Warning: Permanently added '10.128.1.22' (ED25519) to the list of known hosts.
2026/04/23 20:34:24 parsed 1 programs
[ 45.290111][ T29] audit: type=1400 audit(1776976464.174:62): avc: denied { node_bind } for pid=2969 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 45.311504][ T29] audit: type=1400 audit(1776976464.174:63): avc: denied { module_request } for pid=2969 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 47.623779][ T29] audit: type=1400 audit(1776976466.504:64): avc: denied { mounton } for pid=2980 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 47.647749][ T29] audit: type=1400 audit(1776976466.534:65): avc: denied { mount } for pid=2980 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 47.651272][ T2980] cgroup: Unknown subsys name 'net'
[ 47.677673][ T29] audit: type=1400 audit(1776976466.564:66): avc: denied { unmount } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 47.818890][ T2980] cgroup: Unknown subsys name 'cpuset'
[ 47.827481][ T2980] cgroup: Unknown subsys name 'rlimit'
[ 47.984218][ T29] audit: type=1400 audit(1776976466.864:67): avc: denied { setattr } for pid=2980 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 48.008394][ T29] audit: type=1400 audit(1776976466.864:68): avc: denied { create } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 48.033443][ T29] audit: type=1400 audit(1776976466.864:69): avc: denied { write } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 48.062977][ T29] audit: type=1400 audit(1776976466.864:70): avc: denied { read } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 48.085633][ T29] audit: type=1400 audit(1776976466.894:71): avc: denied { sys_module } for pid=2980 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 48.153533][ T2984] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
Setting up swapspace version 1, size = 127995904 bytes
[ 48.227822][ T2980] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 50.043503][ T2987] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 53.272164][ T29] kauditd_printk_skb: 25 callbacks suppressed
[ 53.272186][ T29] audit: type=1400 audit(1776976472.154:97): avc: denied { create } for pid=3000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 62.463182][ T29] audit: type=1401 audit(1776976481.344:98): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768"
[ 63.212834][ T29] audit: type=1400 audit(1776976482.094:99): avc: denied { create } for pid=3486 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1
[ 63.234862][ T29] audit: type=1400 audit(1776976482.094:100): avc: denied { sys_admin } for pid=3486 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 63.258191][ T29] audit: type=1400 audit(1776976482.144:101): avc: denied { sys_chroot } for pid=3487 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 63.395243][ T29] audit: type=1400 audit(1776976482.274:102): avc: denied { create } for pid=3493 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[ 63.790499][ T29] audit: type=1400 audit(1776976482.674:103): avc: denied { create } for pid=3502 comm="syz-executor" name="tun" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1
[ 63.813042][ T29] audit: type=1400 audit(1776976482.694:104): avc: denied { setattr } for pid=3502 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1
[ 63.836064][ T29] audit: type=1400 audit(1776976482.694:105): avc: denied { read write } for pid=3502 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1
[ 63.861513][ T29] audit: type=1400 audit(1776976482.694:106): avc: denied { open } for pid=3502 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1
2026/04/23 20:34:43 executed programs: 0
2026/04/23 20:34:55 executed programs: 2
