[ 34.400527] audit: type=1800 audit(1584618674.810:33): pid=7250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 34.428063] audit: type=1800 audit(1584618674.810:34): pid=7250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 37.586321] random: sshd: uninitialized urandom read (32 bytes read) [ 37.782365] audit: type=1400 audit(1584618678.190:35): avc: denied { map } for pid=7422 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 37.833294] random: sshd: uninitialized urandom read (32 bytes read) [ 38.544737] random: sshd: uninitialized urandom read (32 bytes read) [ 38.733121] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.209' (ECDSA) to the list of known hosts. [ 44.260675] random: sshd: uninitialized urandom read (32 bytes read) [ 44.383654] audit: type=1400 audit(1584618684.790:36): avc: denied { map } for pid=7434 comm="syz-executor955" path="/root/syz-executor955497018" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 44.621030] IPVS: ftp: loaded support on port[0] = 21 [ 45.432160] chnl_net:caif_netlink_parms(): no params data found [ 45.481234] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.487870] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.495137] device bridge_slave_0 entered promiscuous mode [ 45.502866] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.509318] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.516543] device bridge_slave_1 entered promiscuous mode [ 45.534107] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 45.543315] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 45.560372] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 45.567851] team0: Port device team_slave_0 added [ 45.573729] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 45.580989] team0: Port device team_slave_1 added [ 45.595314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.601696] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.627088] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.637956] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.644290] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.671365] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.681950] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 45.691005] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 45.752377] device hsr_slave_0 entered promiscuous mode [ 45.820314] device hsr_slave_1 entered promiscuous mode [ 45.860834] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 45.868191] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 45.916961] audit: type=1400 audit(1584618686.320:37): avc: denied { create } for pid=7435 comm="syz-executor955" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 45.936035] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.941979] audit: type=1400 audit(1584618686.320:38): avc: denied { write } for pid=7435 comm="syz-executor955" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 45.947676] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.971675] audit: type=1400 audit(1584618686.320:39): avc: denied { read } for pid=7435 comm="syz-executor955" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 45.978613] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.008342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.042069] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 46.048172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.057288] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 46.066450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.085463] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.092705] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.102976] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 46.109149] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.131025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.138785] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.145265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.152095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.159644] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.166457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.173776] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 46.181518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 46.188989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.197448] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 46.206285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.215993] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 46.222945] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 46.236535] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 46.244951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 46.252563] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 46.264453] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.323963] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 46.334155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.368235] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 46.375310] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 46.382767] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 46.392558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.400627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.408132] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.416897] device