 fev 15 14:23:18 botnet-redhat kernel: flags: 0x17ffffc0000000() fev 15 14:23:18 botnet-redhat kernel: raw: 0017ffffc0000000 0000000000000000 0000000000000001 00000000fffffeff fev 15 14:23:18 botnet-redhat kernel: raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000 fev 15 14:23:18 botnet-redhat kernel: page dumped because: nonzero mapcount fev 15 14:23:18 botnet-redhat kernel: Modules linked in: joydev input_leds nls_iso8859_1 hid_generic usbhid hid snd_hda_codec_hdmi snd_hda_intel snd_oxygen snd_hda_codec snd_oxygen_lib snd_mpu401_uart snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi intel_rapl x86_pkg_temp_thermal snd_seq intel_powerclamp coretemp kvm_intel snd_seq_device snd_timer nvidia_uvm(POE) kvm irqbypass crct10dif_pclmul snd crc32_pclmul ghash_clmulni_intel pcbc soundcore aesni_intel aes_x86_64 crypto_simd glue_helper cryptd mei_me shpchp mei intel_cstate ie31200_edac lpc_ich intel_rapl_perf tpm_infineon mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 nvidia_drm(POE) nvidia_modeset(POE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm nvidia(POE) ahci r8169 libahci mii ipmi_devintf fev 15 14:23:18 botnet-redhat kernel: ipmi_msghandler video fev 15 14:23:18 botnet-redhat kernel: CPU: 6 PID: 12547 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:23:18 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:23:18 botnet-redhat kernel: Call Trace: fev 15 14:23:18 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:23:18 botnet-redhat kernel: bad_page+0xcb/0x120 fev 15 14:23:18 botnet-redhat kernel: free_pages_check_bad+0x5f/0x70 fev 15 14:23:18 botnet-redhat kernel: free_pcppages_bulk+0x447/0x4e0 fev 15 14:23:18 botnet-redhat kernel: free_hot_cold_page+0x24b/0x260 fev 15 14:23:18 botnet-redhat kernel: free_hot_cold_page_list+0x43/0xa0 fev 15 14:23:18 botnet-redhat kernel: release_pages+0x2c1/0x370 fev 15 14:23:18 botnet-redhat kernel: free_pages_and_swap_cache+0xba/0xd0 fev 15 14:23:18 botnet-redhat kernel: tlb_flush_mmu_free+0x36/0x60 fev 15 14:23:18 botnet-redhat kernel: arch_tlb_finish_mmu+0x47/0x80 fev 15 14:23:18 botnet-redhat kernel: tlb_finish_mmu+0x23/0x30 fev 15 14:23:18 botnet-redhat kernel: exit_mmap+0xca/0x160 fev 15 14:23:18 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:23:18 botnet-redhat kernel: do_exit+0x27f/0xae0 fev 15 14:23:18 botnet-redhat kernel: ? __do_page_fault+0x27b/0x4d0 fev 15 14:23:18 botnet-redhat kernel: do_group_exit+0x43/0xb0 fev 15 14:23:18 botnet-redhat kernel: SyS_exit_group+0x14/0x20 fev 15 14:23:18 botnet-redhat kernel: entry_SYSCALL_64_fastpath+0x33/0xa3 fev 15 14:23:18 botnet-redhat kernel: RIP: 0033:0x7fd4dab21f78 fev 15 14:23:18 botnet-redhat kernel: RSP: 002b:00007fff0cd9c3d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 fev 15 14:23:18 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4dab21f78 fev 15 14:23:18 botnet-redhat kernel: RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 fev 15 14:23:18 botnet-redhat kernel: RBP: 00007fd4dae1f878 R08: 00000000000000e7 R09: ffffffffffffff80 fev 15 14:23:18 botnet-redhat kernel: R10: 0000000000000004 R11: 0000000000000246 R12: 00007fd4dae1f878 fev 15 