[ 45.261487] audit: type=1800 audit(1584156207.782:30): pid=7959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 50.467992] kauditd_printk_skb: 4 callbacks suppressed [ 50.468005] audit: type=1400 audit(1584156213.012:35): avc: denied { map } for pid=8134 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.31' (ECDSA) to the list of known hosts. [ 57.341037] audit: type=1400 audit(1584156219.882:36): avc: denied { map } for pid=8146 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/14 03:23:40 parsed 1 programs [ 59.010945] audit: type=1400 audit(1584156221.552:37): avc: denied { map } for pid=8146 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17091 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/03/14 03:23:41 executed programs: 0 [ 59.208633] IPVS: ftp: loaded support on port[0] = 21 [ 59.272541] chnl_net:caif_netlink_parms(): no params data found [ 59.326598] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.333790] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.341948] device bridge_slave_0 entered promiscuous mode [ 59.350142] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.357023] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.364195] device bridge_slave_1 entered promiscuous mode [ 59.380934] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.390257] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.408654] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.416419] team0: Port device team_slave_0 added [ 59.422141] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.430194] team0: Port device team_slave_1 added [ 59.444677] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 59.451197] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.477277] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 59.489534] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 59.496063] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.521675] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 59.532886] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.541004] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.607562] device hsr_slave_0 entered promiscuous mode [ 59.645538] device hsr_slave_1 entered promiscuous mode [ 59.715877] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 59.725699] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 59.779568] audit: type=1400 audit(1584156222.322:38): avc: denied { create } for pid=8164 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 59.805824] audit: type=1400 audit(1584156222.322:39): avc: denied { write } for pid=8164 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 59.825931] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.831319] audit: type=1400 audit(1584156222.352:40): avc: denied { read } for pid=8164 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 59.837566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.869063] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.875588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.914022] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 59.921910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.930406] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.939838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.958398] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.965695] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.972661] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 59.983824] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 59.990419] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.999979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.007693] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.014232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.036346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.043951] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.050340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.058090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.067015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.074576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.083120] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.092072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.102312] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 60.108652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.124276] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 60.132043] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.139355] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.151959] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.165541] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 60.176154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.216606] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 60.223613] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 60.231284] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 60.242210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.250088] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.257146] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.271097] device