[ 103.938349][ T31] audit: type=1800 audit(1562067638.002:26): pid=13104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0
[ 103.974909][ T31] audit: type=1800 audit(1562067638.032:27): pid=13104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c.
[ 105.239218][T13171] sshd (13171) used greatest stack depth: 53592 bytes left
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c.
[....] startpar: service(s) returned failure: ssh ...[?25l[?1c7[1G[[31mFAIL[39;49m8[?25h[?0c [31mfailed![39;49m
Debian GNU/Linux 7 syzkaller ttyS0
Warning: Permanently added '10.128.0.84' (ECDSA) to the list of known hosts.
2019/07/02 11:40:50 fuzzer started
2019/07/02 11:40:56 dialing manager at 10.128.0.26:40783
2019/07/02 11:40:56 syscalls: 2348
2019/07/02 11:40:56 code coverage: enabled
2019/07/02 11:40:56 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled
2019/07/02 11:40:56 extra coverage: enabled
2019/07/02 11:40:56 setuid sandbox: enabled
2019/07/02 11:40:56 namespace sandbox: enabled
2019/07/02 11:40:56 Android sandbox: /sys/fs/selinux/policy does not exist
2019/07/02 11:40:56 fault injection: enabled
2019/07/02 11:40:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/07/02 11:40:56 net packet injection: enabled
2019/07/02 11:40:56 net device setup: enabled
11:44:04 executing program 0:
syzkaller login: [ 310.812696][T13290] IPVS: ftp: loaded support on port[0] = 21
[ 310.969962][T13290] chnl_net:caif_netlink_parms(): no params data found
[ 311.031242][T13290] bridge0: port 1(bridge_slave_0) entered blocking state
[ 311.039156][T13290] bridge0: port 1(bridge_slave_0) entered disabled state
[ 311.048488][T13290] device bridge_slave_0 entered promiscuous mode
[ 311.059500][T13290] bridge0: port 2(bridge_slave_1) entered blocking state
[ 311.067453][T13290] bridge0: port 2(bridge_slave_1) entered disabled state
[ 311.077452][T13290] device bridge_slave_1 entered promiscuous mode
[ 311.115155][T13290] bond0: Enslaving bond_slave_0 as an active interface with an up link
[ 311.127513][T13290] bond0: Enslaving bond_slave_1 as an active interface with an up link
[ 311.161371][T13290] team0: Port device team_slave_0 added
[ 311.171274][T13290] team0: Port device team_slave_1 added
[ 311.260024][T13290] device hsr_slave_0 entered promiscuous mode
[ 311.385865][T13290] device hsr_slave_1 entered promiscuous mode
[ 311.666200][T13290] bridge0: port 2(bridge_slave_1) entered blocking state
[ 311.673746][T13290] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 311.681557][T13290] bridge0: port 1(bridge_slave_0) entered blocking state
[ 311.688918][T13290] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 311.772276][T13290] 8021q: adding VLAN 0 to HW filter on device bond0
[ 311.793488][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 311.807577][ T5] bridge0: port 1(bridge_slave_0) entered disabled state
[ 311.817759][ T5] bridge0: port 2(bridge_slave_1) entered disabled state
[ 311.831217][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 311.851525][T13290] 8021q: adding VLAN 0 to HW filter on device team0
[ 311.869405][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 311.878473][ T5] bridge0: port 1(bridge_slave_0) entered blocking state
[ 311.885871][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 311.946032][T13290] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 311.956552][T13290] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 311.977150][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 311.986737][ T5] bridge0: port 2(bridge_slave_1) entered blocking state
[ 311.994051][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 312.004463][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 312.014500][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 312.024016][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 312.033542][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 312.069577][T13290] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 312.108270][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 312.117386][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
11:44:06 executing program 0:
11:44:06 executing program 0:
r0 = socket$kcm(0xa, 0x922000000003, 0x11)
setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4)
sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000180)="f4101100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0)
11:44:06 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x40, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x40}}, 0x0)
11:44:06 executing program 0:
11:44:06 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c)
[ 312.716517][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.
