./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3543982728 <...> Warning: Permanently added '10.128.1.141' (ED25519) to the list of known hosts. execve("./syz-executor3543982728", ["./syz-executor3543982728"], 0x7fffab9cd650 /* 10 vars */) = 0 brk(NULL) = 0x555577f78000 brk(0x555577f78e00) = 0x555577f78e00 arch_prctl(ARCH_SET_FS, 0x555577f78480) = 0 set_tid_address(0x555577f78750) = 289 set_robust_list(0x555577f78760, 24) = 0 rseq(0x555577f78da0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3543982728", 4096) = 28 getrandom("\xc2\xcc\xac\x36\xf2\x55\xcf\x65", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555577f78e00 brk(0x555577f99e00) = 0x555577f99e00 brk(0x555577f9a000) = 0x555577f9a000 mprotect(0x7f64903bb000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 290 attached , child_tidptr=0x555577f78750) = 290 [pid 289] openat(AT_FDCWD, "/sys/kernel/debug/x86/nmi_longest_ns", O_WRONLY|O_CLOEXEC [pid 290] set_robust_list(0x555577f78760, 24 [pid 289] <... openat resumed>) = 3 [pid 290] <... set_robust_list resumed>) = 0 [pid 289] write(3, "10000000000", 11) = 11 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/hung_task_check_interval_secs", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "20", 2) = 2 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/net/core/bpf_jit_kallsyms", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "1", 1) = 1 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/net/core/bpf_jit_harden", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "0", 1) = 1 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/kptr_restrict", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "0", 1) = 1 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/softlockup_all_cpu_backtrace", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "1", 1) = 1 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "100", 3) = 3 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/vm/oom_dump_tasks", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "0", 1) = 1 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/debug/exception-trace", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "0", 1) = 1 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/printk", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "7 4 1 3", 7) = 7 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/keys/gc_delay", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "1", 1) = 1 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/vm/oom_kill_allocating_task", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "1", 1) = 1 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/ctrl-alt-del", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "0", 1) = 1 [pid 289] close(3) = 0 [pid 289] openat(AT_FDCWD, "/proc/sys/kernel/cad_pid", O_WRONLY|O_CLOEXEC) = 3 [pid 289] write(3, "290", 3) = 3 [pid 289] close(3) = 0 [pid 289] kill(290, SIGKILL) = 0 [pid 290] +++ killed by SIGKILL +++ --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_KILLED, si_pid=290, si_uid=0, si_status=SIGKILL, si_utime=0, si_stime=0} --- openat(AT_FDCWD, "/proc/self/make-it-fail", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/failslab/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_futex/ignore-private", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/min-order", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 rt_sigaction(SIGRTMIN, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGSEGV, {sa_handler=0x7f6490317770, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7f649031e950}, NULL, 8) = 0 rt_sigaction(SIGBUS, {sa_handler=0x7f6490317770, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7f649031e950}, executing program NULL, 8) = 0 write(1, "executing program\n", 18) = 18 [ 25.428937][ T30] audit: type=1400 audit(1753299627.232:64): avc: denied { execmem } for pid=289 comm="syz-executor354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 25.473274][ T30] audit: type=1400 audit(1753299627.282:65): avc: denied { prog_load } for pid=289 comm="syz-executor354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 25.492594][ T30] audit: type=1400 audit(1753299627.282:66): avc: denied { bpf } for pid=289 comm="syz-executor354" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SK_MSG, insn_cnt=4, insns=0x200000000040, license="GPL", log_level=2, log_size=64912, log_buf="", kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS}, 72) = 3 close(3) = 0 socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0 bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SK_SKB, insn_cnt=4, insns=0x200000000540, license="GPL", log_level=4, log_size=64912, log_buf="func#0 @0\n0: R1=ctx(id=0,off=0,imm=0) R10=fp0\n0: (b4) w0 = 0\n1: R0_w=inv0 R1=ctx(id=0,off=0,imm=0) R"..., kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS}, 72) = 5 [ 25.682866][ T30] audit: type=1400 audit(1753299627.492:67): avc: denied { perfmon } for pid=289 comm="syz-executor354" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 25.704181][ T30] audit: type=1400 audit(1753299627.512:68): avc: denied { prog_run } for pid=289 comm="syz-executor354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_SOCKMAP, key_size=4, value_size=4, max_entries=18, map_flags=0, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 6 bpf(BPF_PROG_ATTACH, {target_fd=6, attach_bpf_fd=5, attach_type=BPF_SK_SKB_VERDICT, attach_flags=0}, 16) = 0 bpf(BPF_MAP_UPDATE_ELEM, {map_fd=6, key=0x200000000000, value=0x200000000080, flags=BPF_ANY}, 32) = 0 openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 7 write(7, "9", 1) = 1 [ 25.723898][ T30] audit: type=1400 audit(1753299627.532:69): avc: denied { map_create } for pid=289 comm="syz-executor354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 25.724924][ T289] FAULT_INJECTION: forcing a failure. [ 25.724924][ T289] name failslab, interval 1, probability 0, space 0, times 1 [ 25.743629][ T30] audit: type=1400 audit(1753299627.532:70): avc: denied { map_read map_write } for pid=289 comm="syz-executor354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 25.756150][ T289] CPU: 0 PID: 289 Comm: syz-executor354 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 25.786152][ T289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 25.796220][ T289] Call Trace: [ 25.799496][ T289] [ 25.802421][ T289] __dump_stack+0x21/0x30 [ 25.806760][ T289] dump_stack_lvl+0xee/0x150 [ 25.811345][ T289] ? show_regs_print_info+0x20/0x20 [ 25.816553][ T289] dump_stack+0x15/0x20 [ 25.820707][ T289] should_fail+0x3c1/0x510 [ 25.825121][ T289] __should_failslab+0xa4/0xe0 [ 25.829882][ T289] should_failslab+0x9/0x20 [ 25.834383][ T289] slab_pre_alloc_hook+0x3b/0xe0 [ 25.839316][ T289] kmem_cache_alloc_trace+0x48/0x270 [ 25.844602][ T289] ? sk_psock_skb_ingress_self+0x5f/0x330 [ 25.850314][ T289] ? migrate_disable+0x180/0x180 [ 25.855245][ T289] sk_psock_skb_ingress_self+0x5f/0x330 [ 25.860783][ T289] ? migrate_disable+0xd6/0x180 [ 25.865629][ T289] sk_psock_verdict_recv+0x636/0x800 [ 25.870911][ T289] unix_read_sock+0x10a/0x2c0 [ 25.875587][ T289] ? sk_psock_skb_redirect+0x440/0x440 [ 25.881041][ T289] ? unix_stream_splice_actor+0x120/0x120 [ 25.886763][ T289] ? copy_page_from_iter+0x261/0x680 [ 25.892044][ T289] ? copy_user_enhanced_fast_string+0xe/0x40 [ 25.898020][ T289] ? sk_psock_skb_redirect+0x440/0x440 [ 25.903476][ T289] ? unix_set_peek_off+0xa0/0xa0 [ 25.908409][ T289] unix_stream_read_sock+0x61/0x90 [ 25.913516][ T289] sk_psock_verdict_data_ready+0x115/0x170 [ 25.919329][ T289] ? sk_psock_start_verdict+0xc0/0xc0 [ 25.924703][ T289] ? _raw_spin_lock+0x8e/0xe0 [ 25.929377][ T289] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 25.935175][ T289] ? skb_queue_tail+0xcb/0xf0 [ 25.939848][ T289] unix_stream_sendmsg+0x7c4/0xc80 [ 25.944969][ T289] ? unix_show_fdinfo+0xa0/0xa0 [ 25.949827][ T289] ? __update_load_avg_cfs_rq+0xaf/0x2f0 [ 25.955460][ T289] ? security_socket_sendmsg+0x82/0xa0 [ 25.960922][ T289] ? unix_show_fdinfo+0xa0/0xa0 [ 25.965912][ T289] ____sys_sendmsg+0x5a2/0x8c0 [ 25.970696][ T289] ? __sys_sendmsg_sock+0x40/0x40 [ 25.975733][ T289] ? import_iovec+0x7c/0xb0 [ 25.980268][ T289] ___sys_sendmsg+0x1f0/0x260 [ 25.984951][ T289] ? _raw_spin_unlock+0x4d/0x70 [ 25.989804][ T289] ? __sys_sendmsg+0x250/0x250 [ 25.994580][ T289] ? __schedule+0xb76/0x14c0 [ 25.999172][ T289] ? _raw_spin_lock_irqsave+0x110/0x110 [ 26.004726][ T289] ? cgroup_update_frozen+0x15c/0x970 [ 26.010128][ T289] ? ptrace_stop+0x6f4/0xa80 [ 26.014737][ T289] ? __kasan_check_read+0x11/0x20 [ 26.019781][ T289] ? __fdget+0x15b/0x230 [ 26.024053][ T289] __x64_sys_sendmsg+0x1e2/0x2a0 [ 26.029047][ T289] ? ___sys_sendmsg+0x260/0x260 [ 26.033986][ T289] ? __kasan_check_write+0x14/0x20 [ 26.039110][ T289] ? switch_fpu_return+0x15d/0x2c0 [ 26.044235][ T289] x64_sys_call+0x4b/0x9a0 [ 26.048649][ T289] do_syscall_64+0x4c/0xa0 [ 26.053152][ T289] ? clear_bhb_loop+0x50/0xa0 [ 26.058009][ T289] ? clear_bhb_loop+0x50/0xa0 [ 26.063032][ T289] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 26.068926][ T289] RIP: 0033:0x7f6490350409 [ 26.073342][ T289] Code: 48 83 c4 28 c3 e8 17 1a 