Warning: Permanently added '10.128.1.135' (ED25519) to the list of known hosts. 2026/03/07 06:14:23 parsed 1 programs [ 49.693798][ T29] audit: type=1400 audit(1772864063.797:62): avc: denied { node_bind } for pid=2966 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 49.714718][ T29] audit: type=1400 audit(1772864063.797:63): avc: denied { module_request } for pid=2966 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 52.572146][ T29] audit: type=1400 audit(1772864066.677:64): avc: denied { mounton } for pid=2976 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 52.595880][ T29] audit: type=1400 audit(1772864066.697:65): avc: denied { mount } for pid=2976 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 52.605492][ T2976] cgroup: Unknown subsys name 'net' [ 52.626991][ T29] audit: type=1400 audit(1772864066.727:66): avc: denied { unmount } for pid=2976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 52.794171][ T2976] cgroup: Unknown subsys name 'cpuset' [ 52.802944][ T2976] cgroup: Unknown subsys name 'rlimit' [ 52.971029][ T29] audit: type=1400 audit(1772864067.077:67): avc: denied { setattr } for pid=2976 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.994447][ T29] audit: type=1400 audit(1772864067.077:68): avc: denied { create } for pid=2976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.015362][ T29] audit: type=1400 audit(1772864067.077:69): avc: denied { write } for pid=2976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.036213][ T29] audit: type=1400 audit(1772864067.077:70): avc: denied { read } for pid=2976 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.063155][ T29] audit: type=1400 audit(1772864067.167:71): avc: denied { sys_module } for pid=2976 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 53.209622][ T2980] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 53.236956][ T2976] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 54.740392][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 54.740421][ T29] audit: type=1400 audit(1772864068.837:80): avc: denied { execmem } for pid=2982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 54.786138][ T29] audit: type=1400 audit(1772864068.837:81): avc: denied { read } for pid=2983 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 54.807745][ T29] audit: type=1400 audit(1772864068.837:82): avc: denied { open } for pid=2983 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 54.831390][ T29] audit: type=1400 audit(1772864068.847:83): avc: denied { mounton } for pid=2983 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 54.853089][ T29] audit: type=1400 audit(1772864068.937:84): avc: denied { mounton } for pid=2983 comm="syz-executor" path="/root/syzkaller.omxfBl/syz-tmp" dev="sda1" ino=2030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 54.877886][ T29] audit: type=1400 audit(1772864068.937:85): avc: denied { mount } for pid=2983 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 54.900300][ T29] audit: type=1400 audit(1772864068.937:86): avc: denied { mounton } for pid=2983 comm="syz-executor" path="/root/syzkaller.omxfBl/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 54.925930][ T29] audit: type=1400 audit(1772864068.937:87): avc: denied { mount } for pid=2983 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 54.948108][ T29] audit: type=1400 audit(1772864068.957:88): avc: denied { mounton } for pid=2983 comm="syz-executor" path="/root/syzkaller.omxfBl/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 54.975132][ T29] audit: type=1400 audit(1772864068.957:89): avc: denied { mounton } for pid=2983 comm="syz-executor" path="/root/syzkaller.omxfBl/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1599 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 55.043541][ T2983] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 