Warning: Permanently added '10.128.0.37' (ED25519) to the list of known hosts.
2024/10/03 13:53:34 ignoring optional flag "sandboxArg"="0"
2024/10/03 13:53:34 ignoring optional flag "type"="gce"
2024/10/03 13:53:34 parsed 1 programs
2024/10/03 13:53:35 executed programs: 0
[ 66.606164][ T3838] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS
[ 66.728083][ T3859] chnl_net:caif_netlink_parms(): no params data found
[ 66.772597][ T3859] bridge0: port 1(bridge_slave_0) entered blocking state
[ 66.780140][ T3859] bridge0: port 1(bridge_slave_0) entered disabled state
[ 66.790347][ T3859] device bridge_slave_0 entered promiscuous mode
[ 66.798989][ T3859] bridge0: port 2(bridge_slave_1) entered blocking state
[ 66.806604][ T3859] bridge0: port 2(bridge_slave_1) entered disabled state
[ 66.814935][ T3859] device bridge_slave_1 entered promiscuous mode
[ 66.841949][ T3859] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 66.853264][ T3859] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 66.883307][ T3859] team0: Port device team_slave_0 added
[ 66.891847][ T3859] team0: Port device team_slave_1 added
[ 66.917689][ T3859] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 66.924973][ T3859] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 66.952535][ T3859] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 66.965567][ T3859] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 66.972519][ T3859] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 66.998893][ T3859] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 67.033102][ T3859] device hsr_slave_0 entered promiscuous mode
[ 67.040248][ T3859] device hsr_slave_1 entered promiscuous mode
[ 67.568115][ T3859] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 67.579914][ T3859] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 67.590283][ T3859] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 67.600755][ T3859] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 67.623503][ T3859] bridge0: port 2(bridge_slave_1) entered blocking state
[ 67.630720][ T3859] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 67.638241][ T3859] bridge0: port 1(bridge_slave_0) entered blocking state
[ 67.645369][ T3859] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 67.699551][ T3859] 8021q: adding VLAN 0 to HW filter on device bond0
[ 67.717172][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 67.725976][ T154] bridge0: port 1(bridge_slave_0) entered disabled state
[ 67.734049][ T154] bridge0: port 2(bridge_slave_1) entered disabled state
[ 67.742867][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 67.756719][ T3859] 8021q: adding VLAN 0 to HW filter on device team0
[ 67.767913][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 67.777682][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 67.787437][ T9] bridge0: port 1(bridge_slave_0) entered blocking state
[ 67.794663][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 67.812440][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 67.821627][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 67.831431][ T9] bridge0: port 2(bridge_slave_1) entered blocking state
[ 67.838628][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 67.846528][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[ 67.856501][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 67.873546][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 67.884477][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 67.900398][ T3859] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 67.913489][ T3859] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 67.927135][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 67.936150][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 67.946542][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 67.956427][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 67.966543][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 67.975763][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 67.984689][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 67.999999][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 