[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.822680][ T26] audit: type=1800 audit(1562254066.018:25): pid=8720 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.862296][ T26] audit: type=1800 audit(1562254066.018:26): pid=8720 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.891988][ T26] audit: type=1800 audit(1562254066.018:27): pid=8720 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.146' (ECDSA) to the list of known hosts. 2019/07/04 15:27:57 fuzzer started 2019/07/04 15:28:01 dialing manager at 10.128.0.26:39581 2019/07/04 15:28:01 syscalls: 2465 2019/07/04 15:28:01 code coverage: enabled 2019/07/04 15:28:01 comparison tracing: enabled 2019/07/04 15:28:01 extra coverage: extra coverage is not supported by the kernel 2019/07/04 15:28:01 setuid sandbox: enabled 2019/07/04 15:28:01 namespace sandbox: enabled 2019/07/04 15:28:01 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/04 15:28:01 fault injection: enabled 2019/07/04 15:28:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/04 15:28:01 net packet injection: enabled 2019/07/04 15:28:01 net device setup: enabled 15:29:41 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) syzkaller login: [ 173.150666][ T8889] IPVS: ftp: loaded support on port[0] = 21 15:29:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6403000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 173.254229][ T8889] chnl_net:caif_netlink_parms(): no params data found [ 173.321443][ T8889] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.343294][ T8889] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.351593][ T8889] device bridge_slave_0 entered promiscuous mode [ 173.375696][ T8889] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.393099][ T8889] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.401217][ T8889] device bridge_slave_1 entered promiscuous mode [ 173.426388][ T8889] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.446744][ T8889] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.470993][ T8892] IPVS: ftp: loaded support on port[0] = 21 15:29:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000002404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 173.506043][ T8889] team0: Port device team_slave_0 added [ 173.527606][ T8889] team0: Port device team_slave_1 added [ 173.635984][ T8889] device hsr_slave_0 entered promiscuous mode 15:29:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6406000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 173.763288][ T8889] device hsr_slave_1 entered promiscuous mode [ 173.878023][ T8894] IPVS: ftp: loaded support on port[0] = 21 [ 173.901609][ T8897] IPVS: ftp: loaded support on port[0] = 21 [ 173.911497][ T8892] chnl_net:caif_netlink_parms(): no params data found [ 173.929153][ T8889] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.936492][ T8889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.944637][ T8889] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.951749][ T8889] bridge0: port 1(bridge_slave_0) entered forwarding state 15:29:42 executing program 4: [ 174.027632][ T8892] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.036714][ T8892] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.045332][ T8892] device bridge_slave_0 entered promiscuous mode [ 174.054259][ T8892] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.061423][ T8892] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.071284][ T8892] device bridge_slave_1 entered promiscuous mode [ 174.154068][ T8892] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.201336][ T8892] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.281466][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.301918][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.318448][ T8889] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.327291][ T8892] team0: Port device team_slave_0 added [ 174.337467][ T8892] team0: Port device team_slave_1 added [ 174.379341][ T8899] IPVS: ftp: loaded support on port[0] = 21 [ 174.379346][ T8889] 8021q: adding VLAN 0 to HW filter on device team0 15:29:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="6125b8c61bb42000"], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 174.441318][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.451887][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.460794][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.471997][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.481486][ T8900] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.488642][ T8900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.526208][ T8897] chnl_net:caif_netlink_parms(): no params data found [ 174.538950][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.550428][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.559511][ T2995] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.566681][ T2995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.578788][ T8894] chnl_net:caif_netlink_parms(): no