14:23:18 botnet-redhat kernel: R13: 00007fd4dae24d40 R14: 0000000000000000 R15: 0000562fcefba0a0 fev 15 14:23:18 botnet-redhat kernel: BUG: Bad page state in process make pfn:d0fd2 fev 15 14:23:18 botnet-redhat kernel: page:ffffdda9c343f480 count:0 mapcount:-256 mapping: (null) index:0x1 fev 15 14:23:18 botnet-redhat kernel: flags: 0xfffffc0000000() fev 15 14:23:18 botnet-redhat kernel: raw: 000fffffc0000000 0000000000000000 0000000000000001 00000000fffffeff fev 15 14:23:18 botnet-redhat kernel: raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000 fev 15 14:23:18 botnet-redhat kernel: page dumped because: nonzero mapcount fev 15 14:23:18 botnet-redhat kernel: Modules linked in: joydev input_leds nls_iso8859_1 hid_generic usbhid hid snd_hda_codec_hdmi snd_hda_intel snd_oxygen snd_hda_codec snd_oxygen_lib snd_mpu401_uart snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi intel_rapl x86_pkg_temp_thermal snd_seq intel_powerclamp coretemp kvm_intel snd_seq_device snd_timer nvidia_uvm(POE) kvm irqbypass crct10dif_pclmul snd crc32_pclmul ghash_clmulni_intel pcbc soundcore aesni_intel aes_x86_64 crypto_simd glue_helper cryptd mei_me shpchp mei intel_cstate ie31200_edac lpc_ich intel_rapl_perf tpm_infineon mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 nvidia_drm(POE) nvidia_modeset(POE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm nvidia(POE) ahci r8169 libahci mii ipmi_devintf fev 15 14:23:18 botnet-redhat kernel: ipmi_msghandler video fev 15 14:23:18 botnet-redhat kernel: CPU: 6 PID: 12547 Comm: make Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:23:18 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:23:18 botnet-redhat kernel: Call Trace: fev 15 14:23:18 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:23:18 botnet-redhat kernel: bad_page+0xcb/0x120 fev 15 14:23:18 botnet-redhat kernel: free_pages_check_bad+0x5f/0x70 fev 15 14:23:18 botnet-redhat kernel: free_pcppages_bulk+0x447/0x4e0 fev 15 14:23:18 botnet-redhat kernel: free_hot_cold_page+0x24b/0x260 fev 15 14:23:18 botnet-redhat kernel: free_hot_cold_page_list+0x43/0xa0 fev 15 14:23:18 botnet-redhat kernel: release_pages+0x2c1/0x370 fev 15 14:23:18 botnet-redhat kernel: free_pages_and_swap_cache+0xba/0xd0 fev 15 14:23:18 botnet-redhat kernel: tlb_flush_mmu_free+0x36/0x60 fev 15 14:23:18 botnet-redhat kernel: arch_tlb_finish_mmu+0x47/0x80 fev 15 14:23:18 botnet-redhat kernel: tlb_finish_mmu+0x23/0x30 fev 15 14:23:18 botnet-redhat kernel: exit_mmap+0xca/0x160 fev 15 14:23:18 botnet-redhat kernel: mmput+0x57/0x140 fev 15 14:23:18 botnet-redhat kernel: do_exit+0x27f/0xae0 fev 15 14:23:18 botnet-redhat kernel: ? __do_page_fault+0x27b/0x4d0 fev 15 14:23:18 botnet-redhat kernel: do_group_exit+0x43/0xb0 fev 15 14:23:18 botnet-redhat kernel: SyS_exit_group+0x14/0x20 fev 15 14:23:18 botnet-redhat kernel: entry_SYSCALL_64_fastpath+0x33/0xa3 fev 15 14:23:18 botnet-redhat kernel: RIP: 0033:0x7fd4dab21f78 fev 15 14:23:18 botnet-redhat kernel: RSP: 002b:00007fff0cd9c3d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 fev 15 14:23:18 botnet-redhat kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4dab21f78 fev 