Warning: Permanently added '10.128.0.31' (ED25519) to the list of known hosts.
2024/10/25 06:25:58 ignoring optional flag "sandboxArg"="0"
2024/10/25 06:25:58 ignoring optional flag "type"="gce"
2024/10/25 06:25:58 parsed 1 programs
2024/10/25 06:25:58 executed programs: 0
[ 63.870820][ T4424] chnl_net:caif_netlink_parms(): no params data found
[ 63.926154][ T4424] bridge0: port 1(bridge_slave_0) entered blocking state
[ 63.933264][ T4424] bridge0: port 1(bridge_slave_0) entered disabled state
[ 63.941418][ T4424] device bridge_slave_0 entered promiscuous mode
[ 63.949965][ T4424] bridge0: port 2(bridge_slave_1) entered blocking state
[ 63.957150][ T4424] bridge0: port 2(bridge_slave_1) entered disabled state
[ 63.965273][ T4424] device bridge_slave_1 entered promiscuous mode
[ 63.983085][ T4424] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 63.993772][ T4424] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 64.014658][ T4424] team0: Port device team_slave_0 added
[ 64.021871][ T4424] team0: Port device team_slave_1 added
[ 64.037778][ T4424] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 64.044826][ T4424] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 64.070831][ T4424] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 64.082638][ T4424] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 64.089745][ T4424] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 64.115678][ T4424] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 64.142044][ T4424] device hsr_slave_0 entered promiscuous mode
[ 64.148750][ T4424] device hsr_slave_1 entered promiscuous mode
[ 64.585451][ T4424] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 64.596167][ T4424] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 64.605994][ T4424] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 64.617601][ T4424] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 64.638978][ T4424] bridge0: port 2(bridge_slave_1) entered blocking state
[ 64.646091][ T4424] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 64.653444][ T4424] bridge0: port 1(bridge_slave_0) entered blocking state
[ 64.660563][ T4424] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 64.716489][ T4424] 8021q: adding VLAN 0 to HW filter on device bond0
[ 64.732235][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 64.742712][ T144] bridge0: port 1(bridge_slave_0) entered disabled state
[ 64.752981][ T144] bridge0: port 2(bridge_slave_1) entered disabled state
[ 64.761210][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 64.776951][ T4424] 8021q: adding VLAN 0 to HW filter on device team0
[ 64.790511][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 64.799665][ T144] bridge0: port 1(bridge_slave_0) entered blocking state
[ 64.806781][ T144] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 64.831026][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 64.839956][ T144] bridge0: port 2(bridge_slave_1) entered blocking state
[ 64.847081][ T144] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 64.857119][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 64.866004][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 64.887318][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 64.896368][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 64.906678][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 64.915367][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 64.927541][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 64.936297][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 64.947251][ T4424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 65.039292][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 65.047381][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 65.060429][ T4424] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 65.079609][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 65.089607][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 65.110800][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 65.119882][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 65.132131][ T4424] device veth0_vlan entered promiscuous mode
[ 65.139943][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 65.149800][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 65.162918][ T4424] device veth1_vlan entered promiscuous mode
[ 65.185963][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 65.201705][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 65.210455][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 65.220442][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 65.231741][ T4424] device veth0_macvtap entered promiscuous mode
[ 65.244368][ T4424] device veth1_macvtap entered promiscuous mode
[ 65.261815][ T4424] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 65.271670][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 65.280450][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 65.289224][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 65.300412][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 65.311407][ T4424] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 65.320754][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 65.330119][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 65.341501][ T4424] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 65.351276][ T4424] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 65.360683][ T4424] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 65.370329][ T4424] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 65.440172][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 65.449934][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 65.470505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 65.486833][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 65.496253][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 65.508486][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 65.557817][ T4532] loop0: detected capacity change from 0 to 2048
[ 65.592735][ T4532] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none.
