[ 46.096148][ T75] device bridge_slave_1 left promiscuous mode
[ 46.103835][ T75] bridge0: port 2(bridge_slave_1) entered disabled state
[ 46.114934][ T75] device bridge_slave_0 left promiscuous mode
[ 46.122527][ T75] bridge0: port 1(bridge_slave_0) entered disabled state
[ 46.135089][ T75] device veth1_macvtap left promiscuous mode
[ 46.141913][ T75] device veth0_macvtap left promiscuous mode
[ 46.148659][ T75] device veth1_vlan left promiscuous mode
[ 46.154625][ T75] device veth0_vlan left promiscuous mode
[ 46.230255][ T75] team0 (unregistering): Port device team_slave_1 removed
[ 46.244240][ T75] team0 (unregistering): Port device team_slave_0 removed
Warning: Permanently added '10.128.1.243' (ED25519) to the list of known hosts.
2024/05/31 13:21:35 ignoring optional flag "sandboxArg"="0"
2024/05/31 13:21:36 parsed 1 programs
2024/05/31 13:21:38 executed programs: 0
[ 61.275937][ T3498] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS
[ 61.407600][ T3509] bridge0: port 1(bridge_slave_0) entered blocking state
[ 61.415514][ T3509] bridge0: port 1(bridge_slave_0) entered disabled state
[ 61.424547][ T3509] device bridge_slave_0 entered promiscuous mode
[ 61.432408][ T3509] bridge0: port 2(bridge_slave_1) entered blocking state
[ 61.439688][ T3509] bridge0: port 2(bridge_slave_1) entered disabled state
[ 61.448054][ T3509] device bridge_slave_1 entered promiscuous mode
[ 61.496888][ T3509] team0: Port device team_slave_0 added
[ 61.504360][ T3509] team0: Port device team_slave_1 added
[ 61.557082][ T3509] device hsr_slave_0 entered promiscuous mode
[ 61.564887][ T3509] device hsr_slave_1 entered promiscuous mode
[ 61.898112][ T3509] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 61.907580][ T3509] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 61.918621][ T3509] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 61.929984][ T3509] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 61.948589][ T3509] bridge0: port 2(bridge_slave_1) entered blocking state
[ 61.956327][ T3509] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 61.964643][ T3509] bridge0: port 1(bridge_slave_0) entered blocking state
[ 61.972527][ T3509] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 62.126875][ T3509] 8021q: adding VLAN 0 to HW filter on device team0
[ 62.135503][ T3196] bridge0: port 1(bridge_slave_0) entered disabled state
[ 62.146678][ T3196] bridge0: port 2(bridge_slave_1) entered disabled state
[ 62.156845][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 62.165176][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 62.182490][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 62.191958][ T3196] bridge0: port 1(bridge_slave_0) entered blocking state
[ 62.199431][ T3196] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 62.208365][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 62.218018][ T3196] bridge0: port 2(bridge_slave_1) entered blocking state
[ 62.227518][ T3196] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 62.249703][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 62.258880][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 62.268510][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 62.277440][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 62.287471][ T3509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 62.297095][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 62.613226][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 62.623921][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 62.636509][ T3509] device veth0_vlan entered promiscuous mode
[ 62.644111][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 62.654177][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 62.666213][ T3509] device veth1_vlan entered promiscuous mode
[ 62.675601][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 62.684475][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 62.693257][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 62.712042][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 62.720783][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 62.730144][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 62.739839][ T3509] device veth0_macvtap entered promiscuous mode
