Warning: Permanently added '10.128.0.160' (ECDSA) to the list of known hosts. 2019/11/07 16:12:33 fuzzer started 2019/11/07 16:12:35 dialing manager at 10.128.0.105:38105 2019/11/07 16:12:36 syscalls: 2553 2019/11/07 16:12:36 code coverage: enabled 2019/11/07 16:12:36 comparison tracing: enabled 2019/11/07 16:12:36 extra coverage: extra coverage is not supported by the kernel 2019/11/07 16:12:36 setuid sandbox: enabled 2019/11/07 16:12:36 namespace sandbox: enabled 2019/11/07 16:12:36 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/07 16:12:36 fault injection: enabled 2019/11/07 16:12:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/07 16:12:36 net packet injection: enabled 2019/11/07 16:12:36 net device setup: enabled 2019/11/07 16:12:36 concurrency sanitizer: enabled 2019/11/07 16:12:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/07 16:12:40 adding functions to KCSAN blacklist: 'blk_mq_get_request' 'tick_nohz_next_event' '__ext4_new_inode' 'pipe_poll' 'ext4_free_inode' 'generic_permission' 'ktime_get_real_seconds' 'ext4_has_free_clusters' 'do_exit' 'tcp_add_backlog' 'tomoyo_supervisor' 'ext4_nonda_switch' 'find_get_pages_range_tag' 'find_next_bit' 'run_timer_softirq' 'do_nanosleep' 'common_perm_cond' 'pid_update_inode' 'add_timer' '__skb_try_recv_from_queue' 'tick_sched_do_timer' 'ep_poll' 'generic_write_end' 'generic_fillattr' 'taskstats_exit' 'mod_timer' 'blk_mq_run_hw_queue' 'rcu_gp_fqs_check_wake' 'tick_do_update_jiffies64' '__hrtimer_run_queues' 'poll_schedule_timeout' syzkaller login: [ 82.663309][ T8054] KCSAN: could not find function: 'poll_schedule_timeout' 16:13:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003300050ad25a80648c6394fb0300fc0010000b400c000100053582c137153e37040008805b31a83e3f02", 0x2e}], 0x1}, 0x0) 16:13:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80044507, &(0x7f0000000000)=""/163) [ 109.838314][ T8058] IPVS: ftp: loaded support on port[0] = 21 [ 109.997785][ T8058] chnl_net:caif_netlink_parms(): no params data found [ 110.037540][ T8058] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.044752][ T8058] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.053691][ T8058] device bridge_slave_0 entered promiscuous mode [ 110.061941][ T8058] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.070360][ T8058] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.078837][ T8058] device bridge_slave_1 entered promiscuous mode 16:13:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="dc2ac86d4b66732e66617400080441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0xffffffe1}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 110.093217][ T8061] IPVS: ftp: loaded support on port[0] = 21 [ 110.100115][ T8058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 110.115476][ T8058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 110.165063][ T8058] team0: Port device team_slave_0 added [ 110.174040][ T8058] team0: Port device team_slave_1 added [ 110.258275][ T8058] device hsr_slave_0 entered promiscuous mode [ 110.296195][ T8058] device hsr_slave_1 entered promiscuous mode [ 110.369952][ T8064] IPVS: ftp: loaded support on port[0] = 21 [ 110.381824][ T8061] chnl_net:caif_netlink_parms(): no params data found 16:13:08 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r0) [ 110.505030][ T8058] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.512223][ T8058] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.519646][ T8058] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.526722][ T8058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.620617][ T8061] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.636123][ T8061] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.646879][ T8061] device bridge_slave_0 entered promiscuous mode [ 110.684780][ T8061] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.715958][ T8061] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.723784][ T8061] device bridge_slave_1 entered promiscuous mode [ 110.806683][ T8058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.864881][ T8061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 110.891060][ T8058] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.914434][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.947442][ T8088] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.976277][ T8088] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.001130][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 111.041592][ T8061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 111.092396][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.095169][ T8093] IPVS: ftp: loaded support on port[0] = 21 [ 111.108162][ T8088] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.115205][ T8088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.167819][ T8088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.196426][ T8088] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.203504][ T8088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.287514][ T8064] chnl_net:caif_netlink_parms(): no params data found [ 111.303332][ T8061] team0: Port device team_slave_0 added [ 111.351127][ T8061] team0: Port device team_slave_1 added [ 111.358330][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.397608][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.434427][ T8058] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 16:13:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="090000000000363940d3c7a3ba27660199783b0a82f79b3207b4bcfa7790ac47a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24fd620b2022d5ad63b369aaffe9a6b608a5fece0eca95d71f2d3e60633a027fb50cbcbd92d44076d3b97247e066165ccf1032f51d36ab231f6c20d87e9167edf69776dca67d90a17ccd18fb9c5b2cb0c26bd0254072ba9bf0fc3d7b21d53478e382dcf296a23a060bfe5519de6c998ed4984eee3b3e9f030065000d17e5b262b5b5c324e3e8df02d9c6d6f95c339b79b976d136d7470fbef0091ebce8703d28cba1ae6950a7", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 111.467108][ T8058] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 111.509775][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.549751][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.597264][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.637640][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.667683][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.708274][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.737369][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.788704][ T8058] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 111.830490][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.857783][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 111.916135][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 111.949284][ T8064] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.963747][ T8064] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.996936][ T8064] device bridge_slave_0 entered promiscuous mode [ 112.023480][ T8097] IPVS: ftp: loaded support on port[0] = 21 [ 112.080510][ T8061] device hsr_slave_0 entered promiscuous mode [ 112.126291][ T8061] device hsr_slave_1 entered promiscuous mode [ 112.165953][ T8061] debugfs: Directory 'hsr0' with parent '/' already present! [ 112.185421][ T8064] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.203972][ T8064] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.236001][ T8064] device bridge_slave_1 entered promiscuous mode [ 112.387225][ T8116] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. [ 112.394913][ T8093] chnl_net:caif_netlink_parms(): no params data found 16:13:10 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1054}], 0x1}}], 0x476, 0x0, 0x0) 16:13:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003300050ad25a80648c6394fb0300fc0010000b400c000100053582c137153e37040008805b31a83e3f02", 0x2e}], 0x1}, 0x0) [ 112.551987][ T8064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 112.677422][ T8064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 112.710094][ T8136] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. [ 112.726415][ T8093] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.733524][ T8093] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.756930][ T8093] device bridge_slave_0 entered promiscuous mode [ 112.778211][ T8093] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.795321][ T8093] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.823346][ T8093] device bridge_slave_1 entered promiscuous mode 16:13:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003300050ad25a80648c6394fb0300fc0010000b400c000100053582c137153e37040008805b31a83e3f02", 0x2e}], 0x1}, 0x0) [ 112.867915][ T8064] team0: Port device team_slave_0 added [ 112.875231][ T8064] team0: Port device team_slave_1 added [ 112.990853][ T8093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 113.006437][ T8140] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. [ 113.048651][ T8064] device hsr_slave_0 entered promiscuous mode [ 113.076369][ T8064] device hsr_slave_1 entered promiscuous mode 16:13:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003300050ad25a80648c6394fb0300fc0010000b400c000100053582c137153e37040008805b31a83e3f02", 