[ 312.731183][ C1] ==================================================================
[ 312.739544][ C1] BUG: KMSAN: uninit-value in tcp_create_openreq_child+0x157f/0x1cc0
[ 312.747654][ C1] CPU: 1 PID: 13310 Comm: syz-executor.0 Not tainted 5.2.0-rc4+ #7
[ 312.755565][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 312.765651][ C1] Call Trace:
[ 312.768969][ C1]
[ 312.771978][ C1] dump_stack+0x191/0x1f0
[ 312.776514][ C1] kmsan_report+0x162/0x2d0
[ 312.781066][ C1] __msan_warning+0x75/0xe0
[ 312.785624][ C1] tcp_create_openreq_child+0x157f/0x1cc0
[ 312.791404][ C1] tcp_v4_syn_recv_sock+0x234/0x1cf0
[ 312.796817][ C1] ? stack_depot_save+0x374/0x480
[ 312.801894][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 312.807894][ C1] tcp_v6_syn_recv_sock+0x213/0x2d80
[ 312.813396][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 312.819369][ C1] ? tcp_get_cookie_sock+0xa7/0x6b0
[ 312.824599][ C1] ? cookie_v4_check+0x34a6/0x3570
[ 312.829745][ C1] ? tcp_v6_conn_request+0x2d0/0x2d0
[ 312.835057][ C1] tcp_get_cookie_sock+0x16e/0x6b0
[ 312.840223][ C1] cookie_v4_check+0x34a6/0x3570
[ 312.845255][ C1] tcp_v4_do_rcv+0x96b/0xd70
[ 312.850148][ C1] tcp_v4_rcv+0x51f0/0x6af0
[ 312.854938][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 312.860944][ C1] ? tcp_filter+0xf0/0xf0
[ 312.865600][ C1] ip_protocol_deliver_rcu+0x541/0xbc0
[ 312.871116][ C1] ip_local_deliver+0x62a/0x7c0
[ 312.876104][ C1] ? ip_local_deliver+0x7c0/0x7c0
[ 312.881206][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0
[ 312.886874][ C1] ip_rcv+0x6c5/0x740
[ 312.890899][ C1] ? ip_rcv_core+0x11d0/0x11d0
[ 312.895804][ C1] process_backlog+0xef5/0x1410
[ 312.900756][ C1] ? ip_local_deliver_finish+0x350/0x350
[ 312.906683][ C1] ? rps_trigger_softirq+0x2e0/0x2e0
[ 312.912064][ C1] net_rx_action+0x738/0x1940
[ 312.916814][ C1] ? net_tx_action+0xb70/0xb70
[ 312.921912][ C1] __do_softirq+0x4ad/0x858
[ 312.926603][ C1] do_softirq_own_stack+0x49/0x80
[ 312.931642][ C1]
[ 312.934658][ C1] __local_bh_enable_ip+0x199/0x1e0
[ 312.939907][ C1] local_bh_enable+0x36/0x40
[ 312.944527][ C1] ip_finish_output2+0x20dc/0x25d0
[ 312.949815][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 312.955767][ C1] ip_finish_output+0xd2a/0xfd0
[ 312.960690][ C1] ip_output+0x541/0x610
[ 312.964990][ C1] ? ip_mc_finish_output+0x3b0/0x3b0
[ 312.970394][ C1] ? ip_finish_output+0xfd0/0xfd0
[ 312.975774][ C1] __ip_queue_xmit+0x1caf/0x21f0
[ 312.980968][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 312.986930][ C1] ip_queue_xmit+0xcc/0xf0
[ 312.991387][ C1] ? tcp6_seq_show+0x2740/0x2740
[ 312.996354][ C1] __tcp_transmit_skb+0x4076/0x5b40
[ 313.001641][ C1] tcp_write_xmit+0x39a9/0xa730
[ 313.006724][ C1] __tcp_push_pending_frames+0x124/0x4e0
[ 313.012492][ C1] tcp_send_fin+0xd43/0x1540
[ 313.017140][ C1] tcp_close+0x16ba/0x1860
[ 313.021819][ C1] ? ip_mc_drop_socket+0x69b/0x6e0
[ 313.026971][ C1] ? kmsan_internal_memset_shadow+0x104/0x3a0
[ 313.033237][ C1] ? tcp_check_oom+0x530/0x530
[ 313.038035][ C1] inet_release+0x1f7/0x270
[ 313.042655][ C1] inet6_release+0xaf/0x100
[ 313.047250][ C1] sock_close+0x156/0x490
