[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.740200][ T25] audit: type=1800 audit(1570960228.864:25): pid=7049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 36.759882][ T25] audit: type=1800 audit(1570960228.874:26): pid=7049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 36.780038][ T25] audit: type=1800 audit(1570960228.874:27): pid=7049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.226' (ECDSA) to the list of known hosts. 2019/10/13 09:50:35 fuzzer started 2019/10/13 09:50:37 dialing manager at 10.128.0.105:40973 2019/10/13 09:50:37 syscalls: 2523 2019/10/13 09:50:37 code coverage: enabled 2019/10/13 09:50:37 comparison tracing: enabled 2019/10/13 09:50:37 extra coverage: extra coverage is not supported by the kernel 2019/10/13 09:50:37 setuid sandbox: enabled 2019/10/13 09:50:37 namespace sandbox: enabled 2019/10/13 09:50:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/13 09:50:37 fault injection: enabled 2019/10/13 09:50:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/13 09:50:37 net packet injection: enabled 2019/10/13 09:50:37 net device setup: enabled 2019/10/13 09:50:37 concurrency sanitizer: enabled 09:50:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f00000004c0)="2e00000022004786006d20020031d4591ba8acdd41e600899c22fb5b66000025f9336056ac3d23c878ed0f0c0b7c", 0x2e) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffdc1) syzkaller login: [ 48.775989][ T7219] IPVS: ftp: loaded support on port[0] = 21 09:50:41 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000006491bdad00"/64], 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002c00010700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000030000000c0001007463696e6465780044000200400006003c0001000000000000005552360cb04967001d00"/99], 0x74}}, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 48.863758][ T7219] chnl_net:caif_netlink_parms(): no params data found [ 48.903764][ T7219] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.930867][ T7219] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.950654][ T7219] device bridge_slave_0 entered promiscuous mode [ 48.958425][ T7219] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.981469][ T7219] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.990963][ T7219] device bridge_slave_1 entered promiscuous mode [ 49.037661][ T7219] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 49.063672][ T7219] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.098926][ T7223] IPVS: ftp: loaded support on port[0] = 21 [ 49.106436][ T7219] team0: Port device team_slave_0 added [ 49.113515][ T7219] team0: Port device team_slave_1 added [ 49.214671][ T7219] device hsr_slave_0 entered promiscuous mode 09:50:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0xfffffffffffffdd7, 0xffffffffffffffff, 0x0, 0x0) recvfrom$inet6(r1, 0x0, 0x0, 0x10040000022, 0x0, 0xe977579f3fc07884) [ 49.300993][ T7219] device hsr_slave_1 entered promiscuous mode [ 49.348106][ T7219] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.355303][ T7219] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.362717][ T7219] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.369781][ T7219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.496699][ T7219] 8021q: adding VLAN 0 to HW filter on device bond0 09:50:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf002, 0x6c00000000000000}, 0x334, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="280000001c0007b97c0000000000000007000000", @ANYRES32=r2, @ANYBLOB="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"], 0x42e}}, 0x0) [ 49.551336][ T7219] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.559262][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.578541][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.619587][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.633793][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 49.674084][ T7227] IPVS: ftp: loaded support on port[0] = 21 [ 49.685363][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.702154][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.709274][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.717973][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.727486][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.734606][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.776626][ T7223] chnl_net:caif_netlink_parms(): no params data found [ 49.795593][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 49.841221][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 49.850324][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 49.862322][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.873301][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.906263][ T7230] IPVS: ftp: loaded support on port[0] = 21 [ 49.914800][ T7219] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.998024][ T7223] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.026522][ T7223] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.035243][ T7223] device bridge_slave_0 entered promiscuous mode [ 50.048666][ T7223] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.056296][ T7223] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.066417][ T7223] device bridge_slave_1 entered promiscuous mode [ 50.137073][ T7230] ================================================================== [ 50.145228][ T7230] BUG: KCSAN: data-race in pcpu_alloc / pcpu_chunk_populated [ 50.152586][ T7230] [ 50.154934][ T7230] write to 0xffffffff86043740 of 4 bytes by task 7226 on cpu 0: [ 50.162705][ T7230] pcpu_chunk_populated+0xed/0x110 [ 50.167828][ T7230] pcpu_balance_workfn+0xa06/0xc50 [ 50.173163][ T7230] process_one_work+0x3d4/0x890 [ 50.178016][ T7230] worker_thread+0xa0/0x800 [ 50.182515][ T7230] kthread+0x1d4/0x200 09:50:42 executing program 4: gettid() creat(&(0x7f0000000440)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) lsetxattr$security_selinux(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:lib_t:s0\x00', 0x1b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setxattr$security_evm(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000400)=@v2={0x5, 0x2, 0x5}, 0xa, 0x2) dup(r0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000340)={@multicast1, @broadcast, 0x0, 0x8, [@loopback, @rand_addr=0x1, @empty, @broadcast, @multicast1, @loopback, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, 0x30) setxattr$security_capability(0x0, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000000)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) dup2(0xffffffffffffffff, r2) r3 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) r4 = socket$inet(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000480)) [ 50.186584][ T7230] ret_from_fork+0x1f/0x30 [ 50.190992][ T7230] [ 50.193324][ T7230] read to 0xffffffff86043740 of 4 bytes by task 7230 on cpu 1: [ 50.200876][ T7230] pcpu_alloc+0x3b0/0xcf0 [ 50.205216][ T7230] __alloc_percpu_gfp+0x31/0x50 [ 50.210230][ T7230] fib6_nh_init+0x2d6/0xee0 [ 50.214741][ T7230] ip6_route_info_create+0x913/0xd40 [ 50.220022][ T7230] ip6_route_add+0x30/0xd0 [ 50.224441][ T7230] addrconf_prefix_route.isra.0+0x1e3/0x260 [ 50.230338][ T7230] addrconf_add_linklocal+0x1b1/0x250 [ 50.235715][ T7230] addrconf_addr_gen+0x1ff/0x230 [ 50.240659][ T7230] addrconf_dev_config+0x1c0/0x280 [ 50.245778][ T7230] addrconf_notify+0x1fa/0x1480 [ 50.250631][ T7230] notifier_call_chain+0xd7/0x160 [ 50.255664][ T7230] raw_notifier_call_chain+0x37/0x50 [ 50.260953][ T7230] call_netdevice_notifiers_info+0x48/0xc0 [ 50.266757][ T7230] [ 50.269078][ T7230] Reported by Kernel Concurrency Sanitizer on: [ 50.275228][ T7230] CPU: 1 PID: 7230 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 50.282678][ T7230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.292824][ T7230] ================================================================== [ 50.300893][ T7230] Kernel panic - not syncing: panic_on_warn set ... [ 50.307482][ T7230] CPU: 1 PID: 7230 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 50.314938][ T7230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.326995][ T7230] Call Trace: [ 50.330293][ T7230] dump_stack+0xf5/0x159 [ 50.334539][ T7230] panic+0x209/0x639 [ 50.338448][ T7230] ? addrconf_dev_config+0x1c0/0x280 [ 50.343738][ T7230] ? vprintk_func+0x8d/0x140 [ 50.348426][ T7230] kcsan_report.cold+0xc/0x1b [ 50.353112][ T7230] __kcsan_setup_watchpoint+0x3ee/0x510 [ 50.358661][ T7230] __tsan_read4+0x2c/0x30 [ 50.363003][ T7230] pcpu_alloc+0x3b0/0xcf0 [ 50.367359][ T7230] __alloc_percpu_gfp+0x31/0x50 [ 50.372227][ T7230] fib6_nh_init+0x2d6/0xee0 [ 50.376731][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.382373][ T7230] ? fib6_info_alloc+0x11d/0x160 [ 50.387314][ T7230] ip6_route_info_create+0x913/0xd40 [ 50.392604][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.398243][ T7230] ip6_route_add+0x30/0xd0 [ 50.402669][ T7230] addrconf_prefix_route.isra.0+0x1e3/0x260 [ 50.408631][ T7230] addrconf_add_linklocal+0x1b1/0x250 [ 50.414039][ T7230] addrconf_addr_gen+0x1ff/0x230 [ 50.418985][ T7230] addrconf_dev_config+0x1c0/0x280 [ 50.424097][ T7230] ? addrconf_dev_config+0x1c0/0x280 [ 50.429393][ T7230] addrconf_notify+0x1fa/0x1480 [ 50.434269][ T7230] notifier_call_chain+0xd7/0x160 [ 50.439300][ T7230] ? notifier_call_chain+0xd7/0x160 [ 50.444502][ T7230] raw_notifier_call_chain+0x37/0x50 [ 50.449796][ T7230] call_netdevice_notifiers_info+0x48/0xc0 [ 50.455603][ T7230] __dev_notify_flags+0xcf/0x200 [ 50.460561][ T7230] dev_change_flags+0xb8/0xe0 [ 50.465247][ T7230] do_setlink+0x626/0x1e30 [ 50.469665][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.475333][ T7230] ? __tsan_read2+0x2c/0x30 [ 50.479962][ T7230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 50.486213][ T7230] ? __nla_validate_parse+0xa0/0x1130 [ 50.491592][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.497226][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.502862][ T7230] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 50.508760][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.514399][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.520061][ T7230] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 50.525957][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.531585][ T7230] __rtnl_newlink+0x93e/0x1010 [ 50.536351][ T7230] ? __wake_up_common_lock+0x85/0xb0 [ 50.541641][ T7230] ? consume_skb+0xcc/0x1c0 [ 50.546137][ T7230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 50.552384][ T7230] ? netlink_broadcast_filtered+0x2d6/0x800 [ 50.558309][ T7230] ? __kcsan_setup_watchpoint+0x60/0x510 [ 50.563930][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.569553][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.575180][ T7230] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 50.581066][ T7230] ? __rtnl_newlink+0x1010/0x1010 [ 50.586098][ T7230] ? __rtnl_newlink+0x1010/0x1010 [ 50.591136][ T7230] rtnl_newlink+0x63/0x90 [ 50.595461][ T7230] rtnetlink_rcv_msg+0x1d3/0x500 [ 50.600404][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.606037][ T7230] netlink_rcv_skb+0xb0/0x260 [ 50.610709][ T7230] ? rtnl_calcit.isra.0+0x220/0x220 [ 50.615910][ T7230] rtnetlink_rcv+0x26/0x30 [ 50.620318][ T7230] netlink_unicast+0x354/0x430 [ 50.625081][ T7230] netlink_sendmsg+0x456/0x770 [ 50.629841][ T7230] ? aa_sock_msg_perm.isra.0+0xa5/0x140 [ 50.635396][ T7230] ? netlink_unicast+0x430/0x430 [ 50.640328][ T7230] sock_sendmsg+0x9f/0xc0 [ 50.644651][ T7230] __sys_sendto+0x21f/0x320 [ 50.649156][ T7230] ? blkcg_maybe_throttle_current+0x472/0x610 [ 50.655212][ T7230] ? __tsan_read8+0x2c/0x30 [ 50.659705][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.665329][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.671386][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.677010][ T7230] ? __kcsan_setup_watchpoint+0x96/0x510 [ 50.682638][ T7230] __x64_sys_sendto+0x89/0xb0 [ 50.687313][ T7230] do_syscall_64+0xcf/0x2f0 [ 50.691836][ T7230] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 50.697713][ T7230] RIP: 0033:0x4138a3 [ 50.701601][ T7230] Code: ff 0f 83 b0 19 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d ed 29 66 00 00 75 17 49 89 ca b8 2c 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 81 19 00 00 c3 48 83 ec 08 e8 87 fa ff ff [ 50.721195][ T7230] RSP: 002b:00007ffed1f1de68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 50.729597][ T7230] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004138a3 [ 50.737561][ T7230] RDX: 0000000000000038 RSI: 0000000000a70070 RDI: 0000000000000003 [ 50.745522][ T7230] RBP: 0000000000000000 R08: 00007ffed1f1de70 R09: 000000000000000c [ 50.753480][ T7230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 50.761462][ T7230] R13: 0000000000000003 R14: 00007ffed1f1df08 R15: 0000000000000000 [ 50.770805][ T7230] Kernel Offset: disabled [ 50.775131][ T7230] Rebooting in 86400 seconds..