Warning: Permanently added '10.128.1.28' (ED25519) to the list of known hosts. 2025/09/16 07:53:52 parsed 1 programs [ 39.482275][ T29] audit: type=1400 audit(1758009232.410:61): avc: denied { node_bind } for pid=2956 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 39.503101][ T29] audit: type=1400 audit(1758009232.410:62): avc: denied { module_request } for pid=2956 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 41.051829][ T29] audit: type=1400 audit(1758009233.980:63): avc: denied { mounton } for pid=2968 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 41.056141][ T2968] cgroup: Unknown subsys name 'net' [ 41.074629][ T29] audit: type=1400 audit(1758009233.980:64): avc: denied { mount } for pid=2968 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.101943][ T29] audit: type=1400 audit(1758009234.010:65): avc: denied { unmount } for pid=2968 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.265854][ T2968] cgroup: Unknown subsys name 'cpuset' [ 41.273733][ T2968] cgroup: Unknown subsys name 'rlimit' [ 41.441960][ T29] audit: type=1400 audit(1758009234.370:66): avc: denied { setattr } for pid=2968 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.465299][ T29] audit: type=1400 audit(1758009234.370:67): avc: denied { create } for pid=2968 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.486345][ T29] audit: type=1400 audit(1758009234.370:68): avc: denied { write } for pid=2968 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.506753][ T29] audit: type=1400 audit(1758009234.370:69): avc: denied { read } for pid=2968 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.527567][ T29] audit: type=1400 audit(1758009234.410:70): avc: denied { sys_module } for pid=2968 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 41.599472][ T2973] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 41.754466][ T2968] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 43.216533][ T2975] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 46.286565][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 46.286584][ T29] audit: type=1400 audit(1758009239.220:93): avc: denied { create } for pid=2990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.325435][ T29] audit: type=1400 audit(1758009239.220:94): avc: denied { write } for pid=2990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.345890][ T29] audit: type=1400 audit(1758009239.250:95): avc: denied { read } for pid=2990 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 54.030211][ T2990] syz-executor (2990) used greatest stack depth: 22776 bytes left [ 55.771181][ T29] audit: type=1400 audit(1758009248.700:96): avc: denied { create } for pid=3489 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 55.798751][ T29] audit: type=1400 audit(1758009248.700:97): avc: denied { sys_admin } for pid=3489 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 55.828998][ T29] audit: type=1400 audit(1758009248.760:98): avc: denied { sys_chroot } for pid=3490 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 55.948934][ T29] audit: type=1400 audit(1758009248.880:99): avc: denied { create } for pid=3496 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2025/09/16 