./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor166913209 <...> DUID 00:04:f8:b5:8a:47:ae:09:95:3a:43:2d:d7:42:86:31:94:89 forked to background, child pid 3210 [ 29.628153][ T3211] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.639380][ T3211] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.10.26' (ECDSA) to the list of known hosts. execve("./syz-executor166913209", ["./syz-executor166913209"], 0x7ffecd27d040 /* 10 vars */) = 0 brk(NULL) = 0x555555965000 brk(0x555555965c40) = 0x555555965c40 arch_prctl(ARCH_SET_FS, 0x555555965300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor166913209", 4096) = 27 brk(0x555555986c40) = 0x555555986c40 brk(0x555555987000) = 0x555555987000 mprotect(0x7f70412fc000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 memfd_create("syzkaller", 0) = 3 mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f7038e00000 write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 32768) = 32768 munmap(0x7f7038e00000, 32768) = 0 openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 ioctl(4, LOOP_SET_FD, 3) = 0 close(3) = 0 mkdir("./file1", 0777) = 0 syzkaller login: [ 65.047829][ T3631] loop0: detected capacity change from 0 to 64 [ 65.058319][ T3631] ======================================================= [ 65.058319][ T3631] WARNING: The mand mount option has been deprecated and [ 65.058319][ T3631] and is ignored by this kernel. Remove the mand [ 65.058319][ T3631] option from the mount to silence this warning. [ 65.058319][ T3631] ======================================================= mount("/dev/loop0", "./file1", "hfs", MS_NOEXEC|MS_SYNCHRONOUS|MS_MANDLOCK|MS_DIRSYNC|MS_NOATIME|MS_REC|MS_SILENT|MS_POSIXACL|MS_RELATIME|MS_STRICTATIME|MS_LAZYTIME, "iocharset=cp775,file_umask=00000000000000000017674,") = 0 openat(AT_FDCWD, "./file1", O_RDONLY|O_DIRECTORY) = 3 chdir("./file1") = 0 ioctl(4, LOOP_CLR_FD) = 0 close(4) = 0 [ 65.096737][ T3631] hfs: filesystem was not cleanly unmounted, running fsck.hfs is recommended. mounting read-only. [ 65.113841][ T3631] ================================================================== [ 65.121925][ T3631] BUG: KASAN: slab-out-of-bounds in hfs_asc2mac+0x467/0x9a0 [ 65.129235][ T3631] Write of size 1 at addr ffff888027551fce by task syz-executor166/3631 [ 65.137568][ T3631] [ 65.139898][ T3631] CPU: 0 PID: 3631 Comm: syz-executor166 Not tainted 6.1.0-rc6-syzkaller-00176-g08ad43d554ba #0 [ 65.150308][ T3631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 65.160354][ T3631] Call Trace: [ 65.163623][ T3631] [ 65.166552][ T3631] dump_stack_lvl+0x1b1/0x28e [ 65.171280][ T3631] ? nf_tcp_handle_invalid+0x62e/0x62e [ 65.176729][ T3631] ? __wake_up_klogd+0xcd/0x100 [ 65.181573][ T3631] ? panic+0x710/0x710 [ 65.185634][ T3631] ? _printk+0xc0/0x100 [ 65.189778][ T3631] ? _raw_spin_lock_irqsave+0x8e/0x100 [ 65.195228][ T3631] print_address_description+0x74/0x340 [ 65.200761][ T3631] print_report+0x107/0x1f0 [ 65.205251][ T3631] ? __virt_addr_valid+0x21b/0x2d0 [ 65.210349][ T3631] ? __phys_addr+0xb5/0x160 [ 65.214848][ T3631] ? hfs_asc2mac+0x467/0x9a0 [ 65.219422][ T3631] kasan_report+0xcd/0x100 [ 65.223820][ T3631] ? hfs_asc2mac+0x467/0x9a0 [ 65.228392][ T3631] hfs_asc2mac+0x467/0x9a0 [ 65.232785][ T3631] ? mutex_lock_io_nested+0x60/0x60 [ 65.237981][ T3631] ? hfs_mac2asc+0x850/0x850 [ 65.242655][ T3631] ? hfs_find_init+0x8b/0x1e0 [ 65.247391][ T3631] ? trace_kmalloc+0x30/0xf0 [ 65.251973][ T3631] ? __kmalloc+0xcc/0x1a0 [ 65.256292][ T3631] hfs_cat_build_key+0x92/0x170 [ 65.261126][ T3631] hfs_lookup+0x1ab/0x2c0 [ 65.265436][ T3631] ? hfs_dir_release+0x140/0x140 [ 65.270373][ T3631] ? d_alloc_parallel+0x1144/0x1240 [ 65.275564][ T3631] ? memset+0x1f/0x40 [ 65.279530][ T3631] ? lockdep_init_map_type+0x9d/0x890 [ 65.284888][ T3631] ? d_hash_and_lookup+0x1c0/0x1c0 [ 65.289979][ T3631] ? __init_waitqueue_head+0xa6/0x140 [ 65.295336][ T3631] __lookup_slow+0x266/0x3a0 [ 65.299922][ T3631] ? lookup_one_len+0x690/0x690 [ 65.304773][ T3631] ? __down_read_common+0x156/0x2a0 [ 65.309965][ T3631] lookup_slow+0x53/0x70 [ 65.314208][ T3631] walk_component+0x2e1/0x410 [ 65.318878][ T3631] ? path_lookupat+0x16f/0x450 [ 65.323640][ T3631] path_lookupat+0x17d/0x450 [ 65.328221][ T3631] filename_lookup+0x274/0x650 [ 65.332973][ T3631] ? hashlen_string+0x120/0x120 [ 65.337816][ T3631] ? rcu_read_lock_sched_held+0x87/0x110 [ 65.343431][ T3631] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 65.349655][ T3631] ? getname_kernel+0x55/0x2d0 [ 65.354407][ T3631] ? trace_kmem_cache_alloc+0x30/0xe0 [ 65.359768][ T3631] ? kmem_cache_alloc+0x85/0x300 [ 65.364690][ T3631] ? getname_kernel+0x55/0x2d0 [ 65.369445][ T3631] ? getname_kernel+0x13c/0x2d0 [ 65.374285][ T3631] ? memcpy+0x3c/0x60 [ 65.378251][ T3631] kern_path+0x37/0x180 [ 65.382397][ T3631] tomoyo_mount_permission+0x7f9/0xa90 [ 65.387844][ T3631] ? kmem_cache_free+0x94/0x1d0 [ 65.392681][ T3631] ? kasan_set_track+0x52/0x60 [ 65.397428][ T3631] ? kasan_set_track+0x3d/0x60 [ 65.402170][ T3631] ? kasan_save_free_info+0x27/0x40 [ 65.407350][ T3631] ? ____kasan_slab_free+0xd6/0x120 [ 65.412530][ T3631] ? slab_free_freelist_hook+0x12e/0x1a0 [ 65.418149][ T3631] ? tomoyo_get_name+0x550/0x550 [ 65.423079][ T3631] ? do_syscall_64+0x3d/0xb0 [ 65.427653][ T3631] ? _raw_spin_unlock_irqrestore+0x8b/0x120 [ 65.433618][ T3631] ? lockdep_hardirqs_on+0x8d/0x130 [ 65.438802][ T3631] ? _raw_spin_unlock_irqrestore+0xc1/0x120 [ 65.444687][ T3631] ? lockdep_hardirqs_on_prepare+0x428/0x790 [ 65.450653][ T3631] ? kasan_quarantine_put+0xc0/0x210 [ 65.455922][ T3631] ? lockdep_hardirqs_on+0x8d/0x130 [ 65.461107][ T3631] security_sb_mount+0x70/0xd0 [ 65.465858][ T3631] path_mount+0xbd/0x10c0 [ 65.470173][ T3631] ? kmem_cache_free+0x94/0x1d0 [ 65.475022][ T3631] ? user_path_at_empty+0x149/0x1a0 [ 65.480296][ T3631] __se_sys_mount+0x2d3/0x3c0 [ 65.485025][ T3631] ? __x64_sys_mount+0xc0/0xc0 [ 65.489784][ T3631] ? syscall_enter_from_user_mode+0x2e/0x1d0 [ 65.495781][ T3631] ? __x64_sys_mount+0x1c/0xc0 [ 65.500533][ T3631] do_syscall_64+0x3d/0xb0 [ 65.504937][ T3631] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 65.510915][ T3631] RIP: 0033:0x7f704128fb39 [ 65.515321][ T3631] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 65.535008][ T3631] RSP: 002b:00007ffd8bdf0c38 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 65.543421][ T3631] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f704128fb39 [ 65.551379][ T3631] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000100 [ 65.559338][ T3631] RBP: 00007f704124f140 R08: 0000000000000000 R09: 0000000000000000 [ 65.567295][ T3631] R10: 0000000000269415 R11: 0000000000000246 R12: 00007f704124f1d0 [ 65.575250][ T3631] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 65.583210][ T3631] [ 65.586210][ T3631] [ 65.588520][ T3631] Allocated by task 3631: [ 65.592829][ T3631] kasan_set_track+0x3d/0x60 [ 65.597407][ T3631] __kasan_kmalloc+0x97/0xb0 [ 65.601980][ T3631] __kmalloc+0xaf/0x1a0 [ 65.606123][ T3631] hfs_find_init+0x8b/0x1e0 [ 65.610612][ T3631] hfs_lookup+0x105/0x2c0 [ 65.614935][ T3631] __lookup_slow+0x266/0x3a0 [ 65.619516][ T3631] lookup_slow+0x53/0x70 [ 65.623748][ T3631] walk_component+0x2e1/0x410 [ 65.628412][ T3631] path_lookupat+0x17d/0x450 [ 65.632989][ T3631] filename_lookup+0x274/0x650 [ 65.637750][ T3631] kern_path+0x37/0x180 [ 65.641894][ T3631] tomoyo_mount_permission+0x7f9/0xa90 [ 65.647344][ T3631] security_sb_mount+0x70/0xd0 [ 65.652105][ T3631] path_mount+0xbd/0x10c0 [ 65.656442][ T3631] __se_sys_mount+0x2d3/0x3c0 [ 65.661107][ T3631] do_syscall_64+0x3d/0xb0 [ 65.665510][ T3631] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 65.671404][ T3631] [ 65.673710][ T3631] The buggy address belongs to the object at ffff888027551f80 [ 65.673710][ T3631] which belongs to the cache kmalloc-96 of size 96 [ 65.687572][ T3631] The buggy address is located 78 bytes inside of [ 65.687572][ T3631] 96-byte region [ffff888027551f80, ffff888027551fe0) [ 65.700657][ T3631] [ 65.702982][ T3631] The buggy address belongs to the physical page: [ 65.709386][ T3631] page:ffffea00009d5440 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x27551 [ 65.719532][ T3631] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 65.727085][ T3631] raw: 00fff00000000200 ffffea0000788800 dead000000000005 ffff888012841780 [ 65.735646][ T3631] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 65.744291][ T3631] page dumped because: kasan: bad access detected [ 65.750680][ T3631] page_owner tracks the page as allocated [ 65.756372][ T3631] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, tgid 1 (swapper/0), ts 12129986697, free_ts 12104206166 [ 65.774002][ T3631] get_page_from_freelist+0x742/0x7c0 [ 65.779372][ T3631] __alloc_pages+0x259/0x560 [ 65.784033][ T3631] alloc_page_interleave+0x22/0x1c0 [ 65.789262][ T3631] alloc_slab_page+0x70/0xf0 [ 65.793853][ T3631] allocate_slab+0x5e/0x4b0 [ 65.798338][ T3631] ___slab_alloc+0x782/0xe20 [ 65.802906][ T3631] __kmem_cache_alloc_node+0x252/0x310 [ 65.808366][ T3631] __kmalloc+0x9e/0x1a0 [ 65.812520][ T3631] asymmetric_key_generate_id+0x2a/0xb0 [ 65.818067][ T3631] x509_cert_parse+0x547/0x7b0 [ 65.822845][ T3631] x509_key_preparse+0x61/0x680 [ 65.827682][ T3631] asymmetric_key_preparse+0x92/0x170 [ 65.833124][ T3631] key_create_or_update+0x598/0xdb0 [ 65.838304][ T3631] x509_load_certificate_list+0x148/0x280 [ 65.844004][ T3631] __integrity_init_keyring+0x198/0x2df [ 65.849534][ T3631] ima_init+0x3c/0x11f [ 65.853584][ T3631] page last free stack trace: [ 65.858235][ T3631] free_pcp_prepare+0x80c/0x8f0 [ 65.863074][ T3631] free_unref_page_list+0xb4/0x7b0 [ 65.868172][ T3631] release_pages+0x232a/0x25c0 [ 65.872920][ T3631] tlb_flush_mmu+0x850/0xa70 [ 65.877493][ T3631] tlb_finish_mmu+0xcb/0x200 [ 65.882067][ T3631] exit_mmap+0x275/0x630 [ 65.886297][ T3631] __mmput+0x114/0x3b0 [ 65.890360][ T3631] free_bprm+0x136/0x2f0 [ 65.894596][ T3631] kernel_execve+0x40d/0xa00 [ 65.899179][ T3631] call_usermodehelper_exec_async+0x262/0x3b0 [ 65.905245][ T3631] ret_from_fork+0x1f/0x30 [ 65.909658][ T3631] [ 65.911973][ T3631] Memory state around the buggy address: [ 65.917597][ T3631] ffff888027551e80: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 65.925642][ T3631] ffff888027551f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 65.933699][ T3631] >ffff888027551f80: 00 00 00 00 00 00 00 00 00 06 fc fc fc fc fc fc [ 65.941750][ T3631] ^ [ 65.948163][ T3631] ffff888027552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.956218][ T3631] ffff888027552080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.964274][ T3631] ================================================================== [ 65.972851][ T3631] Kernel panic - not syncing: panic_on_warn set ... [ 65.979459][ T3631] CPU: 0 PID: 3631 Comm: syz-executor166 Not tainted 6.1.0-rc6-syzkaller-00176-g08ad43d554ba #0 [ 65.989875][ T3631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 65.999940][ T3631] Call Trace: [ 66.003222][ T3631] [ 66.006149][ T3631] dump_stack_lvl+0x1b1/0x28e [ 66.010828][ T3631] ? nf_tcp_handle_invalid+0x62e/0x62e [ 66.016283][ T3631] ? panic+0x710/0x710 [ 66.020349][ T3631] ? preempt_schedule_common+0xb7/0xe0 [ 66.025806][ T3631] ? vscnprintf+0x59/0x80 [ 66.030132][ T3631] panic+0x2d6/0x710 [ 66.034039][ T3631] ? memcpy_page_flushcache+0xfc/0xfc [ 66.039415][ T3631] ? _raw_spin_unlock_irqrestore+0x110/0x120 [ 66.045407][ T3631] ? rcu_read_lock_sched_held+0x5d/0x110 [ 66.051048][ T3631] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 66.057038][ T3631] ? hfs_asc2mac+0x467/0x9a0 [ 66.061624][ T3631] end_report+0x91/0xa0 [ 66.065780][ T3631] kasan_report+0xda/0x100 [ 66.070208][ T3631] ? hfs_asc2mac+0x467/0x9a0 [ 66.074838][ T3631] hfs_asc2mac+0x467/0x9a0 [ 66.079261][ T3631] ? mutex_lock_io_nested+0x60/0x60 [ 66.084466][ T3631] ? hfs_mac2asc+0x850/0x850 [ 66.089064][ T3631] ? hfs_find_init+0x8b/0x1e0 [ 66.093742][ T3631] ? trace_kmalloc+0x30/0xf0 [ 66.098337][ T3631] ? __kmalloc+0xcc/0x1a0 [ 66.102671][ T3631] hfs_cat_build_key+0x92/0x170 [ 66.107521][ T3631] hfs_lookup+0x1ab/0x2c0 [ 66.111847][ T3631] ? hfs_dir_release+0x140/0x140 [ 66.116777][ T3631] ? d_alloc_parallel+0x1144/0x1240 [ 66.121974][ T3631] ? memset+0x1f/0x40 [ 66.125957][ T3631] ? lockdep_init_map_type+0x9d/0x890 [ 66.131336][ T3631] ? d_hash_and_lookup+0x1c0/0x1c0 [ 66.136449][ T3631] ? __init_waitqueue_head+0xa6/0x140 [ 66.141831][ T3631] __lookup_slow+0x266/0x3a0 [ 66.146422][ T3631] ? lookup_one_len+0x690/0x690 [ 66.151272][ T3631] ? __down_read_common+0x156/0x2a0 [ 66.156473][ T3631] lookup_slow+0x53/0x70 [ 66.160816][ T3631] walk_component+0x2e1/0x410 [ 66.165591][ T3631] ? path_lookupat+0x16f/0x450 [ 66.170376][ T3631] path_lookupat+0x17d/0x450 [ 66.174978][ T3631] filename_lookup+0x274/0x650 [ 66.179754][ T3631] ? hashlen_string+0x120/0x120 [ 66.184620][ T3631] ? rcu_read_lock_sched_held+0x87/0x110 [ 66.190256][ T3631] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 66.196277][ T3631] ? getname_kernel+0x55/0x2d0 [ 66.201054][ T3631] ? trace_kmem_cache_alloc+0x30/0xe0 [ 66.206426][ T3631] ? kmem_cache_alloc+0x85/0x300 [ 66.211365][ T3631] ? getname_kernel+0x55/0x2d0 [ 66.216134][ T3631] ? getname_kernel+0x13c/0x2d0 [ 66.220989][ T3631] ? memcpy+0x3c/0x60 [ 66.224975][ T3631] kern_path+0x37/0x180 [ 66.229134][ T3631] tomoyo_mount_permission+0x7f9/0xa90 [ 66.234596][ T3631] ? kmem_cache_free+0x94/0x1d0 [ 66.239453][ T3631] ? kasan_set_track+0x52/0x60 [ 66.244223][ T3631] ? kasan_set_track+0x3d/0x60 [ 66.248981][ T3631] ? kasan_save_free_info+0x27/0x40 [ 66.254176][ T3631] ? ____kasan_slab_free+0xd6/0x120 [ 66.259388][ T3631] ? slab_free_freelist_hook+0x12e/0x1a0 [ 66.265034][ T3631] ? tomoyo_get_name+0x550/0x550 [ 66.269986][ T3631] ? do_syscall_64+0x3d/0xb0 [ 66.274587][ T3631] ? _raw_spin_unlock_irqrestore+0x8b/0x120 [ 66.280511][ T3631] ? lockdep_hardirqs_on+0x8d/0x130 [ 66.285799][ T3631] ? _raw_spin_unlock_irqrestore+0xc1/0x120 [ 66.291703][ T3631] ? lockdep_hardirqs_on_prepare+0x428/0x790 [ 66.297695][ T3631] ? kasan_quarantine_put+0xc0/0x210 [ 66.302981][ T3631] ? lockdep_hardirqs_on+0x8d/0x130 [ 66.308184][ T3631] security_sb_mount+0x70/0xd0 [ 66.312956][ T3631] path_mount+0xbd/0x10c0 [ 66.317290][ T3631] ? kmem_cache_free+0x94/0x1d0 [ 66.322146][ T3631] ? user_path_at_empty+0x149/0x1a0 [ 66.327344][ T3631] __se_sys_mount+0x2d3/0x3c0 [ 66.332024][ T3631] ? __x64_sys_mount+0xc0/0xc0 [ 66.336789][ T3631] ? syscall_enter_from_user_mode+0x2e/0x1d0 [ 66.342767][ T3631] ? __x64_sys_mount+0x1c/0xc0 [ 66.347530][ T3631] do_syscall_64+0x3d/0xb0 [ 66.351969][ T3631] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 66.357861][ T3631] RIP: 0033:0x7f704128fb39 [ 66.362275][ T3631] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 66.381878][ T3631] RSP: 002b:00007ffd8bdf0c38 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 66.390290][ T3631] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f704128fb39 [ 66.398265][ T3631] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000100 [ 66.406232][ T3631] RBP: 00007f704124f140 R08: 0000000000000000 R09: 0000000000000000 [ 66.414252][ T3631] R10: 0000000000269415 R11: 0000000000000246 R12: 00007f704124f1d0 [ 66.422215][ T3631] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 66.430187][ T3631] [ 66.433257][ T3631] Kernel Offset: disabled [ 66.437576][ T3631] Rebooting in 86400 seconds..