[ 35.651467] audit: type=1800 audit(1584542859.514:33): pid=7311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 35.678615] audit: type=1800 audit(1584542859.514:34): pid=7311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 38.123547] random: sshd: uninitialized urandom read (32 bytes read) [ 38.366546] audit: type=1400 audit(1584542862.224:35): avc: denied { map } for pid=7487 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 38.417549] random: sshd: uninitialized urandom read (32 bytes read) [ 39.166341] random: sshd: uninitialized urandom read (32 bytes read) [ 39.356881] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.1.5' (ECDSA) to the list of known hosts. [ 44.874151] random: sshd: uninitialized urandom read (32 bytes read) [ 45.083386] audit: type=1400 audit(1584542868.944:36): avc: denied { map } for pid=7499 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/18 14:47:49 parsed 1 programs [ 45.792707] random: cc1: uninitialized urandom read (8 bytes read) 2020/03/18 14:47:50 executed programs: 0 [ 46.760782] audit: type=1400 audit(1584542870.624:37): avc: denied { map } for pid=7499 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=80 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 46.804121] audit: type=1400 audit(1584542870.664:38): avc: denied { map } for pid=7499 comm="syz-execprog" path="/root/syzkaller-shm760992568" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 47.111304] IPVS: ftp: loaded support on port[0] = 21 [ 47.989788] chnl_net:caif_netlink_parms(): no params data found [ 48.039666] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.046432] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.053784] device bridge_slave_0 entered promiscuous mode [ 48.062710] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.069196] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.076385] device bridge_slave_1 entered promiscuous mode [ 48.092007] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 48.101808] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 48.119319] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 48.126741] team0: Port device team_slave_0 added [ 48.132729] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 48.139850] team0: Port device team_slave_1 added [ 48.154727] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 48.161152] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 48.186408] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 48.197353] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 48.203682] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 48.235780] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 48.246620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.254215] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.312396] device hsr_slave_0 entered promiscuous mode [ 48.350351] device hsr_slave_1 entered promiscuous mode [ 48.401105] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 48.408287] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 48.458140] audit: type=1400 audit(1584542872.314:39): avc: denied { create } for pid=7517 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 48.482842] audit: type=1400 audit(1584542872.314:40): avc: denied { write } for pid=7517 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 48.500484] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.507465] audit: type=1400 audit(1584542872.344:41): avc: denied { read } for pid=7517 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 48.513064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.543593] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.549932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.581580] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 48.587771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 48.599326] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 48.608305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.626698] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.634758] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.646461] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 48.652729] 8021q: adding VLAN 0 to HW filter on device team0 [ 48.661310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.668858] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.675239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.691866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.699732] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.706150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.713692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 48.722433] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.732023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 48.744888] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 48.754894] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 48.766306] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 48.772838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.780825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.788694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.801165] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 48.808585] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 