68.083425][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 68.092442][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 68.107239][ T3859] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 68.127814][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 68.138199][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 68.159262][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 68.169478][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 68.178617][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 68.188792][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 68.199834][ T3859] device veth0_vlan entered promiscuous mode
[ 68.214839][ T3859] device veth1_vlan entered promiscuous mode
[ 68.237749][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 68.249252][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 68.257833][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 68.268326][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 68.280083][ T3859] device veth0_macvtap entered promiscuous mode
[ 68.292110][ T3859] device veth1_macvtap entered promiscuous mode
[ 68.310357][ T3859] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 68.320434][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 68.330387][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 68.338767][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 68.347761][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 68.360436][ T3859] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 68.369298][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 68.379301][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 68.390712][ T3859] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 68.400560][ T3859] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 68.409643][ T3859] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 68.418733][ T3859] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 68.477133][ T412] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 68.500711][ T412] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 68.504840][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 68.516980][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 68.525291][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 68.537231][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 68.586487][ T3975] loop0: detected capacity change from 0 to 2048
[ 68.689551][ T3975] UDF-fs: INFO Mounting volume 'LiuxUDF', timestamp 2022/11/22 14:59 (1000)
[ 68.694461][ T23] Bluetooth: hci0: command 0x0409 tx timeout
[ 68.727745][ T3975] ==================================================================
[ 68.735987][ T3975] BUG: KASAN: slab-out-of-bounds in udf_readdir+0xcaa/0x2170
[ 68.743381][ T3975] Write of size 201 at addr ffff88802388ba36 by task syz-executor.0/3975
[ 68.751798][ T3975]
[ 68.754134][ T3975] CPU: 1 PID: 3975 Comm: syz-executor.0 Not tainted 5.15.167-syzkaller #0
[ 68.762826][ T3975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 68.772989][ T3975] Call Trace:
[ 68.776286][ T3975]
[ 68.779223][ T3975] dump_stack_lvl+0x1e3/0x2d0
[ 68.783936][ T3975] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 68.789584][ T3975] ? _printk+0xd1/0x120
[ 68.793762][ T3975] ? __wake_up_klogd+0xcc/0x100
[ 68.798732][ T3975] ? panic+0x860/0x860
[ 68.802914][ T3975] ? _raw_spin_lock_irqsave+0xdd/0x120
[ 68.808409][ T3975] print_address_description+0x63/0x3b0
[ 68.814318][ T3975] ? udf_readdir+0xcaa/0x2170
[ 68.819016][ T3975] kasan_report+0x16b/0x1c0
[ 68.823616][ T3975] ? udf_readdir+0xcaa/0x2170
[ 68.828305][ T3975] kasan_check_range+0x27e/0x290
[ 68.833252][ T3975] ? udf_readdir+0xcaa/0x2170
[ 68.837948][ T3975] memcpy+0x3c/0x60
[ 68.841769][ T3975] udf_readdir+0xcaa/0x2170
[ 68.846300][ T3975] ? load_block_bitmap+0x550/0x550
[ 68.851441][ T3975] ? load_block_bitmap+0x550/0x550
[ 68.856586][ T3975] ? __fdget_pos+0x2cb/0x380
[ 68.861201][ T3975] ? end_current_label_crit_section+0x147/0x170
[ 68.867461][ T3975] ? iterate_dir+0x10a/0x570
[ 68.872070][ T3975] ? iterate_dir+0x10a/0x570
[ 68.876692][ T3975] ? fsnotify_perm+0x442/0x590
