Warning: Permanently added '10.128.10.33' (ECDSA) to the list of known hosts. [ 72.519417][ T8461] chnl_net:caif_netlink_parms(): no params data found [ 72.573269][ T8461] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.582388][ T8461] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.590986][ T8461] device bridge_slave_0 entered promiscuous mode [ 72.601114][ T8461] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.610307][ T8461] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.618521][ T8461] device bridge_slave_1 entered promiscuous mode [ 72.639099][ T8461] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.650571][ T8461] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.674708][ T8461] team0: Port device team_slave_0 added [ 72.682410][ T8461] team0: Port device team_slave_1 added [ 72.701604][ T8461] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.708680][ T8461] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.735894][ T8461] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.750909][ T8461] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.758451][ T8461] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.785028][ T8461] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.811788][ T8461] device hsr_slave_0 entered promiscuous mode [ 72.818671][ T8461] device hsr_slave_1 entered promiscuous mode [ 72.935213][ T8461] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 72.947107][ T8461] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 72.958089][ T8461] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 72.967925][ T8461] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 72.994351][ T8461] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.002260][ T8461] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.010789][ T8461] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.017977][ T8461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.063477][ T8461] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.076830][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.090001][ T4878] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.100324][ T4878] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.109276][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 73.123926][ T8461] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.139500][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.148445][ T4878] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.155495][ T4878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.163686][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.172731][ T4878] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.179864][ T4878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.197609][ T3321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.212174][ T3321] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 73.220926][ T3321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.235422][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.249173][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.262203][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 73.281852][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 73.289696][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 73.304414][ T8461] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.328198][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.345371][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.354331][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.362962][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.375637][ T8461] device veth0_vlan entered promiscuous mode [ 73.389749][ T8461] device veth1_vlan entered promiscuous mode [ 73.411227][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 73.420211][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 73.429551][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.440784][ T8461] device veth0_macvtap entered promiscuous mode [ 73.453883][ T8461] device veth1_macvtap entered