veth0_vlan entered promiscuous mode [ 46.426149] device veth1_vlan entered promiscuous mode [ 46.432256] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 46.438912] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 46.447340] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 46.462191] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 46.471503] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 46.478436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.486345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.495715] device veth0_macvtap entered promiscuous mode [ 46.502329] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 46.510914] device veth1_macvtap entered promiscuous mode [ 46.516968] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 46.525541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 46.536437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 46.545847] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 46.553196] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 46.563376] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 46.571002] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 46.578166] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.586386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.597251] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 46.604680] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 46.611947] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.619888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 46.716049] ================================================================== [ 46.723732] BUG: KASAN: use-after-free in tcindex_set_parms+0x1521/0x16a0 [ 46.730677] Write of size 16 at addr ffff8880a865b280 by task syz-executor955/7435 [ 46.738378] [ 46.739991] CPU: 0 PID: 7435 Comm: syz-executor955 Not tainted 4.14.173-syzkaller #0 [ 46.747863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.757231] Call Trace: [ 46.759817] dump_stack+0x13e/0x194 [ 46.763442] ? tcindex_set_parms+0x1521/0x16a0 [ 46.768012] print_address_description.cold+0x7c/0x1e2 [ 46.773273] ? tcindex_set_parms+0x1521/0x16a0 [ 46.777834] kasan_report.cold+0xa9/0x2ae [ 46.781978] tcindex_set_parms+0x1521/0x16a0 [ 46.786561] ? tcindex_alloc_perfect_hash+0x300/0x300 [ 46.791749] ? avc_has_perm_noaudit+0x297/0x400 [ 46.796430] ? nla_parse+0x183/0x240 [ 46.800136] tcindex_change+0x1b5/0x270 [ 46.804167] ? tcindex_set_parms+0x16a0/0x16a0 [ 46.808755] ? tcindex_lookup+0x8c/0x310 [ 46.812804] ? tcindex_set_parms+0x16a0/0x16a0 [ 46.817377] tc_ctl_tfilter+0xf13/0x18e6 [ 46.821441] ? tfilter_notify+0x240/0x240 [ 46.825577] ? mutex_trylock+0x1a0/0x1a0 [ 46.829750] ? rtnetlink_rcv_msg+0x2e8/0xb10 [ 46.834282] ? tfilter_notify+0x240/0x240 [ 46.838514] rtnetlink_rcv_msg+0x3be/0xb10 [ 46.842858] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 46.847426] ? netdev_pick_tx+0x2e0/0x2e0 [ 46.851617] ? skb_clone+0x11c/0x310 [ 46.855351] ? save_trace+0x290/0x290 [ 46.859187] netlink_rcv_skb+0x127/0x370 [ 46.863298] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 46.867866] ? netlink_ack+0x960/0x960 [ 46.871790] netlink_unicast+0x437/0x620 [ 46.875839] ? netlink_attachskb+0x600/0x600 [ 46.880229] netlink_sendmsg+0x733/0xbe0 [ 46.884275] ? netlink_unicast+0x620/0x620 [ 46.888734] ? SYSC_sendto+0x2b0/0x2b0 [ 46.893127] ? security_socket_sendmsg+0x83/0xb0 [ 46.897881] ? netlink_unicast+0x620/0x620 [ 46.902102] sock_sendmsg+0xc5/0x100 [ 46.905807] ___sys_sendmsg+0x70a/0x840 [ 46.909762] ? copy_msghdr_from_user+0x380/0x380 [ 46.914516] ? trace_hardirqs_on+0x10/0x10 [ 46.918815] ? save_trace+0x290/0x290 [ 46.922597] ? find_held_lock+0x2d/0x110 [ 46.926654] ? __might_fault+0x104/0x1b0 [ 46.930699] ? lock_acquire+0x170/0x3f0 [ 46.934654] ? lock_downgrade+0x6e0/0x6e0 [ 46.938787] ? __might_fault+0x177/0x1b0 [ 46.943021] ? _copy_to_user+0x82/0xd0 [ 46.946890] ? __fget_light+0x16a/0x1f0 [ 46.950856] ? sockfd_lookup_light+0xb2/0x160 [ 46.955330] __sys_sendmsg+0xa3/0x120 [ 46.959112] ? SyS_shutdown+0x160/0x160 [ 46.963070] ? up_read+0x17/0x30 [ 46.966415] ? __do_page_fault+0x35b/0xb40 [ 46.970627] SyS_sendmsg+0x27/0x40 [ 46.974169] ? __sys_sendmsg+0x120/0x120 [ 46.978209] do_syscall_64+0x1d5/0x640 [ 46.982080] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 46.987250] RIP: 0033:0x443869 [ 46.990430] RSP: 002b:00007ffd70c9b928 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 46.998252] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443869 [ 47.005625] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 47.012889] RBP: 00007ffd70c9b930 R08: 0000000001bbbbbb R09: 0000000001bbbbbb [ 47.020227] R10: 0000000001bbbbbb R11: 0000000000000246 R12: 00007ffd70c9b940 [ 47.027498] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 47.034863] [ 47.036473] Allocated by task 7435: [ 47.040109] save_stack+0x32/0xa0 [ 47.043698] kasan_kmalloc+0xbf/0xe0 [ 47.047438] kmem_cache_alloc_trace+0x14d/0x7b0 [ 47.052091] call_usermodehelper_setup+0x6f/0x2e0 [ 47.056916] __request_module+0x35a/0x8eb [ 47.061045] dev_load+0x166/0x1a0 [ 47.064476] dev_ioctl+0x51e/0xcb0 [ 47.067992] sock_do_ioctl+0x8c/0xa0 [ 47.071691] sock_ioctl+0x28d/0x450 [ 47.075318] do_vfs_ioctl+0x75a/0xfe0 [ 