[ 34.024248][ T23] audit: type=1800 audit(1570190868.685:25): pid=7033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 34.051512][ T23] audit: type=1800 audit(1570190868.685:26): pid=7033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 34.089119][ T23] audit: type=1800 audit(1570190868.685:27): pid=7033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 34.356146][ T7099] sshd (7099) used greatest stack depth: 10032 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.116' (ECDSA) to the list of known hosts. 2019/10/04 12:08:02 fuzzer started 2019/10/04 12:08:03 dialing manager at 10.128.0.105:38119 2019/10/04 12:08:03 checking machine... 2019/10/04 12:08:03 checking revisions... 2019/10/04 12:08:03 testing simple program... syzkaller login: [ 48.905832][ T7201] IPVS: ftp: loaded support on port[0] = 21 2019/10/04 12:08:03 building call list... executing program [ 52.445613][ T7188] can: request_module (can-proto-0) failed. [ 52.458123][ T7188] can: request_module (can-proto-0) failed. 2019/10/04 12:08:11 syscalls: 2523 2019/10/04 12:08:11 code coverage: enabled 2019/10/04 12:08:11 comparison tracing: enabled 2019/10/04 12:08:11 extra coverage: extra coverage is not supported by the kernel 2019/10/04 12:08:11 setuid sandbox: enabled 2019/10/04 12:08:11 namespace sandbox: enabled 2019/10/04 12:08:11 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/04 12:08:11 fault injection: enabled 2019/10/04 12:08:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/04 12:08:11 net packet injection: enabled 2019/10/04 12:08:11 net device setup: enabled 2019/10/04 12:08:11 concurrency sanitizer: enabled 12:08:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd\x00') prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) [ 58.505619][ T7244] IPVS: ftp: loaded support on port[0] = 21 12:08:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0}) [ 58.594858][ T7244] chnl_net:caif_netlink_parms(): no params data found [ 58.667655][ T7244] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.674855][ T7244] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.695816][ T7244] device bridge_slave_0 entered promiscuous mode [ 58.715783][ T7244] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.722933][ T7244] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.746457][ T7244] device bridge_slave_1 entered promiscuous mode [ 58.778401][ T7244] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.794561][ T7247] IPVS: ftp: loaded support on port[0] = 21 [ 58.802323][ T7244] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.828562][ T7244] team0: Port device team_slave_0 added [ 58.848942][ T7244] team0: Port device team_slave_1 added 12:08:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x14480, 0x0) geteuid() r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="10"], 0x1) sendfile(r2, r3, 0x0, 0x7fffffff) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r5, 0x80080080044df9, &(0x7f0000000040)) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r6 = socket$inet(0x2, 0x6, 0x0) bind$inet(r6, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) accept(r6, 0x0, &(0x7f0000000300)) socket$inet(0x2, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a40)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) r7 = socket$inet(0x2, 0x6, 0x0) bind$inet(r7, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x50, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x4000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8]}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xfffffffffffffffd) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_RELBIT(r8, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r8, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r8, 0x5501, 0x0) r9 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r9, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x21, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x20) ioctl$sock_SIOCGPGRP(r9, 