Warning: Permanently added '10.128.0.31' (ED25519) to the list of known hosts. 2024/10/25 06:25:58 ignoring optional flag "sandboxArg"="0" 2024/10/25 06:25:58 ignoring optional flag "type"="gce" 2024/10/25 06:25:58 parsed 1 programs 2024/10/25 06:25:58 executed programs: 0 [ 63.870820][ T4424] chnl_net:caif_netlink_parms(): no params data found [ 63.926154][ T4424] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.933264][ T4424] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.941418][ T4424] device bridge_slave_0 entered promiscuous mode [ 63.949965][ T4424] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.957150][ T4424] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.965273][ T4424] device bridge_slave_1 entered promiscuous mode [ 63.983085][ T4424] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.993772][ T4424] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.014658][ T4424] team0: Port device team_slave_0 added [ 64.021871][ T4424] team0: Port device team_slave_1 added [ 64.037778][ T4424] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.044826][ T4424] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.070831][ T4424] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.082638][ T4424] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.089745][ T4424] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.115678][ T4424] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.142044][ T4424] device hsr_slave_0 entered promiscuous mode [ 64.148750][ T4424] device hsr_slave_1 entered promiscuous mode [ 64.585451][ T4424] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 64.596167][ T4424] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 64.605994][ T4424] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 64.617601][ T4424] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 64.638978][ T4424] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.646091][ T4424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.653444][ T4424] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.660563][ T4424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.716489][ T4424] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.732235][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.742712][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.752981][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.761210][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 64.776951][ T4424] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.790511][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.799665][ T144] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.806781][ T144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.831026][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.839956][ T144] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.847081][ T144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.857119][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.866004][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.887318][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.896368][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.906678][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.915367][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.927541][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.936297][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.947251][ T4424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.039292][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 65.047381][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.060429][ T4424] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.079609][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 65.089607][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 65.110800][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 65.119882][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.132131][ T4424] device veth0_vlan entered promiscuous mode [ 