[ 313.051616][ C1] ? __inet6_bind+0x1b70/0x1b70
[ 313.056542][ C1] ? sock_mmap+0x130/0x130
[ 313.061033][ C1] __fput+0x4c9/0xba0
[ 313.065074][ C1] ____fput+0x37/0x40
[ 313.069082][ C1] ? fput_many+0x2a0/0x2a0
[ 313.073570][ C1] task_work_run+0x22e/0x2a0
[ 313.078252][ C1] prepare_exit_to_usermode+0x39d/0x4d0
[ 313.084026][ C1] syscall_return_slowpath+0x90/0x5c0
[ 313.089440][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 313.095513][ C1] do_syscall_64+0xe2/0xf0
[ 313.099965][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xe7
[ 313.106514][ C1] RIP: 0033:0x4134b1
[ 313.110441][ C1] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
[ 313.130453][ C1] RSP: 002b:0000000000a6fbc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[ 313.139075][ C1] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004134b1
[ 313.147087][ C1] RDX: 0000001b32520000 RSI: 0000000000000000 RDI: 0000000000000003
[ 313.155088][ C1] RBP: 0000000000000001 R08: 000000005a3ade50 R09: 000000005a3ade54
[ 313.163086][ C1] R10: 0000000000a6fca0 R11: 0000000000000293 R12: 000000000075bf20
[ 313.171173][ C1] R13: 000000000004c5e5 R14: 0000000000760828 R15: ffffffffffffffff
[ 313.179198][ C1]
[ 313.181837][ C1] Uninit was created at:
[ 313.186117][ C1] kmsan_internal_poison_shadow+0x53/0xa0
[ 313.191870][ C1] kmsan_kmalloc+0xa4/0x130
[ 313.196429][ C1] kmem_cache_alloc+0x534/0xb00
[ 313.201316][ C1] inet_reqsk_alloc+0xa8/0x600
[ 313.206120][ C1] cookie_v4_check+0xd2f/0x3570
[ 313.210996][ C1] tcp_v4_do_rcv+0x96b/0xd70
[ 313.216251][ C1] tcp_v4_rcv+0x51f0/0x6af0
[ 313.220795][ C1] ip_protocol_deliver_rcu+0x541/0xbc0
[ 313.226410][ C1] ip_local_deliver+0x62a/0x7c0
[ 313.231286][ C1] ip_rcv+0x6c5/0x740
[ 313.235295][ C1] process_backlog+0xef5/0x1410
[ 313.240175][ C1] net_rx_action+0x738/0x1940
[ 313.244878][ C1] __do_softirq+0x4ad/0x858
[ 313.249404][ C1] do_softirq_own_stack+0x49/0x80
[ 313.254451][ C1] __local_bh_enable_ip+0x199/0x1e0
[ 313.259672][ C1] local_bh_enable+0x36/0x40
[ 313.264383][ C1] ip_finish_output2+0x20dc/0x25d0
[ 313.269520][ C1] ip_finish_output+0xd2a/0xfd0
[ 313.274394][ C1] ip_output+0x541/0x610
[ 313.278658][ C1] __ip_queue_xmit+0x1caf/0x21f0
[ 313.283617][ C1] ip_queue_xmit+0xcc/0xf0
[ 313.288055][ C1] __tcp_transmit_skb+0x4076/0x5b40
[ 313.293371][ C1] tcp_write_xmit+0x39a9/0xa730
[ 313.298250][ C1] __tcp_push_pending_frames+0x124/0x4e0
[ 313.303995][ C1] tcp_send_fin+0xd43/0x1540
[ 313.308613][ C1] tcp_close+0x16ba/0x1860
[ 313.313059][ C1] inet_release+0x1f7/0x270
[ 313.317716][ C1] inet6_release+0xaf/0x100
[ 313.322240][ C1] sock_close+0x156/0x490
[ 313.326760][ C1] __fput+0x4c9/0xba0
[ 313.330768][ C1] ____fput+0x37/0x40
[ 313.334779][ C1] task_work_run+0x22e/0x2a0
[ 313.339496][ C1] prepare_exit_to_usermode+0x39d/0x4d0
[ 313.345165][ C1] syscall_return_slowpath+0x90/0x5c0
[ 313.350570][ C1] do_syscall_64+0xe2/0xf0
[ 313.355009][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xe7
[ 313.361001][ C1] ==================================================================
[ 313.369163][ C1] Disabling lock debugging due to kernel taint
[ 313.375330][ C1] Kernel panic - not syncing: panic_on_warn set ...
