Warning: Permanently added '10.128.1.148' (ED25519) to the list of known hosts. [ 51.075415][ T3547] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 51.083033][ T3547] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 51.090830][ T3547] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 51.098494][ T3547] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 51.105981][ T3549] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 51.113063][ T3549] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 51.182806][ T3545] chnl_net:caif_netlink_parms(): no params data found [ 51.221712][ T3545] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.229803][ T3545] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.237770][ T3545] device bridge_slave_0 entered promiscuous mode [ 51.246652][ T3545] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.254069][ T3545] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.261689][ T3545] device bridge_slave_1 entered promiscuous mode [ 51.280907][ T3545] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.292231][ T3545] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.313904][ T3545] team0: Port device team_slave_0 added [ 51.321405][ T3545] team0: Port device team_slave_1 added [ 51.338019][ T3545] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.344988][ T3545] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.371190][ T3545] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.384189][ T3545] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.391164][ T3545] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.417383][ T3545] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.446613][ T3545] device hsr_slave_0 entered promiscuous mode [ 51.453752][ T3545] device hsr_slave_1 entered promiscuous mode [ 51.530131][ T3545] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 51.539968][ T3545] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 51.548682][ T3545] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 51.557459][ T3545] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 51.576582][ T3545] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.583897][ T3545] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.591457][ T3545] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.598609][ T3545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.639152][ T3545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.651633][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.661608][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.670542][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.678762][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 51.691904][ T3545] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.703259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.711502][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.718618][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.728880][ T3555] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.737614][ T3555] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.744719][ T3555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.764934][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.774059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.782368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.797814][ T3545] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 51.808897][ T3545] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 51.821729][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.830791][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.839270][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.853510][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 51.860957][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 51.872230][ T3545] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.891127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.908743][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.917148][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.925625][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.935780][ T3545] device veth0_vlan entered promiscuous mode [ 51.946806][ T3545] device veth1_vlan entered promiscuous mode [ 51.962317][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 51.970842][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 51.979393][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.990677][ T3545] device veth0_macvtap entered promiscuous mode [ 51.999780][ T3545] device veth1_macvtap entered promiscuous mode [ 52.015613][ T3545] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 52.022977][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.032496][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 52.044765][ T3545] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 52.052389][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 52.062920][ T3545] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.072907][ T3545] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.081895][ T3545] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.091141][ T3545] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.134316][ T3545] loop0: detected capacity change from 0 to 2048 [ 52.141596][ T3545] ======================================================= [ 52.141596][ T3545] WARNING: The mand mount option has been deprecated and [ 52.141596][ T3545] and is ignored by this kernel. Remove the mand [ 52.141596][ T3545] option from the mount to silence this warning. [ 52.141596][ T3545] ======================================================= [ 52.181027][ T3545] UDF-fs: error (device loop0): udf_read_tagged: tag checksum failed, block 99: 0x27 != 0x4d [ 52.193095][ T3545] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 52.236024][ T32] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 52.264922][ T3545] ================================================================== [ 52.272989][ T3545] BUG: KASAN: use-after-free in udf_close_lvid+0x6a4/0x9a0 [ 52.280189][ T3545] Write of size 1 at addr ffff88807ce571d8 by task syz-executor181/3545 [ 52.288493][ T3545] [ 52.290799][ T3545] CPU: 1 PID: 3545 Comm: syz-executor181 Not tainted 6.1.52-syzkaller #0 [ 52.299211][ T3545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 52.309266][ T3545] Call Trace: [ 52.312527][ T3545] [ 52.315449][ T3545] dump_stack_lvl+0x1e3/0x2cb [ 52.320151][ T3545] ? irq_work_queue+0xc6/0x150 [ 52.324900][ T3545] ? nf_tcp_handle_invalid+0x642/0x642 [ 52.330339][ T3545] ? panic+0x75d/0x75d [ 52.334402][ T3545] ? _printk+0xd1/0x111 [ 52.338551][ T3545] ? _raw_spin_lock_irqsave+0xac/0x120 [ 52.343999][ T3545] print_report+0x15f/0x4f0 [ 52.348483][ T3545] ? hook_sb_delete+0x728/0xb30 [ 52.353317][ T3545] ? __virt_addr_valid+0x22b/0x2e0 [ 52.358427][ T3545] ? __phys_addr+0xb6/0x170 [ 52.362910][ T3545] ? udf_close_lvid+0x6a4/0x9a0 [ 52.367744][ T3545] kasan_report+0x136/0x160 [ 52.372225][ T3545] ? udf_close_lvid+0x6a4/0x9a0 [ 52.377058][ T3545] udf_close_lvid+0x6a4/0x9a0 [ 52.381716][ T3545] ? udf_open_lvid+0x5a0/0x5a0 [ 52.386465][ T3545] ? iput+0x3f7/0x980 [ 52.390437][ T3545] ? clear_inode+0x150/0x150 [ 52.395020][ T3545] ? module_put+0x15a/0x350 [ 52.399533][ T3545] udf_put_super+0xc9/0x160 [ 52.404041][ T3545] ? udf_free_in_core_inode+0x20/0x20 [ 52.409395][ T3545] generic_shutdown_super+0x130/0x340 [ 52.414749][ T3545] kill_block_super+0x7a/0xe0 [ 52.419408][ T3545] deactivate_locked_super+0xa0/0x110 [ 52.424762][ T3545] cleanup_mnt+0x490/0x520 [ 52.429161][ T3545] ? lockdep_hardirqs_on+0x94/0x130 [ 52.434339][ T3545] task_work_run+0x246/0x300 [ 52.438909][ T3545] ? kasan_quarantine_put+0xd4/0x220 [ 52.444176][ T3545] ? task_work_cancel+0x2b0/0x2b0 [ 52.449180][ T3545] ? kmem_cache_free+0x292/0x510 [ 52.454113][ T3545] ? do_exit+0x6f6/0x2300 [ 52.458439][ T3545] do_exit+0x6fb/0x2300 [ 52.462580][ T3545] ? do_group_exit+0x1f2/0x2b0 [ 52.467326][ T3545] ? put_task_struct+0x80/0x80 [ 52.472071][ T3545] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.478056][ T3545] ? print_irqtrace_events+0x210/0x210 [ 52.483499][ T3545] ? _raw_spin_unlock_irq+0x1f/0x40 [ 52.488678][ T3545] ? lockdep_hardirqs_on+0x94/0x130 [ 52.493865][ T3545] do_group_exit+0x202/0x2b0 [ 52.498455][ T3545] __x64_sys_exit_group+0x3b/0x40 [ 52.503470][ T3545] do_syscall_64+0x3d/0xb0 [ 52.507900][ T3545] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.513784][ T3545] RIP: 0033:0x7f948c54c679 [ 52.518189][ T3545] Code: Unable to access opcode bytes at 0x7f948c54c64f. [ 52.525618][ T3545] RSP: 002b:00007ffd2c44a4a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 52.534016][ T3545] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f948c54c679 [ 52.541980][ T3545] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 52.549932][ T3545] RBP: 00007f948c5ef3b0 R08: ffffffffffffffb0 R09: 0000000000000000 [ 52.557886][ T3545] R10: 0000000000000022 R11: 0000000000000246 R12: 00007f948c5ef3b0 [ 52.565863][ T3545] R13: 0000000000000000 R14: 00007f948c5f21e0 R15: 00007f948c50f9a0 [ 52.573917][ T3545] [ 52.576941][ T3545] [ 52.579239][ T3545] Allocated by task 3307: [ 52.583551][ T3545] kasan_set_track+0x4b/0x70 [ 52.588124][ T3545] __kasan_slab_alloc+0x65/0x70 [ 52.592959][ T3545] slab_post_alloc_hook+0x50/0x370 [ 52.598050][ T3545] kmem_cache_alloc+0x10c/0x2d0 [ 52.602891][ T3545] getname_flags+0xb8/0x4e0 [ 52.607404][ T3545] __x64_sys_newfstatat+0x130/0x1e0 [ 52.612600][ T3545] do_syscall_64+0x3d/0xb0 [ 52.617004][ T3545] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.622884][ T3545] [ 52.625189][ T3545] Freed by task 3307: [ 52.629139][ T3545] kasan_set_track+0x4b/0x70 [ 52.633900][ T3545] kasan_save_free_info+0x27/0x40 [ 52.638924][ T3545] ____kasan_slab_free+0xd6/0x120 [ 52.644198][ T3545] kmem_cache_free+0x292/0x510 [ 52.648948][ T3545] __x64_sys_newfstatat+0x15c/0x1e0 [ 52.654130][ T3545] do_syscall_64+0x3d/0xb0 [ 52.658547][ T3545] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.664436][ T3545] [ 52.666744][ T3545] The buggy address belongs to the object at ffff88807ce56600 [ 52.666744][ T3545] which belongs to the cache names_cache of size 4096 [ 52.680868][ T3545] The buggy address is located 3032 bytes inside of [ 52.680868][ T3545] 4096-byte region [ffff88807ce56600, ffff88807ce57600) [ 52.694303][ T3545] [ 52.696607][ T3545] The buggy address belongs to the physical page: [ 52.703025][ T3545] page:ffffea0001f39400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7ce50 [ 52.713173][ T3545] head:ffffea0001f39400 order:3 compound_mapcount:0 compound_pincount:0 [ 52.721497][ T3545] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 52.729481][ T3545] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff888140009640 [ 52.738051][ T3545] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 52.746616][ T3545] page dumped because: kasan: bad access detected [ 52.753004][ T3545] page_owner tracks the page as allocated [ 52.758697][ T3545] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3307, tgid 3307 (cmp), ts 28037648811, free_ts 28019390646 [ 52.779255][ T3545] post_alloc_hook+0x18d/0x1b0 [ 52.784001][ T3545] get_page_from_freelist+0x32ed/0x3480 [ 52.789522][ T3545] __alloc_pages+0x28d/0x770 [ 52.794097][ T3545] alloc_slab_page+0x6a/0x150 [ 52.798776][ T3545] new_slab+0x84/0x2d0 [ 52.802827][ T3545] ___slab_alloc+0xa71/0x1080 [ 52.807483][ T3545] kmem_cache_alloc+0x1a5/0x2d0 [ 52.812310][ T3545] getname_flags+0xb8/0x4e0 [ 52.816792][ T3545] __x64_sys_newfstatat+0x130/0x1e0 [ 52.821967][ T3545] do_syscall_64+0x3d/0xb0 [ 52.826363][ T3545] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.832250][ T3545] page last free stack trace: [ 52.836898][ T3545] free_unref_page_prepare+0xf63/0x1120 [ 52.842420][ T3545] free_unref_page+0x98/0x570 [ 52.847070][ T3545] __unfreeze_partials+0x1b7/0x210 [ 52.852161][ T3545] put_cpu_partial+0x116/0x180 [ 52.856904][ T3545] qlist_free_all+0x22/0x60 [ 52.861385][ T3545] kasan_quarantine_reduce+0x162/0x180 [ 52.866822][ T3545] __kasan_slab_alloc+0x1f/0x70 [ 52.871649][ T3545] slab_post_alloc_hook+0x50/0x370 [ 52.876744][ T3545] kmem_cache_alloc+0x10c/0x2d0 [ 52.881575][ T3545] vm_area_dup+0x23/0x1b0 [ 52.885887][ T3545] __split_vma+0xcc/0x530 [ 52.890197][ T3545] mprotect_fixup+0x756/0x840 [ 