Warning: Permanently added '[localhost]:62294' (ED25519) to the list of known hosts. 2025/10/26 09:15:04 ignoring optional flag "type"="qemu" 2025/10/26 09:15:04 parsed 1 programs [ 65.889985][ T40] kauditd_printk_skb: 28 callbacks suppressed [ 65.889997][ T40] audit: type=1400 audit(1761470104.556:102): avc: denied { getattr } for pid=6028 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.964316][ T40] audit: type=1400 audit(1761470104.636:103): avc: denied { unlink } for pid=6035 comm="syz-executor" name="swap-file" dev="sda1" ino=2027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.087001][ T6035] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2025/10/26 09:15:05 executed programs: 0 [ 67.138834][ T5292] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 67.142915][ T5292] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 67.146439][ T5292] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 67.149806][ T5292] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 67.152859][ T5292] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 67.240671][ T6041] chnl_net:caif_netlink_parms(): no params data found [ 67.315054][ T6041] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.317408][ T6041] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.319689][ T6041] bridge_slave_0: entered allmulticast mode [ 67.322717][ T6041] bridge_slave_0: entered promiscuous mode [ 67.326468][ T6041] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.328751][ T6041] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.330993][ T6041] bridge_slave_1: entered allmulticast mode [ 67.333903][ T6041] bridge_slave_1: entered promiscuous mode [ 67.366213][ T6041] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.370874][ T6041] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.403220][ T6041] team0: Port device team_slave_0 added [ 67.406432][ T6041] team0: Port device team_slave_1 added [ 67.438966][ T6041] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.441352][ T6041] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.449398][ T6041] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.454397][ T6041] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.456613][ T6041] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.465104][ T6041] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.474393][ T40] audit: type=1400 audit(1761470106.146:104): avc: denied { search } for pid=6051 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 67.481475][ T40] audit: type=1400 audit(1761470106.146:105): avc: denied { search } for pid=6051 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=1897 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 67.490431][ T40] audit: type=1400 audit(1761470106.146:106): avc: denied { search } for pid=6051 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1901 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 67.499394][ T40] audit: type=1400 audit(1761470106.146:107): avc: denied { search } for pid=6051 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=1902 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 67.508339][ T40] audit: type=1400 audit(1761470106.156:108): avc: denied { read open } for pid=6052 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1902 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 67.518568][ T40] audit: type=1400 audit(1761470106.156:109): avc: denied { getattr } for pid=6052 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1902 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 67.528205][ T40] audit: type=1400 audit(1761470106.166:110): avc: denied { add_name } for pid=6051 comm="dhcpcd-run-hook" name="resolv.conf.eth2.ipv4ll" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 67.545956][ T6041] hsr_slave_0: entered promiscuous mode [ 67.549122][ T6041] hsr_slave_1: entered promiscuous mode [ 67.556760][ T40] audit: type=1400 audit(1761470106.226:111): avc: denied { remove_name } for pid=6054 