48.815530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 48.826407] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.886194] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 48.897116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.931759] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 48.938769] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 48.945616] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 48.954753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.963972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.970865] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.977840] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 48.986703] device veth0_vlan entered promiscuous mode [ 48.996424] device veth1_vlan entered promiscuous mode [ 49.010588] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 49.019506] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 49.027253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 49.035366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.044935] device veth0_macvtap entered promiscuous mode [ 49.051368] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 49.059530] device veth1_macvtap entered promiscuous mode [ 49.065694] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 49.074612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 49.083732] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 49.093011] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 49.100617] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.108983] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 49.116578] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 49.124012] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.131925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.142468] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 49.149347] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.157212] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.164965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.352127] ================================================================== [ 50.359620] BUG: KASAN: use-after-free in tcindex_set_parms+0x1521/0x16a0 [ 50.366539] Write of size 16 at addr ffff8880a84e0b80 by task syz-executor.0/7569 [ 50.374164] [ 50.375777] CPU: 1 PID: 7569 Comm: syz-executor.0 Not tainted 4.14.173-syzkaller #0 [ 50.384258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.393623] Call Trace: [ 50.396221] dump_stack+0x13e/0x194 [ 50.399860] ? tcindex_set_parms+0x1521/0x16a0 [ 50.404502] print_address_description.cold+0x7c/0x1e2 [ 50.409772] ? tcindex_set_parms+0x1521/0x16a0 [ 50.414402] kasan_report.cold+0xa9/0x2ae [ 50.418544] tcindex_set_parms+0x1521/0x16a0 [ 50.422957] ? tcindex_alloc_perfect_hash+0x300/0x300 [ 50.428165] ? avc_has_perm_noaudit+0x297/0x400 [ 50.432846] ? nla_parse+0x183/0x240 [ 50.436545] tcindex_change+0x1b5/0x270 [ 50.440504] ? tcindex_set_parms+0x16a0/0x16a0 [ 50.445111] ? tcindex_lookup+0x8c/0x310 [ 50.449162] ? tcindex_set_parms+0x16a0/0x16a0 [ 50.453726] tc_ctl_tfilter+0xf13/0x18e6 [ 50.457785] ? tfilter_notify+0x240/0x240 [ 50.461918] ? mutex_trylock+0x1a0/0x1a0 [ 50.465972] ? rtnetlink_rcv_msg+0x2e8/0xb10 [ 50.470365] ? tfilter_notify+0x240/0x240 [ 50.474499] rtnetlink_rcv_msg+0x3be/0xb10 [ 50.478735] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 50.483326] ? netdev_pick_tx+0x2e0/0x2e0 [ 50.487678] ? skb_clone+0x11c/0x310 [ 50.491475] ? save_trace+0x290/0x290 [ 50.495271] netlink_rcv_skb+0x127/0x370 [ 50.499317] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 50.503907] ? netlink_ack+0x960/0x960 [ 50.507781] netlink_unicast+0x437/0x620 [ 50.511920] ? netlink_attachskb+0x600/0x600 [ 50.516327] netlink_sendmsg+0x733/0xbe0 [ 50.520406] ? netlink_unicast+0x620/0x620 [ 50.524642] ? SYSC_sendto+0x2b0/0x2b0 [ 50.528525] ? security_socket_sendmsg+0x83/0xb0 [ 50.533268] ? netlink_unicast+0x620/0x620 [ 50.537486] sock_sendmsg+0xc5/0x100 [ 50.541196] ___sys_sendmsg+0x70a/0x840 [ 50.545164] ? trace_hardirqs_on+0x10/0x10 [ 50.549381] ? copy_msghdr_from_user+0x380/0x380 [ 50.554136] ? find_held_lock+0x2d/0x110 [ 50.558195] ? lock_downgrade+0x6e0/0x6e0 [ 50.562330] ? __fget+0x228/0x360 [ 50.565784] ? __fget_light+0x199/0x1f0 [ 50.569742] ? sockfd_lookup_light+0xb2/0x160 [ 50.574219] __sys_sendmsg+0xa3/0x120 [ 50.578000] ? SyS_shutdown+0x160/0x160 [ 50.581968] ? SyS_clock_gettime+0xf5/0x180 [ 50.586272] ? SyS_clock_settime+0x1a0/0x1a0 [ 50.590686] SyS_sendmsg+0x27/0x40 [ 50.594266] ? __sys_sendmsg+0x120/0x120 [ 50.598321] do_syscall_64+0x1d5/0x640 [ 50.602219] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 50.607508] RIP: 0033:0x45c849 [ 50.610699] RSP: 002b:00007f29c6decc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 50.618436] RAX: ffffffffffffffda RBX: 00007f29c6ded6d4 RCX: 000000000045c849 [ 50.625689] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 50.633060] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 50.640334] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 50.647596] R13: 00000000000009f9 R14: 00000000004ccb11 R15: 000000000076bf0c [ 50.654859] [ 50.656516] Allocated by task 6042: [ 50.660198] save_stack+0x32/0xa0 [ 