Warning: Permanently added '10.128.1.22' (ED25519) to the list of known hosts. 2026/04/23 20:34:24 parsed 1 programs [ 45.290111][ T29] audit: type=1400 audit(1776976464.174:62): avc: denied { node_bind } for pid=2969 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 45.311504][ T29] audit: type=1400 audit(1776976464.174:63): avc: denied { module_request } for pid=2969 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 47.623779][ T29] audit: type=1400 audit(1776976466.504:64): avc: denied { mounton } for pid=2980 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 47.647749][ T29] audit: type=1400 audit(1776976466.534:65): avc: denied { mount } for pid=2980 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 47.651272][ T2980] cgroup: Unknown subsys name 'net' [ 47.677673][ T29] audit: type=1400 audit(1776976466.564:66): avc: denied { unmount } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 47.818890][ T2980] cgroup: Unknown subsys name 'cpuset' [ 47.827481][ T2980] cgroup: Unknown subsys name 'rlimit' [ 47.984218][ T29] audit: type=1400 audit(1776976466.864:67): avc: denied { setattr } for pid=2980 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.008394][ T29] audit: type=1400 audit(1776976466.864:68): avc: denied { create } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 48.033443][ T29] audit: type=1400 audit(1776976466.864:69): avc: denied { write } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 48.062977][ T29] audit: type=1400 audit(1776976466.864:70): avc: denied { read } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 48.085633][ T29] audit: type=1400 audit(1776976466.894:71): avc: denied { sys_module } for pid=2980 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 48.153533][ T2984] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 48.227822][ T2980] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 50.043503][ T2987] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 53.272164][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 53.272186][ T29] audit: type=1400 audit(1776976472.154:97): avc: denied { create } for pid=3000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.463182][ T29] audit: type=1401 audit(1776976481.344:98): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 63.212834][ T29] audit: type=1400 audit(1776976482.094:99): avc: denied { create } for pid=3486 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 63.234862][ T29] audit: type=1400 audit(1776976482.094:100): avc: denied { sys_admin } for pid=3486 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 63.258191][ T29] audit: type=1400 audit(1776976482.144:101): avc: denied { sys_chroot } for pid=3487 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 63.395243][ T29] audit: type=1400 audit(1776976482.274:102): avc: denied { create } for pid=3493 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 63.790499][ T29] audit: type=1400 audit(1776976482.674:103): avc: denied { create } for pid=3502 comm="syz-executor" name="tun" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 63.813042][ T29] audit: type=1400 audit(1776976482.694:104): avc: denied { setattr } for pid=3502 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 63.836064][ T29] audit: type=1400 audit(1776976482.694:105): avc: denied { read write } for pid=3502 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 63.861513][ T29] audit: type=1400 audit(1776976482.694:106): avc: denied { open } for pid=3502 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 2026/04/23 20:34:43 executed programs: 0 2026/04/23 20:34:55 executed programs: 2 [ 76.197840][ T29] audit: type=1400 audit(1776976495.084:107): avc: denied { read write } for pid=3965 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.222208][ T29] audit: type=1400 audit(1776976495.084:108): avc: