[   34.400527] audit: type=1800 audit(1584618674.810:33): pid=7250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0
[   34.428063] audit: type=1800 audit(1584618674.810:34): pid=7250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   37.586321] random: sshd: uninitialized urandom read (32 bytes read)
[   37.782365] audit: type=1400 audit(1584618678.190:35): avc:  denied  { map } for  pid=7422 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[   37.833294] random: sshd: uninitialized urandom read (32 bytes read)
[   38.544737] random: sshd: uninitialized urandom read (32 bytes read)
[   38.733121] random: sshd: uninitialized urandom read (32 bytes read)
Warning: Permanently added '10.128.0.209' (ECDSA) to the list of known hosts.
[   44.260675] random: sshd: uninitialized urandom read (32 bytes read)
[   44.383654] audit: type=1400 audit(1584618684.790:36): avc:  denied  { map } for  pid=7434 comm="syz-executor955" path="/root/syz-executor955497018" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
[   44.621030] IPVS: ftp: loaded support on port[0] = 21
[   45.432160] chnl_net:caif_netlink_parms(): no params data found
[   45.481234] bridge0: port 1(bridge_slave_0) entered blocking state
[   45.487870] bridge0: port 1(bridge_slave_0) entered disabled state
[   45.495137] device bridge_slave_0 entered promiscuous mode
[   45.502866] bridge0: port 2(bridge_slave_1) entered blocking state
[   45.509318] bridge0: port 2(bridge_slave_1) entered disabled state
[   45.516543] device bridge_slave_1 entered promiscuous mode
[   45.534107] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   45.543315] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   45.560372] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   45.567851] team0: Port device team_slave_0 added
[   45.573729] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   45.580989] team0: Port device team_slave_1 added
[   45.595314] batman_adv: batadv0: Adding interface: batadv_slave_0
[   45.601696] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   45.627088] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   45.637956] batman_adv: batadv0: Adding interface: batadv_slave_1
[   45.644290] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   45.671365] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   45.681950] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   45.691005] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   45.752377] device hsr_slave_0 entered promiscuous mode
[   45.820314] device hsr_slave_1 entered promiscuous mode
[   45.860834] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   45.868191] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   45.916961] audit: type=1400 audit(1584618686.320:37): avc:  denied  { create } for  pid=7435 comm="syz-executor955" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   45.936035] bridge0: port 2(bridge_slave_1) entered blocking state
[   45.941979] audit: type=1400 audit(1584618686.320:38): avc:  denied  { write } for  pid=7435 comm="syz-executor955" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   45.947676] bridge0: port 2(bridge_slave_1) entered forwarding state
[   45.971675] audit: type=1400 audit(1584618686.320:39): avc:  denied  { read } for  pid=7435 comm="syz-executor955" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[   45.978613] bridge0: port 1(bridge_slave_0) entered blocking state
[   46.008342] bridge0: port 1(bridge_slave_0) entered forwarding state
[   46.042069] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[   46.048172] 8021q: adding VLAN 0 to HW filter on device bond0
[   46.057288] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   46.066450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   46.085463] bridge0: port 1(bridge_slave_0) entered disabled state
[   46.092705] bridge0: port 2(bridge_slave_1) entered disabled state
[   46.102976] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   46.109149] 8021q: adding VLAN 0 to HW filter on device team0
[   46.131025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   46.138785] bridge0: port 1(bridge_slave_0) entered blocking state
[   46.145265] bridge0: port 1(bridge_slave_0) entered forwarding state
[   46.152095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   46.159644] bridge0: port 2(bridge_slave_1) entered blocking state
[   46.166457] bridge0: port 2(bridge_slave_1) entered forwarding state