07:54:09 executed programs: 0 [ 56.227078][ T29] audit: type=1400 audit(1758009249.160:100): avc: denied { write } for pid=2956 comm="syz-execprog" path="pipe:[2594]" dev="pipefs" ino=2594 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 2025/09/16 07:54:19 executed programs: 2 [ 66.662977][ T29] audit: type=1400 audit(1758009259.590:101): avc: denied { read write } for pid=3952 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.686579][ T29] audit: type=1400 audit(1758009259.590:102): avc: denied { open } for pid=3952 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.714721][ T29] audit: type=1400 audit(1758009259.620:103): avc: denied { ioctl } for pid=3952 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.923883][ T346] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 67.073722][ T346] usb 4-1: Using ep0 maxpacket: 32 [ 67.080670][ T346] usb 4-1: config 0 has an invalid interface number: 127 but max is 0 [ 67.088950][ T346] usb 4-1: config 0 has no interface number 0 [ 67.095094][ T346] usb 4-1: config 0 interface 127 has no altsetting 0 [ 67.103699][ T346] usb 4-1: New USB device found, idVendor=0424, idProduct=cf30, bcdDevice=89.09 [ 67.112735][ T346] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 67.120783][ T346] usb 4-1: Product: syz [ 67.124965][ T346] usb 4-1: Manufacturer: syz [ 67.129535][ T346] usb 4-1: SerialNumber: syz [ 67.137888][ T346] usb 4-1: config 0 descriptor?? [ 67.363862][ T346] usb 4-1: USB disconnect, device number 2 [ 67.376837][ T346] ================================================================== [ 67.384919][ T346] BUG: KASAN: slab-use-after-free in hdm_disconnect+0x227/0x250 [ 67.392569][ T346] Read of size 8 at addr ffff88811ab7d898 by task kworker/0:2/346 [ 67.400353][ T346] [ 67.402678][ T346] CPU: 0 UID: 0 PID: 346 Comm: kworker/0:2 Not tainted syzkaller #0 PREEMPT(voluntary) [ 67.402696][ T346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 67.402706][ T346] Workqueue: usb_hub_wq hub_event [ 67.402733][ T346] Call Trace: [ 67.402738][ T346] [ 67.402744][ T346] dump_stack_lvl+0x116/0x1f0 [ 67.402763][ T346] print_report+0xcd/0x630 [ 67.402781][ T346] ? __virt_addr_valid+0x81/0x610 [ 67.402799][ T346] ? __phys_addr+0xe8/0x180 [ 67.402816][ T346] ? hdm_disconnect+0x227/0x250 [ 67.402832][ T346] kasan_report+0xe0/0x110 [ 67.402849][ T346] ? hdm_disconnect+0x227/0x250 [ 67.402865][ T346] hdm_disconnect+0x227/0x250 [ 67.402881][ T346] usb_unbind_interface+0x1da/0x9e0 [ 67.402895][ T346] ? kernfs_remove_by_name_ns+0xbe/0x110 [ 67.402912][ T346] ? __pfx_usb_unbind_interface+0x10/0x10 [ 67.402925][ T346] device_remove+0x122/0x170 [ 67.402944][ T346] device_release_driver_internal+0x44b/0x620 [ 67.402967][ T346] bus_remove_device+0x22f/0x420 [ 67.402986][ T346] device_del+0x396/0x9f0 [ 67.403005][ T346] ? __pfx_device_del+0x10/0x10 [ 67.403023][ T346] ? __pfx___mutex_lock+0x10/0x10 [ 67.403035][ T346] ? __pfx___pm_runtime_barrier+0x10/0x10 [ 67.403055][ T346] ? do_raw_spin_lock+0x12c/0x2b0 [ 67.403071][ T346] usb_disable_device+0x355/0x7d0 [ 67.403090][ T346] ? lockdep_hardirqs_on+0x7c/0x110 [ 67.403111][ T346] usb_disconnect+0x2e1/0x9c0 [ 67.403130][ T346] hub_event+0x1aa2/0x5060 [ 67.403154][ T346] ? __lock_acquire+0xb97/0x1ce0 [ 67.403168][ T346] ? __pfx_hub_event+0x10/0x10 [ 67.403185][ T346] ? interval_tree_remove+0x850/0xee0 [ 67.403207][ T346] ? rcu_is_watching+0x12/0xc0 [ 67.403225][ T346] process_one_work+0x9cf/0x1b70 [ 67.403251][ T346] ? __pfx_hub_event+0x10/0x10 [ 67.403269][ T346] ? __pfx_process_one_work+0x10/0x10 [ 67.403288][ T346] ? assign_work+0x1a0/0x250 [ 67.403304][ T346] worker_thread+0x6c8/0xf10 [ 67.403323][ T346] ? __kthread_parkme+0x19e/0x250 [ 67.403336][ T346] ? __pfx_worker_thread+0x10/0x10 [ 67.403352][ T346] kthread+0x3c5/0x780 [ 67.403368][ T346] ? __pfx_kthread+0x10/0x10 [ 67.403383][ T346] ? rcu_is_watching+0x12/0xc0 [ 67.403400][ T346] ? __pfx_kthread+0x10/0x10 [ 67.403415][ T346] ret_from_fork+0x56d/0x700 [ 67.403427][ T346] ? __pfx_kthread+0x10/0x10 [ 67.403442][ T346] ret_from_fork_asm+0x1a/0x30 [ 67.403463][ T346] [ 67.403468][ T346] [ 67.638565][ T346] Allocated by task 346: [ 67.642876][ T346] kasan_save_stack+0x33/0x60 [ 67.647540][ T346] kasan_save_track+0x14/0x30 [ 67.652203][ T346] __kasan_kmalloc+0x8f/0xa0 [ 67.656794][ T346] hdm_probe+0xb3/0x19a0 [ 67.661021][ T346] usb_probe_interface+0x303/0xa40 [ 67.666135][ T346] really_probe+0x241/0xa90 [ 67.670624][ T346] __driver_probe_device+0x1de/0x440 [ 67.675901][ T346] driver_probe_device+0x4c/0x1b0 [ 67.680912][ T346] __device_attach_driver+0x1df/0x310 [ 67.686274][ T346] bus_for_each_drv+0x159/0x1e0 [ 67.691109][ T346] __device_attach+0x1e4/0x4b0 [ 67.695858][ T346] bus_probe_device+0x17f/0x1c0 [ 67.700695][ T346] device_add+0x1148/0x1aa0 [ 67.705176][ T346] usb_set_configuration+0x1187/0x1e20 [ 67.710620][ T346] usb_generic_driver_probe+0xb1/0x110 [ 67.716061][ T346] usb_probe_device+0xec/0x3e0 [ 67.720820][ T346] really_probe+0x241/0xa90 [ 67.725308][ T346] __driver_probe_device+0x1de/0x440 [ 67.730595][ T346] driver_probe_device+0x4c/0x1b0 [ 67.735605][ T346] __device_attach_driver+0x1df/0x310 [ 67.740963][ T346] bus_for_each_drv+0x159/0x1e0 [ 67.745799][ T346] __device_attach+0x1e4/0x4b0 [ 67.750548][ T346] bus_probe_device+0x17f/0x1c0 [ 67.755380][ T346] device_add+0x1148/0x1aa0 [ 67.759858][ T346] usb_new_device+0xd07/0x1a60 [ 67.764611][ T346] hub_event+0x2fce/0x5060 [ 67.769107][ T346] process_one_work+0x9cf/0x1b70 [ 67.774033][ T346] worker_thread+0x6c8/0xf10 [ 67.778615][ T346] kthread+0x3c5/0x780 [ 67.782677][ T346] ret_from_fork+0x56d/0x700 [ 67.787246][ T346] ret_from_fork_asm+0x1a/0x30 [ 67.791995][ T346] [ 67.794301][ T346] Freed by task 346: [ 67.798169][ T346] kasan_save_stack+0x33/0x60 [ 67.802841][ T346] kasan_save_track+0x14/0x30 [ 67.807501][ T346] kasan_save_free_info+0x3b/0x60 [ 67.812510][ T346] __kasan_slab_free+0x3e/0x50 [ 67.817258][ T346] kfree+0x283/0x470 [ 67.821149][ T346] device_release+0xa4/0x240 [ 67.825719][ T346] kobject_put+0x1e7/0x5a0 [ 67.830134][ T346] device_unregister+0x2f/0xc0 [ 67.834910][ T346] hdm_disconnect+0x10b/0x250 [ 67.839570][ T346] usb_unbind_interface+0x1da/0x9e0 [ 67.844743][ T346] device_remove+0x122/0x170 [ 67.849316][ T346] device_release_driver_internal+0x44b/0x620 [ 67.855375][ T346] bus_remove_device+0x22f/0x420 [ 67.860298][ T346] device_del+0x396/0x9f0 [ 67.864611][ T346] usb_disable_device+0x355/0x7d0 [ 67.869619][ T346] usb_disconnect+0x2e1/0x9c0 [ 67.874279][ T346] hub_event+0x1aa2/0x5060 [ 67.878684][ T346] process_one_work+0x9cf/0x1b70 [ 67.883617][ T346] worker_thread+0x6c8/0xf10 [ 67.888218][ T346] kthread+0x3c5/0x780 [ 67.892270][ T346] ret_from_fork+0x56d/0x700 [ 67.896839][ T346] ret_from_fork_asm+0x1a/0x30 [ 67.901596][ T346] [ 67.903907][ T346] The buggy address belongs to the object at ffff88811ab7c000 [ 67.903907][ T346] which belongs to the cache kmalloc-8k of size 8192 [ 67.917976][ T346] The buggy address is located 6296 bytes inside of [ 67.917976][ T346] freed 8192-byte region [ffff88811ab7c000, ffff88811ab7e000) [ 67.931938][ T346] [ 67.934251][ T346] The buggy address belongs to the physical page: [ 67.940650][ T346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11ab78 [ 67.949489][ T346] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 67.957975][ T346] flags: 0x200000000000040(head|node=0|zone=2) [ 67.964139][ T346] page_type: f5(slab) [ 67.968110][ T346] raw: 0200000000000040 ffff888100042280 ffffea00046aa000 0000000000000002 [ 67.976674][ T346] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 67.985241][ T346] head: 0200000000000040 ffff888100042280 ffffea00046aa000 0000000000000002 [ 67.993921][ T346] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 68.002635][ T346] head: 0200000000000003 ffffea00046ade01 00000000ffffffff 00000000ffffffff [ 68.011384][ T346] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000008 [ 68.020031][ T346] page dumped because: kasan: bad access detected [ 68.026422][ T346] page_owner tracks the page as allocated [ 68.032117][ T346] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 2968, tgid 2968 (syz-executor), ts 41271445825, free_ts 38004155717 [ 68.053484][ T346] post_alloc_hook+0x1c0/0x230 [ 68.058243][ T346] get_page_from_freelist+0xf98/0x2ce0 [ 68.063693][ T346] __alloc_frozen_pages_noprof+0x259/0x21e0 [ 68.069575][ T346] alloc_pages_mpol+0xe4/0x410 [ 68.074325][ T346] new_slab+0x247/0x330 [ 68.078466][ T346] ___slab_alloc+0xc55/0x1620 [ 68.083123][ T346] __slab_alloc.constprop.0+0x56/0xb0 [ 68.088476][ T346] __kmalloc_cache_noprof+0x209/0x3c0 [ 68.093835][ T346] cgroup1_get_tree+0x8f9/0xeb0 [ 68.098669][ T346] vfs_get_tree+0x8e/0x340 [ 68.103071][ T346] path_mount+0x1513/0x2000 [ 68.107553][ T346] __x64_sys_mount+0x28d/0x310 [ 68.112297][ T346] do_syscall_64+0xcd/0x4d0 [ 68.116776][ T346] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.122651][ T346] page last free pid 2955 tgid 2955 stack trace: [ 68.128950][ T346] __free_frozen_pages+0x78a/0xfd0 [ 68.134048][ T346] __put_partials+0x165/0x1c0 [ 68.138712][ T346] qlist_free_all+0x4d/0x120 [ 68.143282][ T346] kasan_quarantine_reduce+0x195/0x1e0 [ 68.148737][ T346] __kasan_slab_alloc+0x4e/0x70 [ 68.153570][ T346] __kmalloc_node_track_caller_noprof+0x1c4/0x4c0 [ 68.159979][ T346] memdup_user+0x2a/0xe0 [ 68.164204][ T346] proc_pid_attr_write+0x22e/0x790 [ 68.169295][ T346] vfs_write+0x29d/0x11d0 [ 68.173600][ T346] ksys_write+0x12a/0x250 [ 68.177909][ T346] do_syscall_64+0xcd/0x4d0 [ 68.182397][ T346] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.188270][ T346] [ 68.190572][ T346] Memory state