[ 65.632915][ T4532] ==================================================================
[ 65.641139][ T4532] BUG: KASAN: use-after-free in ext4_convert_inline_data_nolock+0x319/0xda0
[ 65.649853][ T4532] Read of size 20 at addr ffff8880230521a3 by task syz-executor.0/4532
[ 65.658101][ T4532]
[ 65.660461][ T4532] CPU: 0 PID: 4532 Comm: syz-executor.0 Not tainted 5.15.169-syzkaller #0
[ 65.668963][ T4532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 65.679041][ T4532] Call Trace:
[ 65.682328][ T4532]
[ 65.685266][ T4532] dump_stack_lvl+0x1e3/0x2d0
[ 65.689953][ T4532] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 65.695685][ T4532] ? _printk+0xd1/0x120
[ 65.699863][ T4532] ? __wake_up_klogd+0xcc/0x100
[ 65.704727][ T4532] ? panic+0x860/0x860
[ 65.708813][ T4532] ? _raw_spin_lock_irqsave+0xdd/0x120
[ 65.714305][ T4532] print_address_description+0x63/0x3b0
[ 65.719905][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0
[ 65.726242][ T4532] kasan_report+0x16b/0x1c0
[ 65.730760][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0
[ 65.737242][ T4532] kasan_check_range+0x27e/0x290
[ 65.742205][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0
[ 65.748556][ T4532] memcpy+0x25/0x60
[ 65.752465][ T4532] ext4_convert_inline_data_nolock+0x319/0xda0
[ 65.758641][ T4532] ? ext4_add_dirent_to_inline+0x540/0x540
[ 65.764470][ T4532] ext4_convert_inline_data+0x4cf/0x610
[ 65.770035][ T4532] ? ext4_inline_data_truncate+0xd20/0xd20
[ 65.775869][ T4532] ext4_fallocate+0x148/0x20f0
[ 65.780650][ T4532] ? rcu_read_lock_any_held+0xb3/0x160
[ 65.786124][ T4532] ? ext4_ext_truncate+0x250/0x250
[ 65.791240][ T4532] ? common_file_perm+0x17d/0x1d0
[ 65.796282][ T4532] vfs_fallocate+0x54a/0x6b0
[ 65.800887][ T4532] __x64_sys_fallocate+0xb9/0x100
[ 65.805921][ T4532] do_syscall_64+0x3b/0xb0
[ 65.810343][ T4532] ? clear_bhb_loop+0x15/0x70
[ 65.815117][ T4532] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 65.821016][ T4532] RIP: 0033:0x7fba5089b959
[ 65.825447][ T4532] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 65.845154][ T4532] RSP: 002b:00007fba4fc1d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000011d
[ 65.853579][ T4532] RAX: ffffffffffffffda RBX: 00007fba509baf80 RCX: 00007fba5089b959
[ 65.861564][ T4532] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
[ 65.869544][ T4532] RBP: 00007fba508f7c88 R08: 0000000000000000 R09: 0000000000000000
[ 65.877710][ T4532] R10: 0000000000008000 R11: 0000000000000246 R12: 0000000000000000
[ 65.885737][ T4532] R13: 000000000000000b R14: 00007fba509baf80 R15: 00007fffca773fb8
[ 65.893741][ T4532]
[ 65.896782][ T4532]
[ 65.899108][ T4532] Allocated by task 4484:
[ 65.903435][ T4532] ____kasan_kmalloc+0xba/0xf0
[ 65.908207][ T4532] __kmalloc+0x168/0x300
[ 65.912459][ T4532] tomoyo_realpath_from_path+0xd8/0x5e0
[ 65.918021][ T4532] tomoyo_check_open_permission+0x22c/0x490
[ 65.923930][ T4532] security_file_open+0x5f/0xa0
[ 65.928797][ T4532] do_dentry_open+0x315/0xfb0
[ 65.933499][ T4532] path_openat+0x2705/0x2f20
[ 65.938098][ T4532] do_filp_open+0x21c/0x460
[ 65.942609][ T4532] do_sys_openat2+0x13b/0x4f0
[ 65.947292][ T4532] __x64_sys_openat+0x243/0x290
[ 65.952150][ T4532] do_syscall_64+0x3b/0xb0
[ 65.956582][ T4532] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 65.962490][ T4532]
[ 65.964814][ T4532] Freed by task 4484:
[ 65.968792][ T4532] kasan_set_track+0x4b/0x80
[ 65.973386][ T4532] kasan_set_free_info+0x1f/0x40