[ 76.197840][ T29] audit: type=1400 audit(1776976495.084:107): avc: denied { read write } for pid=3965 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 76.222208][ T29] audit: type=1400 audit(1776976495.084:108): avc: denied { open } for pid=3965 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 76.247989][ T29] audit: type=1400 audit(1776976495.084:109): avc: denied { ioctl } for pid=3965 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 76.436711][ T1121] usb 4-1: new high-speed USB device number 2 using dummy_hcd
[ 76.590600][ T1121] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08
[ 76.599930][ T1121] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 76.608480][ T1121] usb 4-1: Product: syz
[ 76.612669][ T1121] usb 4-1: Manufacturer: syz
[ 76.617319][ T1121] usb 4-1: SerialNumber: syz
[ 76.632227][ T1121] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested
[ 76.689378][ T29] audit: type=1400 audit(1776976495.574:110): avc: denied { firmware_load } for pid=23 comm="kworker/1:0" path="/lib/firmware/ath9k_htc/htc_9271-1.4.0.fw" dev="sda1" ino=313 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1
[ 76.726340][ T23] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008
[ 76.957615][ T1121] usb 4-1: USB disconnect, device number 2
[ 77.796533][ T23] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive
[ 77.804155][ T23] ath9k_htc: Failed to initialize the device
[ 77.811856][ T1121] usb 4-1: ath9k_htc: USB layer deinitialized
[ 78.107428][ T1121] usb 4-1: new high-speed USB device number 3 using dummy_hcd
[ 78.260699][ T1121] usb 4-1: New USB device found, idVendor=0cf3, idProduct=1002, bcdDevice= 1.08
[ 78.269892][ T1121] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 78.277964][ T1121] usb 4-1: Product: syz
[ 78.282338][ T1121] usb 4-1: Manufacturer: syz
[ 78.287021][ T1121] usb 4-1: SerialNumber: syz
[ 78.427400][ T1121] usb 4-1: reset high-speed USB device number 3 using dummy_hcd
[ 79.116705][ T1121] usb 4-1: device descriptor read/64, error -71
[ 79.401771][ T3969] usb 4-1: driver API: 1.9.9 2016-02-15 [1-1]
[ 79.408126][ T3969] usb 4-1: firmware API: 1.9.6 2012-07-07
[ 79.618329][ C1] usb 4-1: received invalid command response:got 60, instead of 0
[ 79.626421][ C1] usb 4-1: restart device (9)
[ 79.631919][ C1] usb 4-1: received invalid command response:got -2, instead of 0
[ 79.832239][ C1] usb 4-1: received invalid command response:got 60, instead of 4
[ 79.840099][ C1] ==================================================================
[ 79.848169][ C1] BUG: KASAN: stack-out-of-bounds in carl9170_handle_command_response+0x21f/0xc50
[ 79.857371][ C1] Write of size 60 at addr ffffc90001f1fa38 by task swapper/1/0
[ 79.864996][ C1]
[ 79.867323][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full)
[ 79.867345][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026
[ 79.867356][ C1] Call Trace:
[ 79.867364][ C1]
[ 79.867371][ C1] dump_stack_lvl+0x100/0x190
[ 79.867398][ C1] print_report+0x13d/0x4b0
[ 79.867422][ C1] ? __lock_acquire+0x4a5/0x2630
[ 79.867444][ C1] ? carl9170_handle_command_response+0x21f/0xc50
[ 79.867466][ C1] kasan_report+0xdf/0x1d0
[ 79.867492][ C1] ? carl9170_handle_command_response+0x21f/0xc50
[ 79.867516][ C1] kasan_check_range+0x10f/0x1e0
[ 79.867534][ C1] __asan_memcpy+0x3c/0x60
[ 79.867554][ C1] carl9170_handle_command_response+0x21f/0xc50
[ 79.867576][ C1] carl9170_usb_rx_irq_complete+0xfc/0x1b0
[ 79.867602][ C1] __usb_hcd_giveback_urb+0x38d/0x610
[ 79.867622][ C1] usb_hcd_giveback_urb+0x3ca/0x4a0
[ 79.867640][ C1] dummy_timer+0xda1/0x36c0
[ 79.867675][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80
[ 79.867703][ C1] ? __pfx_dummy_timer+0x10/0x10
[ 79.867720][ C1] ? rcu_is_watching+0x12/0xc0
[ 79.867744][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80
[ 79.867768][ C1] ? __pfx_dummy_timer+0x10/0x10
[ 79.867785][ C1] __hrtimer_run_queues+0x470/0xa00
[ 79.867811][ C1] hrtimer_run_softirq+0x17d/0x2c0
[ 79.867834][ C1] handle_softirqs+0x1dd/0x9e0