69.856116][ T3007] syz-executor (3007) used greatest stack depth: 22808 bytes left [ 70.274570][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 70.274593][ T29] audit: type=1400 audit(1772864084.377:98): avc: denied { create } for pid=3468 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 70.301315][ T29] audit: type=1400 audit(1772864084.377:99): avc: denied { sys_admin } for pid=3468 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 70.357088][ T29] audit: type=1400 audit(1772864084.457:100): avc: denied { sys_chroot } for pid=3469 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 70.619901][ T29] audit: type=1401 audit(1772864084.717:101): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 71.612442][ T29] audit: type=1400 audit(1772864085.717:102): avc: denied { create } for pid=3501 comm="syz-executor" name="tun" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 71.633443][ T29] audit: type=1400 audit(1772864085.717:103): avc: denied { setattr } for pid=3501 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 71.660761][ T29] audit: type=1400 audit(1772864085.717:104): avc: denied { read write } for pid=3501 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 71.688464][ T29] audit: type=1400 audit(1772864085.717:105): avc: denied { open } for pid=3501 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 71.760381][ T29] audit: type=1400 audit(1772864085.857:106): avc: denied { create } for pid=3504 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2026/03/07 06:14:46 executed programs: 0 2026/03/07 06:15:00 executed programs: 2 [ 86.066568][ T29] audit: type=1400 audit(1772864100.167:107): avc: denied { read write } for pid=3960 comm="syz.2.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.095190][ T29] audit: type=1400 audit(1772864100.197:108): avc: denied { open } for pid=3960 comm="syz.2.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.118918][ T29] audit: type=1400 audit(1772864100.197:109): avc: denied { ioctl } for pid=3960 comm="syz.2.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.330724][ T28] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 86.480533][ T28] usb 3-1: Using ep0 maxpacket: 32 [ 86.488079][ T28] usb 3-1: config 0 has too many interfaces: 197, using maximum allowed: 32 [ 86.496950][ T28] usb 3-1: config 0 has 1 interface, different from the descriptor's value: 197 [ 86.506075][ T28] usb 3-1: config 0 has no interface number 0 [ 86.512280][ T28] usb 3-1: New USB device found, idVendor=1286, idProduct=2001, bcdDevice= 6.2d [ 86.521391][ T28] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 86.541067][ T28] usb 3-1: config 0 descriptor?? [ 86.579365][ T29] audit: type=1400 audit(1772864100.677:110): avc: denied { firmware_load } for pid=2815 comm="kworker/1:2" path="/lib/firmware/libertas/usb8388_olpc.bin" dev="sda1" ino=432 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 86.800564][ C1] usb8xxx: URB in failure status: -2 [ 86.948434][ C1] BUG: sleeping function called from invalid context at drivers/usb/core/urb.c:705 [ 86.957865][ C1] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/1 [ 86.966554][ C1] preempt_count: 101, expected: 0 [ 86.971585][ C1] RCU nest depth: 0, expected: 0 [ 86.976534][ C1] no locks held by swapper/1/0. [ 86.981386][ C1] irq event stamp: 290547 [ 86.985716][ C1] hardirqs last enabled at (290546): [] _raw_spin_unlock_irqrestore+0x52/0x80 [ 86.996265][ C1] hardirqs last disabled at (290547): [] _raw_spin_lock_irqsave+0x52/0x60 [ 87.006356][ C1] softirqs last enabled at (290536): [] __irq_exit_rcu+0xed/0x150 [ 87.015837][ C1] softirqs last disabled at (290543): [] __irq_exit_rcu+0xed/0x150 [ 87.025388][ C1] Preemption disabled at: [ 87.025398][ C1] [<0000000000000000>] 0x0 [ 87.034152][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full) [ 