Warning: Permanently added '10.128.10.33' (ECDSA) to the list of known hosts.
[   72.519417][ T8461] chnl_net:caif_netlink_parms(): no params data found
[   72.573269][ T8461] bridge0: port 1(bridge_slave_0) entered blocking state
[   72.582388][ T8461] bridge0: port 1(bridge_slave_0) entered disabled state
[   72.590986][ T8461] device bridge_slave_0 entered promiscuous mode
[   72.601114][ T8461] bridge0: port 2(bridge_slave_1) entered blocking state
[   72.610307][ T8461] bridge0: port 2(bridge_slave_1) entered disabled state
[   72.618521][ T8461] device bridge_slave_1 entered promiscuous mode
[   72.639099][ T8461] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   72.650571][ T8461] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   72.674708][ T8461] team0: Port device team_slave_0 added
[   72.682410][ T8461] team0: Port device team_slave_1 added
[   72.701604][ T8461] batman_adv: batadv0: Adding interface: batadv_slave_0
[   72.708680][ T8461] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   72.735894][ T8461] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   72.750909][ T8461] batman_adv: batadv0: Adding interface: batadv_slave_1
[   72.758451][ T8461] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   72.785028][ T8461] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   72.811788][ T8461] device hsr_slave_0 entered promiscuous mode
[   72.818671][ T8461] device hsr_slave_1 entered promiscuous mode
[   72.935213][ T8461] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   72.947107][ T8461] netdevsim netdevsim0 netdevsim1: renamed from eth1
[   72.958089][ T8461] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   72.967925][ T8461] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   72.994351][ T8461] bridge0: port 2(bridge_slave_1) entered blocking state
[   73.002260][ T8461] bridge0: port 2(bridge_slave_1) entered forwarding state
[   73.010789][ T8461] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.017977][ T8461] bridge0: port 1(bridge_slave_0) entered forwarding state
[   73.063477][ T8461] 8021q: adding VLAN 0 to HW filter on device bond0
[   73.076830][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   73.090001][ T4878] bridge0: port 1(bridge_slave_0) entered disabled state
[   73.100324][ T4878] bridge0: port 2(bridge_slave_1) entered disabled state
[   73.109276][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[   73.123926][ T8461] 8021q: adding VLAN 0 to HW filter on device team0
[   73.139500][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   73.148445][ T4878] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.155495][ T4878] bridge0: port 1(bridge_slave_0) entered forwarding state
[   73.163686][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   73.172731][ T4878] bridge0: port 2(bridge_slave_1) entered blocking state
[   73.179864][ T4878] bridge0: port 2(bridge_slave_1) entered forwarding state
[   73.197609][ T3321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   73.212174][ T3321] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   73.220926][ T3321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   73.235422][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   73.249173][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   73.262203][ T8461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   73.281852][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   73.289696][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   73.304414][ T8461] 8021q: adding VLAN 0 to HW filter on device batadv0
[   73.328198][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   73.345371][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   73.354331][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   73.362962][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   73.375637][ T8461] device veth0_vlan entered promiscuous mode
[   73.389749][ T8461] device veth1_vlan entered promiscuous mode
[   73.411227][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   73.420211][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   73.429551][ T4878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   73.440784][ T8461] device veth0_macvtap entered promiscuous mode
[   73.453883][ T8461] device veth1_macvtap entered promiscuous mode
[   73.471829][ T8461] batman_adv: batadv0: Interface activated: batadv_slave_0
