Warning: Permanently added '10.128.0.98' (ECDSA) to the list of known hosts. syzkaller login: [ 76.985175][ T8481] IPVS: ftp: loaded support on port[0] = 21 [ 77.073898][ T8481] chnl_net:caif_netlink_parms(): no params data found [ 77.128564][ T8481] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.136844][ T8481] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.144635][ T8481] device bridge_slave_0 entered promiscuous mode [ 77.155455][ T8481] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.162933][ T8481] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.171534][ T8481] device bridge_slave_1 entered promiscuous mode [ 77.193009][ T8481] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.204211][ T8481] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.228832][ T8481] team0: Port device team_slave_0 added [ 77.236682][ T8481] team0: Port device team_slave_1 added [ 77.254650][ T8481] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 77.262060][ T8481] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.288192][ T8481] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 77.301030][ T8481] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 77.308199][ T8481] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.334225][ T8481] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 77.361971][ T8481] device hsr_slave_0 entered promiscuous mode [ 77.368690][ T8481] device hsr_slave_1 entered promiscuous mode [ 77.472672][ T8481] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.484349][ T8481] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 77.495009][ T8481] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 77.507576][ T8481] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 77.533452][ T8481] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.540721][ T8481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.548694][ T8481] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.556009][ T8481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.601292][ T8481] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.615834][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.628722][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.637849][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.645782][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 77.659893][ T8481] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.672496][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.681680][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.688814][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.707173][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.715623][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.722795][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.739408][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.748584][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.761975][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.774017][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.786135][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.797626][ T8481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.818447][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.825825][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.840295][ T8481] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.859977][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 77.880741][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.889046][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.897688][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 77.910843][ T8481] device veth0_vlan entered promiscuous mode [ 77.923115][ T8481] device veth1_vlan entered promiscuous mode [ 77.947008][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 77.954970][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 77.964464][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 77.975957][ T8481] device veth0_macvtap entered promiscuous mode [ 77.985623][ T8481] device veth1_macvtap entered promiscuous mode [ 