[ 52.968142][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.984523][ T8] device veth1_macvtap left promiscuous mode [ 52.991180][ T8] device veth0_macvtap left promiscuous mode [ 52.997605][ T8] device veth1_vlan left promiscuous mode [ 53.003971][ T8] device veth0_vlan left promiscuous mode [ 56.028517][ T8] team0 (unregistering): Port device team_slave_1 removed [ 56.039779][ T8] team0 (unregistering): Port device team_slave_0 removed [ 56.052906][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 56.069481][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 56.116878][ T8] bond0 (unregistering): Released all slaves Warning: Permanently added '10.128.10.55' (ECDSA) to the list of known hosts. 2023/05/12 13:10:13 ignoring optional flag "sandboxArg"="0" 2023/05/12 13:10:14 parsed 1 programs [ 66.591749][ T37] kauditd_printk_skb: 5 callbacks suppressed [ 66.591758][ T37] audit: type=1400 audit(1683897013.992:202): avc: denied { getattr } for pid=5611 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 2023/05/12 13:10:14 executed programs: 0 [ 66.637390][ T37] audit: type=1400 audit(1683897013.992:203): avc: denied { read } for pid=5611 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.683480][ T37] audit: type=1400 audit(1683897013.992:204): avc: denied { open } for pid=5611 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.714808][ T37] audit: type=1400 audit(1683897014.012:205): avc: denied { read } for pid=5611 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.753666][ T37] audit: type=1400 audit(1683897014.012:206): avc: denied { open } for pid=5611 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.781762][ T37] audit: type=1400 audit(1683897014.052:207): avc: denied { mounton } for pid=5636 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.815567][ T37] audit: type=1400 audit(1683897014.052:208): avc: denied { mount } for pid=5636 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.843720][ T37] audit: type=1400 audit(1683897014.052:209): avc: denied { setattr } for pid=5636 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.868770][ T37] audit: type=1400 audit(1683897014.152:210): avc: denied { mounton } for pid=5645 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 66.888373][ T5645] chnl_net:caif_netlink_parms(): no params data found [ 66.932958][ T5645] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.940683][ T5645] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.949012][ T5645] device bridge_slave_0 entered promiscuous mode [ 66.958808][ T5645] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.966096][ T5645] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.974050][ T5645] device bridge_slave_1 entered promiscuous mode [ 66.992666][ T5645] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.004078][ T5645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.023442][ T5645] team0: Port device team_slave_0 added [ 67.030620][ T5645] team0: Port device team_slave_1 added [ 67.044041][ T5645] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.051002][ T5645] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 67.078179][ T5645] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.090318][ T5645] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.098104][ T5645] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 67.124373][ T5645] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.148991][ T5645] device hsr_slave_0 entered promiscuous mode [ 67.155814][ T5645] device hsr_slave_1 entered promiscuous mode [ 68.609457][ T5645] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.619280][ T5645] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.630291][ T5645] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.640193][ T5645] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.709876][ T5645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.723410][ T4836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.734534][ T4836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.744844][ T5645] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.757060][ T5386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.766714][ T5386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.776797][ T5386] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.783950][ T5386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.784790][ T5384] Bluetooth: hci0: command 0x0409 tx timeout [ 68.808771][ T5387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.817782][ T5387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.829924][ T5387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.839676][ T5387] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.846836][ T5387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.856170][ T5387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 68.865449][ T5387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 68.875493][ T5387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 68.884945][ T5387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.894543][ T5387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.902993][ T5387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.918920][ T5645] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 68.932229][ T5645] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.947079][ T5386] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.955470][ T5386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.965810][ T5386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.975506][ T5386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.985963][ T5386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.995294][ T5386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 69.036186][ T37] audit: type=1400 audit(1683897016.442:211): avc: denied { sys_module } for pid=5645 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 69.111571][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 69.119330][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 69.129847][ T5645] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.151762][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 69.164271][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 69.191999][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 69.201805][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.214435][ T5645] device veth0_vlan entered promiscuous mode [ 69.224903][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.233390][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.244114][ T5645] device veth1_vlan entered promiscuous mode [ 69.267231][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 69.279008][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 69.288213][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 69.298213][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.309360][ T5645] device veth0_macvtap entered promiscuous mode [ 69.322263][ T5645] device veth1_macvtap entered promiscuous mode [ 69.340196][ T5645] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 69.349863][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 69.359307][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 69.369549][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.378469][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.391503][ T5645] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 69.400777][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.411430][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.422795][ T5645] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.434520][ T5645] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.445622][ T5645] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.454900][ T5645] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.528754][ T181] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.539401][ T181] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.560860][ T5386] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 69.578017][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.587106][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.602654][ T5383] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 69.709352][ T5802] loop0: detected capacity change from 0 to 4096 [ 69.726800][ T5802] ntfs3: loop0: Different NTFS' sector size and media sector size [ 69.770144][ T5802] ================================================================== [ 69.778484][ T5802] BUG: KASAN: slab-out-of-bounds in ntfs_listxattr+0x32a/0x3c0 [ 69.786082][ T5802] Read of size 1 at addr ffff88802954d2bd by task syz-executor.0/5802 [ 69.794498][ T5802] [ 69.796838][ T5802] CPU: 0 PID: 5802 Comm: syz-executor.0 Not tainted 5.14.0-rc5-syzkaller #0 [ 69.805607][ T5802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 69.815681][ T5802] Call Trace: [ 69.819158][ T5802] dump_stack_lvl+0x57/0x7d [ 69.823708][ T5802] print_address_description.constprop.0.cold+0x6c/0x2d6 [ 69.830747][ T5802] ? ntfs_listxattr+0x32a/0x3c0 [ 69.835778][ T5802] ? ntfs_listxattr+0x32a/0x3c0 [ 69.840637][ T5802] kasan_report.cold+0x83/0xdf [ 69.845409][ T5802] ? ntfs_listxattr+0x32a/0x3c0 [ 69.850355][ T5802] ntfs_listxattr+0x32a/0x3c0 [ 69.855032][ T5802] ? ntfs_permission+0xf0/0xf0 [ 69.859794][ T5802] ? security_inode_listxattr+0x88/0xd0 [ 69.865470][ T5802] listxattr+0xa1/0xf0 [ 69.869546][ T5802] path_listxattr+0x93/0xf0 [ 69.874139][ T5802] ? listxattr+0xf0/0xf0 [ 69.878436][ T5802] ? syscall_enter_from_user_mode+0x21/0x70 [ 69.884337][ T5802] do_syscall_64+0x35/0x80 [ 69.888761][ T5802] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.894663][ T5802] RIP: 0033:0x7ff9cbc4c0d9 [ 69.899251][ T5802] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 69.918862][ T5802] RSP: 002b:00007ff9cafbe168 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3 [ 69.927399][ T5802] RAX: ffffffffffffffda RBX: 00007ff9cbd6bf80 RCX: 00007ff9cbc4c0d9 [ 69.935374][ T5802] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 69.943436][ T5802] RBP: 00007ff9cbca7ae9 R08: 0000000000000000 R09: 0000000000000000 [ 69.951508][ T5802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 69.959864][ T5802] R13: 00007fff1fe2a93f