[   73.480440][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   73.491287][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   73.504309][ T8461] batman_adv: batadv0: Interface activated: batadv_slave_1
[   73.512807][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   73.521502][    T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[   73.533596][ T8461] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   73.543730][ T8461] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   73.553130][ T8461] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   73.562435][ T8461] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   73.615687][ T8671] ==================================================================
[   73.624637][ T8671] BUG: KASAN: use-after-free in ipvlan_queue_xmit+0x161a/0x18a0
[   73.632284][ T8671] Read of size 4 at addr ffff8880201543ff by task syz-executor410/8671
[   73.640724][ T8671] 
[   73.643037][ T8671] CPU: 0 PID: 8671 Comm: syz-executor410 Not tainted 5.13.0-rc1-next-20210512-syzkaller #0
[   73.653133][ T8671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   73.664004][ T8671] Call Trace:
[   73.667416][ T8671]  dump_stack_lvl+0x13e/0x1d6
[   73.672290][ T8671]  ? ipvlan_queue_xmit+0x161a/0x18a0
[   73.677675][ T8671]  print_address_description.constprop.0.cold+0x6c/0x309
[   73.684717][ T8671]  ? ipvlan_queue_xmit+0x161a/0x18a0
[   73.690006][ T8671]  ? ipvlan_queue_xmit+0x161a/0x18a0
[   73.695283][ T8671]  kasan_report.cold+0x83/0xdf
[   73.700326][ T8671]  ? ipvlan_queue_xmit+0x161a/0x18a0
[   73.705740][ T8671]  ipvlan_queue_xmit+0x161a/0x18a0
[   73.711032][ T8671]  ? ipvlan_handle_mode_l3+0x140/0x140
[   73.716797][ T8671]  ? skb_network_protocol+0x148/0x580
[   73.722481][ T8671]  ? skb_crc32c_csum_help+0x70/0x70
[   73.727996][ T8671]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[   73.734118][ T8671]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[   73.740372][ T8671]  ? validate_xmit_xfrm+0x498/0x1050
[   73.745662][ T8671]  ? netif_skb_features+0x38d/0xb90
[   73.750874][ T8671]  ipvlan_start_xmit+0x45/0x190
[   73.755720][ T8671]  __dev_direct_xmit+0x527/0x730
[   73.760651][ T8671]  ? validate_xmit_skb_list+0x120/0x120
[   73.766456][ T8671]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[   73.772716][ T8671]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   73.779161][ T8671]  ? netdev_pick_tx+0x14f/0xb10
[   73.784216][ T8671]  packet_direct_xmit+0x1a5/0x280
[   73.789907][ T8671]  packet_sendmsg+0x2417/0x5280
[   73.794779][ T8671]  ? aa_sk_perm+0x311/0xab0
[   73.799366][ T8671]  ? packet_create+0xac0/0xac0
[   73.804143][ T8671]  ? aa_af_perm+0x230/0x230
[   73.808649][ T8671]  ? find_held_lock+0x2d/0x110
[   73.813563][ T8671]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   73.819814][ T8671]  ? packet_create+0xac0/0xac0
[   73.824581][ T8671]  sock_sendmsg+0xcf/0x120
[   73.829390][ T8671]  __sys_sendto+0x21c/0x320
[   73.834255][ T8671]  ? __ia32_sys_getpeername+0xb0/0xb0
[   73.839622][ T8671]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[   73.845765][ T8671]  ? __context_tracking_exit+0xb8/0xe0
[   73.851242][ T8671]  ? lock_downgrade+0x6e0/0x6e0
[   73.856351][ T8671]  ? lock_downgrade+0x6e0/0x6e0
[   73.861352][ T8671]  __x64_sys_sendto+0xdd/0x1b0
[   73.866477][ T8671]  ? lockdep_hardirqs_on+0x79/0x100
[   73.871689][ T8671]  ? syscall_enter_from_user_mode+0x27/0x70
[   73.877583][ T8671]  do_syscall_64+0x3a/0xb0
[   73.882030][ T8671]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   73.888153][ T8671] RIP: 0033:0x443b49
[   73.892042][ T8671] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[   73.911970][ T8671] RSP: 002b:00007ffe05690fc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[   73.920555][ T8671] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443b49
[   73.928611][ T8671] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000004
[   73.936572][ T8671] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffffffff09
[   73.944799][ T8671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe05690ff0
[   73.952784][ T8671] R13: 00000000000f4240 R14: 00000000004b8018 R15: 00000000004004b8
[   73.961145][ T8671] 
[   73.963561][ T8671] Allocated by task 4866:
[   73.967981][ T8671]  kasan_save_stack+0x1b/0x40
[   73.972749][ T8671]  __kasan_kmalloc+0x9b/0xd0
[   73.977328][ T8671]  kvmalloc_node+0x61/0xf0
[   73.981742][ T8671]  seq_read_iter+0x79f/0x1220
[   73.986410][ T8671]  kernfs_fop_read_iter+0x44f/0x5f0