[   46.173776] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   46.181518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   46.188989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   46.197448] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   46.206285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   46.215993] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   46.222945] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   46.236535] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[   46.244951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   46.252563] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   46.264453] 8021q: adding VLAN 0 to HW filter on device batadv0
[   46.323963] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready
[   46.334155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   46.368235] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready
[   46.375310] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready
[   46.382767] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready
[   46.392558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   46.400627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   46.408132] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   46.416897] device veth0_vlan entered promiscuous mode
[   46.426149] device veth1_vlan entered promiscuous mode
[   46.432256] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready
[   46.438912] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[   46.447340] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   46.462191] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready
[   46.471503] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready
[   46.478436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   46.486345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   46.495715] device veth0_macvtap entered promiscuous mode
[   46.502329] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready
[   46.510914] device veth1_macvtap entered promiscuous mode
[   46.516968] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready
[   46.525541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready
[   46.536437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready
[   46.545847] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready
[   46.553196] batman_adv: batadv0: Interface activated: batadv_slave_0
[   46.563376] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   46.571002] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   46.578166] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   46.586386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   46.597251] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready
[   46.604680] batman_adv: batadv0: Interface activated: batadv_slave_1
[   46.611947] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   46.619888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[   46.716049] ==================================================================
[   46.723732] BUG: KASAN: use-after-free in tcindex_set_parms+0x1521/0x16a0
[   46.730677] Write of size 16 at addr ffff8880a865b280 by task syz-executor955/7435
[   46.738378] 
[   46.739991] CPU: 0 PID: 7435 Comm: syz-executor955 Not tainted 4.14.173-syzkaller #0
[   46.747863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   46.757231] Call Trace:
[   46.759817]  dump_stack+0x13e/0x194
[   46.763442]  ? tcindex_set_parms+0x1521/0x16a0
[   46.768012]  print_address_description.cold+0x7c/0x1e2
[   46.773273]  ? tcindex_set_parms+0x1521/0x16a0
[   46.777834]  kasan_report.cold+0xa9/0x2ae
[   46.781978]  tcindex_set_parms+0x1521/0x16a0
[   46.786561]  ? tcindex_alloc_perfect_hash+0x300/0x300
[   46.791749]  ? avc_has_perm_noaudit+0x297/0x400
[   46.796430]  ? nla_parse+0x183/0x240
[   46.800136]  tcindex_change+0x1b5/0x270
[   46.804167]  ? tcindex_set_parms+0x16a0/0x16a0
[   46.808755]  ? tcindex_lookup+0x8c/0x310
[   46.812804]  ? tcindex_set_parms+0x16a0/0x16a0
[   46.817377]  tc_ctl_tfilter+0xf13/0x18e6
[   46.821441]  ? tfilter_notify+0x240/0x240
[   46.825577]  ? mutex_trylock+0x1a0/0x1a0
[   46.829750]  ? rtnetlink_rcv_msg+0x2e8/0xb10
[   46.834282]  ? tfilter_notify+0x240/0x240
[   46.838514]  rtnetlink_rcv_msg+0x3be/0xb10
[   46.842858]  ? rtnl_bridge_getlink+0x7a0/0x7a0
[   46.847426]  ? netdev_pick_tx+0x2e0/0x2e0
[   46.851617]  ? skb_clone+0x11c/0x310
[   46.855351]  ? save_trace+0x290/0x290
[   46.859187]  netlink_rcv_skb+0x127/0x370
