Warning: Permanently added '10.128.1.162' (ED25519) to the list of known hosts. 2026/04/23 17:26:20 parsed 1 programs [ 47.775876][ T29] audit: type=1400 audit(1776965180.454:62): avc: denied { node_bind } for pid=2970 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 47.796984][ T29] audit: type=1400 audit(1776965180.454:63): avc: denied { module_request } for pid=2970 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 49.702699][ T29] audit: type=1400 audit(1776965182.384:64): avc: denied { mounton } for pid=2980 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 49.726523][ T29] audit: type=1400 audit(1776965182.404:65): avc: denied { mount } for pid=2980 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.729879][ T2980] cgroup: Unknown subsys name 'net' [ 49.755693][ T29] audit: type=1400 audit(1776965182.434:66): avc: denied { unmount } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 49.854431][ T2980] cgroup: Unknown subsys name 'cpuset' [ 49.863066][ T2980] cgroup: Unknown subsys name 'rlimit' [ 50.013580][ T29] audit: type=1400 audit(1776965182.694:67): avc: denied { setattr } for pid=2980 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.036979][ T29] audit: type=1400 audit(1776965182.694:68): avc: denied { create } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.057918][ T29] audit: type=1400 audit(1776965182.694:69): avc: denied { write } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.078929][ T29] audit: type=1400 audit(1776965182.694:70): avc: denied { read } for pid=2980 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.099809][ T29] audit: type=1400 audit(1776965182.724:71): avc: denied { sys_module } for pid=2980 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 50.150318][ T2984] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 50.214904][ T2980] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 51.819515][ T2987] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 54.461100][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 54.461121][ T29] audit: type=1400 audit(1776965187.144:95): avc: denied { create } for pid=2994 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 61.045710][ T3404] modprobe (3404) used greatest stack depth: 23720 bytes left [ 61.822978][ T29] audit: type=1400 audit(1776965194.504:96): avc: denied { mount } for pid=2994 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 61.845109][ T29] audit: type=1400 audit(1776965194.504:97): avc: denied { mounton } for pid=2994 comm="syz-executor" path="/root/syzkaller.ZCFUgg/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2540 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 61.979192][ T2994] syz-executor (2994) used greatest stack depth: 22696 bytes left [ 62.464053][ T29] audit: type=1400 audit(1776965195.144:98): avc: denied { create } for pid=3468 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 62.484310][ T29] audit: type=1400 audit(1776965195.144:99): avc: denied { sys_admin } for pid=3468 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 62.506759][ T29] audit: type=1400 audit(1776965195.184:100): avc: denied { sys_chroot } for pid=3469 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 62.901220][ T29] audit: type=1400 audit(1776965195.574:101): avc: denied { create } for pid=3481 comm="syz-executor" name="tun" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 62.923746][ T29] audit: type=1400 audit(1776965195.604:102): avc: denied { setattr } for pid=3481 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 62.947142][ T29] audit: type=1400 audit(1776965195.604:103): avc: denied { read write } for pid=3481 