denied { open } for pid=3965 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.247989][ T29] audit: type=1400 audit(1776976495.084:109): avc: denied { ioctl } for pid=3965 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.436711][ T1121] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 76.590600][ T1121] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 76.599930][ T1121] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 76.608480][ T1121] usb 4-1: Product: syz [ 76.612669][ T1121] usb 4-1: Manufacturer: syz [ 76.617319][ T1121] usb 4-1: SerialNumber: syz [ 76.632227][ T1121] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 76.689378][ T29] audit: type=1400 audit(1776976495.574:110): avc: denied { firmware_load } for pid=23 comm="kworker/1:0" path="/lib/firmware/ath9k_htc/htc_9271-1.4.0.fw" dev="sda1" ino=313 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 76.726340][ T23] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 76.957615][ T1121] usb 4-1: USB disconnect, device number 2 [ 77.796533][ T23] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 77.804155][ T23] ath9k_htc: Failed to initialize the device [ 77.811856][ T1121] usb 4-1: ath9k_htc: USB layer deinitialized [ 78.107428][ T1121] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 78.260699][ T1121] usb 4-1: New USB device found, idVendor=0cf3, idProduct=1002, bcdDevice= 1.08 [ 78.269892][ T1121] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 78.277964][ T1121] usb 4-1: Product: syz [ 78.282338][ T1121] usb 4-1: Manufacturer: syz [ 78.287021][ T1121] usb 4-1: SerialNumber: syz [ 78.427400][ T1121] usb 4-1: reset high-speed USB device number 3 using dummy_hcd [ 79.116705][ T1121] usb 4-1: device descriptor read/64, error -71 [ 79.401771][ T3969] usb 4-1: driver API: 1.9.9 2016-02-15 [1-1] [ 79.408126][ T3969] usb 4-1: firmware API: 1.9.6 2012-07-07 [ 79.618329][ C1] usb 4-1: received invalid command response:got 60, instead of 0 [ 79.626421][ C1] usb 4-1: restart device (9) [ 79.631919][ C1] usb 4-1: received invalid command response:got -2, instead of 0 [ 79.832239][ C1] usb 4-1: received invalid command response:got 60, instead of 4 [ 79.840099][ C1] ================================================================== [ 79.848169][ C1] BUG: KASAN: stack-out-of-bounds in carl9170_handle_command_response+0x21f/0xc50 [ 79.857371][ C1] Write of size 60 at addr ffffc90001f1fa38 by task swapper/1/0 [ 79.864996][ C1] [ 79.867323][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full) [ 79.867345][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 79.867356][ C1] Call Trace: [ 79.867364][ C1] [ 79.867371][ C1] dump_stack_lvl+0x100/0x190 [ 79.867398][ C1] print_report+0x13d/0x4b0 [ 79.867422][ C1] ? __lock_acquire+0x4a5/0x2630 [ 79.867444][ C1] ? carl9170_handle_command_response+0x21f/0xc50 [ 79.867466][ C1] kasan_report+0xdf/0x1d0 [ 79.867492][ C1] ? carl9170_handle_command_response+0x21f/0xc50 [ 79.867516][ C1] kasan_check_range+0x10f/0x1e0 [ 79.867534][ C1] __asan_memcpy+0x3c/0x60 [ 79.867554][ C1] carl9170_handle_command_response+0x21f/0xc50 [ 79.867576][ C1] carl9170_usb_rx_irq_complete+0xfc/0x1b0 [ 79.867602][ C1] __usb_hcd_giveback_urb+0x38d/0x610 [ 79.867622][ C1] usb_hcd_giveback_urb+0x3ca/0x4a0 [ 79.867640][ C1] dummy_timer+0xda1/0x36c0 [ 79.867675][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 79.867703][ C1] ? __pfx_dummy_timer+0x10/0x10 [ 79.867720][ C1] ? rcu_is_watching+0x12/0xc0 [ 79.867744][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 79.867768][ C1] ? __pfx_dummy_timer+0x10/0x10 [ 79.867785][ C1] __hrtimer_run_queues+0x470/0xa00 [ 79.867811][ C1] hrtimer_run_softirq+0x17d/0x2c0 [ 79.867834][ C1] handle_softirqs+0x1dd/0x9e0 [ 79.867863][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 79.867890][ C1] ? _raw_spin_unlock+0x28/0x50 [ 79.867911][ C1] ? __hrtimer_rearm_deferred+0x9b/0x740 [ 79.867937][ C1] __irq_exit_rcu+0x160/0x210 [ 79.867964][ C1] irq_exit_rcu+0x9/0x30 [ 79.867990][ C1] sysvec_apic_timer_interrupt+0x8f/0xb0 [ 79.868017][ C1] [ 79.868022][ C1] [ 79.868029][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 79.868048][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 79.868075][ C1] Code: d4 b4 01 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 63 9d 15 00 fb f4 7c f2 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 79.868093][ C1] RSP: 0018:ffffc9000013fe00 EFLAGS: 00000246 [ 79.868108][ C1] RAX: 0000000000050b99 RBX: ffff8881022d9dc0 RCX: ffffffff8770e3f5 [ 79.868120][ C1] RDX: 0000000000000000 RSI: ffffffff890d1d42 RDI: ffffffff87b03fe0 [ 79.868131][ C1] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed103eae673d [ 79.868142][ C1] R10: ffff8881f57339eb R11: 0000000000000000 R12: 0000000000000001 [ 79.868152][ C1] R13: ffffed102045b3b8 R14: 0000000000000001 R15: ffffffff8af1a1d0 [ 79.868166][ C1] ? ct_kernel_exit+0x125/0x180 [ 79.868194][ C1] default_idle+0x9/0x10 [ 79.868211][ C1] default_idle_call+0x6c/0xb0 [ 79.868229][ C1] do_idle+0x464/0x590 [ 79.868248][ C1] ? __pfx_do_idle+0x10/0x10 [ 79.868268][ C1] cpu_startup_entry+0x4f/0x60 [ 79.868287][ C1] start_secondary+0x21d/0x2d0 [ 79.868303][ C1] ? __pfx_start_secondary+0x10/0x10 [ 79.868321][ C1] common_startup_64+0x13e/0x148 [ 79.868344][ C1] [ 79.868350][ C1] [ 80.165064][ C1] The buggy address belongs to a vmalloc virtual mapping [ 80.172187][ C1] The buggy address belongs to the physical page: [ 80.178599][ C1] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11e4a7 [ 80.187475][ C1] flags: 0x200000000000000(node=0|zone=2) [ 80.193220][ C1] raw: 0200000000000000 0000000000000000 ffffea00047929c8 0000000000000000 [ 80.201820][ C1] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 80.210406][ C1] page dumped because: kasan: bad access detected [ 80.216913][ C1] page_owner tracks the page as allocated [ 80.222665][ C1] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x29c2(GFP_NOWAIT|__GFP_HIGHMEM|__GFP_IO|__GFP_FS|__GFP_ZERO), pid 1608, tgid 1608 (kworker/u8:7), ts 76062638961, free_ts 75812806022 [ 80.242294][ C1] post_alloc_hook+0x153/0x170 [ 80.247078][ C1] get_page_from_freelist+0xf34/0x3a90 [ 80.252642][ C1] __alloc_frozen_pages_noprof+0x273/0x28a0 [ 80.258557][ C1] alloc_pages_mpol+0xe8/0x410 [ 80.263528][ C1] alloc_pages_noprof+0x1a/0x160 [ 80.268468][ C1] __vmalloc_node_range_noprof+0xf9a/0x1630 [ 80.274373][ C1] __vmalloc_node_noprof+0xad/0xf0 [ 80.279651][ C1] copy_process+0x7fb/0x7d20 [ 80.284245][ C1] kernel_clone+0x12e/0x9c0 [ 80.288842][ C1] user_mode_thread+0xcc/0x110 [ 80.293606][ C1] call_usermodehelper_exec_work+0x6b/0x180 [ 80.299521][ C1] process_one_work+0xa0e/0x1980 [ 80.304464][ C1] worker_thread+0x5ef/0xe50 [ 80.309079][ C1] kthread+0x370/0x450 [ 80.313151][ C1] ret_from_fork+0x69a/0xc80 [ 80.317781][ C1] ret_from_fork_asm+0x1a/0x30 [ 80.322659][ C1] page last free pid 3516 tgid 3516 stack trace: [ 80.328983][ C1] __free_frozen_pages+0x692/0xf10 [ 80.334195][ C1] qlist_free_all+0x47/0xf0 [ 80.338706][ C1] kasan_quarantine_reduce+0x1a0/0x1f0 [ 80.344212][ C1] __kasan_slab_alloc+0x4e/0x70 [ 80.349248][ C1] kmem_cache_alloc_node_noprof+0x26b/0x6b0 [ 80.355148][ C1] __alloc_skb+0x140/0x710 [ 80.359576][ C1] netlink_alloc_large_skb+0x69/0x150 [ 80.364956][ C1] netlink_sendmsg+0x680/0xda0 [ 80.369757][ C1] __sys_sendto+0x468/0x4b0 [ 80.374267][ C1] __x64_sys_sendto+0xe0/0x1c0 [ 80.379035][ C1] do_syscall_64+0x10b/0x7f0 [ 80.383629][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.389534][ C1] [ 80.391865][ C1] Memory state around the buggy address: [ 80.397499][ C1] ffffc90001f1f900: f1 f1 f1 00 00 00 f3 f3 f3 f3 f3 00 00 00 00 