[ 51.520178][ T26] audit: type=1800 audit(1573389634.291:27): pid=7881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.548475][ T26] audit: type=1800 audit(1573389634.291:28): pid=7881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.204049][ T26] audit: type=1800 audit(1573389635.061:29): pid=7881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 52.224110][ T26] audit: type=1800 audit(1573389635.061:30): pid=7881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.214' (ECDSA) to the list of known hosts. 2019/11/10 12:40:45 fuzzer started 2019/11/10 12:40:46 dialing manager at 10.128.0.105:33901 2019/11/10 12:40:47 syscalls: 2553 2019/11/10 12:40:47 code coverage: enabled 2019/11/10 12:40:47 comparison tracing: enabled 2019/11/10 12:40:47 extra coverage: extra coverage is not supported by the kernel 2019/11/10 12:40:47 setuid sandbox: enabled 2019/11/10 12:40:47 namespace sandbox: enabled 2019/11/10 12:40:47 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/10 12:40:47 fault injection: enabled 2019/11/10 12:40:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/10 12:40:47 net packet injection: enabled 2019/11/10 12:40:47 net device setup: enabled 2019/11/10 12:40:47 concurrency sanitizer: enabled 2019/11/10 12:40:47 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 64.848064][ T8051] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/10 12:41:03 adding functions to KCSAN blacklist: 'poll_schedule_timeout' 'blk_mq_sched_dispatch_requests' 'p9_poll_workfn' 'ext4_da_write_end' '__hrtimer_run_queues' 'do_wait' 'do_nanosleep' 'tcp_add_backlog' 'ktime_get_real_seconds' '__delete_from_page_cache' 'dnotify_flush' 'lruvec_lru_size' 'pid_update_inode' 'pipe_wait' 'yama_ptracer_del' 'fib6_ifup' 'generic_permission' '__snd_rawmidi_transmit_ack' '__perf_event_overflow' 'generic_fillattr' 'n_tty_receive_buf_common' 'free_pid' 'percpu_counter_add_batch' 'task_dump_owner' 'inet_putpeer' 'sit_tunnel_xmit' 'mem_cgroup_select_victim_node' 'dd_has_work' 'mod_timer' 'generic_update_time' '__find_get_block' 'writeback_sb_inodes' '__blk_queue_split' 'blk_mq_get_request' 'shmem_file_read_iter' 'generic_write_end' 'bio_endio' 'pcpu_alloc' 'osq_lock' 'watchdog' 'wbc_detach_inode' 'ext4_nonda_switch' 'tick_sched_do_timer' 'blk_mq_run_hw_queue' 'rcu_gp_fqs_loop' 'ext4_mb_good_group' 'list_lru_count_one' 'fsnotify' 'xas_clear_mark' 'ep_poll' 'd_instantiate_new' '__ext4_new_inode' 'do_syslog' 'alloc_empty_file' 'echo_char' '__dev_queue_xmit' 'balance_dirty_pages' 'snd_seq_check_queue' 'snd_seq_prioq_cell_out' 'ktime_get_seconds' 'find_get_pages_range_tag' 'timer_clear_idle' 'fasync_remove_entry' 'lookup_fast' 'ktime_get_ts64' 'do_mmap' 'pipe_poll' 'do_readlinkat' 'evict' 'add_timer' 'shmem_getpage_gfp' 'inactive_list_is_low' 'ksys_read' 'run_timer_softirq' 'xas_find_marked' 'queue_access_lock' 'ext4_free_inode' 'complete_signal' 'blk_mq_dispatch_rq_list' 'vm_area_dup' 'ext4_has_free_clusters' 'commit_echoes' 'wbt_issue' 'taskstats_exit' 'tomoyo_supervisor' 'do_exit' 'audit_log_start' 'snd_seq_timer_get_cur_tick' 'blk_stat_add' 'process_srcu' 'futex_wait_queue_me' 'ext4_mb_find_by_goal' '__add_to_page_cache_locked' 'find_next_bit' 'do_mpage_readpage' 'tick_nohz_idle_stop_tick' 'tick_do_update_jiffies64' 'icmp_global_allow' 'ext4_mark_iloc_dirty' '__alloc_file' 'snd_ctl_notify' 'page_counter_charge' 'generic_file_read_iter' 'copy_process' 'ext4_free_inodes_count' 'kauditd_thread' 'kvm_arch_vcpu_load' 'ip_finish_output2' 'rcu_gp_fqs_check_wake' 12:45:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x20}, {0x6}]}) 12:45:25 executing program 1: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x7, 0x0) [ 342.649753][ T8054] IPVS: ftp: loaded support on port[0] = 21 [ 342.732315][ T8054] chnl_net:caif_netlink_parms(): no params data found [ 342.768100][ T8054] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.782459][ T8054] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.802624][ T8054] device bridge_slave_0 entered promiscuous mode [ 342.823134][ T8054] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.830228][ T8054] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.838090][ T8054] device bridge_slave_1 entered promiscuous mode [ 342.885470][ T8054] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 342.900894][ T8054] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 12:45:25 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) socket(0x1e, 0x805, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x9}, &(0x7f0000000200), 0x0) [ 342.933794][ T8054] team0: Port device team_slave_0 added [ 342.944302][ T8054] team0: Port device team_slave_1 added [ 342.969241][ T8058] IPVS: ftp: loaded support on port[0] = 21 [ 343.043981][ T8054] device hsr_slave_0 entered