78.005146][ T8481] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 78.012668][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 78.022705][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 78.034674][ T8481] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 78.042831][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 78.054394][ T8481] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.064285][ T8481] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.073390][ T8481] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.083497][ T8481] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.120706][ T8481] ================================================================== [ 78.129033][ T8481] BUG: KASAN: slab-out-of-bounds in skb_segment+0x14ba/0x37a0 [ 78.136528][ T8481] Read of size 3560 at addr ffff88801b8e1ce4 by task syz-executor927/8481 [ 78.145028][ T8481] [ 78.147344][ T8481] CPU: 1 PID: 8481 Comm: syz-executor927 Not tainted 5.11.0-rc3-syzkaller #0 [ 78.156173][ T8481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.166214][ T8481] Call Trace: [ 78.169485][ T8481] dump_stack+0x107/0x163 [ 78.173810][ T8481] ? skb_segment+0x14ba/0x37a0 [ 78.178577][ T8481] ? skb_segment+0x14ba/0x37a0 [ 78.183777][ T8481] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 78.190796][ T8481] ? skb_segment+0x14ba/0x37a0 [ 78.195546][ T8481] ? skb_segment+0x14ba/0x37a0 [ 78.200296][ T8481] kasan_report.cold+0x79/0xd5 [ 78.205053][ T8481] ? skb_segment+0x14ba/0x37a0 [ 78.209807][ T8481] check_memory_region+0x13d/0x180 [ 78.214911][ T8481] memcpy+0x20/0x60 [ 78.218708][ T8481] skb_segment+0x14ba/0x37a0 [ 78.223308][ T8481] ? pskb_extract+0x2b0/0x2b0 [ 78.227971][ T8481] ? __lock_acquire+0xbdc/0x54f0 [ 78.232907][ T8481] tcp_gso_segment+0x33d/0x17e0 [ 78.237748][ T8481] ? __sk_receive_skb+0x830/0x830 [ 78.242768][ T8481] tcp6_gso_segment+0x1a0/0x460 [ 78.247609][ T8481] ipv6_gso_segment+0x48d/0xf50 [ 78.252458][ T8481] ? sit_ip6ip6_gro_receive+0x100/0x100 [ 78.257997][ T8481] ? mark_lock+0xf7/0x1720 [ 78.262407][ T8481] skb_mac_gso_segment+0x26e/0x530 [ 78.267508][ T8481] ? sit_ip6ip6_gro_receive+0x100/0x100 [ 78.273061][ T8481] ? skb_network_protocol+0x560/0x560 [ 78.278432][ T8481] __skb_gso_segment+0x330/0x6e0 [ 78.283376][ T8481] validate_xmit_skb+0x69e/0xee0 [ 78.288324][ T8481] validate_xmit_skb_list+0xbc/0x120 [ 78.293603][ T8481] sch_direct_xmit+0x3f8/0xbd0 [ 78.298372][ T8481] ? dev_watchdog+0xc20/0xc20 [ 78.303040][ T8481] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 78.309280][ T8481] __qdisc_run+0x4ba/0x15f0 [ 78.313777][ T8481] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.320015][ T8481] __dev_queue_xmit+0x1489/0x2dd0 [ 78.325036][ T8481] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 78.330312][ T8481] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 78.336565][ T8481] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 78.342283][ T8481] ? virtio_net_hdr_to_skb.constprop.0+0x423/0xa70 [ 78.348776][ T8481] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 78.355283][ T8481] ? packet_parse_headers+0x11d/0x490 [ 78.360660][ T8481] ? prb_fill_curr_block+0x5d0/0x5d0 [ 78.365952][ T8481] packet_sendmsg+0x2406/0x52a0 [ 78.370825][ T8481] ? aa_sk_perm+0x316/0xaa0 [ 78.375326][ T8481] ? packet_cached_dev_get+0x250/0x250 [ 78.380787][ T8481] ? aa_af_perm+0x230/0x230 [ 78.385294][ T8481] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.391528][ T8481] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.397761][ T8481] ? packet_cached_dev_get+0x250/0x250 [ 78.403210][ T8481] sock_sendmsg+0xcf/0x120 [ 78.407637][ T8481] ____sys_sendmsg+0x6e8/0x810 [ 78.412423][ T8481] ? kernel_sendmsg+0x50/0x50 [ 78.417117][ T8481] ? do_recvmmsg+0x6c0/0x6c0 [ 78.421707][ T8481] ? __local_bh_enable_ip+0xa0/0x110 [ 78.426999][ T8481] ? lockdep_hardirqs_on+0x79/0x100 [ 78.432197][ T8481] ? packet_setsockopt+0xc2b/0x3b30 [ 78.437399][ T8481] ___sys_sendmsg+0xf3/0x170 [ 78.442021][ T8481] ? sendmsg_copy_msghdr+0x160/0x160 [ 78.447582][ T8481] ? packet_bind+0x1b0/0x1b0 [ 78.452295][ T8481] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.458533][ T8481] ? __fget_light+0x215/0x280 [ 78.463204][ T8481] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 78.469443][ T8481] __sys_sendmsg+0xe5/0x1b0 [ 78.473956][ T8481] ? __sys_sendmsg_sock+0xb0/0xb0 [ 78.478980][ T8481] ? syscall_enter_from_user_mode+0x1d/0x50 [ 78.484869][ T8481] do_syscall_64+0x2d/0x70 [ 78.489277][ T8481] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 78.495165][ T8481] RIP: 0033:0x443679 [ 78.499048][ T8481] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 0d fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 78.518641][ T8481] RSP: 002b:00007ffde7f61228 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 78.527043][ T8481] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443679 [ 78.535002][ T8481] RDX: 0000000000034000 RSI: 0000000020000440 RDI: 0000000000000003 [ 78.543053][ T8481] RBP: 00007ffde7f61230 R08: 0000000001bbbbbb R09: 0000000001bbbbbb [ 78.551010][ T8481] R10: 0000000000000004 R11: 0000000000000246 R12: 00007ffde7f61240 [ 78.558987][ T8481] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 78.566959][ T8481] [ 78.569267][ T8481] Allocated by task 8481: [ 78.573573][ T8481] kasan_save_stack+0x1b/0x40 [ 78.578253][ T8481] ____kasan_kmalloc.constprop.0+0x82/0xa0 [ 78.584049][ T8481] __kmalloc_node_track_caller+0x1e0/0x3f0 [ 78.589941][ T8481] __alloc_skb+0xae/0x5a0 [ 78.594256][ T8481] alloc_skb_with_frags+0x93/0x5d0 [ 78.599405][ T8481] sock_alloc_send_pskb+0x793/0x920 [ 78.604605][ T8481] packet_sendmsg+0x19ee/0x52a0 [ 78.609505][ T8481] sock_sendmsg+0xcf/0x120 [ 78.613957][ T8481] ____sys_sendmsg+0x6e8/0x810 [ 78.618712][ T8481] ___sys_sendmsg+0xf3/0x170 [ 78.623293][ T8481] __sys_sendmsg+0xe5/0x1b0 [ 78.627786][ T8481] do_syscall_64+0x2d/0x70 [ 78.632193][ T8481] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 78.638086][ T8481] [ 78.640401][ T8481] The buggy address belongs to the object at ffff88801b8e0000 [ 78.640401][ T8481] which belongs to the cache kmalloc-8k of size 8192 [ 78.654448][ T8481] The buggy address is located 7396 bytes inside of [ 78.654448][ T8481] 8192-byte region [ffff88801b8e0000, ffff88801b8e2000) [ 78.667894][ T8481] The buggy address belongs to the page: [ 78.673514][ T8481] page:000000007b35f0ce refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1b8e0 [ 78.683650][ T8481] head:000000007b35f0ce order:3 compound_mapcount:0 compound_pincount:0 [ 78.692080][ T8481] flags: 0xfff00000010200(slab|head) [ 78.697360][ T8481] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff888010042280 [ 78.705931][ T8481] raw: 0000000000000000 0000000000020002 00000001ffffffff 0000000000000000 [ 78.714498][ T8481] page dumped because: kasan: bad access detected [ 78.720990][ T8481] [ 78.723297][ T8481] Memory state around the buggy address: [ 78.728908][ T8481] ffff88801b8e1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 78.736952][ T8481] ffff88801b8e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 78.744997][ T8481] >ffff88801b8e2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.753211][ T8481] ^ [ 78.757260][ T8481] ffff88801b8e2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.765302][ T8481] ffff88801b8e2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.773342][ T8481] ================================================================== [ 78.781390][ T8481] Disabling lock debugging due to kernel taint [ 78.787646][ T8481] Kernel panic - not syncing: panic_on_warn set ... [ 78.794253][ T8481] CPU: 1 PID: 8481 Comm: syz-executor927 Tainted: G B 5.11.0-rc3-syzkaller #0 [ 78.804414][ T8481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.814567][ T8481] Call Trace: [ 78.817845][ T8481] dump_stack+0x107/0x163 [ 78.822187][ T8481] ? skb_segment+0x1460/0x37a0 [ 78.826978][ T8481] panic+0x306/0x73d [ 78.830871][ T8481] ? __warn_printk+0xf3/0xf3 [ 78.835440][ T8481] ? skb_segment+0x14ba/0x37a0 [ 78.840188][ T8481] ? trace_hardirqs_on+0x38/0x1c0 [ 78.845196][ T8481] ? trace_hardirqs_on+0x51/0x1c0 [ 78.850213][ T8481] ? skb_segment+0x14ba/0x37a0 [ 78.854954][ T8481] ? skb_segment+0x14ba/0x37a0 [ 78.859696][ T8481] end_report+0x58/0x5e [ 78.863834][ T8481] kasan_report.cold+0x67/0xd5 [ 78.868579][ T8481] ? skb_segment+0x14ba/0x37a0 [ 78.873324][ T8481] check_memory_region+0x13d/0x180 [ 78.878419][ T8481] memcpy+0x20/0x60 [ 78.882212][ T8481] skb_segment+0x14ba/0x37a0 [ 78.886787][ T8481] ? pskb_extract+0x2b0/0x2b0 [ 78.891443][ T8481] ? __lock_acquire+0xbdc/0x54f0 [ 78.896366][ T8481] tcp_gso_segment+0x33d/0x17e0 [ 78.901217][ T8481] ? __sk_receive_skb+0x830/0x830 [ 78.906224][ T8481] tcp6_gso_segment+0x1a0/0x460 [ 78.911057][ T8481] ipv6_gso_segment+0x48d/0xf50 [ 78.915891][ T8481] ? sit_ip6ip6_gro_receive+0x100/0x100 [ 78.921416][ T8481] ? mark_lock+0xf7/0x1720 [ 78.925820][ T8481] skb_mac_gso_segment+0x26e/0x530 [ 78.930934][ T8481] ? sit_ip6ip6_gro_receive+0x100/0x100 [ 78.936464][ T8481] ? skb_network_protocol+0x560/0x560 [ 78.941827][ T8481] __skb_gso_segment+0x330/0x6e0 [ 78.946764][ T8481] validate_xmit_skb+0x69e/0xee0 [ 78.951699][ T8481] validate_xmit_skb_list+0xbc/0x120 [ 78.956966][ T8481] sch_direct_xmit+0x3f8/0xbd0 [ 78.961717][ T8481] ? dev_watchdog+0xc20/0xc20 [ 78.966374][ T8481] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 78.972598][ T8481] __qdisc_run+0x4ba/0x15f0 [ 78.977094][ T8481] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 78.983318][ T8481] __dev_queue_xmit+0x1489/0x2dd0 [ 78.988327][ T8481] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 78.993595][ T8481] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 78.999902][ T8481] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 79.005603][ T8481] ? virtio_net_hdr_to_skb.constprop.0+0x423/0xa70 [ 79.012084][ T8481] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 79.018304][ T8481] ? packet_parse_headers+0x11d/0x490 [ 79.023656][ T8481] ? prb_fill_curr_block+0x5d0/0x5d0 [ 79.028930][ T8481] packet_sendmsg+0x2406/0x52a0 [ 79.033779][ T8481] ? aa_sk_perm+0x316/0xaa0 [ 79.038274][ T8481] ? packet_cached_dev_get+0x250/0x250 [ 79.043725][ T8481] ? aa_af_perm+0x230/0x230 [ 79.048261][ T8481] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 79.054532][ T8481] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 79.060845][ T8481] ? packet_cached_dev_get+0x250/0x250 [ 79.066290][ T8481] sock_sendmsg+0xcf/0x120 [ 79.070687][ T8481] ____sys_sendmsg+0x6e8/0x810 [ 79.075429][ T8481] ? kernel_sendmsg+0x50/0x50 [ 79.080086][ T8481] ? do_recvmmsg+0x6c0/0x6c0 [ 79.084658][ T8481] ? __local_bh_enable_ip+0xa0/0x110 [ 79.089921][ T8481] ? lockdep_hardirqs_on+0x79/0x100 [ 79.095101][ T8481] ? packet_setsockopt+0xc2b/0x3b30 [ 79.100279][ T8481] ___sys_sendmsg+0xf3/0x170 [ 79.104859][ T8481] ? sendmsg_copy_msghdr+0x160/0x160 [ 79.110123][ T8481] ? packet_bind+0x1b0/0x1b0 [ 79.114698][ T8481] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 79.120931][ T8481] ? __fget_light+0x215/0x280 [ 79.125700][ T8481] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 79.131933][ T8481] __sys_sendmsg+0xe5/0x1b0 [ 79.136428][ T8481] ? __sys_sendmsg_sock+0xb0/0xb0 [ 79.141443][ T8481] ? syscall_enter_from_user_mode+0x1d/0x50 [ 79.147317][ T8481] do_syscall_64+0x2d/0x70 [ 79.151712][ T8481] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 79.157599][ T8481] RIP: 0033:0x443679 [ 79.161472][ T8481] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb 0d fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 79.181072][ T8481] RSP: 002b:00007ffde7f61228 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 79.189466][ T8481] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443679 [ 79.197606][ T8481] RDX: 0000000000034000 RSI: 0000000020000440 RDI: 0000000000000003 [ 79.205565][ T8481] RBP: 00007ffde7f61230 R08: 0000000001bbbbbb R09: 0000000001bbbbbb [ 79.213523][ T8481] R10: 0000000000000004 R11: 0000000000000246 R12: 00007ffde7f61240 [ 79.221491][ T8481] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 79.230105][ T8481] Kernel Offset: disabled [ 79.234417][ T8481] Rebooting in 86400 seconds..