00 [ 80.405559][ C1] ffffc90001f1f980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 80.413795][ C1] >ffffc90001f1fa00: 00 f1 f1 f1 f1 f1 f1 04 f2 04 f3 f3 f3 00 00 00 [ 80.421850][ C1] ^ [ 80.427736][ C1] ffffc90001f1fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 80.435792][ C1] ffffc90001f1fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 80.443849][ C1] ================================================================== [ 80.451923][ C1] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 80.459204][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full) [ 80.468143][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 80.478907][ C1] Call Trace: [ 80.482193][ C1] [ 80.485046][ C1] dump_stack_lvl+0x100/0x190 [ 80.489824][ C1] vpanic+0x552/0x970 [ 80.493812][ C1] ? __pfx_vpanic+0x10/0x10 [ 80.498319][ C1] ? __pfx_vprintk_emit+0x10/0x10 [ 80.503356][ C1] ? carl9170_handle_command_response+0x21f/0xc50 [ 80.509837][ C1] panic+0xd1/0xe0 [ 80.513738][ C1] ? __pfx_panic+0x10/0x10 [ 80.518173][ C1] ? end_report.part.0+0x23/0x90 [ 80.523119][ C1] ? rcu_is_watching+0x12/0xc0 [ 80.527891][ C1] ? end_report.part.0+0x23/0x90 [ 80.532854][ C1] ? check_panic_on_warn+0x1f/0x90 [ 80.537971][ C1] check_panic_on_warn.cold+0x19/0x34 [ 80.543350][ C1] end_report.part.0+0x3a/0x90 [ 80.548126][ C1] kasan_report.cold+0xe/0x18 [ 80.552829][ C1] ? carl9170_handle_command_response+0x21f/0xc50 [ 80.559259][ C1] kasan_check_range+0x10f/0x1e0 [ 80.564196][ C1] __asan_memcpy+0x3c/0x60 [ 80.568617][ C1] carl9170_handle_command_response+0x21f/0xc50 [ 80.574869][ C1] carl9170_usb_rx_irq_complete+0xfc/0x1b0 [ 80.580697][ C1] __usb_hcd_giveback_urb+0x38d/0x610 [ 80.586164][ C1] usb_hcd_giveback_urb+0x3ca/0x4a0 [ 80.591367][ C1] dummy_timer+0xda1/0x36c0 [ 80.595875][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 80.601691][ C1] ? __pfx_dummy_timer+0x10/0x10 [ 80.606653][ C1] ? rcu_is_watching+0x12/0xc0 [ 80.611444][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 80.617261][ C1] ? __pfx_dummy_timer+0x10/0x10 [ 80.622198][ C1] __hrtimer_run_queues+0x470/0xa00 [ 80.627415][ C1] hrtimer_run_softirq+0x17d/0x2c0 [ 80.632639][ C1] handle_softirqs+0x1dd/0x9e0 [ 80.637424][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 80.642723][ C1] ? _raw_spin_unlock+0x28/0x50 [ 80.647577][ C1] ? __hrtimer_rearm_deferred+0x9b/0x740 [ 80.653395][ C1] __irq_exit_rcu+0x160/0x210 [ 80.658084][ C1] irq_exit_rcu+0x9/0x30 [ 80.662350][ C1] sysvec_apic_timer_interrupt+0x8f/0xb0 [ 80.668032][ C1] [ 80.670970][ C1] [ 80.673923][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 80.679914][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 80.685566][ C1] Code: d4 b4 01 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 63 9d 15 00 fb f4 7c f2 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 80.705180][ C1] RSP: 0018:ffffc9000013fe00 EFLAGS: 00000246 [ 80.711266][ C1] RAX: 0000000000050b99 RBX: ffff8881022d9dc0 RCX: ffffffff8770e3f5 [ 80.719239][ C1] RDX: 0000000000000000 RSI: ffffffff890d1d42 RDI: ffffffff87b03fe0 [ 80.727223][ C1] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed103eae673d [ 80.735201][ C1] R10: ffff8881f57339eb R11: 0000000000000000 R12: 0000000000000001 [ 80.743176][ C1] R13: ffffed102045b3b8 R14: 0000000000000001 R15: ffffffff8af1a1d0 [ 80.751237][ C1] ? ct_kernel_exit+0x125/0x180 [ 80.756121][ C1] default_idle+0x9/0x10 [ 80.760413][ C1] default_idle_call+0x6c/0xb0 [ 80.765250][ C1] do_idle+0x464/0x590 [ 80.769333][ C1] ? __pfx_do_idle+0x10/0x10 [ 80.773934][ C1] cpu_startup_entry+0x4f/0x60 [ 80.778705][ C1] start_secondary+0x21d/0x2d0 [ 80.783471][ C1] ? __pfx_start_secondary+0x10/0x10 [ 80.788775][ C1] common_startup_64+0x13e/0x148 [ 80.793728][ C1] [ 80.796887][ C1] Kernel Offset: disabled [ 80.801216][ C1] Rebooting in 86400 seconds..