[ 36.375813][ T26] audit: type=1800 audit(1570542251.139:25): pid=7127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 36.405449][ T26] audit: type=1800 audit(1570542251.139:26): pid=7127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 36.428043][ T26] audit: type=1800 audit(1570542251.149:27): pid=7127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 37.010289][ T7194] sshd (7194) used greatest stack depth: 10032 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.4' (ECDSA) to the list of known hosts. 2019/10/08 13:44:19 fuzzer started 2019/10/08 13:44:21 dialing manager at 10.128.0.105:44253 2019/10/08 13:44:21 syscalls: 2523 2019/10/08 13:44:21 code coverage: enabled 2019/10/08 13:44:21 comparison tracing: enabled 2019/10/08 13:44:21 extra coverage: extra coverage is not supported by the kernel 2019/10/08 13:44:21 setuid sandbox: enabled 2019/10/08 13:44:21 namespace sandbox: enabled 2019/10/08 13:44:21 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/08 13:44:21 fault injection: enabled 2019/10/08 13:44:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/08 13:44:21 net packet injection: enabled 2019/10/08 13:44:21 net device setup: enabled 2019/10/08 13:44:21 concurrency sanitizer: enabled 13:44:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="6000000026000705000000000000000000000000545a99a4f100915f8c66b3bb00", @ANYRES32, @ANYBLOB="00000000ffffffff00000000070001006671000027ff020008000b000000000008000900000000000800020000000000080005000000000000000a00000000000000010000000000"], 0x60}}, 0x0) syzkaller login: [ 49.107887][ T7297] IPVS: ftp: loaded support on port[0] = 21 [ 49.203175][ T7297] chnl_net:caif_netlink_parms(): no params data found 13:44:24 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1a, 0x110, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) [ 49.244769][ T7297] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.252065][ T7297] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.260922][ T7297] device bridge_slave_0 entered promiscuous mode [ 49.279405][ T7297] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.286636][ T7297] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.300527][ T7297] device bridge_slave_1 entered promiscuous mode [ 49.345189][ T7297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 49.370637][ T7297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.403768][ T7297] team0: Port device team_slave_0 added [ 49.411053][ T7297] team0: Port device team_slave_1 added [ 49.471836][ T7297] device hsr_slave_0 entered promiscuous mode [ 49.509002][ T7297] device hsr_slave_1 entered promiscuous mode [ 49.566371][ T7297] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.573498][ T7297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.580930][ T7297] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.588185][ T7297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.606392][ T7300] IPVS: ftp: loaded support on port[0] = 21 13:44:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newqdisc={0x150, 0x24, 0x40b, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_MAX_P={0x8}, @TCA_RED_PARMS={0x14}]}}]}, 0x150}}, 0x0) [ 49.633780][ T7297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.648371][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.670204][ T3022] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.690370][ T3022] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.711526][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 49.739887][ T7297] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.773298][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.789672][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.796747][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.870690][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.879492][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.886935][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.946459][ T7304] IPVS: ftp: loaded support on port[0] = 21 [ 49.955552][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.993645][ T7297] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 50.005607][ T7297] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 50.022170][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.031539][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.042049][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.052097][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 13:44:24 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000001500)={0x11, 0x4, 0x4, 0x3}, 0x3c) [ 50.091260][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.127962][ T7297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 50.142178][ T7300] chnl_net:caif_netlink_parms(): no params data found [ 50.262107][ T7300] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.278612][ T7300] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.289064][ T7300] device bridge_slave_0 entered promiscuous mode [ 