[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.771600][ T25] audit: type=1800 audit(1570544227.131:25): pid=7058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 41.791482][ T25] audit: type=1800 audit(1570544227.131:26): pid=7058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 41.813167][ T25] audit: type=1800 audit(1570544227.131:27): pid=7058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.6' (ECDSA) to the list of known hosts. 2019/10/08 14:17:17 fuzzer started 2019/10/08 14:17:18 dialing manager at 10.128.0.105:44253 2019/10/08 14:17:18 syscalls: 2523 2019/10/08 14:17:18 code coverage: enabled 2019/10/08 14:17:18 comparison tracing: enabled 2019/10/08 14:17:18 extra coverage: extra coverage is not supported by the kernel 2019/10/08 14:17:18 setuid sandbox: enabled 2019/10/08 14:17:18 namespace sandbox: enabled 2019/10/08 14:17:18 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/08 14:17:18 fault injection: enabled 2019/10/08 14:17:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/08 14:17:18 net packet injection: enabled 2019/10/08 14:17:18 net device setup: enabled 2019/10/08 14:17:18 concurrency sanitizer: enabled 14:17:21 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="9d", 0x1}], 0x1, 0x0) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x1000)=nil], &(0x7f00000001c0)=[0x1], 0x0, 0x0) syzkaller login: [ 56.766259][ T7222] IPVS: ftp: loaded support on port[0] = 21 [ 56.854492][ T7222] chnl_net:caif_netlink_parms(): no params data found [ 56.894125][ T7222] bridge0: port 1(bridge_slave_0) entered blocking state 14:17:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xff}, 0x2c) [ 56.902130][ T7222] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.910506][ T7222] device bridge_slave_0 entered promiscuous mode [ 56.920944][ T7222] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.929702][ T7222] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.938406][ T7222] device bridge_slave_1 entered promiscuous mode [ 56.962039][ T7222] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.973621][ T7222] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.002804][ T7222] team0: Port device team_slave_0 added [ 57.009946][ T7222] team0: Port device team_slave_1 added [ 57.094359][ T7222] device hsr_slave_0 entered promiscuous mode [ 57.141670][ T7222] device hsr_slave_1 entered promiscuous mode [ 57.200732][ T7225] IPVS: ftp: loaded support on port[0] = 21 [ 57.215611][ T7222] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.222731][ T7222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.230103][ T7222] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.237219][ T7222] bridge0: port 1(bridge_slave_0) entered forwarding state 14:17:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8001b00000000000000000000080009000d000000", 0x24) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$inet(0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) [ 57.335070][ T7222] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.365701][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.392379][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.411870][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.432992][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 57.460558][ T7222] 8021q: adding VLAN 0 to HW filter on device team0 [ 57.506144][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.521976][ T3022] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.529043][ T3022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.573240][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.583156][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.590208][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state 14:17:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) poll(&(0x7f0000000400)=[{r2}], 0x1, 0x9) [ 57.683887][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.694430][ T7231] IPVS: ftp: loaded support on port[0] = 21 [ 57.716372][ T7225] chnl_net:caif_netlink_parms(): no params data found [ 57.738265][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.748510][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.758559][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.793314][ T7222] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 57.805668][ T7222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.816126][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.898267][ T7222] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.907685][ T7225] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.932907][ T7225] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.951437][ T7225] device bridge_slave_0 entered promiscuous mode [ 57.981893][ T7225] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.989049][ T7225] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.010452][ T7225] device bridge_slave_1 entered promiscuous mode [ 58.041241][ T7233] IPVS: ftp: loaded support on port[0] = 21 14:17:23 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) readv(r0, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r2, 0x0, 0x2000421, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) [ 58.186305][ T7225] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.227617][ T7225] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.292113][ T7225] team0: Port device team_slave_0 added [ 58.304319][ T7231] chnl_net:caif_netlink_parms(): no params data found [ 58.325455][ T7225] team0: Port device team_slave_1 added 14:17:23 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="9d", 0x1}], 0x1, 0x0) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x1000)=nil], &(0x7f00000001c0)=[0x1], 0x0, 0x0) [ 58.475573][ T7225] device hsr_slave_0 entered promiscuous mode 14:17:23 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="9d", 0x1}], 0x1, 0x0) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x1000)=nil], &(0x7f00000001c0)=[0x1], 0x0, 0x0) [ 58.521667][ T7225] device hsr_slave_1 entered promiscuous mode [ 58.551323][ T7225] debugfs: Directory 'hsr0' with parent '/' already present! [ 58.636243][ T7225] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.643360][ T7225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.677039][ T7233] chnl_net:caif_netlink_parms(): no params data found [ 58.686579][ T7231] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.694239][ T7231] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.702421][ T7231] device bridge_slave_0 entered promiscuous mode [ 58.710400][ T7231] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.717978][ T7231] bridge0: port 2(bridge_slave_1) entered disabled state 14:17:24 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="9d", 0x1}], 0x1, 0x0) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x1000)=nil], &(0x7f00000001c0)=[0x1], 0x0, 0x0) [ 58.726255][ T7231] device bridge_slave_1 entered promiscuous mode [ 58.739586][ T7248] IPVS: ftp: loaded support on port[0] = 21 [ 58.799019][ T7225] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.861721][ T7233] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.868808][ T7233] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.892628][ T7233] device bridge_slave_0 entered promiscuous mode [ 58.901981][ T7231] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:17:24 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="9d", 0x1}], 0x1, 0x0) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x1000)=nil], &(0x7f00000001c0)=[0x1], 0x0, 0x0) [ 58.914795][ T7225] 8021q: adding VLAN 0 to HW filter on device team0 [ 58.933233][ T7231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.957863][ T7233] bridge0: port 2(bridge_slave_1) entered blocking state 14:17:24 executing program 0: open(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe2(0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write(r4, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) unshare(0x400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 58.969279][ T7233] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.987605][ T7233] device bridge_slave_1 entered promiscuous mode [ 58.995455][ T3022] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.025675][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 59.045287][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.056214][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.082578][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.095302][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.103916][ T3022] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.111030][ T3022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.144836][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.154554][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.177262][ T7252] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.184653][ T7252] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.207983][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.236021][ T7252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.246455][ T7263] ================================================================== [ 59.254605][ T7263] BUG: KCSAN: data-race in __splice_from_pipe / pipe_poll [ 59.261718][ T7263] [ 59.264074][ T7263] read to 0xffff888109002b78 of 4 bytes by task 7262 on cpu 0: [ 59.271622][ T7263] pipe_poll+0x84/0x1d0 [ 59.275766][ T7263] do_select+0x7d0/0x1020 [ 59.280093][ T7263] core_sys_select+0x38b/0x520 [ 59.284856][ T7263] __x64_sys_pselect6+0x22a/0x280 [ 59.289862][ T7263] do_syscall_64+0xcf/0x2f0 [ 59.294352][ T7263] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.300221][ T7263] [ 59.302534][ T7263] write to 0xffff888109002b78 of 4 bytes by task 7263 on cpu 1: [ 59.310152][ T7263] __splice_from_pipe+0x3ce/0x480 [ 59.315157][ T7263] do_vmsplice.part.0+0x1c5/0x210 [ 59.320166][ T7263] __do_sys_vmsplice+0x15f/0x1c0 [ 59.325084][ T7263] __x64_sys_vmsplice+0x5e/0x80 [ 59.329916][ T7263] do_syscall_64+0xcf/0x2f0 [ 59.334399][ T7263] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.340271][ T7263] [ 59.342575][ T7263] Reported by Kernel Concurrency Sanitizer on: [ 59.348727][ T7263] CPU: 1 PID: 7263 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 59.356159][ T7263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.367945][ T7263] ================================================================== [ 59.376587][ T7263] Kernel panic - not syncing: panic_on_warn set ... [ 59.383150][ T7263] CPU: 1 PID: 7263 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 59.390578][ T7263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.400607][ T7263] Call Trace: [ 59.403883][ T7263] dump_stack+0xf5/0x159 [ 59.408107][ T7263] panic+0x209/0x639 [ 59.411981][ T7263] ? vprintk_func+0x8d/0x140 [ 59.416558][ T7263] kcsan_report.cold+0xc/0x1b [ 59.421215][ T7263] __kcsan_setup_watchpoint+0x3ee/0x510 [ 59.426751][ T7263] __tsan_write4+0x32/0x40 [ 59.431156][ T7263] __splice_from_pipe+0x3ce/0x480 [ 59.436171][ T7263] ? iter_to_pipe+0x3f0/0x3f0 [ 59.440842][ T7263] do_vmsplice.part.0+0x1c5/0x210 [ 59.445864][ T7263] __do_sys_vmsplice+0x15f/0x1c0 [ 59.450780][ T7263] ? __tsan_read8+0x2c/0x30 [ 59.455318][ T7263] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 59.461029][ T7263] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.466680][ T7263] ? _copy_to_user+0x84/0xb0 [ 59.471259][ T7263] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.476878][ T7263] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.482515][ T7263] __x64_sys_vmsplice+0x5e/0x80 [ 59.487382][ T7263] do_syscall_64+0xcf/0x2f0 [ 59.491869][ T7263] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.497872][ T7263] RIP: 0033:0x459a59 [ 59.501762][ T7263] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 59.521348][ T7263] RSP: 002b:00007fb91d4e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 59.529749][ T7263] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a59 [ 59.537712][ T7263] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000005 [ 59.545660][ T7263] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 59.553610][ T7263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb91d4e26d4 [ 59.561574][ T7263] R13: 00000000004c94e5 R14: 00000000004e0c68 R15: 00000000ffffffff [ 59.570745][ T7263] Kernel Offset: disabled [ 59.575065][ T7263] Rebooting in 86400 seconds..