[ 71.418828][ T1423] ieee802154 phy0 wpan0: encryption failed: -22
[ 71.425838][ T1423] ieee802154 phy1 wpan1: encryption failed: -22
Warning: Permanently added '10.128.10.3' (ED25519) to the list of known hosts.
2025/10/14 03:55:59 ignoring optional flag "type"="gce"
2025/10/14 03:55:59 parsed 1 programs
2025/10/14 03:55:59 executed programs: 0
[ 74.780002][ T4436] chnl_net:caif_netlink_parms(): no params data found
[ 74.817076][ T4436] bridge0: port 1(bridge_slave_0) entered blocking state
[ 74.824709][ T4436] bridge0: port 1(bridge_slave_0) entered disabled state
[ 74.834062][ T4436] device bridge_slave_0 entered promiscuous mode
[ 74.842690][ T4436] bridge0: port 2(bridge_slave_1) entered blocking state
[ 74.850914][ T4436] bridge0: port 2(bridge_slave_1) entered disabled state
[ 74.859163][ T4436] device bridge_slave_1 entered promiscuous mode
[ 74.878661][ T4436] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 74.893547][ T4436] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 74.927390][ T4436] team0: Port device team_slave_0 added
[ 74.936734][ T4436] team0: Port device team_slave_1 added
[ 74.960926][ T4436] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 74.968607][ T4436] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 74.995937][ T4436] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 75.008821][ T4436] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 75.016098][ T4436] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 75.045196][ T4436] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 75.083236][ T4436] device hsr_slave_0 entered promiscuous mode
[ 75.091190][ T4436] device hsr_slave_1 entered promiscuous mode
[ 75.549745][ T4436] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 75.561085][ T4436] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 75.570887][ T4436] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 75.580912][ T4436] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 75.604340][ T4436] bridge0: port 2(bridge_slave_1) entered blocking state
[ 75.611650][ T4436] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 75.619329][ T4436] bridge0: port 1(bridge_slave_0) entered blocking state
[ 75.626909][ T4436] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 75.681177][ T4436] 8021q: adding VLAN 0 to HW filter on device bond0
[ 75.697626][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 75.708181][ T144] bridge0: port 1(bridge_slave_0) entered disabled state
[ 75.716909][ T144] bridge0: port 2(bridge_slave_1) entered disabled state
[ 75.725487][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 75.740479][ T4436] 8021q: adding VLAN 0 to HW filter on device team0
[ 75.752977][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 75.762122][ T144] bridge0: port 1(bridge_slave_0) entered blocking state
[ 75.769736][ T144] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 75.788412][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 75.799503][ T144] bridge0: port 2(bridge_slave_1) entered blocking state
[ 75.807116][ T144] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 75.829321][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[ 75.840597][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[ 75.852260][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 75.862725][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 75.874538][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 75.890664][ T4436] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 75.904992][ T4436] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 75.918760][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 75.928593][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 75.937247][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 75.946844][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 75.955563][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 75.972357][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 76.080816][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 76.089375][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 76.103583][ T4436] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 76.128211][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 76.138092][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 76.158039][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 76.167450][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 76.180258][ T4436] device veth0_vlan entered promiscuous mode