[ 68.881477][ T3975] iterate_dir+0x224/0x570
[ 68.885914][ T3975] ? load_block_bitmap+0x550/0x550
[ 68.891073][ T3975] __se_sys_getdents64+0x209/0x4f0
[ 68.896198][ T3975] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 68.902193][ T3975] ? __x64_sys_getdents64+0x80/0x80
[ 68.907402][ T3975] ? filldir+0x720/0x720
[ 68.911920][ T3975] ? syscall_enter_from_user_mode+0x2e/0x240
[ 68.917911][ T3975] ? lockdep_hardirqs_on+0x94/0x130
[ 68.923133][ T3975] ? syscall_enter_from_user_mode+0x2e/0x240
[ 68.929131][ T3975] do_syscall_64+0x3b/0xb0
[ 68.933558][ T3975] ? clear_bhb_loop+0x15/0x70
[ 68.938244][ T3975] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 68.944253][ T3975] RIP: 0033:0x7f44675eae69
[ 68.948775][ T3975] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 68.968410][ T3975] RSP: 002b:00007f446696b0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 68.976832][ T3975] RAX: ffffffffffffffda RBX: 00007f4467718f80 RCX: 00007f44675eae69
[ 68.984899][ T3975] RDX: 0000000000001000 RSI: 0000000020000f80 RDI: 0000000000000005
[ 68.992883][ T3975] RBP: 00007f446763747a R08: 0000000000000000 R09: 0000000000000000
[ 69.001081][ T3975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 69.009246][ T3975] R13: 000000000000000b R14: 00007f4467718f80 R15: 00007ffedec9d008
[ 69.017247][ T3975]
[ 69.020274][ T3975]
[ 69.022598][ T3975] Allocated by task 3975:
[ 69.027096][ T3975] ____kasan_kmalloc+0xba/0xf0
[ 69.031866][ T3975] kmem_cache_alloc_trace+0x143/0x290
[ 69.037248][ T3975] udf_readdir+0xbc6/0x2170
[ 69.041767][ T3975] iterate_dir+0x224/0x570
[ 69.046195][ T3975] __se_sys_getdents64+0x209/0x4f0
[ 69.051356][ T3975] do_syscall_64+0x3b/0xb0
[ 69.055779][ T3975] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.061681][ T3975]
[ 69.064006][ T3975] The buggy address belongs to the object at ffff88802388ba00
[ 69.064006][ T3975] which belongs to the cache kmalloc-256 of size 256
[ 69.078066][ T3975] The buggy address is located 54 bytes inside of
[ 69.078066][ T3975] 256-byte region [ffff88802388ba00, ffff88802388bb00)
[ 69.091364][ T3975] The buggy address belongs to the page:
[ 69.097038][ T3975] page:ffffea00008e2280 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2388a
[ 69.107289][ T3975] head:ffffea00008e2280 order:1 compound_mapcount:0
[ 69.113882][ T3975] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 69.121878][ T3975] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff888017041b40
[ 69.130475][ T3975] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[ 69.139149][ T3975] page dumped because: kasan: bad access detected
[ 69.145570][ T3975] page_owner tracks the page as allocated
[ 69.151342][ T3975] page last allocated via order 1, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 3859, ts 68556326164, free_ts 68545597972
[ 69.172109][ T3975] get_page_from_freelist+0x322a/0x33c0
[ 69.177673][ T3975] __alloc_pages+0x272/0x700
[ 69.182282][ T3975] new_slab+0xbb/0x4b0
[ 69.186355][ T3975] ___slab_alloc+0x6f6/0xe10
[ 69.190950][ T3975] __kmalloc_node+0x1fa/0x390
[ 69.195729][ T3975] kvmalloc_node+0x80/0x140
[ 69.200329][ T3975] nf_hook_entries_grow+0x331/0x760
[ 69.205532][ T3975] __nf_register_net_hook+0x22f/0x8e0
[ 69.210907][ T3975] nf_register_net_hook+0xac/0x180
[ 69.216023][ T3975] nf_register_net_hooks+0x3d/0x1a0
[ 69.221232][ T3975] ipt_register_table+0x4ca/0x7a0
[ 69.226261][ T3975] iptable_security_table_init+0x3e/0x60
[ 69.231903][ T3975] xt_find_table_lock+0x2cc/0x3a0
[ 69.237023][ T3975] xt_request_find_table_lock+0x22/0xf0
[ 69.242583][ T3975] do_ipt_get_ctl+0x872/0x1880
[ 69.247400][ T3975] nf_getsockopt+0x28e/0x2b0
[ 69.252454][ T3975] page last free stack trace:
[ 69.257123][ T3975] free_unref_page_prepare+0xc34/0xcf0
[ 69.262589][ T3975] free_unref_page+0x95/0x2d0
[ 69.267279][ T3975] __unfreeze_partials+0x1b7/0x210
[ 69.272401][ T3975] put_cpu_partial+0x132/0x1a0
[ 69.277180][ T3975] ___cache_free+0xe3/0x100
[ 69.281691][ T3975] qlist_free_all+0x36/0x90
[ 69.286203][ T3975] kasan_quarantine_reduce+0x162/0x180
[ 69.291762][ T3975] __kasan_slab_alloc+0x2f/0xc0
