Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. 2019/11/04 15:03:48 fuzzer started 2019/11/04 15:03:49 dialing manager at 10.128.0.105:42499 2019/11/04 15:03:50 syscalls: 2553 2019/11/04 15:03:50 code coverage: enabled 2019/11/04 15:03:50 comparison tracing: enabled 2019/11/04 15:03:50 extra coverage: extra coverage is not supported by the kernel 2019/11/04 15:03:50 setuid sandbox: enabled 2019/11/04 15:03:50 namespace sandbox: enabled 2019/11/04 15:03:50 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 15:03:50 fault injection: enabled 2019/11/04 15:03:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 15:03:50 net packet injection: enabled 2019/11/04 15:03:50 net device setup: enabled 2019/11/04 15:03:50 concurrency sanitizer: enabled 2019/11/04 15:03:50 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 69.470408][ T8051] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/04 15:03:52 adding functions to KCSAN blacklist: 'tomoyo_supervisor' '__hrtimer_run_queues' 'ktime_get_real_seconds' 'add_timer' 'find_next_bit' 'tick_sched_do_timer' 'run_timer_softirq' 'rcu_gp_fqs_check_wake' 'pipe_poll' 'wbt_issue' 'tick_do_update_jiffies64' 'blk_mq_sched_dispatch_requests' 'ep_poll' 'generic_permission' 'tcp_add_backlog' 'poll_schedule_timeout' 'ext4_has_free_clusters' 15:03:59 executing program 0: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x5800) 15:03:59 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) [ 76.448552][ T8054] IPVS: ftp: loaded support on port[0] = 21 [ 76.542483][ T8054] chnl_net:caif_netlink_parms(): no params data found [ 76.608103][ T8058] IPVS: ftp: loaded support on port[0] = 21 [ 76.614325][ T8054] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.621503][ T8054] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.629688][ T8054] device bridge_slave_0 entered promiscuous mode [ 76.640345][ T8054] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.648008][ T8054] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.657149][ T8054] device bridge_slave_1 entered promiscuous mode [ 76.677634][ T8054] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.695479][ T8054] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.722427][ T8054] team0: Port device team_slave_0 added [ 76.730948][ T8054] team0: Port device team_slave_1 added 15:03:59 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040)) r1 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$netlink(r1, 0x10e, 0xb, 0x0, &(0x7f0000000040)) [ 76.806409][ T8054] device hsr_slave_0 entered promiscuous mode [ 76.861933][ T8054] device hsr_slave_1 entered promiscuous mode [ 76.963188][ T8060] IPVS: ftp: loaded support on port[0] = 21 [ 77.088785][ T8054] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.096024][ T8054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.103360][ T8054] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.110464][ T8054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.302853][ T8058] chnl_net:caif_netlink_parms(): no params data found [ 77.337329][ T8060] chnl_net:caif_netlink_parms(): no params data found 15:04:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@ipv6_newaddr={0x40, 0x14, 0x205, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_ADDRESS={0x14, 0x1, @mcast1}, @IFA_LOCAL={0x14, 0x2, @rand_addr="2bed84e15f64a0c8113a748fae123d6b"}]}, 0x40}}, 0x0) [ 77.481232][ T8054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.570623][ T8054] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.619551][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.628890][ T2850] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.681578][ T2850] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.702822][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 77.762005][ T8060] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.769076][ T8060] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.802094][ T8060] device bridge_slave_0 entered promiscuous mode [ 77.841415][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.850656][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.885914][ T2850] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.893083][ T2850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.941877][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.971507][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.003347][ T2850] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.010426][ T2850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.041645][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.074187][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.102529][ T8058] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.109600][ T8058] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.142067][ T8058] device bridge_slave_0 entered promiscuous mode [ 78.173442][ T8060] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.180564][ T8060] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.211997][ T8060] device bridge_slave_1 entered promiscuous mode [ 78.263787][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.272866][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.304560][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.332062][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 15:04:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000002880)={0x14}, 0x14}}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 78.362130][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.393984][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.432019][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.447673][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.484013][ T8058] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.503246][ T8058] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.523521][ T8058] device bridge_slave_1 entered promiscuous mode [ 78.564424][ T8054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.567661][ T8090] IPVS: ftp: loaded support on port[0] = 21 [ 78.601908][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 78.620437][ T8060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.695026][ T8058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.742590][ T8060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.788216][ T8058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.823136][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.830560][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.862357][ T8054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.870657][ T8060] team0: Port device team_slave_0 added [ 78.884664][ T8100] IPVS: ftp: loaded support on port[0] = 21 [ 78.898550][ T8060] team0: Port device team_slave_1 added [ 78.913515][ T8058] team0: Port device team_slave_0 added [ 78.922844][ T8058] team0: Port device team_slave_1 added 15:04:02 executing program 5: getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r0 = dup(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in=@local, @in=@initdev}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x2d) write$FUSE_ENTRY(r1, &(0x7f00000025c0)={0x90}, 0x90) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x8) readv(0xffffffffffffffff, &(0x7f0000000740), 0x4) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000025c0)={0x90}, 0x90) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000300)={0xa, 0x4e24, 0xa16a, @rand_addr="b1cc02d8a64a533f9b75a7b0f54316ae", 0x6}, 0x1c, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000600)="5fde0cbf57aaf179337ef652d9edcd1206a699661961a3a20aba3976860c7a7af6e5d97927eeeba3ab8f714d0ac1ccf3fa2d285fb55f02133477864d5291fdc35e53262d681b747170d7de00f649093776071f13071f0a12df9f0ecb904d6894e7c07c055a25893d9c4a3c99831473d34121b53dc5c1038ffb22c4979654c7f242ed94665d732e38a6fc1629470122ab77f96a404a539a779849f7e39d300873b413db5b77f1a5de8e7f22ac5d", 0xad}], 0x2, &(0x7f00000006c0)=[@pktinfo={{0x24, 0x29, 0x32, {@local}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7}}], 0x40}, 0x40080) sendmsg$inet6(r1, &(0x7f0000000700)={&(0x7f0000000300)={0xa, 0x4e24, 0xa16a, @rand_addr="b1cc02d8a64a533f9b75a7b0f54316ae", 0x6}, 0x1c, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2, &(0x7f00000006c0)=[@pktinfo={{0x24, 0x29, 0x32, {@local}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7}}], 0x40}, 0x40080) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000480)={@rand_addr="625ddb97f2c33c123e529d716db50f81", r2}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 79.063668][ T8060] device hsr_slave_0 entered promiscuous mode [ 79.103312][ T8060] device hsr_slave_1 entered promiscuous mode [ 79.141189][ T8060] debugfs: Directory 'hsr0' with parent '/' already present! [ 79.194024][ T8058] device hsr_slave_0 entered promiscuous mode [ 79.231519][ T8058] device hsr_slave_1 entered promiscuous mode [ 79.271258][ T8058] debugfs: Directory 'hsr0' with parent '/' already present! [ 79.291334][ T8090] chnl_net:caif_netlink_parms(): no params data found [ 79.300764][ T8107] IPVS: ftp: loaded support on port[0] = 21 15:04:02 executing program 0: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x5800) [ 79.584889][ T8090] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.607016][ T8090] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.647131][ T8090] device bridge_slave_0 entered promiscuous mode [ 79.731634][ T8090] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.738747][ T8090] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.831065][ T8090] device bridge_slave_1 entered promiscuous mode [ 79.958354][ T8100] chnl_net:caif_netlink_parms(): no params data found [ 80.045399][ T8060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.078434][ T8143] ================================================================== [ 80.086612][ T8143] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 80.094161][ T8143] [ 80.096499][ T8143] write to 0xffff88812a7c9d18 of 2 bytes by task 8139 on cpu 0: [ 80.104140][ T8143] pid_update_inode+0x51/0x70 [ 80.108825][ T8143] pid_revalidate+0x91/0xd0 [ 80.111327][ T8058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.113344][ T8143] lookup_fast+0x6f2/0x700 [ 80.124410][ T8143] walk_component+0x6d/0xe70 [ 80.129012][ T8143] link_path_walk.part.0+0x5d3/0xa90 [ 80.134316][ T8143] path_openat+0x14f/0x36e0 [ 80.138824][ T8143] do_filp_open+0x11e/0x1b0 [ 80.143587][ T8143] do_sys_open+0x3b3/0x4f0 [ 80.148015][ T8143] __x64_sys_open+0x55/0x70 [ 80.152535][ T8143] do_syscall_64+0xcc/0x370 [ 80.152686][ T8090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.157060][ T8143] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.171934][ T8143] [ 80.174276][ T8143] read to 0xffff88812a7c9d18 of 2 bytes by task 8143 on cpu 1: [ 80.181823][ T8143] pid_update_inode+0x44/0x70 [ 80.186514][ T8143] pid_revalidate+0x91/0xd0 [ 80.191028][ T8143] lookup_fast+0x6f2/0x700 [ 80.195449][ T8143] walk_component+0x6d/0xe70 [ 80.200046][ T8143] link_path_walk.part.0+0x5d3/0xa90 [ 80.205358][ T8143] path_openat+0x14f/0x36e0 [ 80.209866][ T8143] do_filp_open+0x11e/0x1b0 [ 80.214386][ T8143] do_sys_open+0x3b3/0x4f0 [ 80.216617][ T8060] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.218820][ T8143] __x64_sys_open+0x55/0x70 [ 80.229891][ T8143] do_syscall_64+0xcc/0x370 [ 80.234408][ T8143] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.240293][ T8143] [ 80.242620][ T8143] Reported by Kernel Concurrency Sanitizer on: [ 80.248789][ T8143] CPU: 1 PID: 8143 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 80.255549][ T8143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.265613][ T8143] ================================================================== [ 80.273674][ T8143] Kernel panic - not syncing: panic_on_warn set ... [ 80.280278][ T8143] CPU: 1 PID: 8143 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 80.287039][ T8143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.295980][ T8058] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.297103][ T8143] Call Trace: [ 80.306994][ T8143] dump_stack+0xf5/0x159 [ 80.311245][ T8143] panic+0x210/0x640 [ 80.315157][ T8143] ? vprintk_func+0x8d/0x140 [ 80.319766][ T8143] kcsan_report.cold+0xc/0xe [ 80.324378][ T8143] kcsan_setup_watchpoint+0x3fe/0x410 [ 80.329761][ T8143] __tsan_read2+0x145/0x1f0 [ 80.334277][ T8143] pid_update_inode+0x44/0x70 [ 80.338960][ T8143] pid_revalidate+0x91/0xd0 [ 80.343482][ T8143] lookup_fast+0x6f2/0x700 [ 80.347919][ T8143] walk_component+0x6d/0xe70 [ 80.352530][ T8143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.358798][ T8143] ? security_inode_permission+0xa5/0xc0 [ 80.364449][ T8143] ? inode_permission+0xa0/0x3c0 [ 80.369402][ T8143] link_path_walk.part.0+0x5d3/0xa90 [ 80.374712][ T8143] path_openat+0x14f/0x36e0 [ 80.379241][ T8143] ? proc_pid_status+0xee1/0x1000 [ 80.384287][ T8143] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 80.390537][ T8143] ? __virt_addr_valid+0x163/0x1e0 [ 80.395659][ T8143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.401909][ T8143] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 80.407810][ T8143] ? __read_once_size+0x41/0xe0 [ 80.412676][ T8143] do_filp_open+0x11e/0x1b0 [ 80.417210][ T8143] ? __alloc_fd+0x2ef/0x3b0 [ 80.421742][ T8143] do_sys_open+0x3b3/0x4f0 [ 80.426179][ T8143] __x64_sys_open+0x55/0x70 [ 80.430704][ T8143] do_syscall_64+0xcc/0x370 [ 80.435226][ T8143] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.441121][ T8143] RIP: 0033:0x7fecf1dde120 [ 80.445557][ T8143] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 80.465161][ T8143] RSP: 002b:00007fffc5391e88 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 80.473582][ T8143] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007fecf1dde120 [ 80.481565][ T8143] RDX: 00007fffc5391ec2 RSI: 0000000000000000 RDI: 00007fffc5391eb0 [ 80.489663][ T8143] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007fecf20a655f [ 80.497646][ T8143] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000010d8220 [ 80.505629][ T8143] R13: 0000000000000020 R14: 00007fecf2493010 R15: 0000000000000000 [ 80.515091][ T8143] Kernel Offset: disabled [ 80.519421][ T8143] Rebooting in 86400 seconds..