[ 62.750854][ T3509] device veth1_macvtap entered promiscuous mode
[ 62.765413][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 62.774440][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 62.783203][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 62.792645][ T3602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 62.805151][ T3509] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 62.817642][ T3509] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 62.828712][ T3509] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 62.840953][ T3509] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 62.853148][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 62.864318][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 62.902673][ T75] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 62.921557][ T75] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 62.930484][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 62.941379][ T917] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 62.953241][ T917] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 62.961519][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 63.002832][ T3709] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 63.026600][ T3713] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 63.049859][ T3716] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 63.080587][ T3719] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 63.106479][ T3723] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 63.140360][ T3728] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 63.169239][ T3732] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 63.192550][ T3736] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 63.228067][ T3740] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 63.259777][ T3743] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[ 63.645027][ C1] ==================================================================
[ 63.653734][ C1] BUG: KASAN: use-after-free in ip_skb_dst_mtu+0xa1d/0xba0
[ 63.661094][ C1] Read of size 1 at addr ffff888073bec012 by task sed/3809
[ 63.668546][ C1]
[ 63.671058][ C1] CPU: 1 PID: 3809 Comm: sed Not tainted 5.15.160-syzkaller #0
[ 63.679057][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
[ 63.689634][ C1] Call Trace:
[ 63.693021][ C1]
[ 63.695904][ C1] dump_stack_lvl+0x8e/0xdd
[ 63.701037][ C1] print_address_description.constprop.0.cold+0x6c/0x309
[ 63.708601][ C1] ? ip_skb_dst_mtu+0xa1d/0xba0
[ 63.713914][ C1] ? ip_skb_dst_mtu+0xa1d/0xba0
[ 63.719111][ C1] kasan_report.cold+0x83/0xdf
[ 63.724482][ C1] ? ip_skb_dst_mtu+0xa1d/0xba0
[ 63.729816][ C1] ip_skb_dst_mtu+0xa1d/0xba0
[ 63.734902][ C1] ? ip_finish_output2+0x1aa0/0x1aa0
[ 63.740270][ C1] ? nf_nat_ipv4_out+0xbe/0x4f0
[ 63.745115][ C1] __ip_finish_output.part.0+0x23/0x350
[ 63.750933][ C1] ip_output+0x365/0x710
[ 63.755181][ C1] ? ip_finish_output+0x2d0/0x2d0
[ 63.760639][ C1] ? ip_route_output_key_hash_rcu+0x2ca0/0x2ca0
[ 63.767054][ C1] ? unwind_next_frame+0x2ad/0x1ce0
[ 63.772337][ C1] ? arch_stack_walk+0x7d/0xe0
[ 63.777878][ C1] ? __do_sys_kcmp+0x5d4/0xde0
[ 63.782842][ C1] ? __ip_finish_output.part.0+0x350/0x350
[ 63.789106][ C1] ? vfs_statx+0x142/0x390
[ 63.794331][ C1] ? __do_sys_newfstatat+0x96/0x120
[ 63.799836][ C1] ? do_syscall_64+0x33/0xb0
[ 63.804505][ C1] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 63.810824][ C1] ip_local_out+0xaf/0x150
[ 63.816412][ C1] ipvlan_process_v4_outbound+0x41d/0x520
[ 63.822573][ C1] ? ipvlan_route_v6_outbound+0x4f0/0x4f0
[ 63.829800][ C1] ? __sanitizer_cov_trace_switch+0x45/0x70
[ 63.838388][ C1] ? ipvlan_get_L3_hdr+0x81/0xa10
[ 63.845118][ C1] ipvlan_queue_xmit+0xbaa/0xfb0
[ 63.850957][ C1] ? ipvlan_handle_mode_l3+0x140/0x140
[ 63.858941][ C1] ? validate_xmit_xfrm+0x436/0x10b0
[ 63.865214][ C1] ? netif_skb_features+0x39d/0xd00
[ 63.871264][ C1] ipvlan_start_xmit+0x45/0x140