0x8904, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000a80)={{{@in6=@local, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f00000017c0)) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) [ 58.947954][ T7244] device hsr_slave_0 entered promiscuous mode [ 58.997037][ T7244] device hsr_slave_1 entered promiscuous mode [ 59.044561][ T7244] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.051741][ T7244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.059171][ T7244] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.066236][ T7244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.222859][ T7244] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.230120][ T7247] chnl_net:caif_netlink_parms(): no params data found [ 59.246294][ T7249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.256717][ T7249] bridge0: port 1(bridge_slave_0) entered disabled state 12:08:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) [ 59.274879][ T7249] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.285457][ T7249] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 59.303472][ T7244] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.319969][ T7252] IPVS: ftp: loaded support on port[0] = 21 [ 59.332999][ T7249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.347399][ T7187] ================================================================== [ 59.348388][ T7249] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.355711][ T7187] BUG: KCSAN: data-race in ext4_es_lookup_extent+0x3ba/0x510 and ext4_es_lookup_extent+0x3d3/0x510 [ 59.362655][ T7249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.373290][ T7187] [ 59.373305][ T7187] write to 0xffff888126b18428 of 8 bytes by task 7254 on cpu 0: [ 59.373319][ T7187] ext4_es_lookup_extent+0x3d3/0x510 [ 59.373343][ T7187] ext4_map_blocks+0xc2/0xf70 [ 59.400374][ T7187] ext4_getblk+0x30b/0x380 [ 59.404890][ T7187] ext4_bread+0x4a/0x190 [ 59.409128][ T7187] __ext4_read_dirblock+0x3e/0x700 [ 59.414232][ T7187] ext4_add_entry+0x46b/0x8e0 [ 59.418902][ T7187] ext4_mkdir+0x515/0x820 [ 59.423230][ T7187] vfs_mkdir+0x283/0x390 [ 59.427469][ T7187] do_mkdirat+0x1ac/0x1f0 [ 59.431796][ T7187] __x64_sys_mkdir+0x40/0x50 [ 59.436382][ T7187] do_syscall_64+0xcf/0x2f0 [ 59.440878][ T7187] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.446813][ T7187] [ 59.449140][ T7187] read to 0xffff888126b18428 of 8 bytes by task 7187 on cpu 1: [ 59.456771][ T7187] ext4_es_lookup_extent+0x3ba/0x510 [ 59.462050][ T7187] ext4_map_blocks+0xc2/0xf70 [ 59.466715][ T7187] ext4_mpage_readpages+0x92b/0x1270 [ 59.472000][ T7187] ext4_readpages+0x92/0xc0 [ 59.476500][ T7187] read_pages+0xa2/0x2d0 [ 59.480735][ T7187] __do_page_cache_readahead+0x353/0x390 [ 59.486359][ T7187] ondemand_readahead+0x35d/0x710 [ 59.491638][ T7187] page_cache_async_readahead+0x22c/0x250 [ 59.497354][ T7187] generic_file_read_iter+0xffc/0x1440 [ 59.502808][ T7187] ext4_file_read_iter+0xfa/0x240 [ 59.507827][ T7187] new_sync_read+0x389/0x4f0 [ 59.512411][ T7187] __vfs_read+0xb1/0xc0 [ 59.516561][ T7187] integrity_kernel_read+0xa1/0xe0 [ 59.521744][ T7187] [ 59.524062][ T7187] Reported by Kernel Concurrency Sanitizer on: [ 59.530210][ T7187] CPU: 1 PID: 7187 Comm: syz-fuzzer Not tainted 5.3.0+ #0 [ 59.533318][ T7255] IPVS: ftp: loaded support on port[0] = 21 [ 59.539296][ T7187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.539301][ T7187] ================================================================== [ 59.539308][ T7187] Kernel panic - not syncing: panic_on_warn set ... [ 59.539322][ T7187] CPU: 1 PID: 7187 Comm: syz-fuzzer Not tainted 5.3.0+ #0 [ 59.539339][ T7187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.588933][ T7187] Call Trace: [ 59.592224][ T7187] dump_stack+0xf5/0x159 [ 59.596472][ T7187] panic+0x209/0x639 [ 59.600371][ T7187] ? vprintk_func+0x8d/0x140 [ 59.605048][ T7187] kcsan_report.cold+0x57/0xeb [ 59.609814][ T7187] __kcsan_setup_watchpoint+0x342/0x500 [ 59.615359][ T7187] __tsan_read8+0x2c/0x30 [ 59.619697][ T7187] ext4_es_lookup_extent+0x3ba/0x510 [ 59.624987][ T7187] ext4_map_blocks+0xc2/0xf70 [ 59.629681][ T7187] ext4_mpage_readpages+0x92b/0x1270 [ 59.634687][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.634980][ T7187] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 59.635005][ T7187] ? ext4_invalidatepage+0x1e0/0x1e0 [ 59.644106][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.648857][ T7187] ext4_readpages+0x92/0xc0 [ 59.648871][ T7187] ? ext4_invalidatepage+0x1e0/0x1e0 [ 59.648885][ T7187] read_pages+0xa2/0x2d0 [ 59.648913][ T7187] __do_page_cache_readahead+0x353/0x390 [ 59.654283][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.661283][ T7187] ondemand_readahead+0x35d/0x710 [ 59.661311][ T7187] page_cache_async_readahead+0x22c/0x250 [ 59.685792][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.688084][ T7187] generic_file_read_iter+0xffc/0x1440 [ 59.694606][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.698815][ T7187] ext4_file_read_iter+0xfa/0x240 [ 59.698845][ T7187] new_sync_read+0x389/0x4f0 [ 59.724016][ T7244] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 59.724976][ T7187] __vfs_read+0xb1/0xc0 [ 59.724995][ T7187] integrity_kernel_read+0xa1/0xe0 [ 59.725021][ T7187] ima_calc_file_hash_tfm+0x1b5/0x260 [ 59.730194][ T7244] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 59.739926][ T7187] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 59.739941][ T7187] ? widen_string+0x4a/0x1a0 [ 59.739966][ T7187] ? __tsan_read1+0x2c/0x30 [ 59.754346][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.754579][ T7187] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 59.767244][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.770607][ T7187] ? __tsan_read4+0x2c/0x30 [ 59.776837][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.779693][ T7187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 59.788103][ T7247] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.793101][ T7187] ? refcount_sub_and_test_checked+0xc8/0x190 [ 59.801282][ T7247] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.805284][ T7187] ? __tsan_read4+0x2c/0x30 [ 59.805316][ T7187] ima_calc_file_hash+0x158/0xf10 [ 59.814006][ T7247] device bridge_slave_0 entered promiscuous mode [ 59.819419][ T7187] ? __tsan_write8+0x32/0x40 [ 59.819436][ T7187] ? ext4_xattr_get+0x10b/0x5c0 [ 59.819450][ T7187] ? __rcu_read_unlock+0x62/0xe0 [ 59.819480][ T7187] ima_collect_measurement+0x384/0x3b0 [ 59.846102][ T7244] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.848285][ T7187] process_measurement+0x980/0xff0 [ 59.892621][ T7187] ? __tsan_read4+0x2c/0x30 [ 59.897127][ T7187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 59.903357][ T7187] ? refcount_sub_and_test_checked+0xc8/0x190 [ 59.909406][ T7187] ima_file_check+0x7e/0xb0 [ 59.913986][ T7187] path_openat+0xfb1/0x3530 [ 59.918475][ T7187] do_filp_open+0x11e/0x1b0 [ 59.922962][ T7187] ? _raw_spin_unlock+0x4b/0x60 [ 59.927794][ T7187] ? __alloc_fd+0x316/0x4c0 [ 59.932276][ T7187] ? get_unused_fd_flags+0x93/0xc0 [ 59.937379][ T7187] do_sys_open+0x3b3/0x4f0 [ 59.941786][ T7187] __x64_sys_openat+0x62/0x80 [ 59.946445][ T7187] do_syscall_64+0xcf/0x2f0 [ 59.950932][ T7187] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.956800][ T7187] RIP: 0033:0x47c5aa [ 59.960676][ T7187] Code: e8 7b 6b fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 4c 8b 54 24 28 4c 8b 44 24 30 4c 8b 4c 24 38 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 40 ff ff ff ff 48 c7 44 24 48 [ 59.980388][ T7187] RSP: 002b:000000c4203ad850 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 59.988779][ T7187] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c5aa [ 59.996733][ T7187] RDX: 0000000000080002 RSI: 000000c4200998a0 RDI: ffffffffffffff9c [ 60.004741][ T7187] RBP: 000000c4203ad8d0 R08: 0000000000000000 R09: 0000000000000000 [ 60.012706][ T7187] R10: 00000000000001a4 R11: 0000000000000206 R12: ffffffffffffffff [ 60.020659][ T7187] R13: 00000000000000c6 R14: 00000000000000c5 R15: 0000000000000100 [ 60.030210][ T7187] Kernel Offset: disabled [ 60.034530][ T7187] Rebooting in 86400 seconds..