[   46.863298]  ? rtnl_bridge_getlink+0x7a0/0x7a0
[   46.867866]  ? netlink_ack+0x960/0x960
[   46.871790]  netlink_unicast+0x437/0x620
[   46.875839]  ? netlink_attachskb+0x600/0x600
[   46.880229]  netlink_sendmsg+0x733/0xbe0
[   46.884275]  ? netlink_unicast+0x620/0x620
[   46.888734]  ? SYSC_sendto+0x2b0/0x2b0
[   46.893127]  ? security_socket_sendmsg+0x83/0xb0
[   46.897881]  ? netlink_unicast+0x620/0x620
[   46.902102]  sock_sendmsg+0xc5/0x100
[   46.905807]  ___sys_sendmsg+0x70a/0x840
[   46.909762]  ? copy_msghdr_from_user+0x380/0x380
[   46.914516]  ? trace_hardirqs_on+0x10/0x10
[   46.918815]  ? save_trace+0x290/0x290
[   46.922597]  ? find_held_lock+0x2d/0x110
[   46.926654]  ? __might_fault+0x104/0x1b0
[   46.930699]  ? lock_acquire+0x170/0x3f0
[   46.934654]  ? lock_downgrade+0x6e0/0x6e0
[   46.938787]  ? __might_fault+0x177/0x1b0
[   46.943021]  ? _copy_to_user+0x82/0xd0
[   46.946890]  ? __fget_light+0x16a/0x1f0
[   46.950856]  ? sockfd_lookup_light+0xb2/0x160
[   46.955330]  __sys_sendmsg+0xa3/0x120
[   46.959112]  ? SyS_shutdown+0x160/0x160
[   46.963070]  ? up_read+0x17/0x30
[   46.966415]  ? __do_page_fault+0x35b/0xb40
[   46.970627]  SyS_sendmsg+0x27/0x40
[   46.974169]  ? __sys_sendmsg+0x120/0x120
[   46.978209]  do_syscall_64+0x1d5/0x640
[   46.982080]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[   46.987250] RIP: 0033:0x443869
[   46.990430] RSP: 002b:00007ffd70c9b928 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   46.998252] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443869
[   47.005625] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003
[   47.012889] RBP: 00007ffd70c9b930 R08: 0000000001bbbbbb R09: 0000000001bbbbbb
[   47.020227] R10: 0000000001bbbbbb R11: 0000000000000246 R12: 00007ffd70c9b940
[   47.027498] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[   47.034863] 
[   47.036473] Allocated by task 7435:
[   47.040109]  save_stack+0x32/0xa0
[   47.043698]  kasan_kmalloc+0xbf/0xe0
[   47.047438]  kmem_cache_alloc_trace+0x14d/0x7b0
[   47.052091]  call_usermodehelper_setup+0x6f/0x2e0
[   47.056916]  __request_module+0x35a/0x8eb
[   47.061045]  dev_load+0x166/0x1a0
[   47.064476]  dev_ioctl+0x51e/0xcb0
[   47.067992]  sock_do_ioctl+0x8c/0xa0
[   47.071691]  sock_ioctl+0x28d/0x450
[   47.075318]  do_vfs_ioctl+0x75a/0xfe0
[   47.079110]  SyS_ioctl+0x7f/0xb0
[   47.082455]  do_syscall_64+0x1d5/0x640
[   47.086333]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[   47.091502] 
[   47.093185] Freed by task 7435:
[   47.096512]  save_stack+0x32/0xa0
[   47.099951]  kasan_slab_free+0x75/0xc0
[   47.103818]  kfree+0xcb/0x260
[   47.106908]  call_usermodehelper_exec+0x1f7/0x410
[   47.111736]  __request_module+0x37a/0x8eb
[   47.115874]  dev_load+0x166/0x1a0
[   47.119305]  dev_ioctl+0x51e/0xcb0
[   47.122824]  sock_do_ioctl+0x8c/0xa0
[   47.126520]  sock_ioctl+0x28d/0x450
[   47.130128]  do_vfs_ioctl+0x75a/0xfe0
[   47.133920]  SyS_ioctl+0x7f/0xb0
[   47.137266]  do_syscall_64+0x1d5/0x640
[   47.141149]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[   47.146314] 
[   47.147932] The buggy address belongs to the object at ffff8880a865b240
[   47.147932]  which belongs to the cache kmalloc-128 of size 128
[   47.160714] The buggy address is located 64 bytes inside of
[   47.160714]  128-byte region [ffff8880a865b240, ffff8880a865b2c0)
[   47.172487] The buggy address belongs to the page:
[   47.177448] page:ffffea0002a196c0 count:1 mapcount:0 mapping:ffff8880a865b000 index:0x0
[   47.185586] flags: 0xfffe0000000100(slab)
[   47.189723] raw: 00fffe0000000100 ffff8880a865b000 0000000000000000 0000000100000015
[   47.197585] raw: ffffea00023abc20 ffffea00027b20a0 ffff88812fe56640 0000000000000000
[   47.205456] page dumped because: kasan: bad access detected
[   47.211157] 
[   47.212774] Memory state around the buggy address:
[   47.217683]  ffff8880a865b180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   47.225035]  ffff8880a865b200: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
[   47.232385] >ffff8880a865b280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.239752]                    ^
[   47.243108]  ffff8880a865b300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.250445]  ffff8880a865b380: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
[   47.257803] ==================================================================
[   47.265138] Disabling lock debugging due to kernel taint
[   47.274381] Kernel panic - not syncing: panic_on_warn set ...