[ 313.381953][ C1] CPU: 1 PID: 13310 Comm: syz-executor.0 Tainted: G B 5.2.0-rc4+ #7
[ 313.391254][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 313.401333][ C1] Call Trace:
[ 313.404648][ C1]
[ 313.407534][ C1] dump_stack+0x191/0x1f0
[ 313.411961][ C1] panic+0x3c9/0xc1e
[ 313.415941][ C1] kmsan_report+0x2ca/0x2d0
[ 313.420617][ C1] __msan_warning+0x75/0xe0
[ 313.425287][ C1] tcp_create_openreq_child+0x157f/0x1cc0
[ 313.431335][ C1] tcp_v4_syn_recv_sock+0x234/0x1cf0
[ 313.436663][ C1] ? stack_depot_save+0x374/0x480
[ 313.441736][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 313.447668][ C1] tcp_v6_syn_recv_sock+0x213/0x2d80
[ 313.453028][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 313.459081][ C1] ? tcp_get_cookie_sock+0xa7/0x6b0
[ 313.464306][ C1] ? cookie_v4_check+0x34a6/0x3570
[ 313.469455][ C1] ? tcp_v6_conn_request+0x2d0/0x2d0
[ 313.474765][ C1] tcp_get_cookie_sock+0x16e/0x6b0
[ 313.479931][ C1] cookie_v4_check+0x34a6/0x3570
[ 313.484970][ C1] tcp_v4_do_rcv+0x96b/0xd70
[ 313.489610][ C1] tcp_v4_rcv+0x51f0/0x6af0
[ 313.494332][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 313.500331][ C1] ? tcp_filter+0xf0/0xf0
[ 313.504698][ C1] ip_protocol_deliver_rcu+0x541/0xbc0
[ 313.510206][ C1] ip_local_deliver+0x62a/0x7c0
[ 313.515106][ C1] ? ip_local_deliver+0x7c0/0x7c0
[ 313.520158][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0
[ 313.525985][ C1] ip_rcv+0x6c5/0x740
[ 313.530158][ C1] ? ip_rcv_core+0x11d0/0x11d0
[ 313.535171][ C1] process_backlog+0xef5/0x1410
[ 313.540283][ C1] ? ip_local_deliver_finish+0x350/0x350
[ 313.545969][ C1] ? rps_trigger_softirq+0x2e0/0x2e0
[ 313.551291][ C1] net_rx_action+0x738/0x1940
[ 313.556026][ C1] ? net_tx_action+0xb70/0xb70
[ 313.560830][ C1] __do_softirq+0x4ad/0x858
[ 313.565380][ C1] do_softirq_own_stack+0x49/0x80
[ 313.570508][ C1]
[ 313.573619][ C1] __local_bh_enable_ip+0x199/0x1e0
[ 313.579091][ C1] local_bh_enable+0x36/0x40
[ 313.583710][ C1] ip_finish_output2+0x20dc/0x25d0
[ 313.588876][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 313.594833][ C1] ip_finish_output+0xd2a/0xfd0
[ 313.599752][ C1] ip_output+0x541/0x610
[ 313.604040][ C1] ? ip_mc_finish_output+0x3b0/0x3b0
[ 313.609365][ C1] ? ip_finish_output+0xfd0/0xfd0
[ 313.614417][ C1] __ip_queue_xmit+0x1caf/0x21f0
[ 313.619399][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 313.625353][ C1] ip_queue_xmit+0xcc/0xf0
[ 313.629821][ C1] ? tcp6_seq_show+0x2740/0x2740
[ 313.634788][ C1] __tcp_transmit_skb+0x4076/0x5b40
[ 313.640081][ C1] tcp_write_xmit+0x39a9/0xa730
[ 313.645070][ C1] __tcp_push_pending_frames+0x124/0x4e0
[ 313.650744][ C1] tcp_send_fin+0xd43/0x1540
[ 313.655411][ C1] tcp_close+0x16ba/0x1860
[ 313.659859][ C1] ? ip_mc_drop_socket+0x69b/0x6e0
[ 313.665010][ C1] ? kmsan_internal_memset_shadow+0x104/0x3a0
[ 313.671258][ C1] ? tcp_check_oom+0x530/0x530
[ 313.676206][ C1] inet_release+0x1f7/0x270
[ 313.680752][ C1] inet6_release+0xaf/0x100
[ 313.685294][ C1] sock_close+0x156/0x490
[ 313.689664][ C1] ? __inet6_bind+0x1b70/0x1b70
[ 313.694547][ C1] ? sock_mmap+0x130/0x130
[ 313.699160][ C1] __fput+0x4c9/0xba0
[ 313.703191][ C1] ____fput+0x37/0x40
[ 313.707200][ C1] ? fput_many+0x2a0/0x2a0
[ 313.711765][ C1] task_work_run+0x22e/0x2a0
[ 313.716407][ C1] prepare_exit_to_usermode+0x39d/0x4d0
[ 313.721993][ C1] syscall_return_slowpath+0x90/0x5c0
[ 313.727402][ C1] ? kmsan_get_shadow_origin_ptr+0x71/0x470
[ 313.733331][ C1] do_syscall_64+0xe2/0xf0
[ 313.737867][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xe7
[ 313.743783][ C1] RIP: 0033:0x4134b1
[ 313.747707][ C1] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
[ 313.767447][ C1] RSP: 002b:0000000000a6fbc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[ 313.775931][ C1] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004134b1
[ 313.783934][ C1] RDX: 0000001b32520000 RSI: 0000000000000000 RDI: 0000000000000003
[ 313.791926][ C1] RBP: 0000000000000001 R08: 000000005a3ade50 R09: 000000005a3ade54
[ 313.800068][ C1] R10: 0000000000a6fca0 R11: 0000000000000293 R12: 000000000075bf20
[ 313.808061][ C1] R13: 000000000004c5e5 R14: 0000000000760828 R15: ffffffffffffffff
[ 313.817412][ C1] Kernel Offset: disabled
[ 313.821754][ C1] Rebooting in 86400 seconds..