[ 79.867863][ C1] ? __pfx_handle_softirqs+0x10/0x10
[ 79.867890][ C1] ? _raw_spin_unlock+0x28/0x50
[ 79.867911][ C1] ? __hrtimer_rearm_deferred+0x9b/0x740
[ 79.867937][ C1] __irq_exit_rcu+0x160/0x210
[ 79.867964][ C1] irq_exit_rcu+0x9/0x30
[ 79.867990][ C1] sysvec_apic_timer_interrupt+0x8f/0xb0
[ 79.868017][ C1]
[ 79.868022][ C1]
[ 79.868029][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20
[ 79.868048][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20
[ 79.868075][ C1] Code: d4 b4 01 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 63 9d 15 00 fb f4 7c f2 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[ 79.868093][ C1] RSP: 0018:ffffc9000013fe00 EFLAGS: 00000246
[ 79.868108][ C1] RAX: 0000000000050b99 RBX: ffff8881022d9dc0 RCX: ffffffff8770e3f5
[ 79.868120][ C1] RDX: 0000000000000000 RSI: ffffffff890d1d42 RDI: ffffffff87b03fe0
[ 79.868131][ C1] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed103eae673d
[ 79.868142][ C1] R10: ffff8881f57339eb R11: 0000000000000000 R12: 0000000000000001
[ 79.868152][ C1] R13: ffffed102045b3b8 R14: 0000000000000001 R15: ffffffff8af1a1d0
[ 79.868166][ C1] ? ct_kernel_exit+0x125/0x180
[ 79.868194][ C1] default_idle+0x9/0x10
[ 79.868211][ C1] default_idle_call+0x6c/0xb0
[ 79.868229][ C1] do_idle+0x464/0x590
[ 79.868248][ C1] ? __pfx_do_idle+0x10/0x10
[ 79.868268][ C1] cpu_startup_entry+0x4f/0x60
[ 79.868287][ C1] start_secondary+0x21d/0x2d0
[ 79.868303][ C1] ? __pfx_start_secondary+0x10/0x10
[ 79.868321][ C1] common_startup_64+0x13e/0x148
[ 79.868344][ C1]
[ 79.868350][ C1]
[ 80.165064][ C1] The buggy address belongs to a vmalloc virtual mapping
[ 80.172187][ C1] The buggy address belongs to the physical page:
[ 80.178599][ C1] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11e4a7
[ 80.187475][ C1] flags: 0x200000000000000(node=0|zone=2)
[ 80.193220][ C1] raw: 0200000000000000 0000000000000000 ffffea00047929c8 0000000000000000
[ 80.201820][ C1] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 80.210406][ C1] page dumped because: kasan: bad access detected
[ 80.216913][ C1] page_owner tracks the page as allocated
[ 80.222665][ C1] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x29c2(GFP_NOWAIT|__GFP_HIGHMEM|__GFP_IO|__GFP_FS|__GFP_ZERO), pid 1608, tgid 1608 (kworker/u8:7), ts 76062638961, free_ts 75812806022
[ 80.242294][ C1] post_alloc_hook+0x153/0x170
[ 80.247078][ C1] get_page_from_freelist+0xf34/0x3a90
[ 80.252642][ C1] __alloc_frozen_pages_noprof+0x273/0x28a0
[ 80.258557][ C1] alloc_pages_mpol+0xe8/0x410
[ 80.263528][ C1] alloc_pages_noprof+0x1a/0x160
[ 80.268468][ C1] __vmalloc_node_range_noprof+0xf9a/0x1630
[ 80.274373][ C1] __vmalloc_node_noprof+0xad/0xf0
[ 80.279651][ C1] copy_process+0x7fb/0x7d20
[ 80.284245][ C1] kernel_clone+0x12e/0x9c0
[ 80.288842][ C1] user_mode_thread+0xcc/0x110
[ 80.293606][ C1] call_usermodehelper_exec_work+0x6b/0x180
[ 80.299521][ C1] process_one_work+0xa0e/0x1980
[ 80.304464][ C1] worker_thread+0x5ef/0xe50
[ 80.309079][ C1] kthread+0x370/0x450
[ 80.313151][ C1] ret_from_fork+0x69a/0xc80
[ 80.317781][ C1] ret_from_fork_asm+0x1a/0x30
[ 80.322659][ C1] page last free pid 3516 tgid 3516 stack trace:
[ 80.328983][ C1] __free_frozen_pages+0x692/0xf10
[ 80.334195][ C1] qlist_free_all+0x47/0xf0
[ 80.338706][ C1] kasan_quarantine_reduce+0x1a0/0x1f0
[ 80.344212][ C1] __kasan_slab_alloc+0x4e/0x70
[ 80.349248][ C1] kmem_cache_alloc_node_noprof+0x26b/0x6b0
[ 80.355148][ C1] __alloc_skb+0x140/0x710
[ 80.359576][ C1] netlink_alloc_large_skb+0x69/0x150
[ 80.364956][ C1] netlink_sendmsg+0x680/0xda0
[ 80.369757][ C1] __sys_sendto+0x468/0x4b0
[ 80.374267][ C1] __x64_sys_sendto+0xe0/0x1c0
[ 80.379035][ C1] do_syscall_64+0x10b/0x7f0
[ 80.383629][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 80.389534][ C1]
[ 80.391865][ C1] Memory state around the buggy address:
[ 80.397499][ C1] ffffc90001f1f900: f1 f1 f1 00 00 00 f3 f3 f3 f3 f3 00 00 00 00 00