promiscuous mode [ 343.082501][ T8054] device hsr_slave_1 entered promiscuous mode [ 343.154742][ T8061] IPVS: ftp: loaded support on port[0] = 21 12:45:26 executing program 3: clock_adjtime(0x0, &(0x7f0000000240)={0x7ff}) [ 343.254695][ T8054] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.261865][ T8054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.269123][ T8054] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.276204][ T8054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.590505][ T8058] chnl_net:caif_netlink_parms(): no params data found [ 343.626189][ T8054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 343.705446][ T8057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.743591][ T8057] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.761834][ T8057] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.794652][ T8057] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 343.841252][ T8090] IPVS: ftp: loaded support on port[0] = 21 [ 343.893349][ T8054] 8021q: adding VLAN 0 to HW filter on device team0 [ 343.900615][ T8061] chnl_net:caif_netlink_parms(): no params data found [ 343.919376][ T8058] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.951708][ T8058] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.971860][ T8058] device bridge_slave_0 entered promiscuous mode [ 343.996434][ T8058] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.031734][ T8058] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.042020][ T8058] device bridge_slave_1 entered promiscuous mode 12:45:26 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="aefdda9d240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d77c41cb69d952f41bdd2ac8bb8c43", 0x2e}, {&(0x7f0000000000)="aa1d484e24c0000000000000007704a71e023a27b2da9426f40100c000"/42, 0x2a}], 0x2) [ 344.124483][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.152300][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.160620][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.167720][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.242408][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.251102][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.302401][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.309471][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.342369][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 344.382064][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 344.391343][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 344.434022][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 344.497523][ T8058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 344.519165][ T8054] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 344.593667][ T8054] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 344.625499][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 344.642828][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 344.651545][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 344.722850][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 344.752627][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.784947][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.812560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.850175][ T8061] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.863813][ T8061] bridge0: port 1(bridge_slave_0) entered disabled state 12:45:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{}, "018000da7d469c04", "02a839a6c7986edc3f8a6200c88e37de79b97525cedefaa0bded32e7d887ec99", "612a56d3", "00943f4aece800"}, 0xfe83) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}], 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="23ff1f0a8117fb62d5eb1b3c750c75c5533f018823a16997c30e069cb5b742686128af8baad097514187691d92010000009e3db9e86db57e1d384bfe3042c49ef9134937af481f2b44e023b3884e0efb76d2659a715f3b513e33fd96c9d3c9afed9390b357a4000000000000000a010000000003000000000832ff0769dea9ed32487d2bf1ac37afcf98d817857774004608d609000000701f793b97fdcccc622708000000e69857745a810000be8900009755979c72f645e9898fb9d669af77550098329a0aa58aa5"], 0xc9) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000004c0)="8c93b369b4485a9c10410940b32f0e27d945c8c14b33d632252983591bb93b689d6e39110602c2742c532b470d9fa7322ac1690e5df60e8062db873b9560fc588ed49aba2b2527da322e73b77d95bb0444859638ca691f4b3a357aed45ea752b4392faf13508b4a7baeb1c5893fc7e139dac69c2854fcc1eb35f4afeca8436506df8eedad9db05c67f0bfe3f1619f83e53a87f7eec8b9ba6e3dd2cb923602749eee99fa28d3e4202aef93ec74bf4806962a3c7eff9066fe5f8", 0xb9}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000007c0)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d40", 0x55}], 0x1}}], 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 344.902206][ T8061] device bridge_slave_0 entered