[ 63.876799][ C1] dev_hard_start_xmit+0x1c5/0x6f0
[ 63.882979][ C1] sch_direct_xmit+0x19f/0xbe0
[ 63.888136][ C1] ? ktime_get+0x115/0x360
[ 63.895861][ C1] ? ktime_get+0x291/0x360
[ 63.902376][ C1] ? dev_watchdog+0xbf0/0xbf0
[ 63.908531][ C1] ? qdisc_dequeue_head+0x22f/0x330
[ 63.914690][ C1] ? tbf_dequeue+0x9d8/0xdf0
[ 63.920894][ C1] __qdisc_run+0x4a0/0x15a0
[ 63.926523][ C1] ? lock_acquire+0x11a/0x250
[ 63.931654][ C1] net_tx_action+0x65f/0x930
[ 63.936779][ C1] __do_softirq+0x1fd/0x5e5
[ 63.942226][ C1] irq_exit_rcu+0xde/0x120
[ 63.947115][ C1] sysvec_apic_timer_interrupt+0x6f/0x90
[ 63.952777][ C1]
[ 63.955819][ C1]
[ 63.958857][ C1] asm_sysvec_apic_timer_interrupt+0x16/0x20
[ 63.966063][ C1] RIP: 0010:step_into+0x169/0x1dd0
[ 63.971968][ C1] Code: 89 c5 89 85 20 ff ff ff 41 81 e5 00 00 07 00 44 89 ee e8 3a ec b0 ff 45 85 ed 0f 85 a5 01 00 00 e8 2c f3 b0 ff e8 27 f3 b0 ff <4c> 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 0f b6 04 02 84
[ 63.994291][ C1] RSP: 0018:ffffc90002de79d0 EFLAGS: 00000293
[ 64.000448][ C1] RAX: 0000000000000000 RBX: ffffc90002de7c40 RCX: ffffffff81b15fc6
[ 64.008848][ C1] RDX: ffff88806da70000 RSI: ffffffff81b15fd9 RDI: 0000000000000005
[ 64.018018][ C1] RBP: ffffc90002de7ac8 R08: 0000000000000002 R09: ffff888013edc948
[ 64.026783][ C1] R10: 0000000000000000 R11: ffffffff8a0e0388 R12: ffff888013edc8d0
[ 64.034968][ C1] R13: 0000000000000000 R14: 0000000000000040 R15: 0000000000000141
[ 64.043479][ C1] ? step_into+0x156/0x1dd0
[ 64.048243][ C1] ? step_into+0x169/0x1dd0
[ 64.052791][ C1] ? vfs_rename+0x1680/0x1680
[ 64.058130][ C1] ? try_to_unlazy_next+0x310/0x310
[ 64.063980][ C1] path_openat+0x49c/0x28e0
[ 64.068492][ C1] ? __do_fast_syscall_32+0x70/0xe0
[ 64.073969][ C1] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 64.081079][ C1] ? path_lookupat+0x780/0x780
[ 64.087654][ C1] ? find_held_lock+0x2d/0x110
[ 64.093781][ C1] ? __virt_addr_valid+0x224/0x320
[ 64.100280][ C1] do_filp_open+0x1aa/0x400
[ 64.106400][ C1] ? may_open_dev+0xf0/0xf0
[ 64.112736][ C1] ? _find_next_bit+0x1e5/0x260
[ 64.118165][ C1] ? _raw_spin_unlock+0x1a/0x30
[ 64.124222][ C1] ? alloc_fd+0x232/0x5a0
[ 64.128833][ C1] do_sys_openat2+0x16d/0x4d0
[ 64.135697][ C1] ? build_open_flags+0x6f0/0x6f0
[ 64.142808][ C1] ? lock_downgrade+0x4f0/0x4f0
[ 64.151153][ C1] __x64_sys_openat+0x13f/0x1f0
[ 64.158435][ C1] ? __ia32_sys_open+0x1c0/0x1c0
[ 64.165517][ C1] ? vtime_user_exit+0xde/0x180
[ 64.171210][ C1] ? trace_user_exit.constprop.0+0x111/0x120
[ 64.178351][ C1] do_syscall_64+0x33/0xb0
[ 64.183792][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 64.190292][ C1] RIP: 0033:0x7f847bd40a46
[ 64.195359][ C1] Code: 10 00 00 00 44 8b 54 24 e0 48 89 44 24 c0 48 8d 44 24 d0 48 89 44 24 c8 44 89 c2 4c 89 ce bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 76 0c f7 d8 89 05 0a 48 01 00 48 83 c8 ff c3 31
[ 64.216691][ C1] RSP: 002b:00007ffc85a57658 EFLAGS: 00000287 ORIG_RAX: 0000000000000101
[ 64.226036][ C1] RAX: ffffffffffffffda RBX: 00007ffc85a578b8 RCX: 00007f847bd40a46
[ 64.234483][ C1] RDX: 0000000000080000 RSI: 00007ffc85a576d0 RDI: 00000000ffffff9c
[ 64.243110][ C1] RBP: 00007ffc85a576c0 R08: 0000000000080000 R09: 00007ffc85a576d0
[ 64.251340][ C1] R10: 0000000000000000 R11: 0000000000000287 R12: 00007ffc85a576d0
[ 64.259318][ C1] R13: 0000000000000009 R14: 00007ffc85a5789f R15: 00000000ffffffff
[ 64.268273][ C1]
[ 64.271607][ C1]
[ 64.273942][ C1] Allocated by task 3804:
[ 64.278799][ C1] kasan_save_stack+0x1b/0x40
[ 64.284254][ C1] __kasan_kmalloc+0x7c/0x90
[ 64.288943][ C1] sk_prot_alloc+0x110/0x290
[ 64.294189][ C1] sk_alloc+0x30/0x4d0
[ 64.298827][ C1] packet_create+0x11d/0xb20
[ 64.303711][ C1] __sock_create+0x2c5/0x540
[ 64.308608][ C1] __sys_socket+0xef/0x200
[ 64.314323][ C1] __x64_sys_socket+0x6f/0xb0
[ 64.319520][ C1] do_syscall_64+0x33/0xb0
[ 64.324494][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 64.330890][ C1]
[ 64.333344][ C1] Freed by task 3809:
[ 64.337956][ C1] kasan_save_stack+0x1b/0x40
[ 64.343231][ C1] kasan_set_track+0x1c/0x30
[ 64.347839][ C1] kasan_set_free_info+0x20/0x30