[ 76.190764][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 76.201469][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 76.219063][ T4436] device veth1_vlan entered promiscuous mode
[ 76.242155][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 76.253437][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 76.263457][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 76.274271][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 76.286811][ T4436] device veth0_macvtap entered promiscuous mode
[ 76.298111][ T4436] device veth1_macvtap entered promiscuous mode
[ 76.316626][ T4436] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 76.324741][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 76.333949][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 76.343809][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 76.352939][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 76.367997][ T4436] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 76.377492][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 76.387288][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 76.400429][ T4436] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 76.410687][ T4436] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 76.421331][ T4436] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 76.431313][ T4436] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 76.530191][ T4535] loop0: detected capacity change from 0 to 2048
[ 76.566818][ T4535] UDF-fs: error (device loop0): udf_read_tagged: tag checksum failed, block 99: 0x27 != 0x4d
[ 76.606886][ T4535] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000)
[ 76.702340][ T4436] ==================================================================
[ 76.711283][ T4436] BUG: KASAN: use-after-free in crc_itu_t+0x1f5/0x280
[ 76.718375][ T4436] Read of size 1 at addr ffff8880746d8000 by task syz-executor.0/4436
[ 76.726615][ T4436]
[ 76.729168][ T4436] CPU: 0 PID: 4436 Comm: syz-executor.0 Not tainted syzkaller #0
[ 76.737175][ T4436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
[ 76.747661][ T4436] Call Trace:
[ 76.751055][ T4436]
[ 76.754379][ T4436] dump_stack_lvl+0x168/0x230
[ 76.759175][ T4436] ? show_regs_print_info+0x20/0x20
[ 76.764873][ T4436] ? load_image+0x3b0/0x3b0
[ 76.769667][ T4436] ? _raw_spin_lock_irqsave+0xb0/0xf0
[ 76.775170][ T4436] print_address_description+0x60/0x2d0
[ 76.780909][ T4436] ? crc_itu_t+0x1f5/0x280
[ 76.785602][ T4436] kasan_report+0xdf/0x130
[ 76.790282][ T4436] ? crc_itu_t+0x1f5/0x280
[ 76.794807][ T4436] crc_itu_t+0x1f5/0x280
[ 76.799074][ T4436] udf_sync_fs+0x194/0x350
[ 76.803923][ T4436] ? udf_put_super+0x160/0x160
[ 76.806858][ T21] Bluetooth: hci0: command 0x0409 tx timeout
[ 76.809225][ T4436] ? get_nr_dirty_inodes+0x248/0x2d0
[ 76.821236][ T4436] sync_filesystem+0xe6/0x220
[ 76.826241][ T4436] generic_shutdown_super+0x6b/0x300
[ 76.832104][ T4436] kill_block_super+0x7c/0xe0
[ 76.836947][ T4436] deactivate_locked_super+0x93/0xf0
[ 76.842552][ T4436] cleanup_mnt+0x418/0x4d0
[ 76.847338][ T4436] ? lockdep_hardirqs_on+0x94/0x140
[ 76.852562][ T4436] task_work_run+0x125/0x1a0
[ 76.857264][ T4436] exit_to_user_mode_loop+0x10f/0x130
[ 76.862933][ T4436] exit_to_user_mode_prepare+0xee/0x180
[ 76.868771][ T4436] syscall_exit_to_user_mode+0x16/0x40
[ 76.874602][ T4436] do_syscall_64+0x58/0xa0
[ 76.879040][ T4436] ? clear_bhb_loop+0x30/0x80
