Starting Update UTMP about System Runlevel Changes... [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.25' (ECDSA) to the list of known hosts. syzkaller login: [ 32.867534] IPVS: ftp: loaded support on port[0] = 21 [ 32.935922] chnl_net:caif_netlink_parms(): no params data found [ 33.018456] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.025424] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.033036] device bridge_slave_0 entered promiscuous mode [ 33.041207] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.047562] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.055135] device bridge_slave_1 entered promiscuous mode [ 33.072001] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 33.080845] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 33.097937] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 33.105267] team0: Port device team_slave_0 added [ 33.110996] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 33.118142] team0: Port device team_slave_1 added [ 33.133066] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.139420] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.165249] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.176692] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.183316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.209109] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.222960] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 33.230276] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 33.249327] device hsr_slave_0 entered promiscuous mode [ 33.255038] device hsr_slave_1 entered promiscuous mode [ 33.262061] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 33.269211] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 33.331135] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.337524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.344406] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.350991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.380614] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 33.386671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.396318] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 33.404834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.413948] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.421063] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.427925] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 33.441701] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 33.447771] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.456916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.464960] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.471350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.480974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.488625] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.494998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.513675] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 33.523626] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.534744] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 33.542656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 33.550684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 33.558140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.566196] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.574662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 33.581844] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 33.594738] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 33.602031] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 33.608672] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 33.621306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.653268] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 33.663098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.694963] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 33.702160] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 33.708546] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 33.718408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.726365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.734048] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.742944] device veth0_vlan entered promiscuous mode [ 33.752171] device veth1_vlan entered promiscuous mode [ 33.758002] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 33.767580] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 33.779979] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 33.789712] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 33.796866] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 33.804866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.813940] device veth0_macvtap entered promiscuous mode [ 33.820584] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 33.828338] device veth1_macvtap entered promiscuous