87.034190][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 87.034214][ C1] Call Trace: [ 87.034224][ C1] [ 87.034233][ C1] dump_stack_lvl+0x100/0x190 [ 87.034291][ C1] __might_resched.cold+0x1ec/0x232 [ 87.034347][ C1] ? __pfx___might_resched+0x10/0x10 [ 87.034385][ C1] ? find_held_lock+0x2b/0x80 [ 87.034425][ C1] usb_kill_urb+0x8e/0x320 [ 87.034448][ C1] ? __pfx_usb_kill_urb+0x10/0x10 [ 87.034470][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 87.034498][ C1] ? __mod_timer+0x40e/0xca0 [ 87.034542][ C1] usb_tx_block+0x91/0x320 [ 87.034574][ C1] if_usb_send_fw_pkt.isra.0+0x2e4/0x550 [ 87.034610][ C1] if_usb_receive_fwload+0x5d3/0x780 [ 87.034642][ C1] ? __pfx_if_usb_receive_fwload+0x10/0x10 [ 87.034677][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 87.034708][ C1] __usb_hcd_giveback_urb+0x38d/0x610 [ 87.034748][ C1] usb_hcd_giveback_urb+0x3ca/0x4a0 [ 87.034789][ C1] dummy_timer+0xd85/0x3670 [ 87.034855][ C1] ? __pfx_dummy_timer+0x10/0x10 [ 87.034893][ C1] ? rcu_is_watching+0x12/0xc0 [ 87.034921][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 87.034947][ C1] ? __pfx_dummy_timer+0x10/0x10 [ 87.034985][ C1] __hrtimer_run_queues+0x50e/0xa70 [ 87.035016][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 87.035040][ C1] ? ktime_get_update_offsets_now+0x2cd/0x4d0 [ 87.035083][ C1] hrtimer_run_softirq+0x17d/0x350 [ 87.035109][ C1] handle_softirqs+0x1de/0x9d0 [ 87.035149][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 87.035190][ C1] __irq_exit_rcu+0xed/0x150 [ 87.035228][ C1] irq_exit_rcu+0x9/0x30 [ 87.035261][ C1] sysvec_apic_timer_interrupt+0x8f/0xb0 [ 87.035292][ C1] [ 87.035299][ C1] [ 87.035307][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 87.035334][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 87.035364][ C1] Code: ae b1 01 e9 13 e8 02 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d d3 e1 1d 00 fb f4 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 87.035387][ C1] RSP: 0018:ffffc9000013fe00 EFLAGS: 00000246 [ 87.035414][ C1] RAX: 0000000000046eed RBX: ffff8881022a1d00 RCX: ffffffff876898d5 [ 87.035429][ C1] RDX: 0000000000000000 RSI: ffffffff8901db96 RDI: ffffffff87afa420 [ 87.035444][ C1] RBP: 0000000000000001 R08: 0000000000000001 R09: ffffed103eae6725 [ 87.035458][ C1] R10: ffff8881f573392b R11: 0000000000000000 R12: ffffed10204543a0 [ 87.035472][ C1] R13: 0000000000000001 R14: ffffffff8aefe2d0 R15: 0000000000000000 [ 87.035494][ C1] ? ct_kernel_exit+0x125/0x180 [ 87.035528][ C1] default_idle+0x9/0x10 [ 87.035561][ C1] default_idle_call+0x6c/0xb0 [ 87.035596][ C1] do_idle+0x35b/0x4b0 [ 87.035635][ C1] ? __pfx_do_idle+0x10/0x10 [ 87.035671][ C1] ? rcu_is_watching+0x12/0xc0 [ 87.035698][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 87.035724][ C1] ? lockdep_hardirqs_on+0x78/0x100 [ 87.035758][ C1] cpu_startup_entry+0x4f/0x60 [ 87.035797][ C1] start_secondary+0x21d/0x2d0 [ 87.035835][ C1] ? __pfx_start_secondary+0x10/0x10 [ 87.035877][ C1] common_startup_64+0x13e/0x148 [ 87.035929][ C1] [ 87.035965][ C1] BUG: scheduling while atomic: swapper/1/0/0x00000102 [ 87.153710][ T1117] usb 3-1: USB disconnect, device number 2 [ 87.158740][ C1] no locks held by swapper/1/0. [ 87.158759][ C1] Modules linked in: [ 87.375868][ C1] irq event stamp: 290547 [ 87.380198][ C1] hardirqs last enabled at (290546): [] _raw_spin_unlock_irqrestore+0x52/0x80 [ 87.390720][ C1] hardirqs last disabled at (290547): [] _raw_spin_lock_irqsave+0x52/0x60 [ 87.400803][ C1] softirqs last enabled at (290536): [] __irq_exit_rcu+0xed/0x150 [ 87.410292][ C1] softirqs last disabled at (290543): [] __irq_exit_rcu+0xed/0x150 [ 87.419809][ C1] Preemption disabled at: [ 87.419820][ C1] [<0000000000000000>] 0x0 [ 87.428601][ C1] Kernel panic - not syncing: scheduling while atomic: panic_on_warn set ... [ 