15 14:23:18 botnet-redhat kernel: RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 fev 15 14:23:18 botnet-redhat kernel: RBP: 00007fd4dae1f878 R08: 00000000000000e7 R09: ffffffffffffff80 fev 15 14:23:18 botnet-redhat kernel: R10: 0000000000000004 R11: 0000000000000246 R12: 00007fd4dae1f878 fev 15 14:23:18 botnet-redhat kernel: R13: 00007fd4dae24d40 R14: 0000000000000000 R15: 0000562fcefba0a0 fev 15 14:23:33 botnet-redhat kernel: BUG: Bad page state in process kworker/6:1 pfn:15a2b3 fev 15 14:23:33 botnet-redhat kernel: page:ffffdda9c568acc0 count:0 mapcount:-256 mapping: (null) index:0x1 fev 15 14:23:33 botnet-redhat kernel: flags: 0x17ffffc0000000() fev 15 14:23:33 botnet-redhat kernel: raw: 0017ffffc0000000 0000000000000000 0000000000000001 00000000fffffeff fev 15 14:23:33 botnet-redhat kernel: raw: dead000000000100 dead000000000200 0000000000000000 0000000000000000 fev 15 14:23:33 botnet-redhat kernel: page dumped because: nonzero mapcount fev 15 14:23:33 botnet-redhat kernel: Modules linked in: joydev input_leds nls_iso8859_1 hid_generic usbhid hid snd_hda_codec_hdmi snd_hda_intel snd_oxygen snd_hda_codec snd_oxygen_lib snd_mpu401_uart snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi intel_rapl x86_pkg_temp_thermal snd_seq intel_powerclamp coretemp kvm_intel snd_seq_device snd_timer nvidia_uvm(POE) kvm irqbypass crct10dif_pclmul snd crc32_pclmul ghash_clmulni_intel pcbc soundcore aesni_intel aes_x86_64 crypto_simd glue_helper cryptd mei_me shpchp mei intel_cstate ie31200_edac lpc_ich intel_rapl_perf tpm_infineon mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 nvidia_drm(POE) nvidia_modeset(POE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm nvidia(POE) ahci r8169 libahci mii ipmi_devintf fev 15 14:23:33 botnet-redhat kernel: ipmi_msghandler video fev 15 14:23:33 botnet-redhat kernel: CPU: 6 PID: 72 Comm: kworker/6:1 Tainted: P B OE 4.13.0-32-generic #35-Ubuntu fev 15 14:23:33 botnet-redhat kernel: Hardware name: Gigabyte Technology Co., Ltd. H81M-S2PH/H81M-S2PH, BIOS FD 08/10/2015 fev 15 14:23:33 botnet-redhat kernel: Workqueue: events free_work fev 15 14:23:33 botnet-redhat kernel: Call Trace: fev 15 14:23:33 botnet-redhat kernel: dump_stack+0x63/0x8b fev 15 14:23:33 botnet-redhat kernel: bad_page+0xcb/0x120 fev 15 14:23:33 botnet-redhat kernel: free_pages_check_bad+0x5f/0x70 fev 15 14:23:33 botnet-redhat kernel: free_pcppages_bulk+0x447/0x4e0 fev 15 14:23:33 botnet-redhat kernel: free_hot_cold_page+0x24b/0x260 fev 15 14:23:33 botnet-redhat kernel: __free_pages+0x1f/0x30 fev 15 14:23:33 botnet-redhat kernel: __vunmap+0x55/0xb0 fev 15 14:23:33 botnet-redhat kernel: free_work+0x25/0x40 fev 15 14:23:33 botnet-redhat kernel: process_one_work+0x1e7/0x410 fev 15 14:23:33 botnet-redhat kernel: worker_thread+0x4b/0x420 fev 15 14:23:33 botnet-redhat kernel: kthread+0x125/0x140 fev 15 14:23:33 botnet-redhat kernel: ? process_one_work+0x410/0x410 fev 15 14:23:33 botnet-redhat kernel: ? kthread_create_on_node+0x70/0x70 fev 15 14:23:33 botnet-redhat kernel: ret_from_fork+0x1f/0x30 fev 15 14:45:18 botnet-redhat kernel: r8169 0000:03:00.0: invalid short VPD tag 00 at offset 1