65.139943][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.149800][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.162918][ T4424] device veth1_vlan entered promiscuous mode [ 65.185963][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 65.201705][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 65.210455][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 65.220442][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 65.231741][ T4424] device veth0_macvtap entered promiscuous mode [ 65.244368][ T4424] device veth1_macvtap entered promiscuous mode [ 65.261815][ T4424] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 65.271670][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 65.280450][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 65.289224][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 65.300412][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.311407][ T4424] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.320754][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 65.330119][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 65.341501][ T4424] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.351276][ T4424] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.360683][ T4424] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.370329][ T4424] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.440172][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.449934][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.470505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 65.486833][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 65.496253][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 65.508486][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 65.557817][ T4532] loop0: detected capacity change from 0 to 2048 [ 65.592735][ T4532] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 65.632915][ T4532] ================================================================== [ 65.641139][ T4532] BUG: KASAN: use-after-free in ext4_convert_inline_data_nolock+0x319/0xda0 [ 65.649853][ T4532] Read of size 20 at addr ffff8880230521a3 by task syz-executor.0/4532 [ 65.658101][ T4532] [ 65.660461][ T4532] CPU: 0 PID: 4532 Comm: syz-executor.0 Not tainted 5.15.169-syzkaller #0 [ 65.668963][ T4532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 65.679041][ T4532] Call Trace: [ 65.682328][ T4532] [ 65.685266][ T4532] dump_stack_lvl+0x1e3/0x2d0 [ 65.689953][ T4532] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 65.695685][ T4532] ? _printk+0xd1/0x120 [ 65.699863][ T4532] ? __wake_up_klogd+0xcc/0x100 [ 65.704727][ T4532] ? panic+0x860/0x860 [ 65.708813][ T4532] ? _raw_spin_lock_irqsave+0xdd/0x120 [ 65.714305][ T4532] print_address_description+0x63/0x3b0 [ 65.719905][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0 [ 65.726242][ T4532] kasan_report+0x16b/0x1c0 [ 65.730760][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0 [ 65.737242][ T4532] kasan_check_range+0x27e/0x290 [ 65.742205][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0 [ 65.748556][ T4532] memcpy+0x25/0x60 [ 65.752465][ T4532] ext4_convert_inline_data_nolock+0x319/0xda0 [ 65.758641][ T4532] ? ext4_add_dirent_to_inline+0x540/0x540 [ 65.764470][ T4532] ext4_convert_inline_data+0x4cf/0x610 [ 65.770035][ T4532] ? ext4_inline_data_truncate+0xd20/0xd20 [ 65.775869][ T4532] ext4_fallocate+0x148/0x20f0 [ 65.780650][ T4532] ? rcu_read_lock_any_held+0xb3/0x160 [ 65.786124][ T4532] ? ext4_ext_truncate+0x250/0x250 [ 65.791240][ T4532] ? common_file_perm+0x17d/0x1d0 [ 65.796282][ T4532] vfs_fallocate+0x54a/0x6b0 [ 65.800887][ T4532] __x64_sys_fallocate+0xb9/0x100 [ 65.805921][ T4532] do_syscall_64+0x3b/0xb0 [ 65.810343][ T4532] ? clear_bhb_loop+0x15/0x70 [ 65.815117][ T4532] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.821016][ T4532] RIP: 0033:0x7fba5089b959 [ 65.825447][ T4532] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 65.845154][ T4532] RSP: 002b:00007fba4fc1d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 65.853579][ T4532] RAX: ffffffffffffffda RBX: 