[ 80.405559][ C1] ffffc90001f1f980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 80.413795][ C1] >ffffc90001f1fa00: 00 f1 f1 f1 f1 f1 f1 04 f2 04 f3 f3 f3 00 00 00
[ 80.421850][ C1] ^
[ 80.427736][ C1] ffffc90001f1fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 80.435792][ C1] ffffc90001f1fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 80.443849][ C1] ==================================================================
[ 80.451923][ C1] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 80.459204][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full)
[ 80.468143][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026
[ 80.478907][ C1] Call Trace:
[ 80.482193][ C1]
[ 80.485046][ C1] dump_stack_lvl+0x100/0x190
[ 80.489824][ C1] vpanic+0x552/0x970
[ 80.493812][ C1] ? __pfx_vpanic+0x10/0x10
[ 80.498319][ C1] ? __pfx_vprintk_emit+0x10/0x10
[ 80.503356][ C1] ? carl9170_handle_command_response+0x21f/0xc50
[ 80.509837][ C1] panic+0xd1/0xe0
[ 80.513738][ C1] ? __pfx_panic+0x10/0x10
[ 80.518173][ C1] ? end_report.part.0+0x23/0x90
[ 80.523119][ C1] ? rcu_is_watching+0x12/0xc0
[ 80.527891][ C1] ? end_report.part.0+0x23/0x90
[ 80.532854][ C1] ? check_panic_on_warn+0x1f/0x90
[ 80.537971][ C1] check_panic_on_warn.cold+0x19/0x34
[ 80.543350][ C1] end_report.part.0+0x3a/0x90
[ 80.548126][ C1] kasan_report.cold+0xe/0x18
[ 80.552829][ C1] ? carl9170_handle_command_response+0x21f/0xc50
[ 80.559259][ C1] kasan_check_range+0x10f/0x1e0
[ 80.564196][ C1] __asan_memcpy+0x3c/0x60
[ 80.568617][ C1] carl9170_handle_command_response+0x21f/0xc50
[ 80.574869][ C1] carl9170_usb_rx_irq_complete+0xfc/0x1b0
[ 80.580697][ C1] __usb_hcd_giveback_urb+0x38d/0x610
[ 80.586164][ C1] usb_hcd_giveback_urb+0x3ca/0x4a0
[ 80.591367][ C1] dummy_timer+0xda1/0x36c0
[ 80.595875][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80
[ 80.601691][ C1] ? __pfx_dummy_timer+0x10/0x10
[ 80.606653][ C1] ? rcu_is_watching+0x12/0xc0
[ 80.611444][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80
[ 80.617261][ C1] ? __pfx_dummy_timer+0x10/0x10
[ 80.622198][ C1] __hrtimer_run_queues+0x470/0xa00
[ 80.627415][ C1] hrtimer_run_softirq+0x17d/0x2c0
[ 80.632639][ C1] handle_softirqs+0x1dd/0x9e0
[ 80.637424][ C1] ? __pfx_handle_softirqs+0x10/0x10
[ 80.642723][ C1] ? _raw_spin_unlock+0x28/0x50
[ 80.647577][ C1] ? __hrtimer_rearm_deferred+0x9b/0x740
[ 80.653395][ C1] __irq_exit_rcu+0x160/0x210
[ 80.658084][ C1] irq_exit_rcu+0x9/0x30
[ 80.662350][ C1] sysvec_apic_timer_interrupt+0x8f/0xb0
[ 80.668032][ C1]
[ 80.670970][ C1]
[ 80.673923][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20
[ 80.679914][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20
[ 80.685566][ C1] Code: d4 b4 01 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 63 9d 15 00 fb f4 7c f2 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[ 80.705180][ C1] RSP: 0018:ffffc9000013fe00 EFLAGS: 00000246
[ 80.711266][ C1] RAX: 0000000000050b99 RBX: ffff8881022d9dc0 RCX: ffffffff8770e3f5
[ 80.719239][ C1] RDX: 0000000000000000 RSI: ffffffff890d1d42 RDI: ffffffff87b03fe0
[ 80.727223][ C1] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed103eae673d
[ 80.735201][ C1] R10: ffff8881f57339eb R11: 0000000000000000 R12: 0000000000000001
[ 80.743176][ C1] R13: ffffed102045b3b8 R14: 0000000000000001 R15: ffffffff8af1a1d0
[ 80.751237][ C1] ? ct_kernel_exit+0x125/0x180
[ 80.756121][ C1] default_idle+0x9/0x10
[ 80.760413][ C1] default_idle_call+0x6c/0xb0
[ 80.765250][ C1] do_idle+0x464/0x590
[ 80.769333][ C1] ? __pfx_do_idle+0x10/0x10
[ 80.773934][ C1] cpu_startup_entry+0x4f/0x60
[ 80.778705][ C1] start_secondary+0x21d/0x2d0
[ 80.783471][ C1] ? __pfx_start_secondary+0x10/0x10
[ 80.788775][ C1] common_startup_64+0x13e/0x148
[ 80.793728][ C1]
[ 80.796887][ C1] Kernel Offset: disabled
[ 80.801216][ C1] Rebooting in 86400 seconds..