50.663634] kasan_kmalloc+0xbf/0xe0 [ 50.667467] kmem_cache_alloc_trace+0x14d/0x7b0 [ 50.672125] load_elf_binary+0xc9/0x46b0 [ 50.676202] search_binary_handler+0x139/0x6c0 [ 50.680817] do_execveat_common.isra.0+0xf32/0x1c70 [ 50.685842] SyS_execve+0x34/0x40 [ 50.689301] do_syscall_64+0x1d5/0x640 [ 50.693173] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 50.698342] [ 50.699952] Freed by task 6042: [ 50.703210] save_stack+0x32/0xa0 [ 50.706650] kasan_slab_free+0x75/0xc0 [ 50.710523] kfree+0xcb/0x260 [ 50.713613] load_elf_binary+0x4cf/0x46b0 [ 50.717738] search_binary_handler+0x139/0x6c0 [ 50.722300] do_execveat_common.isra.0+0xf32/0x1c70 [ 50.727311] SyS_execve+0x34/0x40 [ 50.730756] do_syscall_64+0x1d5/0x640 [ 50.734624] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 50.739790] [ 50.741400] The buggy address belongs to the object at ffff8880a84e0b40 [ 50.741400] which belongs to the cache kmalloc-128 of size 128 [ 50.754037] The buggy address is located 64 bytes inside of [ 50.754037] 128-byte region [ffff8880a84e0b40, ffff8880a84e0bc0) [ 50.765820] The buggy address belongs to the page: [ 50.770730] page:ffffea0002a13800 count:1 mapcount:0 mapping:ffff8880a84e0000 index:0x0 [ 50.778854] flags: 0xfffe0000000100(slab) [ 50.782993] raw: 00fffe0000000100 ffff8880a84e0000 0000000000000000 0000000100000015 [ 50.790869] raw: ffffea0002a37de0 ffffea0002a1f920 ffff88812fe56640 0000000000000000 [ 50.798736] page dumped because: kasan: bad access detected [ 50.804426] [ 50.806032] Memory state around the buggy address: [ 50.810954] ffff8880a84e0a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 50.818406] ffff8880a84e0b00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 50.825753] >ffff8880a84e0b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.833111] ^ [ 50.836479] ffff8880a84e0c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.843879] ffff8880a84e0c80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 50.851228] ================================================================== [ 50.858570] Disabling lock debugging due to kernel taint [ 50.865561] Kernel panic - not syncing: panic_on_warn set ... [ 50.865561] [ 50.872951] CPU: 1 PID: 7569 Comm: syz-executor.0 Tainted: G B 4.14.173-syzkaller #0 [ 50.881943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.891353] Call Trace: [ 50.893930] dump_stack+0x13e/0x194 [ 50.897545] panic+0x1f9/0x42d [ 50.900716] ? add_taint.cold+0x16/0x16 [ 50.904937] ? preempt_schedule_common+0x4a/0xc0 [ 50.909672] ? tcindex_set_parms+0x1521/0x16a0 [ 50.914293] ? ___preempt_schedule+0x16/0x18 [ 50.918736] ? tcindex_set_parms+0x1521/0x16a0 [ 50.923297] kasan_end_report+0x43/0x49 [ 50.927278] kasan_report.cold+0x12f/0x2ae [ 50.931495] tcindex_set_parms+0x1521/0x16a0 [ 50.935885] ? tcindex_alloc_perfect_hash+0x300/0x300 [ 50.941055] ? avc_has_perm_noaudit+0x297/0x400 [ 50.945731] ? nla_parse+0x183/0x240 [ 50.949426] tcindex_change+0x1b5/0x270 [ 50.953410] ? tcindex_set_parms+0x16a0/0x16a0 [ 50.957973] ? tcindex_lookup+0x8c/0x310 [ 50.962101] ? tcindex_set_parms+0x16a0/0x16a0 [ 50.966974] tc_ctl_tfilter+0xf13/0x18e6 [ 50.971051] ? tfilter_notify+0x240/0x240 [ 50.975197] ? mutex_trylock+0x1a0/0x1a0 [ 50.979255] ? rtnetlink_rcv_msg+0x2e8/0xb10 [ 50.983661] ? tfilter_notify+0x240/0x240 [ 50.987803] rtnetlink_rcv_msg+0x3be/0xb10 [ 50.992023] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 50.996604] ? netdev_pick_tx+0x2e0/0x2e0 [ 51.000743] ? skb_clone+0x11c/0x310 [ 51.004458] ? save_trace+0x290/0x290 [ 51.008249] netlink_rcv_skb+0x127/0x370 [ 51.012291] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 51.016854] ? netlink_ack+0x960/0x960 [ 51.020723] netlink_unicast+0x437/0x620 [ 51.024765] ? netlink_attachskb+0x600/0x600 [ 51.029172] netlink_sendmsg+0x733/0xbe0 [ 51.033219] ? netlink_unicast+0x620/0x620 [ 51.037441] ? SYSC_sendto+0x2b0/0x2b0 [ 51.041332] ? security_socket_sendmsg+0x83/0xb0 [ 51.046069] ? netlink_unicast+0x620/0x620 [ 51.050289] sock_sendmsg+0xc5/0x100 [ 51.054010] ___sys_sendmsg+0x70a/0x840 [ 51.057974] ? trace_hardirqs_on+0x10/0x10 [ 51.062196] ? copy_msghdr_from_user+0x380/0x380 [ 51.066936] ? find_held_lock+0x2d/0x110 [ 51.070996] ? lock_downgrade+0x6e0/0x6e0 [ 51.075131] ? __fget+0x228/0x360 [ 51.078576] ? __fget_light+0x199/0x1f0 [ 51.082542] ? sockfd_lookup_light+0xb2/0x160 [ 51.087149] __sys_sendmsg+0xa3/0x120 [ 51.090945] ? SyS_shutdown+0x160/0x160 [ 51.094912] ? SyS_clock_gettime+0xf5/0x180 [ 51.099306] ? SyS_clock_settime+0x1a0/0x1a0 [ 51.103697] SyS_sendmsg+0x27/0x40 [ 51.107238] ? __sys_sendmsg+0x120/0x120 [ 51.111282] do_syscall_64+0x1d5/0x640 [ 51.115250] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 51.120439] RIP: 0033:0x45c849 [ 51.123619] RSP: 002b:00007f29c6decc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 51.131317] RAX: ffffffffffffffda RBX: 00007f29c6ded6d4 RCX: 000000000045c849 [ 51.138575] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 51.145828] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 51.153083] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 51.160344] R13: 00000000000009f9 R14: 00000000004ccb11 R15: 000000000076bf0c [ 51.168905] Kernel Offset: disabled [ 51.172535] Rebooting in 86400 seconds..