around the buggy address: [ 68.196175][ T346] ffff88811ab7d780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.204214][ T346] ffff88811ab7d800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.212260][ T346] >ffff88811ab7d880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.220300][ T346] ^ [ 68.225126][ T346] ffff88811ab7d900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.233168][ T346] ffff88811ab7d980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.241206][ T346] ================================================================== [ 68.249565][ T346] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 68.256767][ T346] CPU: 0 UID: 0 PID: 346 Comm: kworker/0:2 Not tainted syzkaller #0 PREEMPT(voluntary) [ 68.266492][ T346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 68.276562][ T346] Workqueue: usb_hub_wq hub_event [ 68.281585][ T346] Call Trace: [ 68.284851][ T346] [ 68.287764][ T346] dump_stack_lvl+0x3d/0x1f0 [ 68.292349][ T346] vpanic+0x6e8/0x7a0 [ 68.296329][ T346] ? __pfx_vpanic+0x10/0x10 [ 68.300827][ T346] ? hdm_disconnect+0x227/0x250 [ 68.305677][ T346] panic+0xca/0xd0 [ 68.309384][ T346] ? __pfx_panic+0x10/0x10 [ 68.313786][ T346] ? check_panic_on_warn+0x1f/0xb0 [ 68.318883][ T346] check_panic_on_warn+0xab/0xb0 [ 68.323812][ T346] end_report+0x107/0x170 [ 68.328127][ T346] kasan_report+0xee/0x110 [ 68.332532][ T346] ? hdm_disconnect+0x227/0x250 [ 68.337372][ T346] hdm_disconnect+0x227/0x250 [ 68.342037][ T346] usb_unbind_interface+0x1da/0x9e0 [ 68.347222][ T346] ? kernfs_remove_by_name_ns+0xbe/0x110 [ 68.352850][ T346] ? __pfx_usb_unbind_interface+0x10/0x10 [ 68.358564][ T346] device_remove+0x122/0x170 [ 68.363148][ T346] device_release_driver_internal+0x44b/0x620 [ 68.369209][ T346] bus_remove_device+0x22f/0x420 [ 68.374140][ T346] device_del+0x396/0x9f0 [ 68.378460][ T346] ? __pfx_device_del+0x10/0x10 [ 68.383297][ T346] ? __pfx___mutex_lock+0x10/0x10 [ 68.388305][ T346] ? __pfx___pm_runtime_barrier+0x10/0x10 [ 68.394015][ T346] ? do_raw_spin_lock+0x12c/0x2b0 [ 68.399031][ T346] usb_disable_device+0x355/0x7d0 [ 68.404048][ T346] ? lockdep_hardirqs_on+0x7c/0x110 [ 68.409240][ T346] usb_disconnect+0x2e1/0x9c0 [ 68.413906][ T346] hub_event+0x1aa2/0x5060 [ 68.418325][ T346] ? __lock_acquire+0xb97/0x1ce0 [ 68.423261][ T346] ? __pfx_hub_event+0x10/0x10 [ 68.428028][ T346] ? interval_tree_remove+0x850/0xee0 [ 68.433395][ T346] ? rcu_is_watching+0x12/0xc0 [ 68.438149][ T346] process_one_work+0x9cf/0x1b70 [ 68.443086][ T346] ? __pfx_hub_event+0x10/0x10 [ 68.447849][ T346] ? __pfx_process_one_work+0x10/0x10 [ 68.453217][ T346] ? assign_work+0x1a0/0x250 [ 68.457801][ T346] worker_thread+0x6c8/0xf10 [ 68.462401][ T346] ? __kthread_parkme+0x19e/0x250 [ 68.467411][ T346] ? __pfx_worker_thread+0x10/0x10 [ 68.472519][ T346] kthread+0x3c5/0x780 [ 68.476664][ T346] ? __pfx_kthread+0x10/0x10 [ 68.481251][ T346] ? rcu_is_watching+0x12/0xc0 [ 68.486016][ T346] ? __pfx_kthread+0x10/0x10 [ 68.490606][ T346] ret_from_fork+0x56d/0x700 [ 68.495188][ T346] ? __pfx_kthread+0x10/0x10 [ 68.499767][ T346] ret_from_fork_asm+0x1a/0x30 [ 68.504530][ T346] [ 68.507753][ T346] Kernel Offset: disabled [ 68.512065][ T346] Rebooting in 86400 seconds..