comm="rm" name="resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=1985 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 68.117714][ T6041] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.124923][ T6041] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.130950][ T6041] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.135824][ T6041] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.154297][ T6041] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.157365][ T6041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.160622][ T6041] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.163774][ T6041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.204076][ T6041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.217890][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.222199][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.236693][ T6041] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.248861][ T75] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.251208][ T75] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.256195][ T75] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.258992][ T75] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.390326][ T6041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.411463][ T6041] veth0_vlan: entered promiscuous mode [ 68.416929][ T6041] veth1_vlan: entered promiscuous mode [ 68.435793][ T6041] veth0_macvtap: entered promiscuous mode [ 68.439695][ T6041] veth1_macvtap: entered promiscuous mode [ 68.448175][ T6041] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.458881][ T6041] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.467720][ T96] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.471026][ T96] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.475536][ T96] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.479461][ T96] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.652003][ T6104] loop0: detected capacity change from 0 to 32768 [ 68.672624][ T6104] ================================================================== [ 68.676017][ T6104] BUG: KASAN: slab-out-of-bounds in dbAllocBits+0x617/0x630 [ 68.679086][ T6104] Read of size 8 at addr ffff88802a4dceb8 by task syz-executor.0/6104 [ 68.684274][ T6104] [ 68.685323][ T6104] CPU: 0 UID: 0 PID: 6104 Comm: syz-executor.0 Not tainted syzkaller #0 PREEMPT(full) [ 68.685344][ T6104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 [ 68.685354][ T6104] Call Trace: [ 68.685366][ T6104] [ 68.685372][ T6104] dump_stack_lvl+0x116/0x1f0 [ 68.685443][ T6104] print_report+0xcd/0x630 [ 68.685462][ T6104] ? __virt_addr_valid+0x81/0x610 [ 68.685483][ T6104] ? __phys_addr+0xe8/0x180 [ 68.685504][ T6104] ? dbAllocBits+0x617/0x630 [ 68.685525][ T6104] kasan_report+0xe0/0x110 [ 68.685543][ T6104] ? dbAllocBits+0x617/0x630 [ 68.685567][ T6104] dbAllocBits+0x617/0x630 [ 68.685606][ T6104] dbAllocDmap+0x5c/0x110 [ 68.685629][ T6104] dbAlloc+0x79c/0xac0 [ 68.685655][ T6104] ea_get+0xc7d/0x1330 [ 68.685679][ T6104] ? __pfx_ea_get+0x10/0x10 [ 68.685705][ T6104] __jfs_setxattr+0x1eb/0x1030 [ 68.685730][ T6104] ? __pfx___jfs_setxattr+0x10/0x10 [ 68.685756][ T6104] ? posix_acl_to_xattr+0x2d3/0x390 [ 68.685783][ T6104] __jfs_set_acl+0x116/0x1b0 [ 68.685808][ T6104] jfs_set_acl+0x254/0x330 [ 68.685830][ T6104] ? __pfx_jfs_set_acl+0x10/0x10 [ 68.685852][ T6104] ? make_vfsuid+0xec/0x140 [ 68.685874][ T6104] ? vfs_parse_fs_qstr+0x1a0/0x1c0 [ 68.685894][ T6104] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 68.685917][ T6104] ? posix_acl_valid+0x2fb/0x350 [ 68.685940][ T6104] set_posix_acl+0x25f/0x320 [ 68.685965][ T6104] vfs_set_acl+0x5a7/0x930 [ 68.685992][ T6104] do_set_acl+0xd9/0x1a0 [ 68.686016][ T6104] do_setxattr+0xeb/0x180 [ 68.686034][ T6104] filename_setxattr+0x16b/0x1d0 [ 68.686050][ T6104] ? __pfx_filename_setxattr+0x10/0x10 [ 68.686068][ T6104] ? getname_flags.part.0+0x1c5/0x550 [ 68.686094][ T6104] path_setxattrat+0x1de/0x2a0 [ 68.686112][ T6104] ? __pfx_path_setxattrat+0x10/0x10 [ 68.686143][ T6104] ? __pfx___rseq_handle_notify_resume+0x10/0x10 [ 68.686169][ T6104] ? __x64_sys_openat+0x174/0x210 [ 68.686191][ T6104] ? xfd_validate_state+0x61/0x180 [ 68.686219][ T6104] __x64_sys_lsetxattr+0xc9/0x140 [ 68.686235][ T6104] ? do_syscall_64+0x91/0xfa0 [ 68.686260][ T6104] ? lockdep_hardirqs_on+0x7c/0x110 [ 68.686284][ T6104] do_syscall_64+0xcd/0xfa0 [ 68.686309][ T6104] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.686325][ T6104] RIP: 0033:0x7fc9db67dca9 [ 68.686340][ T6104] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 68.686355][ T6104] RSP: 002b:00007fc9dc34d0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 68.686377][ T6104] RAX: ffffffffffffffda RBX: 00007fc9db7abf80 RCX: 00007fc9db67dca9 [ 68.686388][ T6104] RDX: 0000000020000180 RSI: 0000000020000040 RDI: 0000000020000000 [ 68.686398][ T6104] RBP: 00007fc9db6c947e R08: 0000000000000000 R09: 0000000000000000 [ 68.686407][ T6104] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000000 [ 68.686417][ T6104] R13: 000000000000000b R14: 00007fc9db7abf80 R15: 00007ffc37389fc8 [ 68.686433][ T6104] [ 68.686439][ T6104] [ 68.807894][ T6104] The buggy address belongs to the object at ffff88802a4dc000 [ 68.807894][ T6104] which belongs to the cache kmalloc-2k of size 2048 [ 68.813602][ T6104] The buggy address is located 1720 bytes to the right of [ 68.813602][ T6104] allocated 2048-byte region [ffff88802a4dc000, ffff88802a4dc800) [ 68.819622][ T6104] [ 68.820664][ T6104] The buggy address belongs to the physical page: [ 68.823259][ T6104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a4d8 [ 68.826884][ T6104] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 68.830391][ T6104] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 68.833567][ T6104] page_type: f5(slab) [ 68.835186][ T6104] raw: 00fff00000000040 ffff88801b442f00 dead000000000122 0000000000000000 [ 68.838718][ T6104] raw: 0000000000000000 0000000080080008 00000000f5000000 0000000000000000 [ 68.842226][ T6104] head: 00fff00000000040 ffff88801b442f00 dead000000000122 0000000000000000 [ 68.845842][ T6104] head: 0000000000000000 0000000080080008 00000000f5000000 0000000000000000 [ 68.849441][ T6104] head: 00fff00000000003 ffffea0000a93601 00000000ffffffff 00000000ffffffff [ 68.852843][ T6104] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 68.856488][ T6104] page dumped because: kasan: bad access detected [ 68.859198][ T6104] page_owner tracks the page as allocated [ 68.861578][ T6104] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 6104, tgid 6102 (syz-executor.0), ts 68655362326, free_ts 68527326574 [ 68.869969][ T6104] post_alloc_hook+0x1c0/0x230 [ 68.872018][ T6104] get_page_from_freelist+0x10a3/0x3a30 [ 68.874343][ T6104] __alloc_frozen_pages_noprof+0x25f/0x2470 [ 68.876811][ T6104] alloc_pages_mpol+0x1fb/0x550 [ 68.878872][ T6104] new_slab+0x24a/0x360 [ 68.880647][ T6104] ___slab_alloc+0xdae/0x1a60 [ 68.882642][ T6104] __slab_alloc.constprop.0+0x63/0x110 [ 68.884962][ T6104] __kmalloc_node_track_caller_noprof+0x4db/0x8a0 [ 68.887667][ T6104] kmalloc_reserve+0xef/0x2c0 [ 68.889461][ T6104] __alloc_skb+0x166/0x380 [ 68.890880][ T6104] audit_log_start+0x34e/0x950 [ 68.892465][ T6104] common_lsm_audit+0xb2/0x300 [ 68.894358][ T6104] slow_avc_audit+0x186/0x210 [ 68.896277][ T6104] avc_has_perm+0x1b5/0x1f0 [ 68.898226][ T6104] inode_has_perm+0x168/0x1d0 [ 68.900037][ T6104] selinux_mount+0x384/0x460 [ 68.901899][ T6104] page last free pid 6043 tgid 6043 stack trace: [ 68.904344][ T6104] __free_frozen_pages+0x7df/0x1160 [ 68.906050][ T6104] __put_partials+0x130/0x170 [ 68.907545][ T6104] qlist_free_all+0x4d/0x120 [ 68.909120][ T6104] kasan_quarantine_reduce+0x195/0x1e0 [ 68.910831][ T6104] __kasan_slab_alloc+0x69/0x90 [ 68.912476][ T6104] kmem_cache_alloc_noprof+0x250/0x6e0 [ 68.914354][ T6104] getname_flags.part.0+0x4c/0x550 [ 68.916022][ T6104] getname_flags+0x93/0xf0 [ 68.917446][ T6104] do_sys_openat2+0xb8/0x1d0 [ 68.918912][ T6104] __x64_sys_openat+0x174/0x210 [ 68.920650][ T6104] do_syscall_64+0xcd/0xfa0 [ 68.922118][ T6104] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.924320][ T6104] [ 68.925118][ T6104] Memory state around the buggy address: [ 68.926930][ T6104] ffff88802a4dcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.929358][ T6104] ffff88802a4dce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.932596][ T6104] >ffff88802a4dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.935273][ T6104] ^ [ 68.937522][ T6104] ffff88802a4dcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.940707][ T6104] ffff88802a4dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.943843][ T6104] ================================================================== [ 68.948480][ T6104] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 68.950709][ T6104] CPU: 3 UID: 0 PID: 6104 Comm: syz-executor.0 Not tainted syzkaller #0 PREEMPT(full) [ 68.954248][ T6104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 [ 68.958367][ T6104] Call Trace: [ 68.959417][ T6104] [ 68.960335][ T6104] dump_stack_lvl+0x3d/0x1f0 [ 68.961907][ T6104] vpanic+0x640/0x6f0 [ 68.963485][ T6104] panic+0xca/0xd0 [ 68.964958][ T6104] ? __pfx_panic+0x10/0x10 [ 68.966453][ T6104] ? dbAllocBits+0x617/0x630 [ 68.968052][ T6104] ? preempt_schedule_common+0x44/0xc0 [ 68.969842][ T6104] ? preempt_schedule_thunk+0x16/0x30 [ 68.971500][ T6104] ? check_panic_on_warn+0x1f/0xb0 [ 68.973119][ T6104] check_panic_on_warn+0xab/0xb0 [ 68.974914][ T6104] end_report+0x107/0x170 [ 68.976333][ T6104] kasan_report+0xee/0x110 [ 68.978074][ T6104] ? dbAllocBits+0x617/0x630 [ 68.979976][ T6104] dbAllocBits+0x617/0x630 [ 68.981753][ T6104] dbAllocDmap+0x5c/0x110 [ 68.983134][ T6104] dbAlloc+0x79c/0xac0 [ 68.984554][ T6104] ea_get+0xc7d/0x1330 [ 68.985813][ T6104] ? __pfx_ea_get+0x10/0x10 [ 68.987219][ T6104] __jfs_setxattr+0x1eb/0x1030 [ 68.988767][ T6104] ? __pfx___jfs_setxattr+0x10/0x10 [ 68.990836][ T6104] ? posix_acl_to_xattr+0x2d3/0x390 [ 68.993065][ T6104] __jfs_set_acl+0x116/0x1b0 [ 68.995061][ T6104] jfs_set_acl+0x254/0x330 [ 68.996938][ T6104] ? __pfx_jfs_set_acl+0x10/0x10 [ 68.999012][ T6104] ? make_vfsuid+0xec/0x140 [ 69.000926][ T6104] ? vfs_parse_fs_qstr+0x1a0/0x1c0 [ 69.003065][ T6104] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 69.005540][ T6104] ? posix_acl_valid+0x2fb/0x350 [ 69.007616][ T6104] set_posix_acl+0x25f/0x320 [ 69.009577][ T6104] vfs_set_acl+0x5a7/0x930 [ 69.011474][ T6104] do_set_acl+0xd9/0x1a0 [ 69.013235][ T6104] do_setxattr+0xeb/0x180 [ 69.014905][ T6104] filename_setxattr+0x16b/0x1d0 [ 69.016845][ T6104] ? __pfx_filename_setxattr+0x10/0x10 [ 69.018966][ T6104] ? getname_flags.part.0+0x1c5/0x550 [ 69.021040][ T6104] path_setxattrat+0x1de/0x2a0 [ 69.022940][ T6104] ? __pfx_path_setxattrat+0x10/0x10 [ 69.024606][ T6104] ? __pfx___rseq_handle_notify_resume+0x10/0x10 [ 69.026531][ T6104] ? __x64_sys_openat+0x174/0x210 [ 69.028079][ T6104] ? xfd_validate_state+0x61/0x180 [ 69.029692][ T6104] __x64_sys_lsetxattr+0xc9/0x140 [ 69.031275][ T6104] ? do_syscall_64+0x91/0xfa0 [ 69.032836][ T6104] ? lockdep_hardirqs_on+0x7c/0x110 [ 69.034454][ T6104] do_syscall_64+0xcd/0xfa0 [ 69.035836][ T6104] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.037703][ T6104] RIP: 0033:0x7fc9db67dca9 [ 69.039096][ T6104] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 69.045683][ T6104] RSP: 002b:00007fc9dc34d0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 69.048182][ T6104] RAX: ffffffffffffffda RBX: 00007fc9db7abf80 RCX: 00007fc9db67dca9 [ 69.050534][ T6104] RDX: 0000000020000180 RSI: 0000000020000040 RDI: 0000000020000000 [ 69.052993][ T6104] RBP: 00007fc9db6c947e R08: 0000000000000000 R09: 0000000000000000 [ 69.055663][ T6104] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000000 [ 69.058270][ T6104] R13: 000000000000000b R14: 00007fc9db7abf80 R15: 00007ffc37389fc8 [ 69.061065][ T6104] [ 69.063118][ T6104] Kernel Offset: disabled [ 69.064667][ T6104] Rebooting in 86400 seconds..