[   73.991613][ T8671]  new_sync_read+0x41e/0x6e0
[   73.996290][ T8671]  vfs_read+0x35c/0x570
[   74.000636][ T8671]  ksys_read+0x12d/0x250
[   74.005515][ T8671]  do_syscall_64+0x3a/0xb0
[   74.010373][ T8671]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   74.016478][ T8671] 
[   74.018794][ T8671] Freed by task 4866:
[   74.023379][ T8671]  kasan_save_stack+0x1b/0x40
[   74.028057][ T8671]  kasan_set_track+0x1c/0x30
[   74.032755][ T8671]  kasan_set_free_info+0x20/0x30
[   74.037689][ T8671]  __kasan_slab_free+0xfb/0x130
[   74.042655][ T8671]  slab_free_freelist_hook+0xdf/0x240
[   74.048138][ T8671]  kfree+0xeb/0x650
[   74.052149][ T8671]  kvfree+0x42/0x50
[   74.055959][ T8671]  seq_release+0x4f/0x80
[   74.060310][ T8671]  kernfs_fop_release+0xee/0x190
[   74.065246][ T8671]  __fput+0x288/0x920
[   74.069234][ T8671]  task_work_run+0xdd/0x1a0
[   74.073755][ T8671]  exit_to_user_mode_prepare+0x272/0x280
[   74.079417][ T8671]  syscall_exit_to_user_mode+0x19/0x60
[   74.084887][ T8671]  do_syscall_64+0x47/0xb0
[   74.089305][ T8671]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   74.095243][ T8671] 
[   74.097754][ T8671] The buggy address belongs to the object at ffff888020154000
[   74.097754][ T8671]  which belongs to the cache kmalloc-4k of size 4096
[   74.111900][ T8671] The buggy address is located 1023 bytes inside of
[   74.111900][ T8671]  4096-byte region [ffff888020154000, ffff888020155000)
[   74.125685][ T8671] The buggy address belongs to the page:
[   74.131316][ T8671] page:ffffea0000805400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x20150
[   74.141466][ T8671] head:ffffea0000805400 order:3 compound_mapcount:0 compound_pincount:0
[   74.149786][ T8671] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[   74.157944][ T8671] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff888011042140
[   74.166698][ T8671] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000
[   74.175275][ T8671] page dumped because: kasan: bad access detected
[   74.181984][ T8671] page_owner tracks the page as allocated
[   74.187698][ T8671] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4866, ts 72933117851, free_ts 72873475504
[   74.206223][ T8671]  get_page_from_freelist+0x1033/0x2b60
[   74.211779][ T8671]  __alloc_pages+0x1b2/0x500
[   74.216455][ T8671]  alloc_pages+0x18c/0x2a0
[   74.220863][ T8671]  allocate_slab+0x2c5/0x4c0
[   74.225559][ T8671]  ___slab_alloc+0x4bd/0x820
[   74.230142][ T8671]  __slab_alloc.constprop.0+0xa7/0xf0
[   74.235545][ T8671]  __kmalloc+0x315/0x330
[   74.239777][ T8671]  tomoyo_realpath_from_path+0xc3/0x620
[   74.245332][ T8671]  tomoyo_check_open_permission+0x272/0x380
[   74.251219][ T8671]  tomoyo_file_open+0xa3/0xd0
[   74.256098][ T8671]  security_file_open+0x52/0x4f0
[   74.261154][ T8671]  do_dentry_open+0x358/0x11c0
[   74.266008][ T8671]  path_openat+0x1c09/0x27d0
[   74.270588][ T8671]  do_filp_open+0x190/0x3d0
[   74.275175][ T8671]  do_sys_openat2+0x16d/0x420
[   74.279922][ T8671]  __x64_sys_open+0x119/0x1c0
[   74.284621][ T8671] page last free stack trace:
[   74.289533][ T8671]  __free_pages_ok+0x4ba/0xd20
[   74.294320][ T8671]  unfreeze_partials+0x17c/0x1d0
[   74.299262][ T8671]  put_cpu_partial+0x13d/0x230
[   74.304163][ T8671]  qlist_free_all+0x5a/0xc0
[   74.308658][ T8671]  kasan_quarantine_reduce+0x180/0x200
[   74.314200][ T8671]  __kasan_slab_alloc+0x8e/0xa0
[   74.319637][ T8671]  kmem_cache_alloc+0x285/0x4a0
[   74.324520][ T8671]  prepare_kernel_cred+0x23/0x800
[   74.329882][ T8671]  call_usermodehelper_exec_async+0x10e/0x580
[   74.335972][ T8671]  ret_from_fork+0x1f/0x30
[   74.340391][ T8671] 
[   74.342838][ T8671] Memory state around the buggy address:
[   74.348460][ T8671]  ffff888020154280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.356593][ T8671]  ffff888020154300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.364906][ T8671] >ffff888020154380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.372974][ T8671]                                                                 ^
[   74.381051][ T8671]  ffff888020154400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.389351][ T8671]  ffff888020154480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.397622][ T8671] ==================================================================
[   74.405702][ T8671] Disabling lock debugging due to kernel taint
[   74.412082][ T8671] Kernel panic - not syncing: panic_on_warn set ...
