[ 52.350253][ T26] audit: type=1800 audit(1573051037.882:27): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 52.376976][ T26] audit: type=1800 audit(1573051037.882:28): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.266487][ T26] audit: type=1800 audit(1573051038.862:29): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 53.286889][ T26] audit: type=1800 audit(1573051038.862:30): pid=7884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.83' (ECDSA) to the list of known hosts. 2019/11/06 14:37:27 fuzzer started 2019/11/06 14:37:29 dialing manager at 10.128.0.105:44951 2019/11/06 14:37:29 syscalls: 2553 2019/11/06 14:37:29 code coverage: enabled 2019/11/06 14:37:29 comparison tracing: enabled 2019/11/06 14:37:29 extra coverage: extra coverage is not supported by the kernel 2019/11/06 14:37:29 setuid sandbox: enabled 2019/11/06 14:37:29 namespace sandbox: enabled 2019/11/06 14:37:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 14:37:29 fault injection: enabled 2019/11/06 14:37:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 14:37:29 net packet injection: enabled 2019/11/06 14:37:29 net device setup: enabled 2019/11/06 14:37:29 concurrency sanitizer: enabled 2019/11/06 14:37:29 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/06 14:37:30 adding functions to KCSAN blacklist: 'pid_update_inode' 'tomoyo_supervisor' 'pipe_poll' 'ep_poll' '__hrtimer_run_queues' 'echo_char' 'find_next_bit' 14:37:33 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) connect$x25(r0, 0x0, 0x0) 14:37:33 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000140), 0x0, 0xba) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x25d) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195", 0x33}], 0x1}, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xff2b69543f54baa9, 0x0) r2 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3, 0x2) splice(r2, 0x0, r0, 0x0, 0x1000000008, 0x3) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) syzkaller login: [ 67.686630][ T8056] IPVS: ftp: loaded support on port[0] = 21 [ 67.781262][ T8056] chnl_net:caif_netlink_parms(): no params data found [ 67.851992][ T8056] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.869068][ T8056] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.876892][ T8056] device bridge_slave_0 entered promiscuous mode [ 67.890009][ T8056] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.897080][ T8056] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.906086][ T8056] device bridge_slave_1 entered promiscuous mode [ 67.920884][ T8059] IPVS: ftp: loaded support on port[0] = 21 [ 67.943715][ T8056] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.963921][ T8056] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:37:33 executing program 2: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x7f, 0x29, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x1, 0x8a9, 0x0, 0x0, 0x613, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0xffffffffffffffa2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 68.002122][ T8056] team0: Port device team_slave_0 added [ 68.020903][ T8056] team0: Port device team_slave_1 added [ 68.151459][ T8056] device hsr_slave_0 entered promiscuous mode 14:37:33 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 68.259305][ T8056] device hsr_slave_1 entered promiscuous mode [ 68.321092][ T8062] IPVS: ftp: loaded support on port[0] = 21 [ 68.343701][ T8059] chnl_net:caif_netlink_parms(): no params data found [ 68.500449][ T8056] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.507534][ T8056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.515080][ T8056] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.522829][ T8056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.610256][ T8065] IPVS: ftp: loaded support on port[0] = 21 [ 68.619572][ T8059] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.626860][ T8059] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.651517][ T8059] device bridge_slave_0 entered promiscuous mode [ 68.711651][ T8059] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.718722][ T8059] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.759816][ T8059] device bridge_slave_1 entered promiscuous mode [ 68.844244][ T2405] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.869530][ T2405] bridge0: port 2(bridge_slave_1) entered disabled state 14:37:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xd59}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff018000000600395032303030"], 0x13) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_ENTRY(r3, &(0x7f0000000140)={0x90}, 0x90) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x3, &(0x7f0000000a40)=[{0x0}, {&(0x7f0000000880)}, {&(0x7f0000000940), 0x0, 0x330c}], 0x0, 0x0) [ 69.008378][ T8059] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.054764][ T8062] chnl_net:caif_netlink_parms(): no params data found [ 69.096694][ T8059] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.241121][ T8056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.261835][ T8059] team0: Port device team_slave_0 added [ 69.271107][ T8062] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.278202][ T8062] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.319824][ T8062] device bridge_slave_0 entered promiscuous mode [ 69.364909][ T8056] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.375214][ T8059] team0: Port device team_slave_1 added [ 69.390742][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.398469][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.439783][ T8062] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.446884][ T8062] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.490070][ T8062] device bridge_slave_1 entered promiscuous mode [ 69.529139][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.537918][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.569889][ T8091] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.577078][ T8091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.629695][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.638352][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.679575][ T8091] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.686721][ T8091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.719655][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.728744][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.780523][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.809605][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.864550][ T8092] IPVS: ftp: loaded support on port[0] = 21 [ 69.872283][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.890256][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.921799][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.951985][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 14:37:35 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x1}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x400000000000122, 0x0) [ 69.979957][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.992938][ T8054] ================================================================== [ 70.001091][ T8054] BUG: KCSAN: data-race in tcp_add_backlog / tcp_recvmsg [ 70.008108][ T8054] [ 70.010456][ T8054] write to 0xffff8881242e12f8 of 8 bytes by interrupt on cpu 1: [ 70.017347][ T8056] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.018120][ T8054] tcp_add_backlog+0x476/0xce0 [ 70.033171][ T8054] tcp_v4_rcv+0x1a70/0x1bd0 [ 70.037682][ T8054] ip_protocol_deliver_rcu+0x4d/0x420 [ 70.043064][ T8054] ip_local_deliver_finish+0x110/0x140 [ 70.048532][ T8054] ip_local_deliver+0x133/0x210 [ 70.050025][ T8056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.053394][ T8054] ip_rcv_finish+0x121/0x160 [ 70.065080][ T8054] ip_rcv+0x18f/0x1a0 [ 70.069073][ T8054] __netif_receive_skb_one_core+0xa7/0xe0 [ 70.074798][ T8054] __netif_receive_skb+0x37/0xf0 [ 70.079748][ T8054] netif_receive_skb_internal+0x59/0x190 [ 70.085398][ T8054] napi_gro_receive+0x28f/0x330 [ 70.090263][ T8054] receive_buf+0x284/0x30b0 [ 70.094907][ T8054] virtnet_poll+0x436/0x7d0 [ 70.099431][ T8054] net_rx_action+0x3ae/0xa90 [ 70.102734][ T8065] chnl_net:caif_netlink_parms(): no params data found [ 70.104055][ T8054] __do_softirq+0x115/0x33f [ 70.115307][ T8054] irq_exit+0xbb/0xe0 [ 70.119294][ T8054] do_IRQ+0xa6/0x180 [ 70.123195][ T8054] ret_from_intr+0x0/0x19 [ 70.127537][ T8054] tomoyo_check_path_acl+0x1/0xa0 [ 70.132569][ T8054] tomoyo_path_permission+0xe3/0x160 [ 70.137878][ T8054] tomoyo_check_open_permission+0x2fd/0x320 [ 70.143795][ T8054] tomoyo_file_open+0x75/0x90 [ 70.148650][ T8054] security_file_open+0x69/0x210 [ 70.153693][ T8054] do_dentry_open+0x20a/0x8f0 [ 70.158382][ T8054] vfs_open+0x62/0x80 [ 70.162376][ T8054] path_openat+0xf73/0x36e0 [ 70.166885][ T8054] do_filp_open+0x11e/0x1b0 [ 70.171399][ T8054] do_sys_open+0x3b3/0x4f0 [ 70.175826][ T8054] __x64_sys_open+0x55/0x70 [ 70.180351][ T8054] do_syscall_64+0xcc/0x370 [ 70.184861][ T8054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.190745][ T8054] [ 70.193082][ T8054] read to 0xffff8881242e12f8 of 8 bytes by task 8054 on cpu 0: [ 70.196454][ T8065] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.200631][ T8054] tcp_recvmsg+0x46e/0x1b40 [ 70.200650][ T8054] inet_recvmsg+0xbb/0x250 [ 70.200682][ T8054] sock_recvmsg+0x92/0xb0 [ 70.209930][ T8065] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.212258][ T8054] sock_read_iter+0x15f/0x1e0 [ 70.225746][ T8065] device bridge_slave_0 entered promiscuous mode [ 70.227976][ T8054] new_sync_read+0x389/0x4f0 [ 70.243963][ T8054] __vfs_read+0xb1/0xc0 [ 70.245904][ T8065] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.248145][ T8054] vfs_read+0x143/0x2c0 [ 70.255365][ T8065] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.259290][ T8054] ksys_read+0xd5/0x1b0 [ 70.259321][ T8054] __x64_sys_read+0x4c/0x60 [ 70.267180][ T8065] device bridge_slave_1 entered promiscuous mode [ 70.270725][ T8054] do_syscall_64+0xcc/0x370 [ 70.270761][ T8054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.288008][ T8065] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.295661][ T8054] [ 70.295669][ T8054] Reported by Kernel Concurrency Sanitizer on: [ 70.295690][ T8054] CPU: 0 PID: 8054 Comm: syz-fuzzer Not tainted 5.4.0-rc6+ #0 [ 70.295712][ T8054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.306190][ T8065] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.307038][ T8054] ================================================================== [ 70.307049][ T8054] Kernel panic - not syncing: panic_on_warn set ... [ 70.307068][ T8054] CPU: 0 PID: 8054 Comm: syz-fuzzer Not tainted 5.4.0-rc6+ #0 [ 70.307089][ T8054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.324906][ T8065] team0: Port device team_slave_0 added [ 70.330805][ T8054] Call Trace: [ 70.330838][ T8054] dump_stack+0xf5/0x159 [ 70.330943][ T8054] panic+0x210/0x640 [ 70.340910][ T8065] team0: Port device team_slave_1 added [ 70.348017][ T8054] ? vprintk_func+0x8d/0x140 [ 70.399126][ T8054] kcsan_report.cold+0xc/0xe [ 70.403743][ T8054] kcsan_setup_watchpoint+0x3fe/0x410 [ 70.409229][ T8054] __tsan_read8+0x145/0x1f0 [ 70.413776][ T8054] tcp_recvmsg+0x46e/0x1b40 [ 70.418321][ T8054] inet_recvmsg+0xbb/0x250 [ 70.422742][ T8054] ? apparmor_socket_recvmsg+0x3b/0x50 [ 70.428230][ T8054] ? security_socket_recvmsg+0x92/0xb0 [ 70.433705][ T8054] ? inet_sendpage+0x100/0x100 [ 70.438510][ T8054] sock_recvmsg+0x92/0xb0 [ 70.442852][ T8054] sock_read_iter+0x15f/0x1e0 [ 70.447554][ T8054] new_sync_read+0x389/0x4f0 [ 70.452258][ T8054] __vfs_read+0xb1/0xc0 [ 70.456453][ T8054] vfs_read+0x143/0x2c0 [ 70.460634][ T8054] ksys_read+0xd5/0x1b0 [ 70.464802][ T8054] __x64_sys_read+0x4c/0x60 [ 70.469318][ T8054] do_syscall_64+0xcc/0x370 [ 70.473846][ T8054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.479747][ T8054] RIP: 0033:0x47c530 [ 70.483664][ T8054] Code: 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 49 c7 c2 00 00 00 00 49 c7 c0 00 00 00 00 49 c7 c1 00 00 00 00 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 70.503277][ T8054] RSP: 002b:000000c4202cd7d0 EFLAGS: 00000202 ORIG_RAX: 0000000000000000 [ 70.511703][ T8054] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c530 [ 70.519683][ T8054] RDX: 0000000000001000 RSI: 000000c420058000 RDI: 0000000000000003 [ 70.527666][ T8054] RBP: 000000c4202cd828 R08: 0000000000000000 R09: 0000000000000000 [ 70.535653][ T8054] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000100 [ 70.543753][ T8054] R13: ffffffffffffffff R14: 0000000000000004 R15: ffffffffffffffff [ 70.553528][ T8054] Kernel Offset: disabled [ 70.557860][ T8054] Rebooting in 86400 seconds..