50.309367][ T7300] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.316657][ T7300] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.339491][ T7300] device bridge_slave_1 entered promiscuous mode [ 50.399788][ T7300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.426280][ T7304] chnl_net:caif_netlink_parms(): no params data found [ 50.463370][ T7300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.528956][ T7300] team0: Port device team_slave_0 added [ 50.536032][ T7300] team0: Port device team_slave_1 added [ 50.561723][ T7312] IPVS: ftp: loaded support on port[0] = 21 [ 50.575666][ T7304] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.588153][ T7304] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.596582][ T7304] device bridge_slave_0 entered promiscuous mode [ 50.620152][ T7304] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.627275][ T7304] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.635736][ T7304] device bridge_slave_1 entered promiscuous mode 13:44:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) r4 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r5, &(0x7f0000000a40), 0x8000000000000b0, 0x0) sched_setattr(0x0, 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x1000000, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote}) ioctl$FIGETBSZ(r2, 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc058565d, &(0x7f0000000300)={0x0, 0x0, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) [ 50.714445][ T7300] device hsr_slave_0 entered promiscuous mode [ 50.768994][ T7300] device hsr_slave_1 entered promiscuous mode [ 50.808791][ T7300] debugfs: Directory 'hsr0' with parent '/' already present! [ 50.831865][ T7316] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 50.856347][ T7304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 13:44:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="6000000026000705000000000000000000000000545a99a4f100915f8c66b3bb00", @ANYRES32, @ANYBLOB="00000000ffffffff00000000070001006671000027ff020008000b000000000008000900000000000800020000000000080005000000000000000a00000000000000010000000000"], 0x60}}, 0x0) [ 50.877009][ T7300] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.884141][ T7300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.891573][ T7300] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.898762][ T7300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.982260][ T7304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.089509][ T7304] team0: Port device team_slave_0 added [ 51.102519][ T7320] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 51.123629][ T7304] team0: Port device team_slave_1 added [ 51.143480][ T7300] 8021q: adding VLAN 0 to HW filter on device bond0 13:44:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="6000000026000705000000000000000000000000545a99a4f100915f8c66b3bb00", @ANYRES32, @ANYBLOB="00000000ffffffff00000000070001006671000027ff020008000b000000000008000900000000000800020000000000080005000000000000000a00000000000000010000000000"], 0x60}}, 0x0) [ 51.220961][ T7300] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.233170][ T27] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.247575][ T7321] IPVS: ftp: loaded support on port[0] = 21 [ 51.255911][ T27] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.274136][ T7284] ================================================================== [ 51.282280][ T7284] BUG: KCSAN: data-race in ext4_es_lookup_extent / ext4_es_lookup_extent [ 51.290688][ T7284] [ 51.293032][ T7284] read to 0xffff888218648c28 of 8 bytes by task 7326 on cpu 1: [ 51.300581][ T7284] ext4_es_lookup_extent+0x3ba/0x510 [ 51.306087][ T7284] ext4_map_blocks+0xc2/0xf70 [ 51.310947][ T7284] ext4_getblk+0x30b/0x380 [ 51.315358][ T7284] ext4_bread+0x4a/0x190 [ 51.319590][ T7284] __ext4_read_dirblock+0x3e/0x700 [ 51.324683][ T7284] ext4_add_entry+0x46b/0x8e0 [ 51.329358][ T7284] ext4_add_nondir+0x31/0xa0 [ 51.334098][ T7284] ext4_symlink+0x7c0/0x970 [ 51.338594][ T7284] vfs_symlink+0x218/0x310 [ 51.342994][ T7284] do_symlinkat+0x1a5/0x1e0 [ 51.347486][ T7284] __x64_sys_symlink+0x3f/0x50 [ 51.352523][ T7284] do_syscall_64+0xcf/0x2f0 [ 51.357015][ T7284] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 51.362960][ T7284] [ 51.365281][ T7284] write to 0xffff888218648c28 of 8 bytes by task 7284 on cpu 0: [ 51.372903][ T7284] ext4_es_lookup_extent+0x3d3/0x510 [ 51.378178][ T7284] ext4_map_blocks+0xc2/0xf70 [ 51.382848][ T7284] ext4_mpage_readpages+0x92b/0x1270 [ 51.388363][ T7284] ext4_readpages+0x92/0xc0 [ 51.392870][ T7284] read_pages+0xa2/0x2d0 [ 51.397093][ T7284] __do_page_cache_readahead+0x353/0x390 [ 51.402709][ T7284] ondemand_readahead+0x35d/0x710 [ 51.407722][ T7284] page_cache_async_readahead+0x22c/0x250 [ 51.413507][ T7284] generic_file_read_iter+0xffc/0x1440 [ 51.418949][ T7284] ext4_file_read_iter+0xfa/0x240 [ 51.423953][ T7284] new_sync_read+0x389/0x4f0 [ 51.428528][ T7284] __vfs_read+0xb1/0xc0 [ 51.432677][ T7284] integrity_kernel_read+0xa1/0xe0 [ 51.437769][ T7284] [ 51.440071][ T7284] Reported by Kernel Concurrency Sanitizer on: [ 51.446212][ T7284] CPU: 0 PID: 7284 Comm: syz-fuzzer Not tainted 5.3.0+ #0 [ 51.453318][ T7284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.463353][ T7284] ================================================================== [ 51.471410][ T7284] Kernel panic - not syncing: panic_on_warn set ... [ 51.477976][ T7284] CPU: 0 PID: 7284 Comm: syz-fuzzer Not tainted 5.3.0+ #0 [ 51.485143][ T7284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.495261][ T7284] Call Trace: [ 51.498543][ T7284] dump_stack+0xf5/0x159 [ 51.502776][ T7284] panic+0x209/0x639 [ 51.506661][ T7284] ? generic_file_read_iter+0xffc/0x1440 [ 51.512357][ T7284] ? vprintk_func+0x8d/0x140 [ 51.516930][ T7284] kcsan_report.cold+0xc/0x1b [ 51.521710][ T7284] __kcsan_setup_watchpoint+0x3ee/0x510 [ 51.527483][ T7284] __tsan_write8+0x32/0x40 [ 51.532130][ T7284] ext4_es_lookup_extent+0x3d3/0x510 [ 51.537522][ T7284] ext4_map_blocks+0xc2/0xf70 [ 51.542819][ T7284] ext4_mpage_readpages+0x92b/0x1270 [ 51.548101][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.553718][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.559357][ T7284] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 51.565320][ T7284] ? ext4_invalidatepage+0x1e0/0x1e0 [ 51.570594][ T7284] ext4_readpages+0x92/0xc0 [ 51.575086][ T7284] ? ext4_invalidatepage+0x1e0/0x1e0 [ 51.580456][ T7284] read_pages+0xa2/0x2d0 [ 51.585166][ T7284] __do_page_cache_readahead+0x353/0x390 [ 51.590783][ T7284] ondemand_readahead+0x35d/0x710 [ 51.595808][ T7284] page_cache_async_readahead+0x22c/0x250 [ 51.601618][ T7284] generic_file_read_iter+0xffc/0x1440 [ 51.607175][ T7284] ext4_file_read_iter+0xfa/0x240 [ 51.612215][ T7284] new_sync_read+0x389/0x4f0 [ 51.616797][ T7284] __vfs_read+0xb1/0xc0 [ 51.620953][ T7284] integrity_kernel_read+0xa1/0xe0 [ 51.626058][ T7284] ima_calc_file_hash_tfm+0x1b5/0x260 [ 51.631422][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.637043][ T7284] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 51.642776][ T7284] ? widen_string+0x4a/0x1a0 [ 51.647364][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.652982][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.658615][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.664244][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.669863][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.675578][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.681214][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.687280][ T7284] ? __tsan_read4+0x2c/0x30 [ 51.691947][ T7284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 51.698178][ T7284] ? refcount_sub_and_test_checked+0xc8/0x190 [ 51.704490][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.710130][ T7284] ? __tsan_read4+0x2c/0x30 [ 51.714819][ T7284] ima_calc_file_hash+0x158/0xf10 [ 51.719932][ T7284] ? __tsan_write8+0x32/0x40 [ 51.724530][ T7284] ? ext4_xattr_get+0x10b/0x5c0 [ 51.729396][ T7284] ? __rcu_read_unlock+0x62/0xe0 [ 51.734411][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.742127][ T7284] ima_collect_measurement+0x384/0x3b0 [ 51.747582][ T7284] process_measurement+0x980/0xff0 [ 51.752786][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.758406][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.764112][ T7284] ? __tsan_read4+0x2c/0x30 [ 51.769689][ T7284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 51.776271][ T7284] ? refcount_sub_and_test_checked+0xc8/0x190 [ 51.782397][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.788831][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.794458][ T7284] ima_file_check+0x7e/0xb0 [ 51.798968][ T7284] path_openat+0xfb1/0x3530 [ 51.803461][ T7284] ? __kcsan_setup_watchpoint+0x96/0x510 [ 51.813601][ T7284] do_filp_open+0x11e/0x1b0 [ 51.818714][ T7284] ? _raw_spin_unlock+0x4b/0x60 [ 51.823562][ T7284] ? __alloc_fd+0x316/0x4c0 [ 51.828229][ T7284] ? get_unused_fd_flags+0x93/0xc0 [ 51.834312][ T7284] do_sys_open+0x3b3/0x4f0 [ 51.838728][ T7284] __x64_sys_openat+0x62/0x80 [ 51.843744][ T7284] do_syscall_64+0xcf/0x2f0 [ 51.848308][ T7284] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 51.854292][ T7284] RIP: 0033:0x47c5aa [ 51.858169][ T7284] Code: e8 7b 6b fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 51.877761][ T7284] RSP: 002b:000000c425690850 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 51.886325][ T7284] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c5aa [ 51.894374][ T7284] RDX: 0000000000080002 RSI: 000000c420097080 RDI: ffffffffffffff9c [ 51.902413][ T7284] RBP: 000000c4256908d0 R08: 0000000000000000 R09: 0000000000000000 [ 51.910365][ T7284] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 51.918319][ T7284] R13: 0000000000000085 R14: 0000000000000084 R15: 0000000000000100 [ 51.927965][ T7284] Kernel Offset: disabled [ 51.932406][ T7284] Rebooting in 86400 seconds..