00007fba509baf80 RCX: 00007fba5089b959 [ 65.861564][ T4532] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 65.869544][ T4532] RBP: 00007fba508f7c88 R08: 0000000000000000 R09: 0000000000000000 [ 65.877710][ T4532] R10: 0000000000008000 R11: 0000000000000246 R12: 0000000000000000 [ 65.885737][ T4532] R13: 000000000000000b R14: 00007fba509baf80 R15: 00007fffca773fb8 [ 65.893741][ T4532] [ 65.896782][ T4532] [ 65.899108][ T4532] Allocated by task 4484: [ 65.903435][ T4532] ____kasan_kmalloc+0xba/0xf0 [ 65.908207][ T4532] __kmalloc+0x168/0x300 [ 65.912459][ T4532] tomoyo_realpath_from_path+0xd8/0x5e0 [ 65.918021][ T4532] tomoyo_check_open_permission+0x22c/0x490 [ 65.923930][ T4532] security_file_open+0x5f/0xa0 [ 65.928797][ T4532] do_dentry_open+0x315/0xfb0 [ 65.933499][ T4532] path_openat+0x2705/0x2f20 [ 65.938098][ T4532] do_filp_open+0x21c/0x460 [ 65.942609][ T4532] do_sys_openat2+0x13b/0x4f0 [ 65.947292][ T4532] __x64_sys_openat+0x243/0x290 [ 65.952150][ T4532] do_syscall_64+0x3b/0xb0 [ 65.956582][ T4532] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 65.962490][ T4532] [ 65.964814][ T4532] Freed by task 4484: [ 65.968792][ T4532] kasan_set_track+0x4b/0x80 [ 65.973386][ T4532] kasan_set_free_info+0x1f/0x40 [ 65.978329][ T4532] ____kasan_slab_free+0xd8/0x120 [ 65.983365][ T4532] slab_free_freelist_hook+0xdd/0x160 [ 65.988749][ T4532] kfree+0xf1/0x270 [ 65.992575][ T4532] tomoyo_realpath_from_path+0x5ad/0x5e0 [ 65.998214][ T4532] tomoyo_check_open_permission+0x22c/0x490 [ 66.004118][ T4532] security_file_open+0x5f/0xa0 [ 66.008980][ T4532] do_dentry_open+0x315/0xfb0 [ 66.013662][ T4532] path_openat+0x2705/0x2f20 [ 66.018263][ T4532] do_filp_open+0x21c/0x460 [ 66.022777][ T4532] do_sys_openat2+0x13b/0x4f0 [ 66.027465][ T4532] __x64_sys_openat+0x243/0x290 [ 66.032326][ T4532] do_syscall_64+0x3b/0xb0 [ 66.036760][ T4532] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.042668][ T4532] [ 66.044999][ T4532] The buggy address belongs to the object at ffff888023052000 [ 66.044999][ T4532] which belongs to the cache kmalloc-4k of size 4096 [ 66.059055][ T4532] The buggy address is located 419 bytes inside of [ 66.059055][ T4532] 4096-byte region [ffff888023052000, ffff888023053000) [ 66.072422][ T4532] The buggy address belongs to the page: [ 66.078081][ T4532] page:ffffea00008c1400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x23050 [ 66.088245][ T4532] head:ffffea00008c1400 order:3 compound_mapcount:0 compound_pincount:0 [ 66.096575][ T4532] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 66.104594][ T4532] raw: 00fff00000010200 0000000000000000 0000000400000001 ffff888017042140 [ 66.113189][ T4532] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 66.121774][ T4532] page dumped because: kasan: bad access detected [ 66.128198][ T4532] page_owner tracks the page as allocated [ 66.133913][ T4532] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3835, ts 25441461765, free_ts 25378429374 [ 66.152325][ T4532] get_page_from_freelist+0x322a/0x33c0 [ 66.157882][ T4532] __alloc_pages+0x272/0x700 [ 66.162520][ T4532] new_slab+0xbb/0x4b0 [ 66.166773][ T4532] ___slab_alloc+0x6f6/0xe10 [ 66.171372][ T4532] __kmalloc+0x1c9/0x300 [ 66.175623][ T4532] tomoyo_realpath_from_path+0xd8/0x5e0 [ 66.181171][ T4532] tomoyo_check_open_permission+0x22c/0x490 [ 66.187073][ T4532] security_file_open+0x5f/0xa0 [ 66.191932][ T4532] do_dentry_open+0x315/0xfb0 [ 66.196616][ T4532] path_openat+0x2705/0x2f20 [ 66.201219][ T4532] do_filp_open+0x21c/0x460 [ 66.205727][ T4532] do_sys_openat2+0x13b/0x4f0 [ 66.210420][ T4532] __x64_sys_openat+0x243/0x290 [ 66.215283][ T4532] do_syscall_64+0x3b/0xb0 [ 66.219706][ T4532] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.225617][ T4532] page last free stack trace: [ 66.230285][ T4532] free_unref_page_prepare+0xc34/0xcf0 [ 66.235749][ T4532] free_unref_page+0x95/0x2d0 [ 66.240433][ T4532] __unfreeze_partials+0x1b7/0x210 [ 66.245553][ T4532] put_cpu_partial+0x132/0x1a0 [ 66.250324][ T4532] ___cache_free+0xe3/0x100 [ 66.254834][ T4532] qlist_free_all+0x36/0x90 [ 66.259343][ T4532] kasan_quarantine_reduce+0x162/0x180 [ 66.264810][ T4532] __kasan_slab_alloc+0x2f/0xc0 [ 66.269669][ T4532] slab_post_alloc_hook+0x53/0x380 [ 66.274795][ T4532] __kmalloc+0x120/0x300 [ 66.279055][ T4532] tomoyo_supervisor+0xe67/0x12c0 [ 66.284170][ T4532] tomoyo_path_permission+0x243/0x360 [ 66.289555][ T4532] tomoyo_path_perm+0x436/0x6b0 [ 66.294417][ T4532] security_inode_getattr+0xcf/0x120 [ 66.299714][ T4532] vfs_getattr+0x26/0x360 [ 66.304066][ T4532] vfs_statx+0x18f/0x3b0 [ 66.308319][ T4532] [ 66.310641][ T4532] Memory state around the buggy address: [ 66.316267][ T4532] ffff888023052080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.324335][ T4532] ffff888023052100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.332399][ T4532] >ffff888023052180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.340458][ T4532] ^ [ 66.345585][ T4532] ffff888023052200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.353651][ T4532] ffff888023052280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.361719][ T4532] ================================================================== [ 66.369777][ T4532] Disabling lock debugging due to kernel taint [ 66.377612][ T4183] Bluetooth: hci0: command 0x0409 tx timeout [ 66.392437][ T4532] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 66.399658][ T4532] CPU: 0 PID: 4532 Comm: syz-executor.0 Tainted: G B 5.15.169-syzkaller #0 [ 66.409763][ T4532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 66.419824][ T4532] Call Trace: [ 66.423103][ T4532] [ 66.426034][ T4532] dump_stack_lvl+0x1e3/0x2d0 [ 66.430731][ T4532] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 66.436370][ T4532] ? panic+0x860/0x860 [ 66.440532][ T4532] ? preempt_schedule_common+0xa6/0xd0 [ 66.446000][ T4532] ? preempt_schedule+0xd9/0xe0 [ 66.450859][ T4532] panic+0x318/0x860 [ 66.454765][ T4532] ? check_panic_on_warn+0x1d/0xa0 [ 66.459883][ T4532] ? fb_is_primary_device+0xd0/0xd0 [ 66.465090][ T4532] ? _raw_spin_unlock_irqrestore+0x128/0x130 [ 66.471080][ T4532] ? _raw_spin_unlock+0x40/0x40 [ 66.475937][ T4532] ? print_memory_metadata+0xe2/0x140 [ 66.481321][ T4532] check_panic_on_warn+0x7e/0xa0 [ 66.486266][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0 [ 66.492600][ T4532] end_report+0x6d/0xf0 [ 66.496797][ T4532] kasan_report+0x18e/0x1c0 [ 66.501317][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0 [ 66.507659][ T4532] kasan_check_range+0x27e/0x290 [ 66.512624][ T4532] ? ext4_convert_inline_data_nolock+0x319/0xda0 [ 66.518961][ T4532] memcpy+0x25/0x60 [ 66.522782][ T4532] ext4_convert_inline_data_nolock+0x319/0xda0 [ 66.529055][ T4532] ? ext4_add_dirent_to_inline+0x540/0x540 [ 66.534885][ T4532] ext4_convert_inline_data+0x4cf/0x610 [ 66.540530][ T4532] ? ext4_inline_data_truncate+0xd20/0xd20 [ 66.546351][ T4532] ext4_fallocate+0x148/0x20f0 [ 66.551129][ T4532] ? rcu_read_lock_any_held+0xb3/0x160 [ 66.556609][ T4532] ? ext4_ext_truncate+0x250/0x250 [ 66.561727][ T4532] ? common_file_perm+0x17d/0x1d0 [ 66.566771][ T4532] vfs_fallocate+0x54a/0x6b0 [ 66.571396][ T4532] __x64_sys_fallocate+0xb9/0x100 [ 66.576429][ T4532] do_syscall_64+0x3b/0xb0 [ 66.580848][ T4532] ? clear_bhb_loop+0x15/0x70 [ 66.585531][ T4532] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.591429][ T4532] RIP: 0033:0x7fba5089b959 [ 66.595845][ T4532] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 66.615447][ T4532] RSP: 002b:00007fba4fc1d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 66.623868][ T4532] RAX: ffffffffffffffda RBX: 00007fba509baf80 RCX: 00007fba5089b959 [ 66.631846][ T4532] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 66.639822][ T4532] RBP: 00007fba508f7c88 R08: 0000000000000000 R09: 0000000000000000 [ 66.647799][ T4532] R10: 0000000000008000 R11: 0000000000000246 R12: 0000000000000000 [ 66.655774][ T4532] R13: 000000000000000b R14: 00007fba509baf80 R15: 00007fffca773fb8 [ 66.663763][ T4532] [ 66.666972][ T4532] Kernel Offset: disabled [ 66.671319][ T4532] Rebooting in 86400 seconds..