47.079110] SyS_ioctl+0x7f/0xb0 [ 47.082455] do_syscall_64+0x1d5/0x640 [ 47.086333] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 47.091502] [ 47.093185] Freed by task 7435: [ 47.096512] save_stack+0x32/0xa0 [ 47.099951] kasan_slab_free+0x75/0xc0 [ 47.103818] kfree+0xcb/0x260 [ 47.106908] call_usermodehelper_exec+0x1f7/0x410 [ 47.111736] __request_module+0x37a/0x8eb [ 47.115874] dev_load+0x166/0x1a0 [ 47.119305] dev_ioctl+0x51e/0xcb0 [ 47.122824] sock_do_ioctl+0x8c/0xa0 [ 47.126520] sock_ioctl+0x28d/0x450 [ 47.130128] do_vfs_ioctl+0x75a/0xfe0 [ 47.133920] SyS_ioctl+0x7f/0xb0 [ 47.137266] do_syscall_64+0x1d5/0x640 [ 47.141149] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 47.146314] [ 47.147932] The buggy address belongs to the object at ffff8880a865b240 [ 47.147932] which belongs to the cache kmalloc-128 of size 128 [ 47.160714] The buggy address is located 64 bytes inside of [ 47.160714] 128-byte region [ffff8880a865b240, ffff8880a865b2c0) [ 47.172487] The buggy address belongs to the page: [ 47.177448] page:ffffea0002a196c0 count:1 mapcount:0 mapping:ffff8880a865b000 index:0x0 [ 47.185586] flags: 0xfffe0000000100(slab) [ 47.189723] raw: 00fffe0000000100 ffff8880a865b000 0000000000000000 0000000100000015 [ 47.197585] raw: ffffea00023abc20 ffffea00027b20a0 ffff88812fe56640 0000000000000000 [ 47.205456] page dumped because: kasan: bad access detected [ 47.211157] [ 47.212774] Memory state around the buggy address: [ 47.217683] ffff8880a865b180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 47.225035] ffff8880a865b200: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 47.232385] >ffff8880a865b280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.239752] ^ [ 47.243108] ffff8880a865b300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.250445] ffff8880a865b380: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 47.257803] ================================================================== [ 47.265138] Disabling lock debugging due to kernel taint [ 47.274381] Kernel panic - not syncing: panic_on_warn set ... [ 47.274381] [ 47.281772] CPU: 0 PID: 7435 Comm: syz-executor955 Tainted: G B 4.14.173-syzkaller #0 [ 47.290858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.300368] Call Trace: [ 47.302953] dump_stack+0x13e/0x194 [ 47.306603] panic+0x1f9/0x42d [ 47.309799] ? add_taint.cold+0x16/0x16 [ 47.313785] ? preempt_schedule_common+0x4a/0xc0 [ 47.318529] ? tcindex_set_parms+0x1521/0x16a0 [ 47.323111] ? ___preempt_schedule+0x16/0x18 [ 47.327604] ? tcindex_set_parms+0x1521/0x16a0 [ 47.332173] kasan_end_report+0x43/0x49 [ 47.336142] kasan_report.cold+0x12f/0x2ae [ 47.341055] tcindex_set_parms+0x1521/0x16a0 [ 47.345450] ? tcindex_alloc_perfect_hash+0x300/0x300 [ 47.350634] ? avc_has_perm_noaudit+0x297/0x400 [ 47.355301] ? nla_parse+0x183/0x240 [ 47.359013] tcindex_change+0x1b5/0x270 [ 47.362985] ? tcindex_set_parms+0x16a0/0x16a0 [ 47.367569] ? tcindex_lookup+0x8c/0x310 [ 47.371625] ? tcindex_set_parms+0x16a0/0x16a0 [ 47.376204] tc_ctl_tfilter+0xf13/0x18e6 [ 47.380250] ? tfilter_notify+0x240/0x240 [ 47.384382] ? mutex_trylock+0x1a0/0x1a0 [ 47.388429] ? rtnetlink_rcv_msg+0x2e8/0xb10 [ 47.392825] ? tfilter_notify+0x240/0x240 [ 47.396961] rtnetlink_rcv_msg+0x3be/0xb10 [ 47.401263] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 47.405918] ? netdev_pick_tx+0x2e0/0x2e0 [ 47.410045] ? skb_clone+0x11c/0x310 [ 47.413742] ? save_trace+0x290/0x290 [ 47.417525] netlink_rcv_skb+0x127/0x370 [ 47.421863] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 47.426434] ? netlink_ack+0x960/0x960 [ 47.430313] netlink_unicast+0x437/0x620 [ 47.434358] ? netlink_attachskb+0x600/0x600 [ 47.438875] netlink_sendmsg+0x733/0xbe0 [ 47.442919] ? netlink_unicast+0x620/0x620 [ 47.447133] ? SYSC_sendto+0x2b0/0x2b0 [ 47.451019] ? security_socket_sendmsg+0x83/0xb0 [ 47.455761] ? netlink_unicast+0x620/0x620 [ 47.459978] sock_sendmsg+0xc5/0x100 [ 47.464211] ___sys_sendmsg+0x70a/0x840 [ 47.468169] ? copy_msghdr_from_user+0x380/0x380 [ 47.472936] ? trace_hardirqs_on+0x10/0x10 [ 47.477158] ? save_trace+0x290/0x290 [ 47.480945] ? find_held_lock+0x2d/0x110 [ 47.484988] ? __might_fault+0x104/0x1b0 [ 47.489032] ? lock_acquire+0x170/0x3f0 [ 47.492988] ? lock_downgrade+0x6e0/0x6e0 [ 47.497128] ? __might_fault+0x177/0x1b0 [ 47.501172] ? _copy_to_user+0x82/0xd0 [ 47.505043] ? __fget_light+0x16a/0x1f0 [ 47.509016] ? sockfd_lookup_light+0xb2/0x160 [ 47.513506] __sys_sendmsg+0xa3/0x120 [ 47.517289] ? SyS_shutdown+0x160/0x160 [ 47.521247] ? up_read+0x17/0x30 [ 47.524595] ? __do_page_fault+0x35b/0xb40 [ 47.529028] SyS_sendmsg+0x27/0x40 [ 47.532546] ? __sys_sendmsg+0x120/0x120 [ 47.536589] do_syscall_64+0x1d5/0x640 [ 47.540472] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 47.545644] RIP: 0033:0x443869 [ 47.548817] RSP: 002b:00007ffd70c9b928 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 47.556508] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443869 [ 47.565860] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 47.573112] RBP: 00007ffd70c9b930 R08: 0000000001bbbbbb R09: 0000000001bbbbbb [ 47.580361] R10: 0000000001bbbbbb R11: 0000000000000246 R12: 00007ffd70c9b940 [ 47.587612] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 47.596243] Kernel Offset: disabled [ 47.599868] Rebooting in 86400 seconds..