[ 60.475113][ T26] audit: type=1800 audit(1573342825.163:27): pid=7793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 60.475136][ T26] audit: type=1800 audit(1573342825.163:28): pid=7793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.151182][ T26] audit: type=1800 audit(1573342825.893:29): pid=7793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 61.171430][ T26] audit: type=1800 audit(1573342825.893:30): pid=7793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.18' (ECDSA) to the list of known hosts. 2019/11/09 23:40:36 fuzzer started 2019/11/09 23:40:37 dialing manager at 10.128.0.105:33901 2019/11/09 23:40:41 syscalls: 2553 2019/11/09 23:40:41 code coverage: enabled 2019/11/09 23:40:41 comparison tracing: enabled 2019/11/09 23:40:41 extra coverage: extra coverage is not supported by the kernel 2019/11/09 23:40:41 setuid sandbox: enabled 2019/11/09 23:40:41 namespace sandbox: enabled 2019/11/09 23:40:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/09 23:40:41 fault injection: enabled 2019/11/09 23:40:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/09 23:40:41 net packet injection: enabled 2019/11/09 23:40:41 net device setup: enabled 2019/11/09 23:40:41 concurrency sanitizer: enabled 2019/11/09 23:40:41 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 81.960191][ T7963] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/09 23:40:48 adding functions to KCSAN blacklist: 'pcpu_alloc' 'osq_lock' 'tick_do_update_jiffies64' 'run_timer_softirq' 'ext4_nonda_switch' 'dnotify_flush' 'lruvec_lru_size' 'pid_update_inode' 'icmp_global_allow' 'xas_clear_mark' 'generic_permission' 'tick_sched_do_timer' 'ext4_mark_iloc_dirty' '__snd_rawmidi_transmit_ack' 'blk_mq_dispatch_rq_list' '__ext4_new_inode' 'ep_poll' 'n_tty_receive_buf_common' 'ext4_free_inodes_count' 'wbt_issue' 'vm_area_dup' 'task_dump_owner' 'ext4_has_free_clusters' 'taskstats_exit' 'tomoyo_supervisor' 'rcu_gp_fqs_check_wake' 'mod_timer' 'snd_seq_prioq_cell_out' 'ktime_get_seconds' 'p9_poll_workfn' '__hrtimer_run_queues' 'poll_schedule_timeout' 'blk_mq_sched_dispatch_requests' 'pipe_poll' 'blk_mq_get_request' 'do_nanosleep' 'evict' 'tcp_add_backlog' 'find_next_bit' 'generic_write_end' 'do_wait' 'ktime_get_real_seconds' 'tick_nohz_idle_stop_tick' 'inactive_list_is_low' 'add_timer' 23:41:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x7d0c970d4084190f}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a00000000000004ff7f0000000000e53ce01ccb616a6a66000100000000000002000100010000000000000200fd000005000500542d79e36ac2000000000a004872bbb6896209000055338b2698ffffffff7710aa00ffe8"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 23:41:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) [ 131.393431][ T7967] IPVS: ftp: loaded support on port[0] = 21 [ 131.512877][ T7967] chnl_net:caif_netlink_parms(): no params data found [ 131.577358][ T7967] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.584470][ T7967] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.606549][ T7967] device bridge_slave_0 entered promiscuous mode [ 131.626294][ T7967] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.633488][ T7967] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.647367][ T7967] device bridge_slave_1 entered promiscuous mode [ 131.666592][ T7970] IPVS: ftp: loaded support on port[0] = 21 23:41:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="2400000033001901000000000000000002000000ffd38d9b0c0001000800100004001000990a9fd0eb8c3fdf072d352aafe2c3efdce9d7732bab93d8935fa61c51c5adc70c6a9ebdc7dd8d348ecba496a4514dbe22cdf5ee26e6781b9646f9ad5b86253edede404d6c29de3d2cc08c9b5ae66dbeeb2f7be87b3ce6798370210e115887f8383ed5bb24fac229e0433c5fb18fec4e20155b180d5b559af3e6a20e2b70c0b9bd57a83e43c04960bb2642e8722fef3bc1559250c12ce67b42e7cf38fc2bc51d6e"], 0x24}}, 0x0) [ 131.696583][ T7967] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 131.709182][ T7967] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 131.737895][ T7967] team0: Port device team_slave_0 added [ 131.760182][ T7967] team0: Port device team_slave_1 added [ 131.848838][ T7967] device hsr_slave_0 entered promiscuous mode [ 131.895967][ T7967] device hsr_slave_1 entered promiscuous mode 23:41:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x40d, 0x0, 0x0, {{@in=@remote, @in6=@rand_addr="53ac9fe54f55edf45596dbdd8f96b25d"}, {@in6=@loopback={0x4000000000000000}, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) [ 132.001806][ T7972] IPVS: ftp: loaded support on port[0] = 21 [ 132.028344][ T7970] chnl_net:caif_netlink_parms(): no params data found [ 132.183618][ T7967] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.190803][ T7967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.198191][ T7967] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.205235][ T7967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.317208][ T7970] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.324368][ T7970] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.367741][ T7970] device bridge_slave_0 entered promiscuous mode [ 132.405775][ T7970] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.413051][ T7970] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.457908][ T7970] device bridge_slave_1 entered promiscuous mode [ 132.505310][ T7998] IPVS: ftp: loaded support on port[0] = 21 [ 132.569679][ T7970] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 132.595959][ T2877] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.626091][ T2877] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.698405][ T7967] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.735072][ T7970] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 132.811224][ T7970] team0: Port device team_slave_0 added [ 132.856220][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.864153][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.899736][ T7970] team0: Port device team_slave_1 added [ 132.909341][ T7967] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.936477][ T7972] chnl_net:caif_netlink_parms(): no params data found [ 132.976519][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.008574][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.036181][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.043239][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.108042][ T7970] device hsr_slave_0 entered promiscuous mode [ 133.146003][ T7970] device hsr_slave_1 entered promiscuous mode [ 133.175700][ T7970] debugfs: Directory 'hsr0' with parent '/' already present! [ 133.216338][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.236225][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.256709][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state 23:41:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@device={'device', 0x3d, './file0'}}]}) [ 133.263768][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.326283][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.353727][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.379030][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.398802][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.444599][ T7967] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 133.485684][ T7967] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 133.528607][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.547966][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.578320][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.599134][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.624719][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.638413][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.676502][ T7993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.718019][ T7972] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.725095][ T7972] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.748798][ T7972] device bridge_slave_0 entered promiscuous mode [ 133.773017][ T8005] IPVS: ftp: loaded support on port[0] = 21 [ 133.775605][ T7967] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.810479][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.819157][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.836574][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.853822][ T7972] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.870874][ T7972] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.886819][ T7972] device bridge_slave_1 entered promiscuous mode [ 133.946955][ T7998] chnl_net:caif_netlink_parms(): no params data found [ 134.021174][ T7972] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 134.082856][ T7972] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 134.203797][ T7972] team0: Port device team_slave_0 added [ 134.246615][ T7972] team0: Port device team_slave_1 added [ 134.318772][ T7998] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.336173][ T7998] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.344173][ T7998] device bridge_slave_0 entered promiscuous mode [ 134.426778][ T7970] 8021q: adding VLAN 0 to HW filter on device bond0 23:41:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0xfffffd64) syz_emit_ethernet(0x1, &(0x7f0000001080)=ANY=[@ANYBLOB="aebf79941ebd8c91b880e562d18a2d7bcce9e007e0684fa5b751e39eeea42fd2b925d9ffb8477db33ea90f6e0000000005aba760290ebf"], 0x0) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 23:41:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x7d0c970d4084190f}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a00000000000004ff7f0000000000e53ce01ccb616a6a66000100000000000002000100010000000000000200fd000005000500542d79e36ac2000000000a004872bbb6896209000055338b2698ffffffff7710aa00ffe8"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) [ 134.469116][ T7998] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.479951][ T7998] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.536592][ T7998] device bridge_slave_1 entered promiscuous mode [ 134.582680][ T8005] chnl_net:caif_netlink_parms(): no