[ 65.978329][ T4532] ____kasan_slab_free+0xd8/0x120
[ 65.983365][ T4532] slab_free_freelist_hook+0xdd/0x160
[ 65.988749][ T4532] kfree+0xf1/0x270
[ 65.992575][ T4532] tomoyo_realpath_from_path+0x5ad/0x5e0
[ 65.998214][ T4532] tomoyo_check_open_permission+0x22c/0x490
[ 66.004118][ T4532] security_file_open+0x5f/0xa0
[ 66.008980][ T4532] do_dentry_open+0x315/0xfb0
[ 66.013662][ T4532] path_openat+0x2705/0x2f20
[ 66.018263][ T4532] do_filp_open+0x21c/0x460
[ 66.022777][ T4532] do_sys_openat2+0x13b/0x4f0
[ 66.027465][ T4532] __x64_sys_openat+0x243/0x290
[ 66.032326][ T4532] do_syscall_64+0x3b/0xb0
[ 66.036760][ T4532] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 66.042668][ T4532]
[ 66.044999][ T4532] The buggy address belongs to the object at ffff888023052000
[ 66.044999][ T4532] which belongs to the cache kmalloc-4k of size 4096
[ 66.059055][ T4532] The buggy address is located 419 bytes inside of
[ 66.059055][ T4532] 4096-byte region [ffff888023052000, ffff888023053000)
[ 66.072422][ T4532] The buggy address belongs to the page:
[ 66.078081][ T4532] page:ffffea00008c1400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x23050
[ 66.088245][ T4532] head:ffffea00008c1400 order:3 compound_mapcount:0 compound_pincount:0
[ 66.096575][ T4532] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 66.104594][ T4532] raw: 00fff00000010200 0000000000000000 0000000400000001 ffff888017042140
[ 66.113189][ T4532] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000
[ 66.121774][ T4532] page dumped because: kasan: bad access detected
[ 66.128198][ T4532] page_owner tracks the page as allocated
[ 66.133913][ T4532] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3835, ts 25441461765, free_ts 25378429374
[ 66.152325][ T4532] get_page_from_freelist+0x322a/0x33c0
[ 66.157882][ T4532] __alloc_pages+0x272/0x700
[ 66.162520][ T4532] new_slab+0xbb/0x4b0
[ 66.166773][ T4532] ___slab_alloc+0x6f6/0xe10
[ 66.171372][ T4532] __kmalloc+0x1c9/0x300
[ 66.175623][ T4532] tomoyo_realpath_from_path+0xd8/0x5e0
[ 66.181171][ T4532] tomoyo_check_open_permission+0x22c/0x490
[ 66.187073][ T4532] security_file_open+0x5f/0xa0
[ 66.191932][ T4532] do_dentry_open+0x315/0xfb0
[ 66.196616][ T4532] path_openat+0x2705/0x2f20
[ 66.201219][ T4532] do_filp_open+0x21c/0x460
[ 66.205727][ T4532] do_sys_openat2+0x13b/0x4f0
[ 66.210420][ T4532] __x64_sys_openat+0x243/0x290
[ 66.215283][ T4532] do_syscall_64+0x3b/0xb0
[ 66.219706][ T4532] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 66.225617][ T4532] page last free stack trace:
[ 66.230285][ T4532] free_unref_page_prepare+0xc34/0xcf0
[ 66.235749][ T4532] free_unref_page+0x95/0x2d0
[ 66.240433][ T4532] __unfreeze_partials+0x1b7/0x210
[ 66.245553][ T4532] put_cpu_partial+0x132/0x1a0
[ 66.250324][ T4532] ___cache_free+0xe3/0x100
[ 66.254834][ T4532] qlist_free_all+0x36/0x90
[ 66.259343][ T4532] kasan_quarantine_reduce+0x162/0x180
[ 66.264810][ T4532] __kasan_slab_alloc+0x2f/0xc0
[ 66.269669][ T4532] slab_post_alloc_hook+0x53/0x380
[ 66.274795][ T4532] __kmalloc+0x120/0x300
[ 66.279055][ T4532] tomoyo_supervisor+0xe67/0x12c0
[ 66.284170][ T4532] tomoyo_path_permission+0x243/0x360
[ 66.289555][ T4532] tomoyo_path_perm+0x436/0x6b0
[ 66.294417][ T4532] security_inode_getattr+0xcf/0x120
[ 66.299714][ T4532] vfs_getattr+0x26/0x360
[ 66.304066][ T4532] vfs_statx+0x18f/0x3b0
[ 66.308319][ T4532]
[ 66.310641][ T4532] Memory state around the buggy address:
[ 66.316267][ T4532] ffff888023052080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 66.324335][ T4532] ffff888023052100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 66.332399][ T4532] >ffff888023052180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 66.340458][ T4532] ^
[ 66.345585][ T4532] ffff888023052200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 66.353651][ T4532] ffff888023052280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 66.361719][ T4532] ==================================================================
[ 66.369777][ T4532] Disabling lock debugging due to kernel taint
[ 66.377612][ T4183] Bluetooth: hci0: command 0x0409 tx timeout
[ 66.392437][ T4532] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 66.399658][ T4532] CPU: 0 PID: 4532 Comm: syz-executor.0 Tainted: G B 5.15.169-syzkaller #0
[ 66.409763][ T4532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
[ 66.419824][ T4532] Call Trace:
[ 66.423103][ T4532]
[ 66.426034][ T4532] dump_stack_lvl+0x1e3/0x2d0
[ 66.430731][ T4532] ? io_uring_drop_tctx_refs+0x1a0/0x1a0
[ 66.436370][ T4532] ? panic+0x860/0x860
[ 66.440532][ T4532] ? preempt_schedule_common+0xa6/0xd0
[ 66.446000][ T4532] ? preempt_schedule+0xd9/0xe0
[ 66.450859][ T4532] panic+0x318/0x860
[ 66.454765][ T4532] ? check_panic_on_warn+0x1d/0xa0
[ 66.459883][ T4532] ? fb_is_primary_device+0xd0/0xd0
[ 66.465090][ T4532] ? _raw_spin_unlock_irqrestore+0x128/0x130
[ 66.471080][ T4532] ? _raw_spin_unlock+0x40/0x40
[ 66.475937][ T4532] ? print_memory_metadata+0xe2/0x140
[ 66.481321][ T4532] check_panic_on_warn+0x7e/0xa0
[ 66.486266][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0
[ 66.492600][ T4532] end_report+0x6d/0xf0
[ 66.496797][ T4532] kasan_report+0x18e/0x1c0
[ 66.501317][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0
[ 66.507659][ T4532] kasan_check_range+0x27e/0x290
[ 66.512624][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0
[ 66.518961][ T4532] memcpy+0x25/0x60
[ 66.522782][ T4532] ext4_convert_inline_data_nolock+0x319/0xda0
[ 66.529055][ T4532] ? ext4_add_dirent_to_inline+0x540/0x540
[ 66.534885][ T4532] ext4_convert_inline_data+0x4cf/0x610
[ 66.540530][ T4532] ? ext4_inline_data_truncate+0xd20/0xd20
[ 66.546351][ T4532] ext4_fallocate+0x148/0x20f0
[ 66.551129][ T4532] ? rcu_read_lock_any_held+0xb3/0x160
[ 66.556609][ T4532] ? ext4_ext_truncate+0x250/0x250
[ 66.561727][ T4532] ? common_file_perm+0x17d/0x1d0
[ 66.566771][ T4532] vfs_fallocate+0x54a/0x6b0
[ 66.571396][ T4532] __x64_sys_fallocate+0xb9/0x100
[ 66.576429][ T4532] do_syscall_64+0x3b/0xb0
[ 66.580848][ T4532] ? clear_bhb_loop+0x15/0x70
[ 66.585531][ T4532] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 66.591429][ T4532] RIP: 0033:0x7fba5089b959
[ 66.595845][ T4532] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 66.615447][ T4532] RSP: 002b:00007fba4fc1d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000011d
[ 66.623868][ T4532] RAX: ffffffffffffffda RBX: 00007fba509baf80 RCX: 00007fba5089b959
[ 66.631846][ T4532] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
[ 66.639822][ T4532] RBP: 00007fba508f7c88 R08: 0000000000000000 R09: 0000000000000000
[ 66.647799][ T4532] R10: 0000000000008000 R11: 0000000000000246 R12: 0000000000000000
[ 66.655774][ T4532] R13: 000000000000000b R14: 00007fba509baf80 R15: 00007fffca773fb8
[ 66.663763][ T4532]
[ 66.666972][ T4532] Kernel Offset: disabled
[ 66.671319][ T4532] Rebooting in 86400 seconds..