veth0_vlan entered promiscuous mode [ 60.280702] device veth1_vlan entered promiscuous mode [ 60.294778] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 60.304444] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 60.311700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 60.321051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 60.331976] device veth0_macvtap entered promiscuous mode [ 60.338772] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 60.347460] device veth1_macvtap entered promiscuous mode [ 60.353707] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 60.364039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 60.373769] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 60.383803] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 60.391657] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 60.398903] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 60.407170] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 60.414284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 60.422156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.432677] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 60.439991] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 60.446660] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 60.454535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.560826] audit: type=1400 audit(1584156223.102:41): avc: denied { associate } for pid=8164 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 61.509706] team0 (unregistering): Port device team_slave_0 removed [ 61.638390] team0 (unregistering): Port device team_slave_1 removed [ 61.822972] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 61.829823] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 61.838574] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 61.845873] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 62.983948] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.994185] device bridge_slave_0 left promiscuous mode [ 63.000445] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.444903] bond0: Releasing backup interface bond_slave_0 [ 64.335309] ================================================================== [ 64.342794] BUG: KASAN: use-after-free in free_netdev+0x3b0/0x420 [ 64.349019] Read of size 8 at addr ffff8880a08c13a0 by task syz-executor.0/8249 [ 64.356470] [ 64.358108] CPU: 1 PID: 8249 Comm: syz-executor.0 Not tainted 4.19.109-syzkaller #0 [ 64.365885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.375232] Call Trace: [ 64.377838] dump_stack+0x188/0x20d [ 64.381457] ? free_netdev+0x3b0/0x420 [ 64.385347] print_address_description.cold+0x7c/0x212 [ 64.390643] ? free_netdev+0x3b0/0x420 [ 64.394528] kasan_report.cold+0x88/0x2b9 [ 64.398707] free_netdev+0x3b0/0x420 [ 64.402423] netdev_run_todo+0x5ea/0x740 [ 64.406738] ? register_netdev+0x50/0x50 [ 64.410795] ? __lock_is_held+0xad/0x140 [ 64.414860] ? rtnl_link_get_net_capable.constprop.0+0x230/0x230 [ 64.420991] rtnetlink_rcv_msg+0x460/0xaf0 [ 64.425215] ? rtnetlink_put_metrics+0x520/0x520 [ 64.429957] ? netdev_pick_tx+0x2f0/0x2f0 [ 64.434087] ? __copy_skb_header+0x2f0/0x510 [ 64.438493] ? sock_spd_release+0x270/0x270 [ 64.442817] netlink_rcv_skb+0x160/0x410 [ 64.446872] ? rtnetlink_put_metrics+0x520/0x520 [ 64.451629] ? netlink_ack+0xa60/0xa60 [ 64.455536] netlink_unicast+0x4d7/0x6a0 [ 64.459594] ? netlink_attachskb+0x710/0x710 [ 64.464006] netlink_sendmsg+0x80b/0xcd0 [ 64.468054] ? netlink_unicast+0x6a0/0x6a0 [ 64.472275] ? move_addr_to_kernel.part.0+0x110/0x110 [ 64.477458] ? netlink_unicast+0x6a0/0x6a0 [ 64.481680] sock_sendmsg+0xcf/0x120 [ 64.485379] ___sys_sendmsg+0x803/0x920 [ 64.489341] ? copy_msghdr_from_user+0x410/0x410 [ 64.494091] ? __fget+0x319/0x510 [ 64.497545] ? lock_downgrade+0x740/0x740 [ 64.501681] ? check_preemption_disabled+0x41/0x280 [ 64.506696] ? __fget+0x340/0x510 [ 64.510156] ? iterate_fd+0x350/0x350 [ 64.513955] ? __fget_light+0x1d1/0x230 [ 64.517934] __sys_sendmsg+0xec/0x1b0 [ 64.521719] ? __ia32_sys_shutdown+0x70/0x70 [ 64.526120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 64.530871] ? trace_hardirqs_off_caller+0x55/0x210 [ 64.535873] ? do_syscall_64+0x21/0x620 [ 64.539835] do_syscall_64+0xf9/0x620 [ 64.543729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 64.548909] RIP: 0033:0x45c849 [ 64.552092] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 64.570982] RSP: 002b:00007f8271ea0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 64.578687] RAX: ffffffffffffffda RBX: 00007f8271ea16d4 RCX: 000000000045c849 [ 64.585942] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 64.593195] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 64.600447] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 64.607713] R13: 00000000000009f9 R14: 00000000004ccb17 R15: 000000000076c04c [ 64.615002] [ 64.616628] Allocated by task 8247: [ 64.620242] kasan_kmalloc+0xbf/0xe0 [ 64.623938] __kmalloc+0x15b/0x770 [ 64.627469] sk_prot_alloc+0x18c/0x2d0 [ 64.631342] sk_alloc+0x36/0xf50 [ 64.634694] tun_chr_open+0x7b/0x560 [ 64.638403] misc_open+0x372/0x4a0 [ 64.641928] chrdev_open+0x219/0x5c0 [ 64.645634] do_dentry_open+0x4a8/0x1160 [ 64.649687] path_openat+0x1031/0x4200 [ 64.653582] do_filp_open+0x1a1/0x280 [ 64.657399] do_sys_open+0x3c0/0x500 [ 64.661100] do_syscall_64+0xf9/0x620 [ 64.664885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 64.670055] [ 64.671664] Freed by task 8246: [ 64.674931] __kasan_slab_free+0xf7/0x140 [ 64.679065] kfree+0xce/0x220 [ 64.682158] __sk_destruct+0x579/0x780 [ 64.686027] sk_destruct+0xb9/0xf0 [ 64.689552] __sk_free+0xc2/0x2e0 [ 64.692986] sk_free+0x3b/0x50 [ 64.696187] __tun_detach+0xa04/0x1020 [ 64.700055] tun_chr_close+0x10e/0x180 [ 64.703926] __fput+0x2cd/0x890 [ 64.707210] task_work_run+0x13f/0x1b0 [ 64.711092] exit_to_usermode_loop+0x25a/0x2b0 [ 64.715672] do_syscall_64+0x538/0x620 [ 64.719555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 64.724720] [ 64.726335] The buggy address belongs to the object at ffff8880a08c0d00 [ 64.726335] which belongs to the cache kmalloc-4096 of size 4096 [ 64.739157] The buggy address is located 1696 bytes inside of [ 64.739157] 4096-byte region [ffff8880a08c0d00, ffff8880a08c1d00) [ 64.751194] The buggy address belongs to the page: [ 64.756112] page:ffffea0002823000 count:1 mapcount:0 mapping:ffff88812c3dcdc0 index:0x0 compound_mapcount: 0 [ 64.766081] flags: 0xfffe0000008100(slab|head) [ 64.770650] raw: 00fffe0000008100 ffffea000208cd08 ffffea0002036788 ffff88812c3dcdc0 [ 64.778516] raw: 0000000000000000 ffff8880a08c0d00 0000000100000001 0000000000000000 [ 64.786377] page dumped because: kasan: bad access detected [ 64.792066] [ 64.793697] Memory state around the buggy address: [ 64.798615] ffff8880a08c1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.805965] ffff8880a08c1300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.813309] >ffff8880a08c1380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.820658] ^ [ 64.825060] ffff8880a08c1400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.832456] ffff8880a08c1480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.839799] ================================================================== [ 64.847141] Disabling lock debugging due to kernel taint [ 64.854722] Kernel panic - not syncing: panic_on_warn set ... [ 64.854722] [ 64.862106] CPU: 0 PID: 8249 Comm: syz-executor.0 Tainted: G B 4.19.109-syzkaller #0 [ 64.871278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.880661] Call Trace: [ 64.883242] dump_stack+0x188/0x20d [ 64.886897] panic+0x26a/0x50e [ 64.890072] ? __warn_printk+0xf3/0xf3 [ 64.893942] ? preempt_schedule_common+0x4a/0xc0 [ 64.898686] ? free_netdev+0x3b0/0x420 [ 64.902561] ? ___preempt_schedule+0x16/0x18 [ 64.907008] ? trace_hardirqs_on+0x55/0x210 [ 64.911322] ? free_netdev+0x3b0/0x420 [ 64.915202] kasan_end_report+0x43/0x49 [ 64.919160] kasan_report.cold+0xa4/0x2b9 [ 64.923293] free_netdev+0x3b0/0x420 [ 64.926991] netdev_run_todo+0x5ea/0x740 [ 64.931041] ? register_netdev+0x50/0x50 [ 64.935085] ? __lock_is_held+0xad/0x140 [ 64.939176] ? rtnl_link_get_net_capable.constprop.0+0x230/0x230 [ 64.945305] rtnetlink_rcv_msg+0x460/0xaf0 [ 64.949527] ? rtnetlink_put_metrics+0x520/0x520 [ 64.954272] ? netdev_pick_tx+0x2f0/0x2f0 [ 64.958403] ? __copy_skb_header+0x2f0/0x510 [ 64.962796] ? sock_spd_release+0x270/0x270 [ 64.967105] netlink_rcv_skb+0x160/0x410 [ 64.971150] ? rtnetlink_put_metrics+0x520/0x520 [ 64.975900] ? netlink_ack+0xa60/0xa60 [ 64.979787] netlink_unicast+0x4d7/0x6a0 [ 64.983843] ? netlink_attachskb+0x710/0x710 [ 64.988237] netlink_sendmsg+0x80b/0xcd0 [ 64.992282] ? netlink_unicast+0x6a0/0x6a0 [ 64.996501] ? move_addr_to_kernel.part.0+0x110/0x110 [ 65.001683] ? netlink_unicast+0x6a0/0x6a0 [ 65.006078] sock_sendmsg+0xcf/0x120 [ 65.009774] ___sys_sendmsg+0x803/0x920 [ 65.013779] ? copy_msghdr_from_user+0x410/0x410 [ 65.018571] ? __fget+0x319/0x510 [ 65.022030] ? lock_downgrade+0x740/0x740 [ 65.026195] ? check_preemption_disabled+0x41/0x280 [ 65.031202] ? __fget+0x340/0x510 [ 65.034652] ? iterate_fd+0x350/0x350 [ 65.038461] ? __fget_light+0x1d1/0x230 [ 65.042424] __sys_sendmsg+0xec/0x1b0 [ 65.046220] ? __ia32_sys_shutdown+0x70/0x70 [ 65.050628] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 65.055369] ? trace_hardirqs_off_caller+0x55/0x210 [ 65.060370] ? do_syscall_64+0x21/0x620 [ 65.064341] do_syscall_64+0xf9/0x620 [ 65.068128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 65.073300] RIP: 0033:0x45c849 [ 65.076478] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 65.095382] RSP: 002b:00007f8271ea0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 65.103075] RAX: ffffffffffffffda RBX: 00007f8271ea16d4 RCX: 000000000045c849 [ 65.110330] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 65.117583] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 65.124837] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 65.132087] R13: 00000000000009f9 R14: 00000000004ccb17 R15: 000000000076c04c [ 65.140633] Kernel Offset: disabled [ 65.144268] Rebooting in 86400 seconds..