[ 64.353876][ C1] __kasan_slab_free+0xe0/0x110
[ 64.360163][ C1] kfree+0xd0/0x4e0
[ 64.364673][ C1] __sk_destruct+0x5ce/0x820
[ 64.369626][ C1] sk_destruct+0xbd/0xe0
[ 64.374125][ C1] __sk_free+0xef/0x3d0
[ 64.378424][ C1] sock_wfree+0x129/0x230
[ 64.385075][ C1] ip_defrag+0x12c/0x2600
[ 64.389606][ C1] ipv4_conntrack_defrag+0x488/0x5c0
[ 64.395005][ C1] nf_hook_slow+0xc5/0x1f0
[ 64.399769][ C1] __ip_local_out+0x366/0x620
[ 64.404496][ C1] ip_local_out+0x26/0x150
[ 64.408948][ C1] ipvlan_process_v4_outbound+0x41d/0x520
[ 64.415109][ C1] ipvlan_queue_xmit+0xbaa/0xfb0
[ 64.420043][ C1] ipvlan_start_xmit+0x45/0x140
[ 64.424884][ C1] dev_hard_start_xmit+0x1c5/0x6f0
[ 64.429988][ C1] sch_direct_xmit+0x19f/0xbe0
[ 64.434766][ C1] __qdisc_run+0x4a0/0x15a0
[ 64.439255][ C1] net_tx_action+0x65f/0x930
[ 64.443834][ C1] __do_softirq+0x1fd/0x5e5
[ 64.448360][ C1]
[ 64.450683][ C1] The buggy address belongs to the object at ffff888073bec000
[ 64.450683][ C1] which belongs to the cache kmalloc-4k of size 4096
[ 64.464980][ C1] The buggy address is located 18 bytes inside of
[ 64.464980][ C1] 4096-byte region [ffff888073bec000, ffff888073bed000)
[ 64.478419][ C1] The buggy address belongs to the page:
[ 64.484050][ C1] page:ffffea0001cefa00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x73be8
[ 64.494369][ C1] head:ffffea0001cefa00 order:3 compound_mapcount:0 compound_pincount:0
[ 64.502953][ C1] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 64.511531][ C1] raw: 00fff00000010200 0000000000000000 0000000100000001 ffff88800d842140
[ 64.520719][ C1] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000
[ 64.529908][ C1] page dumped because: kasan: bad access detected
[ 64.536979][ C1] page_owner tracks the page as allocated
[ 64.543200][ C1] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 3375, ts 52558527189, free_ts 52291523556
[ 64.565747][ C1] get_page_from_freelist+0x12d1/0x2d40
[ 64.571656][ C1] __alloc_pages+0x1b2/0x440
[ 64.576244][ C1] alloc_pages+0x16f/0x3d0
[ 64.581113][ C1] allocate_slab+0x2eb/0x430
[ 64.586774][ C1] ___slab_alloc+0xa4b/0xfe0
[ 64.592034][ C1] kmem_cache_alloc_trace+0x323/0x370
[ 64.598055][ C1] tomoyo_find_next_domain+0xc7d/0x1f20
[ 64.603977][ C1] tomoyo_bprm_check_security+0x11b/0x180
[ 64.610403][ C1] security_bprm_check+0x45/0xa0
[ 64.615791][ C1] bprm_execve+0x6be/0x1680
[ 64.621703][ C1] do_execveat_common+0x727/0x890
[ 64.627306][ C1] __x64_sys_execve+0x8f/0xc0
[ 64.632325][ C1] do_syscall_64+0x33/0xb0
[ 64.636967][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 64.643318][ C1] page last free stack trace:
[ 64.648250][ C1] free_pcp_prepare+0x379/0x850
[ 64.653265][ C1] free_unref_page+0x19/0x4b0
[ 64.658288][ C1] __unfreeze_partials+0x2b9/0x2d0
[ 64.663492][ C1] qlist_free_all+0x68/0x110
[ 64.668720][ C1] kasan_quarantine_reduce+0x180/0x1f0
[ 64.674870][ C1] __kasan_slab_alloc+0x73/0x80
[ 64.680737][ C1] kmem_cache_alloc+0x223/0x370
[ 64.685704][ C1] getname_flags.part.0+0x50/0x4f0
[ 64.691152][ C1] getname_flags+0x9a/0xe0
[ 64.695846][ C1] user_path_at_empty+0x2b/0x60
[ 64.700884][ C1] vfs_statx+0x142/0x390
[ 64.705707][ C1] __do_sys_newfstatat+0x96/0x120
[ 64.711171][ C1] do_syscall_64+0x33/0xb0
[ 64.716920][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 64.723093][ C1]
[ 64.725617][ C1] Memory state around the buggy address:
[ 64.731228][ C1] ffff888073bebf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 64.739661][ C1] ffff888073bebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 64.748267][ C1] >ffff888073bec000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 64.757320][ C1] ^
[ 64.762321][ C1] ffff888073bec080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 64.770588][ C1] ffff888073bec100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 64.779004][ C1] ==================================================================
[ 64.787353][ C1] Disabling lock debugging due to kernel taint
[ 64.794040][ C1] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 64.802046][ C1] Kernel Offset: disabled
[ 64.806643][ C1] Rebooting in 86400 seconds..