promiscuous mode [ 344.926892][ T8058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 344.964638][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 344.993675][ T8061] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.000731][ T8061] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.033239][ T8061] device bridge_slave_1 entered promiscuous mode [ 345.056969][ T8054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 345.069378][ T8094] IPVS: ftp: loaded support on port[0] = 21 [ 345.115720][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 345.123259][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 345.144986][ T8061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 345.155427][ T8058] team0: Port device team_slave_0 added [ 345.178749][ T8061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 345.188648][ T8058] team0: Port device team_slave_1 added [ 345.201475][ T8106] IPVS: ftp: loaded support on port[0] = 21 [ 345.224247][ T8058] device hsr_slave_0 entered promiscuous mode [ 345.262193][ T8058] device hsr_slave_1 entered promiscuous mode [ 345.311769][ T8058] debugfs: Directory 'hsr0' with parent '/' already present! [ 345.383117][ T8090] chnl_net:caif_netlink_parms(): no params data found [ 345.396970][ T8023] ================================================================== [ 345.405134][ T8023] BUG: KCSAN: data-race in __dentry_kill / d_set_d_op [ 345.410667][ T8061] team0: Port device team_slave_0 added [ 345.411885][ T8023] [ 345.411907][ T8023] read to 0xffff88812445e3c0 of 4 bytes by task 8064 on cpu 1: [ 345.411932][ T8023] __dentry_kill+0x1be/0x3c0 [ 345.411950][ T8023] dput+0x3b5/0x750 [ 345.411970][ T8023] terminate_walk+0x107/0x250 [ 345.411992][ T8023] path_openat+0x2977/0x36e0 [ 345.412009][ T8023] do_filp_open+0x11e/0x1b0 [ 345.412027][ T8023] do_sys_open+0x3b3/0x4f0 [ 345.412099][ T8023] __x64_sys_open+0x55/0x70 [ 345.418901][ T8061] team0: Port device team_slave_1 added [ 345.419964][ T8023] do_syscall_64+0xcc/0x370 [ 345.468425][ T8023] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 345.474289][ T8023] [ 345.476603][ T8023] write to 0xffff88812445e3c0 of 4 bytes by task 8023 on cpu 0: [ 345.484240][ T8023] d_set_d_op+0x17b/0x230 [ 345.488559][ T8023] simple_lookup+0xaa/0xb0 [ 345.492960][ T8023] path_openat+0x15b4/0x36e0 [ 345.497525][ T8023] do_filp_open+0x11e/0x1b0 [ 345.502018][ T8023] do_sys_open+0x3b3/0x4f0 [ 345.506424][ T8023] __x64_sys_open+0x55/0x70 [ 345.510911][ T8023] do_syscall_64+0xcc/0x370 [ 345.515398][ T8023] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 345.521259][ T8023] [ 345.523563][ T8023] Reported by Kernel Concurrency Sanitizer on: [ 345.529707][ T8023] CPU: 0 PID: 8023 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 345.536702][ T8023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.546741][ T8023] ================================================================== [ 345.554777][ T8023] Kernel panic - not syncing: panic_on_warn set ... [ 345.561367][ T8023] CPU: 0 PID: 8023 Comm: udevd Not tainted 5.4.0-rc6+ #0 [ 345.568367][ T8023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.578566][ T8023] Call Trace: [ 345.581883][ T8023] dump_stack+0xf5/0x159 [ 345.586112][ T8023] panic+0x210/0x640 [ 345.590003][ T8023] ? vprintk_func+0x8d/0x140 [ 345.595103][ T8023] kcsan_report.cold+0xc/0xe [ 345.599680][ T8023] kcsan_setup_watchpoint+0x3fe/0x410 [ 345.605036][ T8023] __tsan_unaligned_write4+0x143/0x1f0 [ 345.610566][ T8023] d_set_d_op+0x17b/0x230 [ 345.615406][ T8023] simple_lookup+0xaa/0xb0 [ 345.619896][ T8023] ? empty_dir_llseek+0x50/0x50 [ 345.624775][ T8023] path_openat+0x15b4/0x36e0 [ 345.629379][ T8023] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 345.635269][ T8023] do_filp_open+0x11e/0x1b0 [ 345.639759][ T8023] ? __alloc_fd+0x2ef/0x3b0 [ 345.644252][ T8023] do_sys_open+0x3b3/0x4f0 [ 345.648668][ T8023] __x64_sys_open+0x55/0x70 [ 345.653162][ T8023] do_syscall_64+0xcc/0x370 [ 345.657655][ T8023] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 345.663545][ T8023] RIP: 0033:0x7fbe0b553120 [ 345.667949][ T8023] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 345.687971][ T8023] RSP: 002b:00007ffd3ded3a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 345.696367][ T8023] RAX: ffffffffffffffda RBX: 00000000008b55a0 RCX: 00007fbe0b553120 [ 345.704338][ T8023] RDX: 00000000000001b6 RSI: 0000000000080000 RDI: 00007ffd3ded3b60 [ 345.712295][ T8023] RBP: 00007ffd3ded3b10 R08: 0000000000000008 R09: 0000000000000001 [ 345.721227][ T8023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 345.729280][ T8023] R13: 000000000041f57a R14: 000000000089c250 R15: 000000000000000b [ 345.738800][ T8023] Kernel Offset: disabled [ 345.743129][ T8023] Rebooting in 86400 seconds..