[ 76.883739][ T4436] ? clear_bhb_loop+0x30/0x80
[ 76.888758][ T4436] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 76.894982][ T4436] RIP: 0033:0x7fc4c1c85c87
[ 76.899860][ T4436] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8
[ 76.921502][ T4436] RSP: 002b:00007fffd37fd7e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 76.931053][ T4436] RAX: 0000000000000000 RBX: 00007fc4c1cdfc5a RCX: 00007fc4c1c85c87
[ 76.939615][ T4436] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007fffd37fd8a0
[ 76.947588][ T4436] RBP: 00007fffd37fd8a0 R08: 0000000000000000 R09: 0000000000000000
[ 76.955724][ T4436] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fffd37fe960
[ 76.963918][ T4436] R13: 00007fc4c1cdfc5a R14: 0000000000012aa5 R15: 0000000000000006
[ 76.972079][ T4436]
[ 76.975086][ T4436]
[ 76.977392][ T4436] Allocated by task 4475:
[ 76.981792][ T4436] __kasan_slab_alloc+0x9c/0xd0
[ 76.986908][ T4436] slab_post_alloc_hook+0x4c/0x380
[ 76.992603][ T4436] kmem_cache_alloc+0x100/0x290
[ 76.997648][ T4436] anon_vma_clone+0xbd/0x4f0
[ 77.002516][ T4436] anon_vma_fork+0x7e/0x500
[ 77.007280][ T4436] copy_mm+0x9e3/0x1380
[ 77.011626][ T4436] copy_process+0x17c6/0x3e00
[ 77.016559][ T4436] kernel_clone+0x219/0x930
[ 77.021390][ T4436] __x64_sys_clone+0x170/0x1c0
[ 77.026135][ T4436] do_syscall_64+0x4c/0xa0
[ 77.030984][ T4436] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 77.037216][ T4436]
[ 77.039742][ T4436] Freed by task 4476:
[ 77.043823][ T4436] kasan_set_track+0x4b/0x70
[ 77.048911][ T4436] kasan_set_free_info+0x1f/0x40
[ 77.054533][ T4436] ____kasan_slab_free+0xd5/0x110
[ 77.059828][ T4436] slab_free_freelist_hook+0xea/0x170
[ 77.065568][ T4436] kmem_cache_free+0x8f/0x210
[ 77.070425][ T4436] unlink_anon_vmas+0x2c8/0x660
[ 77.075539][ T4436] free_pgtables+0x177/0x2a0
[ 77.080324][ T4436] exit_mmap+0x39e/0x5f0
[ 77.084653][ T4436] __mmput+0x115/0x3b0
[ 77.088820][ T4436] exec_mmap+0x4d1/0x5c0
[ 77.093177][ T4436] begin_new_exec+0x7e8/0x1160
[ 77.098051][ T4436] load_elf_binary+0x98e/0x2890
[ 77.103259][ T4436] bprm_execve+0xa92/0x17d0
[ 77.108653][ T4436] do_execveat_common+0x51e/0x6d0
[ 77.114213][ T4436] __x64_sys_execve+0x8e/0xa0
[ 77.119082][ T4436] do_syscall_64+0x4c/0xa0
[ 77.123999][ T4436] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 77.130078][ T4436]
[ 77.132679][ T4436] The buggy address belongs to the object at ffff8880746d8000
[ 77.132679][ T4436] which belongs to the cache anon_vma_chain of size 80
[ 77.147407][ T4436] The buggy address is located 0 bytes inside of
[ 77.147407][ T4436] 80-byte region [ffff8880746d8000, ffff8880746d8050)
[ 77.161304][ T4436] The buggy address belongs to the page:
[ 77.167107][ T4436] page:ffffea0001d1b600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x746d8
[ 77.177897][ T4436] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff)
[ 77.186178][ T4436] raw: 00fff00000000200 ffffea0001d1b7c0 0000000800000008 ffff888140007140
[ 77.195632][ T4436] raw: 0000000000000000 0000000000240024 00000001ffffffff 0000000000000000
[ 77.204302][ T4436] page dumped because: kasan: bad access detected
[ 77.211529][ T4436] page_owner tracks the page as allocated
[ 77.217761][ T4436] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12800(GFP_NOWAIT|__GFP_NOWARN|__GFP_NORETRY), pid 4066, ts 45009630611, free_ts 45004162686
[ 77.234557][ T4436] get_page_from_freelist+0x1b77/0x1c60
[ 77.240396][ T4436] __alloc_pages+0x1e1/0x470
[ 77.245548][ T4436] new_slab+0xc0/0x4b0
[ 77.249932][ T4436] ___slab_alloc+0x81e/0xdf0
[ 77.254794][ T4436] kmem_cache_alloc+0x195/0x290
[ 77.259819][ T4436] anon_vma_clone+0xbd/0x4f0
[ 77.264406][ T4436] anon_vma_fork+0x7e/0x500
[ 77.269067][ T4436] copy_mm+0x9e3/0x1380
[ 77.273464][ T4436] copy_process+0x17c6/0x3e00
[ 77.278299][ T4436] kernel_clone+0x219/0x930
[ 77.283160][ T4436] __x64_sys_clone+0x170/0x1c0
[ 77.289070][ T4436] do_syscall_64+0x4c/0xa0
[ 77.293897][ T4436] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 77.300830][ T4436] page last free stack trace:
[ 77.306716][ T4436] free_unref_page_prepare+0x637/0x6c0
[ 77.313167][ T4436] free_unref_page_list+0x122/0x7e0
[ 77.318635][ T4436] release_pages+0x184b/0x1bb0
[ 77.323383][ T4436] tlb_finish_mmu+0x164/0x2e0
[ 77.328216][ T4436] exit_mmap+0x3a6/0x5f0
[ 77.332440][ T4436] __mmput+0x115/0x3b0
[ 77.336554][ T4436] exit_mm+0x567/0x6c0
[ 77.340732][ T4436] do_exit+0x5a1/0x20a0
[ 77.345076][ T4436] do_group_exit+0x12e/0x300
[ 77.349766][ T4436] __x64_sys_exit_group+0x3b/0x40
[ 77.355153][ T4436] do_syscall_64+0x4c/0xa0
[ 77.359658][ T4436] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 77.367088][ T4436]
[ 77.369653][ T4436] Memory state around the buggy address:
[ 77.375528][ T4436] ffff8880746d7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 77.384658][ T4436] ffff8880746d7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 77.393704][ T4436] >ffff8880746d8000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[ 77.402021][ T4436] ^
[ 77.406077][ T4436] ffff8880746d8080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[ 77.414566][ T4436] ffff8880746d8100: fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb fb
[ 77.423029][ T4436] ==================================================================
[ 77.431288][ T4436] Disabling lock debugging due to kernel taint
[ 77.494415][ T4436] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 77.501938][ T4436] CPU: 1 PID: 4436 Comm: syz-executor.0 Tainted: G B syzkaller #0
[ 77.511670][ T4436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
[ 77.521814][ T4436] Call Trace:
[ 77.525190][ T4436]
[ 77.528150][ T4436] dump_stack_lvl+0x168/0x230
[ 77.533148][ T4436] ? show_regs_print_info+0x20/0x20
[ 77.538545][ T4436] ? load_image+0x3b0/0x3b0
[ 77.543150][ T4436] panic+0x2c9/0x7f0
[ 77.547046][ T4436] ? bpf_jit_dump+0xd0/0xd0
[ 77.551811][ T4436] ? _raw_spin_unlock_irqrestore+0xf6/0x100
[ 77.557910][ T4436] ? _raw_spin_unlock+0x40/0x40
[ 77.562862][ T4436] ? crc_itu_t+0x1f5/0x280
[ 77.567375][ T4436] check_panic_on_warn+0x80/0xa0
[ 77.572409][ T4436] ? crc_itu_t+0x1f5/0x280
[ 77.576835][ T4436] end_report+0x6d/0xf0
[ 77.580999][ T4436] kasan_report+0x102/0x130
[ 77.585818][ T4436] ? crc_itu_t+0x1f5/0x280
[ 77.590337][ T4436] crc_itu_t+0x1f5/0x280
[ 77.595025][ T4436] udf_sync_fs+0x194/0x350
[ 77.599629][ T4436] ? udf_put_super+0x160/0x160
[ 77.604404][ T4436] ? get_nr_dirty_inodes+0x248/0x2d0
[ 77.610137][ T4436] sync_filesystem+0xe6/0x220
[ 77.615004][ T4436] generic_shutdown_super+0x6b/0x300
[ 77.620394][ T4436] kill_block_super+0x7c/0xe0
[ 77.625084][ T4436] deactivate_locked_super+0x93/0xf0
[ 77.630605][ T4436] cleanup_mnt+0x418/0x4d0
[ 77.635034][ T4436] ? lockdep_hardirqs_on+0x94/0x140
[ 77.640417][ T4436] task_work_run+0x125/0x1a0
[ 77.645860][ T4436] exit_to_user_mode_loop+0x10f/0x130
[ 77.651532][ T4436] exit_to_user_mode_prepare+0xee/0x180
[ 77.657935][ T4436] syscall_exit_to_user_mode+0x16/0x40
[ 77.663676][ T4436] do_syscall_64+0x58/0xa0
[ 77.668425][ T4436] ? clear_bhb_loop+0x30/0x80
[ 77.673433][ T4436] ? clear_bhb_loop+0x30/0x80
[ 77.678423][ T4436] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 77.684766][ T4436] RIP: 0033:0x7fc4c1c85c87
[ 77.689594][ T4436] Code: b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 b8
[ 77.710727][ T4436] RSP: 002b:00007fffd37fd7e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 77.719270][ T4436] RAX: 0000000000000000 RBX: 00007fc4c1cdfc5a RCX: 00007fc4c1c85c87
[ 77.727434][ T4436] RDX: 0000000000000000 RSI: 000000000000000a RDI: 00007fffd37fd8a0
[ 77.735497][ T4436] RBP: 00007fffd37fd8a0 R08: 0000000000000000 R09: 0000000000000000
[ 77.743573][ T4436] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fffd37fe960
[ 77.751726][ T4436] R13: 00007fc4c1cdfc5a R14: 0000000000012aa5 R15: 0000000000000006
[ 77.759903][ T4436]
[ 77.763765][ T4436] Kernel Offset: disabled
[ 77.768226][ T4436] Rebooting in 86400 seconds..