[   47.274381] 
[   47.281772] CPU: 0 PID: 7435 Comm: syz-executor955 Tainted: G    B           4.14.173-syzkaller #0
[   47.290858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   47.300368] Call Trace:
[   47.302953]  dump_stack+0x13e/0x194
[   47.306603]  panic+0x1f9/0x42d
[   47.309799]  ? add_taint.cold+0x16/0x16
[   47.313785]  ? preempt_schedule_common+0x4a/0xc0
[   47.318529]  ? tcindex_set_parms+0x1521/0x16a0
[   47.323111]  ? ___preempt_schedule+0x16/0x18
[   47.327604]  ? tcindex_set_parms+0x1521/0x16a0
[   47.332173]  kasan_end_report+0x43/0x49
[   47.336142]  kasan_report.cold+0x12f/0x2ae
[   47.341055]  tcindex_set_parms+0x1521/0x16a0
[   47.345450]  ? tcindex_alloc_perfect_hash+0x300/0x300
[   47.350634]  ? avc_has_perm_noaudit+0x297/0x400
[   47.355301]  ? nla_parse+0x183/0x240
[   47.359013]  tcindex_change+0x1b5/0x270
[   47.362985]  ? tcindex_set_parms+0x16a0/0x16a0
[   47.367569]  ? tcindex_lookup+0x8c/0x310
[   47.371625]  ? tcindex_set_parms+0x16a0/0x16a0
[   47.376204]  tc_ctl_tfilter+0xf13/0x18e6
[   47.380250]  ? tfilter_notify+0x240/0x240
[   47.384382]  ? mutex_trylock+0x1a0/0x1a0
[   47.388429]  ? rtnetlink_rcv_msg+0x2e8/0xb10
[   47.392825]  ? tfilter_notify+0x240/0x240
[   47.396961]  rtnetlink_rcv_msg+0x3be/0xb10
[   47.401263]  ? rtnl_bridge_getlink+0x7a0/0x7a0
[   47.405918]  ? netdev_pick_tx+0x2e0/0x2e0
[   47.410045]  ? skb_clone+0x11c/0x310
[   47.413742]  ? save_trace+0x290/0x290
[   47.417525]  netlink_rcv_skb+0x127/0x370
[   47.421863]  ? rtnl_bridge_getlink+0x7a0/0x7a0
[   47.426434]  ? netlink_ack+0x960/0x960
[   47.430313]  netlink_unicast+0x437/0x620
[   47.434358]  ? netlink_attachskb+0x600/0x600
[   47.438875]  netlink_sendmsg+0x733/0xbe0
[   47.442919]  ? netlink_unicast+0x620/0x620
[   47.447133]  ? SYSC_sendto+0x2b0/0x2b0
[   47.451019]  ? security_socket_sendmsg+0x83/0xb0
[   47.455761]  ? netlink_unicast+0x620/0x620
[   47.459978]  sock_sendmsg+0xc5/0x100
[   47.464211]  ___sys_sendmsg+0x70a/0x840
[   47.468169]  ? copy_msghdr_from_user+0x380/0x380
[   47.472936]  ? trace_hardirqs_on+0x10/0x10
[   47.477158]  ? save_trace+0x290/0x290
[   47.480945]  ? find_held_lock+0x2d/0x110
[   47.484988]  ? __might_fault+0x104/0x1b0
[   47.489032]  ? lock_acquire+0x170/0x3f0
[   47.492988]  ? lock_downgrade+0x6e0/0x6e0
[   47.497128]  ? __might_fault+0x177/0x1b0
[   47.501172]  ? _copy_to_user+0x82/0xd0
[   47.505043]  ? __fget_light+0x16a/0x1f0
[   47.509016]  ? sockfd_lookup_light+0xb2/0x160
[   47.513506]  __sys_sendmsg+0xa3/0x120
[   47.517289]  ? SyS_shutdown+0x160/0x160
[   47.521247]  ? up_read+0x17/0x30
[   47.524595]  ? __do_page_fault+0x35b/0xb40
[   47.529028]  SyS_sendmsg+0x27/0x40
[   47.532546]  ? __sys_sendmsg+0x120/0x120
[   47.536589]  do_syscall_64+0x1d5/0x640
[   47.540472]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[   47.545644] RIP: 0033:0x443869
[   47.548817] RSP: 002b:00007ffd70c9b928 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   47.556508] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443869
[   47.565860] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003
[   47.573112] RBP: 00007ffd70c9b930 R08: 0000000001bbbbbb R09: 0000000001bbbbbb
[   47.580361] R10: 0000000001bbbbbb R11: 0000000000000246 R12: 00007ffd70c9b940
[   47.587612] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[   47.596243] Kernel Offset: disabled
[   47.599868] Rebooting in 86400 seconds..