[ 69.296621][ T3975] slab_post_alloc_hook+0x53/0x380
[ 69.301835][ T3975] kmem_cache_alloc+0xf3/0x280
[ 69.306612][ T3975] ptlock_alloc+0x1c/0x60
[ 69.310950][ T3975] pte_alloc_one+0xd1/0x360
[ 69.315468][ T3975] __pte_alloc+0x75/0x210
[ 69.319820][ T3975] copy_page_range+0x37cc/0x43b0
[ 69.324768][ T3975] copy_mm+0xc64/0x1370
[ 69.328936][ T3975] copy_process+0x1816/0x3ef0
[ 69.333629][ T3975]
[ 69.335957][ T3975] Memory state around the buggy address:
[ 69.341591][ T3975] ffff88802388b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 69.349660][ T3975] ffff88802388ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 69.357727][ T3975] >ffff88802388ba80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06
[ 69.365793][ T3975] ^
[ 69.373952][ T3975] ffff88802388bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 69.382018][ T3975] ffff88802388bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 69.390173][ T3975] ==================================================================
[ 69.398327][ T3975] Disabling lock debugging due to kernel taint
[ 69.417843][ T3975] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 69.425159][ T3975] CPU: 1 PID: 3975 Comm: syz-executor.0 Tainted: G B 5.15.167-syzkaller #0
[ 69.435247][ T3975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 69.445333][ T3975] Call Trace:
[ 69.448612][ T3975]
[ 69.451545][ T3975] dump_stack_lvl+0x1e3/0x2d0
[ 69.456231][ T3975] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 69.461877][ T3975] ? panic+0x860/0x860
[ 69.465957][ T3975] ? preempt_schedule_common+0xa6/0xd0
[ 69.471425][ T3975] ? preempt_schedule+0xd9/0xe0
[ 69.476317][ T3975] panic+0x318/0x860
[ 69.480224][ T3975] ? check_panic_on_warn+0x1d/0xa0
[ 69.485343][ T3975] ? fb_is_primary_device+0xd0/0xd0
[ 69.490669][ T3975] ? _raw_spin_unlock_irqrestore+0x128/0x130
[ 69.496662][ T3975] ? _raw_spin_unlock+0x40/0x40
[ 69.501612][ T3975] ? print_memory_metadata+0xe2/0x140
[ 69.507003][ T3975] check_panic_on_warn+0x7e/0xa0
[ 69.511949][ T3975] ? udf_readdir+0xcaa/0x2170
[ 69.516685][ T3975] end_report+0x6d/0xf0
[ 69.520843][ T3975] kasan_report+0x18e/0x1c0
[ 69.525349][ T3975] ? udf_readdir+0xcaa/0x2170
[ 69.530034][ T3975] kasan_check_range+0x27e/0x290
[ 69.534974][ T3975] ? udf_readdir+0xcaa/0x2170
[ 69.539650][ T3975] memcpy+0x3c/0x60
[ 69.543461][ T3975] udf_readdir+0xcaa/0x2170
[ 69.547975][ T3975] ? load_block_bitmap+0x550/0x550
[ 69.553090][ T3975] ? load_block_bitmap+0x550/0x550
[ 69.558394][ T3975] ? __fdget_pos+0x2cb/0x380
[ 69.563080][ T3975] ? end_current_label_crit_section+0x147/0x170
[ 69.569341][ T3975] ? iterate_dir+0x10a/0x570
[ 69.573941][ T3975] ? iterate_dir+0x10a/0x570
[ 69.578550][ T3975] ? fsnotify_perm+0x442/0x590
[ 69.583327][ T3975] iterate_dir+0x224/0x570
[ 69.587752][ T3975] ? load_block_bitmap+0x550/0x550
[ 69.592868][ T3975] __se_sys_getdents64+0x209/0x4f0
[ 69.597993][ T3975] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 69.604001][ T3975] ? __x64_sys_getdents64+0x80/0x80
[ 69.609207][ T3975] ? filldir+0x720/0x720
[ 69.613543][ T3975] ? syscall_enter_from_user_mode+0x2e/0x240
[ 69.619543][ T3975] ? lockdep_hardirqs_on+0x94/0x130
[ 69.624753][ T3975] ? syscall_enter_from_user_mode+0x2e/0x240
[ 69.630745][ T3975] do_syscall_64+0x3b/0xb0
[ 69.635177][ T3975] ? clear_bhb_loop+0x15/0x70
[ 69.639856][ T3975] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 69.645752][ T3975] RIP: 0033:0x7f44675eae69
[ 69.650170][ T3975] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 69.669774][ T3975] RSP: 002b:00007f446696b0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9
[ 69.678190][ T3975] RAX: ffffffffffffffda RBX: 00007f4467718f80 RCX: 00007f44675eae69
[ 69.686303][ T3975] RDX: 0000000000001000 RSI: 0000000020000f80 RDI: 0000000000000005
[ 69.694450][ T3975] RBP: 00007f446763747a R08: 0000000000000000 R09: 0000000000000000
[ 69.702426][ T3975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 69.710412][ T3975] R13: 000000000000000b R14: 00007f4467718f80 R15: 00007ffedec9d008
[ 69.718395][ T3975]
[ 69.721602][ T3975] Kernel Offset: disabled
[ 69.725948][ T3975] Rebooting in 86400 seconds..