promiscuous mode [ 73.471829][ T8461] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.480440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.491287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 73.504309][ T8461] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.512807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 73.521502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 73.533596][ T8461] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.543730][ T8461] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.553130][ T8461] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.562435][ T8461] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.615687][ T8671] ================================================================== [ 73.624637][ T8671] BUG: KASAN: use-after-free in ipvlan_queue_xmit+0x161a/0x18a0 [ 73.632284][ T8671] Read of size 4 at addr ffff8880201543ff by task syz-executor410/8671 [ 73.640724][ T8671] [ 73.643037][ T8671] CPU: 0 PID: 8671 Comm: syz-executor410 Not tainted 5.13.0-rc1-next-20210512-syzkaller #0 [ 73.653133][ T8671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.664004][ T8671] Call Trace: [ 73.667416][ T8671] dump_stack_lvl+0x13e/0x1d6 [ 73.672290][ T8671] ? ipvlan_queue_xmit+0x161a/0x18a0 [ 73.677675][ T8671] print_address_description.constprop.0.cold+0x6c/0x309 [ 73.684717][ T8671] ? ipvlan_queue_xmit+0x161a/0x18a0 [ 73.690006][ T8671] ? ipvlan_queue_xmit+0x161a/0x18a0 [ 73.695283][ T8671] kasan_report.cold+0x83/0xdf [ 73.700326][ T8671] ? ipvlan_queue_xmit+0x161a/0x18a0 [ 73.705740][ T8671] ipvlan_queue_xmit+0x161a/0x18a0 [ 73.711032][ T8671] ? ipvlan_handle_mode_l3+0x140/0x140 [ 73.716797][ T8671] ? skb_network_protocol+0x148/0x580 [ 73.722481][ T8671] ? skb_crc32c_csum_help+0x70/0x70 [ 73.727996][ T8671] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 73.734118][ T8671] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 73.740372][ T8671] ? validate_xmit_xfrm+0x498/0x1050 [ 73.745662][ T8671] ? netif_skb_features+0x38d/0xb90 [ 73.750874][ T8671] ipvlan_start_xmit+0x45/0x190 [ 73.755720][ T8671] __dev_direct_xmit+0x527/0x730 [ 73.760651][ T8671] ? validate_xmit_skb_list+0x120/0x120 [ 73.766456][ T8671] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 73.772716][ T8671] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.779161][ T8671] ? netdev_pick_tx+0x14f/0xb10 [ 73.784216][ T8671] packet_direct_xmit+0x1a5/0x280 [ 73.789907][ T8671] packet_sendmsg+0x2417/0x5280 [ 73.794779][ T8671] ? aa_sk_perm+0x311/0xab0 [ 73.799366][ T8671] ? packet_create+0xac0/0xac0 [ 73.804143][ T8671] ? aa_af_perm+0x230/0x230 [ 73.808649][ T8671] ? find_held_lock+0x2d/0x110 [ 73.813563][ T8671] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.819814][ T8671] ? packet_create+0xac0/0xac0 [ 73.824581][ T8671] sock_sendmsg+0xcf/0x120 [ 73.829390][ T8671] __sys_sendto+0x21c/0x320 [ 73.834255][ T8671] ? __ia32_sys_getpeername+0xb0/0xb0 [ 73.839622][ T8671] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 73.845765][ T8671] ? __context_tracking_exit+0xb8/0xe0 [ 73.851242][ T8671] ? lock_downgrade+0x6e0/0x6e0 [ 73.856351][ T8671] ? lock_downgrade+0x6e0/0x6e0 [ 73.861352][ T8671] __x64_sys_sendto+0xdd/0x1b0 [ 73.866477][ T8671] ? lockdep_hardirqs_on+0x79/0x100 [ 73.871689][ T8671] ? syscall_enter_from_user_mode+0x27/0x70 [ 73.877583][ T8671] do_syscall_64+0x3a/0xb0 [ 73.882030][ T8671] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 73.888153][ T8671] RIP: 0033:0x443b49 [ 73.892042][ T8671] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 73.911970][ T8671] RSP: 002b:00007ffe05690fc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 73.920555][ T8671] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443b49 [ 73.928611][ T8671] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000004 [ 73.936572][ T8671] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffffffff09 [ 73.944799][ T8671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe05690ff0 [ 73.952784][ T8671] R13: 00000000000f4240 R14: 00000000004b8018 R15: 00000000004004b8 [ 73.961145][ T8671] [ 73.963561][ T8671] Allocated by task 4866: [ 73.967981][ T8671] kasan_save_stack+0x1b/0x40 [ 73.972749][ T8671] __kasan_kmalloc+0x9b/0xd0 [ 73.977328][ T8671] kvmalloc_node+0x61/0xf0 [ 73.981742][ T8671] seq_read_iter+0x79f/0x1220 [ 73.986410][ T8671] kernfs_fop_read_iter+0x44f/0x5f0 [ 73.991613][ T8671] new_sync_read+0x41e/0x6e0 [ 73.996290][ T8671] vfs_read+0x35c/0x570 [ 74.000636][ T8671] ksys_read+0x12d/0x250 [ 74.005515][ T8671] do_syscall_64+0x3a/0xb0 [ 74.010373][ T8671] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.016478][ T8671] [ 74.018794][ T8671] Freed by task 4866: [ 74.023379][ T8671] kasan_save_stack+0x1b/0x40 [ 74.028057][ T8671] kasan_set_track+0x1c/0x30 [ 74.032755][ T8671] kasan_set_free_info+0x20/0x30 [ 74.037689][ T8671] __kasan_slab_free+0xfb/0x130 [ 74.042655][ T8671] slab_free_freelist_hook+0xdf/0x240 [ 74.048138][ T8671] kfree+0xeb/0x650 [ 74.052149][ T8671] kvfree+0x42/0x50 [ 74.055959][ T8671] seq_release+0x4f/0x80 [ 74.060310][ T8671] kernfs_fop_release+0xee/0x190 [ 74.065246][ T8671] __fput+0x288/0x920 [ 74.069234][ T8671] task_work_run+0xdd/0x1a0 [ 74.073755][ T8671] exit_to_user_mode_prepare+0x272/0x280 [ 74.079417][ T8671] syscall_exit_to_user_mode+0x19/0x60 [ 74.084887][ T8671] do_syscall_64+0x47/0xb0 [ 74.089305][ T8671] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.095243][ T8671] [ 74.097754][ T8671] The buggy address belongs to the object at ffff888020154000 [ 74.097754][ T8671] which belongs to the cache kmalloc-4k of size 4096 [ 74.111900][ T8671] The buggy address is located 1023 bytes inside of [ 74.111900][ T8671] 4096-byte region [ffff888020154000, ffff888020155000) [ 74.125685][ T8671] The buggy address belongs to the page: [ 74.131316][ T8671] page:ffffea0000805400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x20150 [ 74.141466][ T8671] head:ffffea0000805400 order:3 compound_mapcount:0 compound_pincount:0 [ 74.149786][ T8671] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 74.157944][ T8671] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff888011042140 [ 74.166698][ T8671] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 74.175275][ T8671] page dumped because: kasan: bad access detected [ 74.181984][ T8671] page_owner tracks the page as allocated [ 74.187698][ T8671] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4866, ts 72933117851, free_ts 72873475504 [ 74.206223][ T8671] get_page_from_freelist+0x1033/0x2b60 [ 74.211779][ T8671] __alloc_pages+0x1b2/0x500 [ 74.216455][ T8671] alloc_pages+0x18c/0x2a0 [ 74.220863][ T8671] allocate_slab+0x2c5/0x4c0 [ 74.225559][ T8671] ___slab_alloc+0x4bd/0x820 [ 74.230142][ T8671] __slab_alloc.constprop.0+0xa7/0xf0 [ 74.235545][ T8671] __kmalloc+0x315/0x330 [ 74.239777][ T8671] tomoyo_realpath_from_path+0xc3/0x620 [ 74.245332][ T8671] tomoyo_check_open_permission+0x272/0x380 [ 74.251219][ T8671] tomoyo_file_open+0xa3/0xd0 [ 74.256098][ T8671] security_file_open+0x52/0x4f0 [ 74.261154][ T8671] do_dentry_open+0x358/0x11c0 [ 74.266008][ T8671] path_openat+0x1c09/0x27d0 [ 74.270588][ T8671] do_filp_open+0x190/0x3d0 [ 74.275175][ T8671] do_sys_openat2+0x16d/0x420 [ 74.279922][ T8671] __x64_sys_open+0x119/0x1c0 [ 74.284621][ T8671] page last free stack trace: [ 74.289533][ T8671] __free_pages_ok+0x4ba/0xd20 [ 74.294320][ T8671] unfreeze_partials+0x17c/0x1d0 [ 74.299262][ T8671] put_cpu_partial+0x13d/0x230 [ 74.304163][ T8671] qlist_free_all+0x5a/0xc0 [ 74.308658][ T8671] kasan_quarantine_reduce+0x180/0x200 [ 74.314200][ T8671] __kasan_slab_alloc+0x8e/0xa0 [ 74.319637][ T8671] kmem_cache_alloc+0x285/0x4a0 [ 74.324520][ T8671] prepare_kernel_cred+0x23/0x800 [ 74.329882][ T8671] call_usermodehelper_exec_async+0x10e/0x580 [ 74.335972][ T8671] ret_from_fork+0x1f/0x30 [ 74.340391][ T8671] [ 74.342838][ T8671] Memory state around the buggy address: [ 74.348460][ T8671] ffff888020154280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.356593][ T8671] ffff888020154300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.364906][ T8671] >ffff888020154380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.372974][ T8671] ^ [ 74.381051][ T8671] ffff888020154400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.389351][ T8671] ffff888020154480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.397622][ T8671] ================================================================== [ 74.405702][ T8671] Disabling lock debugging due to kernel taint [ 74.412082][ T8671] Kernel panic - not syncing: panic_on_warn set ... [ 74.418662][ T8671] CPU: 0 PID: 8671 Comm: syz-executor410 Tainted: G B 5.13.0-rc1-next-20210512-syzkaller #0 [ 74.430157][ T8671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.440335][ T8671] Call Trace: [ 74.443631][ T8671] dump_stack_lvl+0x13e/0x1d6 [ 74.448441][ T8671] ? ipvlan_queue_xmit+0x1600/0x18a0 [ 74.453749][ T8671] panic+0x306/0x73d [ 74.457875][ T8671] ? __warn_printk+0xf3/0xf3 [ 74.462695][ T8671] ? asm_common_interrupt+0x1e/0x40 [ 74.468081][ T8671] ? trace_hardirqs_on+0x38/0x1c0 [ 74.473104][ T8671] ? trace_hardirqs_on+0x51/0x1c0 [ 74.478233][ T8671] ? ipvlan_queue_xmit+0x161a/0x18a0 [ 74.483617][ T8671] ? ipvlan_queue_xmit+0x161a/0x18a0 [ 74.488985][ T8671] end_report.cold+0x5a/0x5a [ 74.493771][ T8671] kasan_report.cold+0x71/0xdf [ 74.498647][ T8671] ? ipvlan_queue_xmit+0x161a/0x18a0 [ 74.503948][ T8671] ipvlan_queue_xmit+0x161a/0x18a0 [ 74.509073][ T8671] ? ipvlan_handle_mode_l3+0x140/0x140 [ 74.514535][ T8671] ? skb_network_protocol+0x148/0x580 [ 74.519913][ T8671] ? skb_crc32c_csum_help+0x70/0x70 [ 74.525245][ T8671] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.531331][ T8671] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 74.537595][ T8671] ? validate_xmit_xfrm+0x498/0x1050 [ 74.542996][ T8671] ? netif_skb_features+0x38d/0xb90 [ 74.548191][ T8671] ipvlan_start_xmit+0x45/0x190 [ 74.553040][ T8671] __dev_direct_xmit+0x527/0x730 [ 74.558199][ T8671] ? validate_xmit_skb_list+0x120/0x120 [ 74.564066][ T8671] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 74.570517][ T8671] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.576782][ T8671] ? netdev_pick_tx+0x14f/0xb10 [ 74.581631][ T8671] packet_direct_xmit+0x1a5/0x280 [ 74.586967][ T8671] packet_sendmsg+0x2417/0x5280 [ 74.591850][ T8671] ? aa_sk_perm+0x311/0xab0 [ 74.596349][ T8671] ? packet_create+0xac0/0xac0 [ 74.601112][ T8671] ? aa_af_perm+0x230/0x230 [ 74.605617][ T8671] ? find_held_lock+0x2d/0x110 [ 74.610388][ T8671] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.616644][ T8671] ? packet_create+0xac0/0xac0 [ 74.621427][ T8671] sock_sendmsg+0xcf/0x120 [ 74.625870][ T8671] __sys_sendto+0x21c/0x320 [ 74.630469][ T8671] ? __ia32_sys_getpeername+0xb0/0xb0 [ 74.635964][ T8671] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.642203][ T8671] ? __context_tracking_exit+0xb8/0xe0 [ 74.647702][ T8671] ? lock_downgrade+0x6e0/0x6e0 [ 74.652559][ T8671] ? lock_downgrade+0x6e0/0x6e0 [ 74.657501][ T8671] __x64_sys_sendto+0xdd/0x1b0 [ 74.662270][ T8671] ? lockdep_hardirqs_on+0x79/0x100 [ 74.667491][ T8671] ? syscall_enter_from_user_mode+0x27/0x70 [ 74.673532][ T8671] do_syscall_64+0x3a/0xb0 [ 74.678052][ T8671] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.683981][ T8671] RIP: 0033:0x443b49 [ 74.687874][ T8671] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 74.707904][ T8671] RSP: 002b:00007ffe05690fc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 74.716329][ T8671] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443b49 [ 74.724298][ T8671] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000004 [ 74.732271][ T8671] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffffffff09 [ 74.740242][ T8671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe05690ff0 [ 74.748336][ T8671] R13: 00000000000f4240 R14: 00000000004b8018 R15: 00000000004004b8 [ 74.759380][ T8671] Kernel Offset: disabled [ 74.763721][ T8671] Rebooting in 86400 seconds..