mode [ 33.836993] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 33.846467] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 33.855984] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.863656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.872051] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 33.882010] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.889454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 44.056412] ================================================================== [ 44.063936] BUG: KASAN: use-after-free in refcount_dec_not_one+0x71/0x1d0 [ 44.070854] Read of size 4 at addr ffff88809bf47418 by task syz-executor839/10277 [ 44.078449] [ 44.080069] CPU: 1 PID: 10277 Comm: syz-executor839 Not tainted 4.19.211-syzkaller #0 [ 44.088020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 44.097355] Call Trace: [ 44.099929] dump_stack+0x1fc/0x2ef [ 44.103541] print_address_description.cold+0x54/0x219 [ 44.108798] kasan_report_error.cold+0x8a/0x1b9 [ 44.113449] ? refcount_dec_not_one+0x71/0x1d0 [ 44.118008] kasan_report+0x8f/0xa0 [ 44.121616] ? refcount_dec_not_one+0x71/0x1d0 [ 44.126178] refcount_dec_not_one+0x71/0x1d0 [ 44.130567] ? refcount_dec_and_test_checked+0x20/0x20 [ 44.135828] ? nbd_config_put+0x5da/0x870 [ 44.139958] refcount_dec_and_mutex_lock+0x1c/0x80 [ 44.144875] nbd_genl_connect+0x11ee/0x1630 [ 44.149181] ? nbd_xmit_timeout+0x730/0x730 [ 44.153485] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 44.158655] ? validate_nla+0x270/0x820 [ 44.162614] ? nla_parse+0x1b2/0x290 [ 44.166309] genl_family_rcv_msg+0x642/0xc40 [ 44.170699] ? genl_rcv+0x40/0x40 [ 44.174130] ? genl_rcv_msg+0x12f/0x160 [ 44.178084] ? mutex_trylock+0x1a0/0x1a0 [ 44.182135] ? __radix_tree_lookup+0x216/0x370 [ 44.186698] genl_rcv_msg+0xbf/0x160 [ 44.190393] netlink_rcv_skb+0x160/0x440 [ 44.194435] ? genl_family_rcv_msg+0xc40/0xc40 [ 44.198997] ? netlink_ack+0xae0/0xae0 [ 44.202876] ? genl_rcv+0x15/0x40 [ 44.206316] genl_rcv+0x24/0x40 [ 44.209580] netlink_unicast+0x4d5/0x690 [ 44.213622] ? netlink_sendskb+0x110/0x110 [ 44.217835] ? _copy_from_iter_full+0x229/0x7c0 [ 44.222486] ? __phys_addr_symbol+0x2c/0x70 [ 44.226797] ? __check_object_size+0x17b/0x3e0 [ 44.231363] netlink_sendmsg+0x6c3/0xc50 [ 44.235413] ? aa_af_perm+0x230/0x230 [ 44.239191] ? nlmsg_notify+0x1f0/0x1f0 [ 44.243144] ? kernel_recvmsg+0x220/0x220 [ 44.247275] ? nlmsg_notify+0x1f0/0x1f0 [ 44.251230] sock_sendmsg+0xc3/0x120 [ 44.254923] ___sys_sendmsg+0x7bb/0x8e0 [ 44.258877] ? copy_msghdr_from_user+0x440/0x440 [ 44.263611] ? netlink_dump+0xc10/0xc10 [ 44.267565] ? nlmsg_notify+0x1f0/0x1f0 [ 44.271523] ? security_socket_recvmsg+0x8f/0xc0 [ 44.276260] ? __sys_recvfrom+0x2cd/0x3a0 [ 44.280387] ? __ia32_sys_send+0x100/0x100 [ 44.284601] ? debug_object_active_state+0x254/0x330 [ 44.289686] ? __fdget+0x1a0/0x230 [ 44.293207] __x64_sys_sendmsg+0x132/0x220 [ 44.297421] ? __sys_sendmsg+0x1b0/0x1b0 [ 44.301466] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 44.306809] ? trace_hardirqs_off_caller+0x6e/0x210 [ 44.311803] ? do_syscall_64+0x21/0x620 [ 44.315757] do_syscall_64+0xf9/0x620 [ 44.319547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 44.324722] RIP: 0033:0x7f81e8ed6d39 [ 44.328418] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 44.347296] RSP: 002b:00007ffeccf82678 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 44.354983] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f81e8ed6d39 [ 44.362229] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 44.369477] RBP: 0000000000000003 R08: 0000000000000000 R09: 000000000000000d [ 44.376725] R10: 0000000000000000 R11: 0000000000000246 R12: 00005555563b32c0 [ 44.383972] R13: 0000000000000013 R14: 000000000000abd7 R15: 00007ffeccf82684 [ 44.391224] [ 44.392834] Allocated by task 10271: [ 44.396530] kmem_cache_alloc_trace+0x12f/0x380 [ 44.401176] nbd_dev_add+0x44/0x890 [ 44.404781] nbd_genl_connect+0x4cc/0x1630 [ 44.408994] genl_family_rcv_msg+0x642/0xc40 [ 44.413378] genl_rcv_msg+0xbf/0x160 [ 44.417088] netlink_rcv_skb+0x160/0x440 [ 44.421134] genl_rcv+0x24/0x40 [ 44.424390] netlink_unicast+0x4d5/0x690 [ 44.428429] netlink_sendmsg+0x6c3/0xc50 [ 44.432467] sock_sendmsg+0xc3/0x120 [ 44.436155] ___sys_sendmsg+0x7bb/0x8e0 [ 44.440104] __x64_sys_sendmsg+0x132/0x220 [ 44.444317] do_syscall_64+0xf9/0x620 [ 44.448107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 44.453271] [ 44.454885] Freed by task 10277: [ 44.458229] kfree+0xcc/0x210 [ 44.461313] nbd_put.part.0+0xfe/0x140 [ 44.465176] nbd_config_put+0x6a0/0x870 [ 44.469127] nbd_genl_connect+0x11bb/0x1630 [ 44.473426] genl_family_rcv_msg+0x642/0xc40 [ 44.477817] genl_rcv_msg+0xbf/0x160 [ 44.481511] netlink_rcv_skb+0x160/0x440 [ 44.485556] genl_rcv+0x24/0x40 [ 44.488814] netlink_unicast+0x4d5/0x690 [ 44.492852] netlink_sendmsg+0x6c3/0xc50 [ 44.496892] sock_sendmsg+0xc3/0x120 [ 