52.894850][ T3545] do_mprotect_pkey+0x8b6/0xbe0 [ 52.899675][ T3545] __x64_sys_mprotect+0x7c/0x90 [ 52.904503][ T3545] do_syscall_64+0x3d/0xb0 [ 52.908893][ T3545] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.914766][ T3545] [ 52.917068][ T3545] Memory state around the buggy address: [ 52.922678][ T3545] ffff88807ce57080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.930715][ T3545] ffff88807ce57100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.938753][ T3545] >ffff88807ce57180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.946788][ T3545] ^ [ 52.953708][ T3545] ffff88807ce57200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.961763][ T3545] ffff88807ce57280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.969802][ T3545] ================================================================== [ 52.979462][ T3545] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 52.986671][ T3545] CPU: 0 PID: 3545 Comm: syz-executor181 Not tainted 6.1.52-syzkaller #0 [ 52.995069][ T3545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 53.005114][ T3545] Call Trace: [ 53.008396][ T3545] [ 53.011335][ T3545] dump_stack_lvl+0x1e3/0x2cb [ 53.016020][ T3545] ? nf_tcp_handle_invalid+0x642/0x642 [ 53.021475][ T3545] ? panic+0x75d/0x75d [ 53.025538][ T3545] ? preempt_schedule_common+0xa6/0xd0 [ 53.031014][ T3545] ? vscnprintf+0x59/0x80 [ 53.035350][ T3545] panic+0x318/0x75d [ 53.039244][ T3545] ? check_panic_on_warn+0x1d/0xa0 [ 53.044361][ T3545] ? memcpy_page_flushcache+0xfc/0xfc [ 53.049741][ T3545] ? _raw_spin_unlock_irqrestore+0x128/0x130 [ 53.055719][ T3545] ? _raw_spin_unlock+0x40/0x40 [ 53.060558][ T3545] ? print_report+0x4a3/0x4f0 [ 53.065228][ T3545] check_panic_on_warn+0x7e/0xa0 [ 53.070160][ T3545] ? udf_close_lvid+0x6a4/0x9a0 [ 53.075012][ T3545] end_report+0x66/0x110 [ 53.079246][ T3545] kasan_report+0x143/0x160 [ 53.083737][ T3545] ? udf_close_lvid+0x6a4/0x9a0 [ 53.088597][ T3545] udf_close_lvid+0x6a4/0x9a0 [ 53.093277][ T3545] ? udf_open_lvid+0x5a0/0x5a0 [ 53.098035][ T3545] ? iput+0x3f7/0x980 [ 53.102013][ T3545] ? clear_inode+0x150/0x150 [ 53.106598][ T3545] ? module_put+0x15a/0x350 [ 53.111095][ T3545] udf_put_super+0xc9/0x160 [ 53.115594][ T3545] ? udf_free_in_core_inode+0x20/0x20 [ 53.120957][ T3545] generic_shutdown_super+0x130/0x340 [ 53.126319][ T3545] kill_block_super+0x7a/0xe0 [ 53.130984][ T3545] deactivate_locked_super+0xa0/0x110 [ 53.136345][ T3545] cleanup_mnt+0x490/0x520 [ 53.140751][ T3545] ? lockdep_hardirqs_on+0x94/0x130 [ 53.145938][ T3545] task_work_run+0x246/0x300 [ 53.150517][ T3545] ? kasan_quarantine_put+0xd4/0x220 [ 53.155787][ T3545] ? task_work_cancel+0x2b0/0x2b0 [ 53.160799][ T3545] ? kmem_cache_free+0x292/0x510 [ 53.165721][ T3545] ? do_exit+0x6f6/0x2300 [ 53.170041][ T3545] do_exit+0x6fb/0x2300 [ 53.174190][ T3545] ? do_group_exit+0x1f2/0x2b0 [ 53.178957][ T3545] ? put_task_struct+0x80/0x80 [ 53.183710][ T3545] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.189674][ T3545] ? print_irqtrace_events+0x210/0x210 [ 53.195115][ T3545] ? _raw_spin_unlock_irq+0x1f/0x40 [ 53.200302][ T3545] ? lockdep_hardirqs_on+0x94/0x130 [ 53.205491][ T3545] do_group_exit+0x202/0x2b0 [ 53.210069][ T3545] __x64_sys_exit_group+0x3b/0x40 [ 53.215083][ T3545] do_syscall_64+0x3d/0xb0 [ 53.219487][ T3545] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.225370][ T3545] RIP: 0033:0x7f948c54c679 [ 53.229768][ T3545] Code: Unable to access opcode bytes at 0x7f948c54c64f. [ 53.236768][ T3545] RSP: 002b:00007ffd2c44a4a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 53.245169][ T3545] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f948c54c679 [ 53.253130][ T3545] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 53.261088][ T3545] RBP: 00007f948c5ef3b0 R08: ffffffffffffffb0 R09: 0000000000000000 [ 53.269044][ T3545] R10: 0000000000000022 R11: 0000000000000246 R12: 00007f948c5ef3b0 [ 53.277012][ T3545] R13: 0000000000000000 R14: 00007f948c5f21e0 R15: 00007f948c50f9a0 [ 53.284980][ T3545] [ 53.288174][ T3545] Kernel Offset: disabled [ 53.292488][ T3545] Rebooting in 86400 seconds..