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 26.092945][ T289] RSP: 002b:00007fff44ed6198 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 26.101363][ T289] RAX: ffffffffffffffda RBX: 00007fff44ed6240 RCX: 00007f6490350409 [ 26.109682][ T289] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 26.117664][ T289] RBP: 0000000000000001 R08: 00007fff44ed5f37 R09: 00007f64903910e8 [ 26.125640][ T289] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 26.133617][ T289] R13: 00007fff44ed6518 R14: 0000000000000001 R15: 0000000000000001 [ 26.141590][ T289] [ 26.144917][ T20] ------------[ cut here ]------------ [ 26.150444][ T20] kernel BUG at net/core/skbuff.c:1727! [ 26.156055][ T20] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 26.162166][ T20] CPU: 0 PID: 20 Comm: kworker/0:1 Not tainted 5.15.189-syzkaller-00079-ga71626bd56a5 #0 [ 26.172005][ T20] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 sendmsg(4, {msg_name=NULL, msg_namelen=67124864, msg_iov=[{iov_base="\x3e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., iov_len=536871553}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 16744320 exit_group(0) = ? [ 26.182353][ T20] Workqueue: events sk_psock_backlog [ 26.187685][ T20] RIP: 0010:pskb_expand_head+0x11a5/0x11d0 [ 26.193540][ T20] Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c de f3 ff ff 4c 89 e7 e8 8c 9a f6 fd e9 d1 f3 ff ff e8 42 22 b8 fd 0f 0b e8 3b 22 b8 fd <0f> 0b 48 8b 4d d0 80 e1 07 80 c1 03 38 c1 0f 8c b2 fa ff ff 48 8b [ 26.213192][ T20] RSP: 0018:ffffc90000147a08 EFLAGS: 00010293 [ 26.219367][ T20] RAX: ffffffff83b08d95 RBX: dffffc0000000000 RCX: ffff88810030bb40 [ 26.227360][ T20] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 26.235337][ T20] RBP: ffffc90000147aa8 R08: dffffc0000000000 R09: ffffed1024a64ebe [ 26.243322][ T20] R10: ffffed1024a64ebe R11: 1ffff11024a64ebd R12: 0000000000000e80 [ 26.251306][ T20] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000008080 [ 26.259460][ T20] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 26.268400][ T20] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.274996][ T20] CR2: 0000200000009000 CR3: 000000011cf04000 CR4: 00000000003506b0 [ 26.283014][ T20] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.291077][ T20] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.299058][ T20] Call Trace: [ 26.302339][ T20] [ 26.305281][ T20] __pskb_pull_tail+0xb1/0x1480 [ 26.310141][ T20] sk_psock_skb_ingress_enqueue+0x67/0x410 [ 26.315953][ T20] ? kmem_cache_alloc_trace+0x119/0x270 [ 26.321504][ T20] ? sk_psock_backlog+0x876/0x1230 [ 26.326621][ T20] sk_psock_backlog+0xa72/0x1230 [ 26.331562][ T20] ? sk_psock_init+0x6f0/0x6f0 [ 26.336330][ T20] ? __schedule+0xb76/0x14c0 [ 26.340929][ T20] process_one_work+0x6be/0xba0 [ 26.345792][ T20] worker_thread+0xa59/0x1200 [ 26.350478][ T20] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 26.355944][ T20] kthread+0x411/0x500 [ 26.360017][ T20] ? worker_clr_flags+0x190/0x190 [ 26.365085][ T20] ? kthread_blkcg+0xd0/0xd0 [ 26.369684][ T20] ret_from_fork+0x1f/0x30 [ 26.374116][ T20] [ 26.377135][ T20] Modules linked in: [ 26.382791][ T20] ---[ end trace 3485ec4049903d52 ]--- [ 26.388293][ T20] RIP: 0010:pskb_expand_head+0x11a5/0x11d0 [ 26.394198][ T20] Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c de f3 ff ff 4c 89 e7 e8 8c 9a f6 fd e9 d1 f3 ff ff e8 42 22 b8 fd 0f 0b e8 3b 22 b8 fd <0f> 0b 48 8b 4d d0 80 e1 07 80 c1 03 38 c1 0f 8c b2 fa ff ff 48 8b [ 26.413846][ T20] RSP: 0018:ffffc90000147a08 EFLAGS: 00010293 [ 26.419946][ T20] RAX: ffffffff83b08d95 RBX: dffffc0000000000 RCX: ffff88810030bb40 [ 26.427935][ T20] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 26.435940][ T20] RBP: ffffc90000147aa8 R08: dffffc0000000000 R09: ffffed1024a64ebe [ 26.443943][ T20] R10: ffffed1024a64ebe R11: 1ffff11024a64ebd R12: 0000000000000e80 [ 26.451951][ T20] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000008080 [ 26.460042][ T20] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 26.469005][ T20] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.475615][ T20] CR2: 0000200000009000 CR3: 000000010d220000 CR4: 00000000003506b0 [ 26.483629][ T20] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.491730][ T20] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.499734][ T20] Kernel panic - not syncing: Fatal exception [ 26.501115][ T30] audit: type=1400 audit(1753299628.312:71): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 26.506104][ T20] Kernel Offset: disabled [ 26.532137][ T20] Rebooting in 86400 seconds..