0x2e}], 0x1}, 0x0) [ 113.125981][ T8064] debugfs: Directory 'hsr0' with parent '/' already present! [ 113.136229][ T8061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.144605][ T8093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 113.171167][ T8137] IPVS: ftp: loaded support on port[0] = 21 [ 113.234186][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.246585][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.288856][ T8143] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. [ 113.302407][ T8061] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.380396][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.401270][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.460752][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.468023][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.504225][ T8152] ================================================================== [ 113.512423][ T8152] BUG: KCSAN: data-race in __rb_insert_augmented / vm_area_dup [ 113.519958][ T8152] [ 113.522302][ T8152] read to 0xffff88811f22b000 of 200 bytes by task 8154 on cpu 1: [ 113.526928][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.530045][ T8152] vm_area_dup+0x70/0xf0 [ 113.530063][ T8152] dup_mm+0x330/0xba0 [ 113.530094][ T8152] copy_process+0x36f3/0x3b50 [ 113.551041][ T8152] _do_fork+0xfe/0x6e0 [ 113.555132][ T8152] __x64_sys_clone+0x12b/0x160 [ 113.560794][ T8152] do_syscall_64+0xcc/0x370 [ 113.565405][ T8152] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 113.571295][ T8152] [ 113.573632][ T8152] write to 0xffff88811f22b058 of 8 bytes by task 8152 on cpu 0: [ 113.581283][ T8152] __rb_insert_augmented+0x1e1/0x370 [ 113.586586][ T8152] vma_interval_tree_insert_after+0x14b/0x170 [ 113.586638][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.592665][ T8152] dup_mm+0x53e/0xba0 [ 113.604597][ T8152] copy_process+0x36f3/0x3b50 [ 113.609278][ T8152] _do_fork+0xfe/0x6e0 [ 113.613365][ T8152] __x64_sys_clone+0x12b/0x160 [ 113.618146][ T8152] do_syscall_64+0xcc/0x370 [ 113.622676][ T8152] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 113.628559][ T8152] [ 113.630880][ T8152] Reported by Kernel Concurrency Sanitizer on: [ 113.637044][ T8152] CPU: 0 PID: 8152 Comm: net.agent Not tainted 5.4.0-rc6+ #0 [ 113.644412][ T8152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.654484][ T8152] ================================================================== [ 113.662561][ T8152] Kernel panic - not syncing: panic_on_warn set ... [ 113.669163][ T8152] CPU: 0 PID: 8152 Comm: net.agent Not tainted 5.4.0-rc6+ #0 [ 113.676530][ T8152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.678512][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.686579][ T8152] Call Trace: [ 113.686614][ T8152] dump_stack+0xf5/0x159 [ 113.686649][ T8152] panic+0x210/0x640 [ 113.693704][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.696950][ T8152] ? vprintk_func+0x8d/0x140 [ 113.696987][ T8152] kcsan_report.cold+0xc/0xe [ 113.721814][ T8152] kcsan_setup_watchpoint+0x3fe/0x410 [ 113.727201][ T8152] __tsan_unaligned_write8+0x143/0x1f0 [ 113.732681][ T8152] __rb_insert_augmented+0x1e1/0x370 [ 113.738002][ T8152] ? kmem_cache_alloc+0x1f3/0x5d0 [ 113.743047][ T8152] ? __anon_vma_interval_tree_subtree_search+0x160/0x160 [ 113.750088][ T8152] vma_interval_tree_insert_after+0x14b/0x170 [ 113.756168][ T8152] dup_mm+0x53e/0xba0 [ 113.760186][ T8152] copy_process+0x36f3/0x3b50 [ 113.764924][ T8152] _do_fork+0xfe/0x6e0 [ 113.769001][ T8152] ? __udelay+0x10/0x20 [ 113.773176][ T8152] __x64_sys_clone+0x12b/0x160 [ 113.777967][ T8152] do_syscall_64+0xcc/0x370 [ 113.782494][ T8152] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 113.788391][ T8152] RIP: 0033:0x7f95db677f46 [ 113.792830][ T8152] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 14 25 10 00 00 00 31 d2 49 81 c2 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 31 01 00 00 85 c0 41 89 c4 0f 85 3b 01 00 [ 113.812437][ T8152] RSP: 002b:00007ffc85e584e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 113.820864][ T8152] RAX: ffffffffffffffda RBX: 00007ffc85e584e0 RCX: 00007f95db677f46 [ 113.828844][ T8152] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 113.836828][ T8152] RBP: 00007ffc85e58520 R08: 0000000000001fd8 R09: 0000000000001fd8 [ 113.844814][ T8152] R10: 00007f95dbb6e9d0 R11: 0000000000000246 R12: 0000000000000000 [ 113.852803][ T8152] R13: 0000000000000000 R14: 0000000000000002 R15: 00000000006c2090 [ 113.862023][ T8152] Kernel Offset: disabled [ 113.866355][ T8152] Rebooting in 86400 seconds..