R14: 00007ff9cafbe300 R15: 0000000000022000 [ 69.967844][ T5802] [ 69.970170][ T5802] Allocated by task 5802: [ 69.974868][ T5802] kasan_save_stack+0x1b/0x40 [ 69.979548][ T5802] __kasan_kmalloc+0x98/0xc0 [ 69.984342][ T5802] __kmalloc+0x214/0x4d0 [ 69.988609][ T5802] ntfs_read_ea+0x39c/0x860 [ 69.993198][ T5802] ntfs_listxattr+0x151/0x3c0 [ 69.998057][ T5802] listxattr+0xa1/0xf0 [ 70.002132][ T5802] path_listxattr+0x93/0xf0 [ 70.006930][ T5802] do_syscall_64+0x35/0x80 [ 70.011349][ T5802] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.017241][ T5802] [ 70.019562][ T5802] The buggy address belongs to the object at ffff88802954d280 [ 70.019562][ T5802] which belongs to the cache kmalloc-64 of size 64 [ 70.033474][ T5802] The buggy address is located 61 bytes inside of [ 70.033474][ T5802] 64-byte region [ffff88802954d280, ffff88802954d2c0) [ 70.046663][ T5802] The buggy address belongs to the page: [ 70.052381][ T5802] page:ffffea0000a55340 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2954d [ 70.062533][ T5802] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 70.070269][ T5802] raw: 00fff00000000200 ffffea0000a99a48 ffffea0000726708 ffff888010840200 [ 70.078958][ T5802] raw: 0000000000000000 ffff88802954d000 0000000100000020 0000000000000000 [ 70.087640][ T5802] page dumped because: kasan: bad access detected [ 70.094141][ T5802] page_owner tracks the page as allocated [ 70.099949][ T5802] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2420c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_COMP|__GFP_THISNODE), pid 8, ts 11245018021, free_ts 0 [ 70.117074][ T5802] get_page_from_freelist+0xa72/0x2f80 [ 70.122540][ T5802] __alloc_pages+0x1b2/0x500 [ 70.127312][ T5802] cache_grow_begin+0x75/0x460 [ 70.132163][ T5802] cache_alloc_refill+0x27f/0x380 [ 70.137195][ T5802] kmem_cache_alloc_node_trace+0x4ca/0x5d0 [ 70.143015][ T5802] __kmalloc_node+0x38/0x60 [ 70.147530][ T5802] __vmalloc_node_range+0x531/0x7e0 [ 70.152735][ T5802] copy_process+0x6fc/0x6960 [ 70.157331][ T5802] kernel_clone+0xb8/0x7f0 [ 70.161750][ T5802] kernel_thread+0xa3/0xe0 [ 70.166255][ T5802] call_usermodehelper_exec_work+0xa4/0x140 [ 70.172163][ T5802] process_one_work+0x84c/0x13d0 [ 70.177102][ T5802] worker_thread+0x598/0x1040 [ 70.181784][ T5802] kthread+0x38b/0x460 [ 70.185851][ T5802] ret_from_fork+0x1f/0x30 [ 70.190352][ T5802] page_owner free stack trace missing [ 70.195905][ T5802] [ 70.198234][ T5802] Memory state around the buggy address: [ 70.203859][ T5802] ffff88802954d180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.211923][ T5802] ffff88802954d200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.219993][ T5802] >ffff88802954d280: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc [ 70.228309][ T5802] ^ [ 70.234300][ T5802] ffff88802954d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.242548][ T5802] ffff88802954d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.250613][ T5802] ================================================================== [ 70.258672][ T5802] Disabling lock debugging due to kernel taint [ 70.278844][ T5802] Kernel panic - not syncing: panic_on_warn set ... [ 70.285484][ T5802] CPU: 1 PID: 5802 Comm: syz-executor.0 Tainted: G B 5.14.0-rc5-syzkaller #0 [ 70.295831][ T5802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 [ 70.306164][ T5802] Call Trace: [ 70.309465][ T5802] dump_stack_lvl+0x57/0x7d [ 70.313968][ T5802] panic+0x256/0x4eb [ 70.317864][ T5802] ? __warn_printk+0xee/0xee [ 70.322595][ T5802] ? preempt_schedule_common+0x59/0xc0 [ 70.328232][ T5802] ? ntfs_listxattr+0x32a/0x3c0 [ 70.333086][ T5802] ? preempt_schedule_thunk+0x16/0x18 [ 70.338461][ T5802] ? ntfs_listxattr+0x32a/0x3c0 [ 70.343320][ T5802] ? ntfs_listxattr+0x32a/0x3c0 [ 70.348344][ T5802] end_report.cold+0x5a/0x5a [ 70.352942][ T5802] kasan_report.cold+0x71/0xdf [ 70.357716][ T5802] ? ntfs_listxattr+0x32a/0x3c0 [ 70.362572][ T5802] ntfs_listxattr+0x32a/0x3c0 [ 70.367251][ T5802] ? ntfs_permission+0xf0/0xf0 [ 70.372013][ T5802] ? security_inode_listxattr+0x88/0xd0 [ 70.377559][ T5802] listxattr+0xa1/0xf0 [ 70.381733][ T5802] path_listxattr+0x93/0xf0 [ 70.386242][ T5802] ? listxattr+0xf0/0xf0 [ 70.390482][ T5802] ? syscall_enter_from_user_mode+0x21/0x70 [ 70.396408][ T5802] do_syscall_64+0x35/0x80 [ 70.400823][ T5802] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.406722][ T5802] RIP: 0033:0x7ff9cbc4c0d9 [ 70.411130][ T5802] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 70.431080][ T5802] RSP: 002b:00007ff9cafbe168 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3 [ 70.439664][ T5802] RAX: ffffffffffffffda RBX: 00007ff9cbd6bf80 RCX: 00007ff9cbc4c0d9 [ 70.447739][ T5802] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 70.455707][ T5802] RBP: 00007ff9cbca7ae9 R08: 0000000000000000 R09: 0000000000000000 [ 70.463672][ T5802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 70.471732][ T5802] R13: 00007fff1fe2a93f R14: 00007ff9cafbe300 R15: 0000000000022000 [ 70.480028][ T5802] Kernel Offset: disabled [ 70.484681][ T5802] Rebooting in 86400 seconds..