87.437376][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G W syzkaller #0 PREEMPT(full) [ 87.447909][ C1] Tainted: [W]=WARN [ 87.451729][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 87.461803][ C1] Call Trace: [ 87.465100][ C1] [ 87.467965][ C1] dump_stack_lvl+0x100/0x190 [ 87.472667][ C1] vpanic+0x552/0x970 [ 87.476677][ C1] ? __pfx_vpanic+0x10/0x10 [ 87.481199][ C1] ? __pfx_vprintk_emit+0x10/0x10 [ 87.486254][ C1] panic+0xd1/0xe0 [ 87.490254][ C1] ? __pfx_panic+0x10/0x10 [ 87.494710][ C1] ? nbcon_cpu_emergency_exit+0x127/0x1e0 [ 87.500485][ C1] ? __pfx_nbcon_cpu_emergency_exit+0x10/0x10 [ 87.506589][ C1] ? check_panic_on_warn+0x1f/0x90 [ 87.511719][ C1] check_panic_on_warn.cold+0x19/0x34 [ 87.517117][ C1] __schedule_bug.cold+0xca/0xfa [ 87.522085][ C1] __schedule+0x263a/0x41f0 [ 87.526610][ C1] ? do_raw_spin_lock+0x128/0x260 [ 87.531662][ C1] ? __pfx___schedule+0x10/0x10 [ 87.536525][ C1] ? find_held_lock+0x2b/0x80 [ 87.541230][ C1] ? schedule+0x2bf/0x390 [ 87.545581][ C1] schedule+0xdd/0x390 [ 87.549669][ C1] usb_kill_urb+0x253/0x320 [ 87.554216][ C1] ? __pfx_usb_kill_urb+0x10/0x10 [ 87.559255][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 87.565078][ C1] ? __pfx_autoremove_wake_function+0x10/0x10 [ 87.571172][ C1] usb_tx_block+0x91/0x320 [ 87.575613][ C1] if_usb_send_fw_pkt.isra.0+0x2e4/0x550 [ 87.581271][ C1] if_usb_receive_fwload+0x5d3/0x780 [ 87.586587][ C1] ? __pfx_if_usb_receive_fwload+0x10/0x10 [ 87.592421][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 87.598335][ C1] __usb_hcd_giveback_urb+0x38d/0x610 [ 87.603766][ C1] usb_hcd_giveback_urb+0x3ca/0x4a0 [ 87.609014][ C1] dummy_timer+0xd85/0x3670 [ 87.613584][ C1] ? __pfx_dummy_timer+0x10/0x10 [ 87.618557][ C1] ? rcu_is_watching+0x12/0xc0 [ 87.623340][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 87.629180][ C1] ? __pfx_dummy_timer+0x10/0x10 [ 87.634159][ C1] __hrtimer_run_queues+0x50e/0xa70 [ 87.639386][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 87.645148][ C1] ? ktime_get_update_offsets_now+0x2cd/0x4d0 [ 87.651360][ C1] hrtimer_run_softirq+0x17d/0x350 [ 87.656507][ C1] handle_softirqs+0x1de/0x9d0 [ 87.661919][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 87.667266][ C1] __irq_exit_rcu+0xed/0x150 [ 87.671905][ C1] irq_exit_rcu+0x9/0x30 [ 87.676240][ C1] sysvec_apic_timer_interrupt+0x8f/0xb0 [ 87.681944][ C1] [ 87.684914][ C1] [ 87.687888][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 87.693934][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 87.699683][ C1] Code: ae b1 01 e9 13 e8 02 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d d3 e1 1d 00 fb f4 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 87.719361][ C1] RSP: 0018:ffffc9000013fe00 EFLAGS: 00000246 [ 87.725487][ C1] RAX: 0000000000046eed RBX: ffff8881022a1d00 RCX: ffffffff876898d5 [ 87.733510][ C1] RDX: 0000000000000000 RSI: ffffffff8901db96 RDI: ffffffff87afa420 [ 87.741544][ C1] RBP: 0000000000000001 R08: 0000000000000001 R09: ffffed103eae6725 [ 87.749571][ C1] R10: ffff8881f573392b R11: 0000000000000000 R12: ffffed10204543a0 [ 87.757597][ C1] R13: 0000000000000001 R14: ffffffff8aefe2d0 R15: 0000000000000000 [ 87.765634][ C1] ? ct_kernel_exit+0x125/0x180 [ 87.770601][ C1] default_idle+0x9/0x10 [ 87.774920][ C1] default_idle_call+0x6c/0xb0 [ 87.779760][ C1] do_idle+0x35b/0x4b0 [ 87.784004][ C1] ? __pfx_do_idle+0x10/0x10 [ 87.788665][ C1] ? rcu_is_watching+0x12/0xc0 [ 87.793460][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 87.799315][ C1] ? lockdep_hardirqs_on+0x78/0x100 [ 87.804551][ C1] cpu_startup_entry+0x4f/0x60 [ 87.809370][ C1] start_secondary+0x21d/0x2d0 [ 87.814168][ C1] ? __pfx_start_secondary+0x10/0x10 [ 87.819490][ C1] common_startup_64+0x13e/0x148 [ 87.824470][ C1] [ 87.828076][ C1] Kernel Offset: disabled [ 87.832461][ C1] Rebooting in 86400 seconds..