[   74.418662][ T8671] CPU: 0 PID: 8671 Comm: syz-executor410 Tainted: G    B             5.13.0-rc1-next-20210512-syzkaller #0
[   74.430157][ T8671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   74.440335][ T8671] Call Trace:
[   74.443631][ T8671]  dump_stack_lvl+0x13e/0x1d6
[   74.448441][ T8671]  ? ipvlan_queue_xmit+0x1600/0x18a0
[   74.453749][ T8671]  panic+0x306/0x73d
[   74.457875][ T8671]  ? __warn_printk+0xf3/0xf3
[   74.462695][ T8671]  ? asm_common_interrupt+0x1e/0x40
[   74.468081][ T8671]  ? trace_hardirqs_on+0x38/0x1c0
[   74.473104][ T8671]  ? trace_hardirqs_on+0x51/0x1c0
[   74.478233][ T8671]  ? ipvlan_queue_xmit+0x161a/0x18a0
[   74.483617][ T8671]  ? ipvlan_queue_xmit+0x161a/0x18a0
[   74.488985][ T8671]  end_report.cold+0x5a/0x5a
[   74.493771][ T8671]  kasan_report.cold+0x71/0xdf
[   74.498647][ T8671]  ? ipvlan_queue_xmit+0x161a/0x18a0
[   74.503948][ T8671]  ipvlan_queue_xmit+0x161a/0x18a0
[   74.509073][ T8671]  ? ipvlan_handle_mode_l3+0x140/0x140
[   74.514535][ T8671]  ? skb_network_protocol+0x148/0x580
[   74.519913][ T8671]  ? skb_crc32c_csum_help+0x70/0x70
[   74.525245][ T8671]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[   74.531331][ T8671]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[   74.537595][ T8671]  ? validate_xmit_xfrm+0x498/0x1050
[   74.542996][ T8671]  ? netif_skb_features+0x38d/0xb90
[   74.548191][ T8671]  ipvlan_start_xmit+0x45/0x190
[   74.553040][ T8671]  __dev_direct_xmit+0x527/0x730
[   74.558199][ T8671]  ? validate_xmit_skb_list+0x120/0x120
[   74.564066][ T8671]  ? __sanitizer_cov_trace_const_cmp1+0x22/0x80
[   74.570517][ T8671]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   74.576782][ T8671]  ? netdev_pick_tx+0x14f/0xb10
[   74.581631][ T8671]  packet_direct_xmit+0x1a5/0x280
[   74.586967][ T8671]  packet_sendmsg+0x2417/0x5280
[   74.591850][ T8671]  ? aa_sk_perm+0x311/0xab0
[   74.596349][ T8671]  ? packet_create+0xac0/0xac0
[   74.601112][ T8671]  ? aa_af_perm+0x230/0x230
[   74.605617][ T8671]  ? find_held_lock+0x2d/0x110
[   74.610388][ T8671]  ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[   74.616644][ T8671]  ? packet_create+0xac0/0xac0
[   74.621427][ T8671]  sock_sendmsg+0xcf/0x120
[   74.625870][ T8671]  __sys_sendto+0x21c/0x320
[   74.630469][ T8671]  ? __ia32_sys_getpeername+0xb0/0xb0
[   74.635964][ T8671]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[   74.642203][ T8671]  ? __context_tracking_exit+0xb8/0xe0
[   74.647702][ T8671]  ? lock_downgrade+0x6e0/0x6e0
[   74.652559][ T8671]  ? lock_downgrade+0x6e0/0x6e0
[   74.657501][ T8671]  __x64_sys_sendto+0xdd/0x1b0
[   74.662270][ T8671]  ? lockdep_hardirqs_on+0x79/0x100
[   74.667491][ T8671]  ? syscall_enter_from_user_mode+0x27/0x70
[   74.673532][ T8671]  do_syscall_64+0x3a/0xb0
[   74.678052][ T8671]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   74.683981][ T8671] RIP: 0033:0x443b49
[   74.687874][ T8671] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[   74.707904][ T8671] RSP: 002b:00007ffe05690fc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[   74.716329][ T8671] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000443b49
[   74.724298][ T8671] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000004
[   74.732271][ T8671] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffffffff09
[   74.740242][ T8671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe05690ff0
[   74.748336][ T8671] R13: 00000000000f4240 R14: 00000000004b8018 R15: 00000000004004b8
[   74.759380][ T8671] Kernel Offset: disabled
[   74.763721][ T8671] Rebooting in 86400 seconds..