params data found [ 174.636820][ T8892] device hsr_slave_0 entered promiscuous mode [ 174.693349][ T8892] device hsr_slave_1 entered promiscuous mode [ 174.765180][ T8905] IPVS: ftp: loaded support on port[0] = 21 [ 174.789198][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.797898][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.807253][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.816077][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.824458][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.832977][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.887875][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.895911][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.904801][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.926365][ T8897] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.933564][ T8897] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.941279][ T8897] device bridge_slave_0 entered promiscuous mode [ 174.951076][ T8897] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.958365][ T8897] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.966426][ T8897] device bridge_slave_1 entered promiscuous mode [ 174.974028][ T8894] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.981083][ T8894] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.989003][ T8894] device bridge_slave_0 entered promiscuous mode [ 174.997967][ T8894] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.006662][ T8894] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.014800][ T8894] device bridge_slave_1 entered promiscuous mode [ 175.045395][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.055045][ T3488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.065769][ T8894] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 175.079673][ T8894] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.099287][ T8897] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 175.127263][ T8894] team0: Port device team_slave_0 added [ 175.136379][ T8897] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.146651][ T8889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.161108][ T8894] team0: Port device team_slave_1 added [ 175.192572][ T8897] team0: Port device team_slave_0 added [ 175.217710][ T8897] team0: Port device team_slave_1 added [ 175.274893][ T8894] device hsr_slave_0 entered promiscuous mode [ 175.323438][ T8894] device hsr_slave_1 entered promiscuous mode [ 175.394170][ T8889] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.465484][ T8899] chnl_net:caif_netlink_parms(): no params data found [ 175.536296][ T8897] device hsr_slave_0 entered promiscuous mode [ 175.593845][ T8897] device hsr_slave_1 entered promiscuous mode [ 175.767886][ T8899] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.775557][ T8899] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.783632][ T8899] device bridge_slave_0 entered promiscuous mode [ 175.800355][ T8892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.817406][ T8899] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.825801][ T8899] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.833938][ T8899] device bridge_slave_1 entered promiscuous mode [ 175.855128][ T8899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 175.936732][ T8899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.959617][ T8905] chnl_net:caif_netlink_parms(): no params data found [ 175.980498][ T8897] 8021q: adding VLAN 0 to HW filter on device bond0 15:29:44 executing program 0: 15:29:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000001503000000feffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 176.053639][ T8899] team0: Port device team_slave_0 added [ 176.062072][ T8892] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.079634][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.088767][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.107363][ T8919] ------------[ cut here ]------------ [ 176.113981][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.122280][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.130751][ T8919] verifier backtracking bug [ 176.130891][ T8919] WARNING: CPU: 0 PID: 8919 at kernel/bpf/verifier.c:1755 mark_chain_precision+0x15c2/0x18e0 [ 176.145542][ T8919] Kernel panic - not syncing: panic_on_warn set ... [ 176.152122][ T8919] CPU: 0 PID: 8919 Comm: syz-executor.0 Not tainted 5.2.0-rc7-next-20190703 #28 [ 176.161129][ T8919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.171175][ T8919] Call Trace: [ 176.174475][ T8919] dump_stack+0x172/0x1f0 [ 176.178803][ T8919] ? mark_chain_precision+0x1520/0x18e0 [ 176.184928][ T8919] panic+0x2dc/0x755 [ 176.188833][ T8919] ? add_taint.cold+0x16/0x16 [ 176.193513][ T8919] ? kasan_check_write+0x14/0x20 [ 176.198446][ T8919] ? __warn.cold+0x5/0x4c [ 176.202763][ T8919] ? mark_chain_precision+0x15c2/0x18e0 [ 176.208293][ T8919] __warn.cold+0x20/0x4c [ 176.212519][ T8919] ? mark_chain_precision+0x15c2/0x18e0 [ 176.218069][ T8919] report_bug+0x263/0x2b0 [ 176.222728][ T8919] do_error_trap+0x11b/0x200 [ 176.227306][ T8919] do_invalid_op+0x37/0x50 [ 176.231714][ T8919] ? mark_chain_precision+0x15c2/0x18e0 [ 176.237268][ T8919] invalid_op+0x14/0x20 [ 176.241420][ T8919] RIP: 0010:mark_chain_precision+0x15c2/0x18e0 [ 176.247566][ T8919] Code: e9 55 f2 ff ff 48 89 df e8 5b c9 2c 00 e9 3a f3 ff ff e8 21 a7 f2 ff 48 c7 c7 60 9d 91 87 c6 05 1e f8 1f 08 01 e8 96 1f c4 ff <0f> 0b 41 be f2 ff ff ff e9 eb f7 ff ff e8 fc a6 f2 ff 45 31 f6 e9 [ 176.267164][ T8919] RSP: 0018:ffff888065627378 EFLAGS: 00010282 [ 176.273318][ T8919] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 176.281295][ T8919] RDX: 000000000000a055 RSI: ffffffff815c0c96 RDI: ffffed100cac4e61 [ 176.289252][ T8919] RBP: ffff8880656274d0 R08: ffff888065616100 R09: 0000000000000000 [ 176.297217][ T8919] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 176.305207][ T8919] R13: ffff888065630bc0 R14: 0000000000000001 R15: dffffc0000000000 [ 176.313200][ T8919] ? vprintk_func+0x86/0x189 [ 176.317815][ T8919] ? mark_chain_precision+0x15c2/0x18e0 [ 176.323699][ T8919] ? mark_reg_unknown+0x50/0x50 [ 176.328535][ T8919] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 176.334330][ T8919] ? bpf_verifier_log_write+0x240/0x240 [ 176.339916][ T8919] ? check_reg_arg+0x1f1/0x480 [ 176.344683][ T8919] check_cond_jmp_op+0xcce/0x3c20 [ 176.349717][ T8919] ? security_capable+0x95/0xc0 [ 176.354571][ T8919] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 176.360203][ T8919] ? find_held_lock+0x35/0x130 [ 176.365001][ T8919] ? __sanitizer_cov_trace_const_cmp2+0x1d/0x20 [ 176.371361][ T8919] ? check_func_arg+0x11b0/0x11b0 [ 176.376383][ T8919] ? fault_create_debugfs_attr+0x180/0x180 [ 176.386456][ T8919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.392692][ T8919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.399009][ T8919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.405236][ T8919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.411466][ T8919] ? krealloc+0x7b/0xd0 [ 176.415620][ T8919] ? krealloc+0x7b/0xd0 [ 176.420122][ T8919] ? rcu_read_lock_sched_held+0x110/0x130 [ 176.425842][ T8919] ? kfree+0x28b/0x2c0 [ 176.429900][ T8919] do_check+0x6187/0x8990 [ 176.434231][ T8919] ? find_held_lock+0x35/0x130 [ 176.439014][ T8919] ? check_helper_call+0x3210/0x3210 [ 176.444282][ T8919] ? kfree+0x226/0x2c0 [ 176.448333][ T8919] ? kvfree+0x61/0x70 [ 176.452290][ T8919] ? kfree+0x226/0x2c0 [ 176.456354][ T8919] ? lockdep_hardirqs_on+0x418/0x5d0 [ 176.461668][ T8919] ? trace_hardirqs_on+0x67/0x240 [ 176.466684][ T8919] ? kvfree+0x61/0x70 [ 176.470698][ T8919] bpf_check+0x6f99/0x9948 [ 176.476764][ T8919] ? do_check+0x8990/0x8990 [ 176.481268][ T8919] ? lock_downgrade+0x920/0x920 [ 176.486269][ T8919] ? ktime_get_with_offset+0x13a/0x350 [ 176.491711][ T8919] ? bpf_prog_load+0xdce/0x1670 [ 176.496553][ T8919] ? ktime_get_with_offset+0x13a/0x350 [ 176.502010][ T8919] ? lockdep_hardirqs_on+0x418/0x5d0 [ 176.507381][ T8919] ? trace_hardirqs_on+0x67/0x240 [ 176.512406][ T8919] ? memset+0x32/0x40 [ 176.516387][ T8919] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 176.522971][ T8919] ? bpf_obj_name_cpy+0x13f/0x190 [ 176.527995][ T8919] bpf_prog_load+0xe68/0x1670 [ 176.532683][ T8919] ? bpf_prog_new_fd+0x60/0x60 [ 176.537451][ T8919] ? lock_downgrade+0x920/0x920 [ 176.542306][ T8919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 176.548554][ T8919] ? security_bpf+0x8b/0xc0 [ 176.553065][ T8919] __do_sys_bpf+0xa46/0x42f0 [ 176.557675][ T8919] ? bpf_prog_load+0x1670/0x1670 [ 176.562610][ T8919] ? kasan_check_read+0x11/0x20 [ 176.567444][ T8919] ? _copy_to_user+0x118/0x160 [ 176.572192][ T8919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 176.578434][ T8919] ? put_timespec64+0xda/0x140 [ 176.583565][ T8919] ? nsecs_to_jiffies+0x30/0x30 [ 176.588408][ T8919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 176.593859][ T8919] ? do_syscall_64+0x26/0x6a0 [ 176.598532][ T8919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.604577][ T8919] ? do_syscall_64+0x26/0x6a0 [ 176.609240][ T8919] __x64_sys_bpf+0x73/0xb0 [ 176.613655][ T8919] do_syscall_64+0xfd/0x6a0 [ 176.618174][ T8919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.625333][ T8919] RIP: 0033:0x4597c9 [ 176.629211][ T8919] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.648798][ T8919] RSP: 002b:00007fc1e3da1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 176.657202][ T8919] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 176.665253][ T8919] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005 [ 176.673223][ T8919] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 176.681189][ T8919] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1e3da26d4 [ 176.689144][ T8919] R13: 00000000004bfc12 R14: 00000000004d15f8 R15: 00000000ffffffff [ 176.698609][ T8919] Kernel Offset: disabled [ 176.703056][ T8919] Rebooting in 86400 seconds..