44.500583] ___sys_sendmsg+0x7bb/0x8e0 [ 44.504534] __x64_sys_sendmsg+0x132/0x220 [ 44.508746] do_syscall_64+0xf9/0x620 [ 44.512529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 44.517689] [ 44.519295] The buggy address belongs to the object at ffff88809bf47340 [ 44.519295] which belongs to the cache kmalloc-512 of size 512 [ 44.531929] The buggy address is located 216 bytes inside of [ 44.531929] 512-byte region [ffff88809bf47340, ffff88809bf47540) [ 44.543777] The buggy address belongs to the page: [ 44.548690] page:ffffea00026fd1c0 count:1 mapcount:0 mapping:ffff88813bff0940 index:0x0 [ 44.556815] flags: 0xfff00000000100(slab) [ 44.561041] raw: 00fff00000000100 ffffea00026fd388 ffffea0002c30d88 ffff88813bff0940 [ 44.568918] raw: 0000000000000000 ffff88809bf470c0 0000000100000006 0000000000000000 [ 44.576783] page dumped because: kasan: bad access detected [ 44.582464] [ 44.584069] Memory state around the buggy address: [ 44.588975] ffff88809bf47300: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 44.596321] ffff88809bf47380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.603665] >ffff88809bf47400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.611004] ^ [ 44.615135] ffff88809bf47480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.622471] ffff88809bf47500: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.629804] ================================================================== [ 44.637139] Disabling lock debugging due to kernel taint [ 44.643554] Kernel panic - not syncing: panic_on_warn set ... [ 44.643554] [ 44.650932] CPU: 0 PID: 10277 Comm: syz-executor839 Tainted: G B 4.19.211-syzkaller #0 [ 44.660276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 44.669617] Call Trace: [ 44.672201] dump_stack+0x1fc/0x2ef [ 44.675827] panic+0x26a/0x50e [ 44.679017] ? __warn_printk+0xf3/0xf3 [ 44.682907] ? preempt_schedule_common+0x45/0xc0 [ 44.687658] ? ___preempt_schedule+0x16/0x18 [ 44.692060] ? trace_hardirqs_on+0x55/0x210 [ 44.696370] kasan_end_report+0x43/0x49 [ 44.700323] kasan_report_error.cold+0xa7/0x1b9 [ 44.704984] ? refcount_dec_not_one+0x71/0x1d0 [ 44.709563] kasan_report+0x8f/0xa0 [ 44.713183] ? refcount_dec_not_one+0x71/0x1d0 [ 44.717751] refcount_dec_not_one+0x71/0x1d0 [ 44.722143] ? refcount_dec_and_test_checked+0x20/0x20 [ 44.727400] ? nbd_config_put+0x5da/0x870 [ 44.731637] refcount_dec_and_mutex_lock+0x1c/0x80 [ 44.736621] nbd_genl_connect+0x11ee/0x1630 [ 44.740927] ? nbd_xmit_timeout+0x730/0x730 [ 44.745232] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 44.750404] ? validate_nla+0x270/0x820 [ 44.754368] ? nla_parse+0x1b2/0x290 [ 44.758079] genl_family_rcv_msg+0x642/0xc40 [ 44.762468] ? genl_rcv+0x40/0x40 [ 44.765925] ? genl_rcv_msg+0x12f/0x160 [ 44.769881] ? mutex_trylock+0x1a0/0x1a0 [ 44.773929] ? __radix_tree_lookup+0x216/0x370 [ 44.778504] genl_rcv_msg+0xbf/0x160 [ 44.782202] netlink_rcv_skb+0x160/0x440 [ 44.786248] ? genl_family_rcv_msg+0xc40/0xc40 [ 44.790811] ? netlink_ack+0xae0/0xae0 [ 44.794683] ? genl_rcv+0x15/0x40 [ 44.798125] genl_rcv+0x24/0x40 [ 44.801386] netlink_unicast+0x4d5/0x690 [ 44.805428] ? netlink_sendskb+0x110/0x110 [ 44.809644] ? _copy_from_iter_full+0x229/0x7c0 [ 44.814299] ? __phys_addr_symbol+0x2c/0x70 [ 44.818723] ? __check_object_size+0x17b/0x3e0 [ 44.823286] netlink_sendmsg+0x6c3/0xc50 [ 44.827331] ? aa_af_perm+0x230/0x230 [ 44.831116] ? nlmsg_notify+0x1f0/0x1f0 [ 44.835078] ? kernel_recvmsg+0x220/0x220 [ 44.839208] ? nlmsg_notify+0x1f0/0x1f0 [ 44.843172] sock_sendmsg+0xc3/0x120 [ 44.846869] ___sys_sendmsg+0x7bb/0x8e0 [ 44.850826] ? copy_msghdr_from_user+0x440/0x440 [ 44.855568] ? netlink_dump+0xc10/0xc10 [ 44.859527] ? nlmsg_notify+0x1f0/0x1f0 [ 44.863481] ? security_socket_recvmsg+0x8f/0xc0 [ 44.868215] ? __sys_recvfrom+0x2cd/0x3a0 [ 44.872340] ? __ia32_sys_send+0x100/0x100 [ 44.876554] ? debug_object_active_state+0x254/0x330 [ 44.881753] ? __fdget+0x1a0/0x230 [ 44.885275] __x64_sys_sendmsg+0x132/0x220 [ 44.889489] ? __sys_sendmsg+0x1b0/0x1b0 [ 44.893533] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 44.898998] ? trace_hardirqs_off_caller+0x6e/0x210 [ 44.903995] ? do_syscall_64+0x21/0x620 [ 44.907953] do_syscall_64+0xf9/0x620 [ 44.911736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 44.916910] RIP: 0033:0x7f81e8ed6d39 [ 44.920603] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 44.939488] RSP: 002b:00007ffeccf82678 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 44.947174] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f81e8ed6d39 [ 44.954422] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 44.961671] RBP: 0000000000000003 R08: 0000000000000000 R09: 000000000000000d [ 44.968919] R10: 0000000000000000 R11: 0000000000000246 R12: 00005555563b32c0 [ 44.976166] R13: 0000000000000013 R14: 000000000000abd7 R15: 00007ffeccf82684 [ 44.983615] Kernel Offset: disabled [ 44.987230] Rebooting in 86400 seconds..