params data found [ 134.618523][ T7972] device hsr_slave_0 entered promiscuous mode [ 134.656041][ T7972] device hsr_slave_1 entered promiscuous mode [ 134.676251][ T7972] debugfs: Directory 'hsr0' with parent '/' already present! [ 134.722936][ T7998] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 134.758029][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 23:41:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x7d0c970d4084190f}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a00000000000004ff7f0000000000e53ce01ccb616a6a66000100000000000002000100010000000000000200fd000005000500542d79e36ac2000000000a004872bbb6896209000055338b2698ffffffff7710aa00ffe8"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) [ 134.785912][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.795175][ T7970] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.810969][ T7998] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 135.015886][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.024543][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.064098][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.071200][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.154724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.184407][ T8063] ================================================================== [ 135.192558][ T8063] BUG: KCSAN: data-race in alloc_empty_file / percpu_counter_add_batch [ 135.200788][ T8063] [ 135.203128][ T8063] read to 0xffffffff85a08548 of 8 bytes by task 8061 on cpu 1: [ 135.210683][ T8063] alloc_empty_file+0x2d/0x180 [ 135.215463][ T8063] path_openat+0x74/0x36e0 [ 135.219881][ T8063] do_filp_open+0x11e/0x1b0 [ 135.224393][ T8063] do_sys_open+0x3b3/0x4f0 [ 135.228821][ T8063] __x64_sys_open+0x55/0x70 [ 135.233353][ T8063] do_syscall_64+0xcc/0x370 [ 135.237866][ T8063] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.243751][ T8063] [ 135.246088][ T8063] write to 0xffffffff85a08548 of 8 bytes by task 8063 on cpu 0: [ 135.253724][ T8063] percpu_counter_add_batch+0xca/0x150 [ 135.259193][ T8063] alloc_empty_file+0xd2/0x180 [ 135.263978][ T8063] path_openat+0x74/0x36e0 [ 135.268390][ T8063] do_filp_open+0x11e/0x1b0 [ 135.272903][ T8063] do_sys_open+0x3b3/0x4f0 [ 135.277341][ T8063] __x64_sys_open+0x55/0x70 [ 135.282315][ T8063] do_syscall_64+0xcc/0x370 [ 135.286828][ T8063] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.292729][ T8063] [ 135.295053][ T8063] Reported by Kernel Concurrency Sanitizer on: [ 135.301209][ T8063] CPU: 0 PID: 8063 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 135.307966][ T8063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.318024][ T8063] ================================================================== [ 135.326083][ T8063] Kernel panic - not syncing: panic_on_warn set ... [ 135.332701][ T8063] CPU: 0 PID: 8063 Comm: ps Not tainted 5.4.0-rc6+ #0 [ 135.339476][ T8063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.349549][ T8063] Call Trace: [ 135.352855][ T8063] dump_stack+0xf5/0x159 [ 135.357124][ T8063] panic+0x210/0x640 [ 135.361056][ T8063] ? vprintk_func+0x8d/0x140 [ 135.365662][ T8063] kcsan_report.cold+0xc/0xe [ 135.370286][ T8063] kcsan_setup_watchpoint+0x3fe/0x410 [ 135.375676][ T8063] __tsan_unaligned_write8+0x143/0x1f0 [ 135.381169][ T8063] percpu_counter_add_batch+0xca/0x150 [ 135.386669][ T8063] alloc_empty_file+0xd2/0x180 [ 135.391444][ T8063] path_openat+0x74/0x36e0 [ 135.395874][ T8063] ? __rcu_read_unlock+0x66/0x3c0 [ 135.400910][ T8063] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 135.406812][ T8063] ? __rcu_read_unlock+0x66/0x3c0 [ 135.411856][ T8063] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 135.417766][ T8063] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 135.423672][ T8063] ? __read_once_size+0x41/0xe0 [ 135.428529][ T8063] do_filp_open+0x11e/0x1b0 [ 135.433043][ T8063] ? __check_object_size+0x5f/0x346 [ 135.438256][ T8063] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 135.444168][ T8063] ? __alloc_fd+0x2ef/0x3b0 [ 135.448698][ T8063] do_sys_open+0x3b3/0x4f0 [ 135.453136][ T8063] __x64_sys_open+0x55/0x70 [ 135.457650][ T8063] do_syscall_64+0xcc/0x370 [ 135.462184][ T8063] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.468088][ T8063] RIP: 0033:0x7f27edcab120 [ 135.472529][ T8063] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 135.492222][ T8063] RSP: 002b:00007ffdf7971b68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 135.500654][ T8063] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f27edcab120 [ 135.508632][ T8063] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f27ee179d00 [ 135.516627][ T8063] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f27edf73a10 [ 135.524612][ T8063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f27ee178d00 [ 135.532598][ T8063] R13: 00000000010fd1c0 R14: 0000000000000005 R15: 0000000000000000 [ 135.541896][ T8063] Kernel Offset: disabled [ 135.546250][ T8063] Rebooting in 86400 seconds..