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 62.970711][ T29] audit: type=1400 audit(1776965195.604:104): avc: denied { open } for pid=3481 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1 [ 63.454848][ T29] audit: type=1400 audit(1776965196.134:105): avc: denied { create } for pid=3495 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2026/04/23 17:26:37 executed programs: 0 2026/04/23 17:26:47 executed programs: 2 [ 74.490011][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 74.490030][ T29] audit: type=1400 audit(1776965207.164:107): avc: denied { read write } for pid=3965 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.519799][ T29] audit: type=1400 audit(1776965207.184:108): avc: denied { open } for pid=3965 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.543490][ T29] audit: type=1400 audit(1776965207.184:109): avc: denied { ioctl } for pid=3965 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.760955][ T2820] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 74.924626][ T2820] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 74.934015][ T2820] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 74.942533][ T2820] usb 4-1: Product: syz [ 74.946895][ T2820] usb 4-1: Manufacturer: syz [ 74.951720][ T2820] usb 4-1: SerialNumber: syz [ 74.966190][ T2820] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 75.012665][ T29] audit: type=1400 audit(1776965207.694:110): avc: denied { firmware_load } for pid=28 comm="kworker/1:1" path="/lib/firmware/ath9k_htc/htc_9271-1.4.0.fw" dev="sda1" ino=313 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 75.022402][ T28] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 75.244499][ T10] usb 4-1: USB disconnect, device number 2 [ 76.080804][ T28] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 76.088364][ T28] ath9k_htc: Failed to initialize the device [ 76.095249][ T10] usb 4-1: ath9k_htc: USB layer deinitialized [ 76.390638][ T10] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 76.544514][ T10] usb 4-1: New USB device found, idVendor=0cf3, idProduct=1002, bcdDevice= 1.08 [ 76.553710][ T10] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 76.561982][ T10] usb 4-1: Product: syz [ 76.566180][ T10] usb 4-1: Manufacturer: syz [ 76.571015][ T10] usb 4-1: SerialNumber: syz [ 76.711535][ T10] usb 4-1: reset high-speed USB device number 3 using dummy_hcd [ 77.400751][ T10] usb 4-1: device descriptor read/64, error -71 [ 77.683911][ T1121] usb 4-1: driver API: 1.9.9 2016-02-15 [1-1] [ 77.690253][ T1121] usb 4-1: firmware API: 1.9.6 2012-07-07 [ 77.900146][ C0] usb 4-1: received invalid command response:got 60, instead of 0 [ 77.908140][ C0] usb 4-1: restart device (9) [ 77.913871][ C0] usb 4-1: received invalid command response:got -2, instead of 0 [ 78.114267][ C0] usb 4-1: received invalid command response:got 60, instead of 4 [ 78.122295][ C0] ================================================================== [ 78.130452][ C0] BUG: KASAN: stack-out-of-bounds in carl9170_handle_command_response+0x21f/0xc50 [ 78.139667][ C0] Write of size 60 at addr ffffc900032bfa38 by task swapper/0/0 [ 78.147377][ C0] [ 78.149910][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT(full) [ 78.149929][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 78.149944][ C0] Call Trace: [ 78.149951][ C0] [ 78.149960][ C0] dump_stack_lvl+0x100/0x190 [ 78.149986][ C0] print_report+0x13d/0x4b0 [ 78.150007][ C0] ? __lock_acquire+0x4a5/0x2630 [ 78.150025][ C0] ? carl9170_handle_command_response+0x21f/0xc50 [ 78.150044][ C0] kasan_report+0xdf/0x1d0 [ 78.150066][ C0] ? carl9170_handle_command_response+0x21f/0xc50 [ 78.150086][ C0] kasan_check_range+0x10f/0x1e0 [ 78.150103][ C0] __asan_memcpy+0x3c/0x60 [ 78.150120][ C0] carl9170_handle_command_response+0x21f/0xc50 [ 78.150139][ C0] carl9170_usb_rx_irq_complete+0xfc/0x1b0 [ 78.150161][ C0] __usb_hcd_giveback_urb+0x38d/0x610 [ 78.150178][ C0] usb_hcd_giveback_urb+0x3ca/0x4a0 [ 78.150193][ C0] dummy_timer+0xda1/0x36c0 [ 78.150218][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 78.150241][ C0] ? __pfx_dummy_timer+0x10/0x10 [ 78.150256][ C0] ? rcu_is_watching+0x12/0xc0 [ 78.150276][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 78.150295][ C0] ? __pfx_dummy_timer+0x10/0x10 [ 78.150310][ C0] __hrtimer_run_queues+0x470/0xa00 [ 78.150332][ C0] hrtimer_run_softirq+0x17d/0x2c0 [ 78.150360][ C0] handle_softirqs+0x1dd/0x9e0 [ 78.150385][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 78.150407][ C0] ? _raw_spin_unlock+0x28/0x50 [ 78.150424][ C0] ? __hrtimer_rearm_deferred+0x9b/0x740 [ 78.150445][ C0] __irq_exit_rcu+0x160/0x210 [ 78.150467][ C0] irq_exit_rcu+0x9/0x30 [ 78.150488][ C0] sysvec_apic_timer_interrupt+0x8f/0xb0 [ 78.150512][ C0] [ 78.150516][ C0] [ 78.150524][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 78.150556][ C0] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 78.150596][ C0] Code: d4 b4 01 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 63 9d 15 00 fb f4 7c f2 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 78.150616][ C0] RSP: 0018:ffffffff89407e10 EFLAGS: 00000246 [ 78.150629][ C0] RAX: 00000000000a0b09 RBX: ffffffff8942ca40 RCX: ffffffff8770e3f5 [ 78.150640][ C0] RDX: 0000000000000000 RSI: ffffffff890d1d42 RDI: ffffffff87b03fe0 [ 78.150649][ C0] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed103eac673d [ 78.150658][ C0] R10: ffff8881f56339eb R11: 0000000000000000 R12: 0000000000000000 [ 78.150667][ C0] R13: fffffbfff1285948 R14: 0000000000000000 R15: ffffffff8af1a1d0 [ 78.150679][ C0] ? ct_kernel_exit+0x125/0x180 [ 78.150704][ C0] default_idle+0x9/0x10 [ 78.150718][ C0] default_idle_call+0x6c/0xb0 [ 78.150732][ C0] do_idle+0x464/0x590 [ 78.150748][ C0] ? __pfx_do_idle+0x10/0x10 [ 78.150765][ C0] cpu_startup_entry+0x4f/0x60 [ 78.150780][ C0] rest_init+0x251/0x260 [ 78.150796][ C0] ? __pfx_x86_late_time_init+0x10/0x10 [ 78.150816][ C0] start_kernel+0x47f/0x480 [ 78.150834][ C0] x86_64_start_reservations+0x24/0x30 [ 78.150852][ C0] x86_64_start_kernel+0x12b/0x130 [ 78.150870][ C0] common_startup_64+0x13e/0x148 [ 78.150889][ C0] [ 78.150895][ C0] [ 78.462974][ C0] The buggy address belongs to a vmalloc virtual mapping [ 78.470034][ C0] The buggy address belongs to the physical page: [ 78.476527][ C0] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10db87 [ 78.485376][ C0] flags: 0x200000000000000(node=0|zone=2) [ 78.491105][ C0] raw: 0200000000000000 ffffea000436e1c8 ffffea000436e1c8 0000000000000000 [ 78.499689][ C0] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 78.508434][ C0] page dumped because: kasan: bad access detected [ 78.514932][ C0] page_owner tracks the page as allocated [ 78.520877][ C0] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x29c2(GFP_NOWAIT|__GFP_HIGHMEM|__GFP_IO|__GFP_FS|__GFP_ZERO), pid 37, tgid 37 (kworker/u8:2), ts 8209635063, free_ts 0 [ 78.539289][ C0] post_alloc_hook+0x153/0x170 [ 78.544071][ C0] get_page_from_freelist+0xf34/0x3a90 [ 78.549650][ C0] __alloc_frozen_pages_noprof+0x273/0x28a0 [ 78.555653][ C0] alloc_pages_mpol+0xe8/0x410 [ 78.560431][ C0] alloc_pages_noprof+0x1a/0x160 [ 78.565470][ C0] __vmalloc_node_range_noprof+0xf9a/0x1630 [ 78.571484][ C0] __vmalloc_node_noprof+0xad/0xf0 [ 78.576678][ C0] copy_process+0x7fb/0x7d20 [ 78.581346][ C0] kernel_clone+0x12e/0x9c0 [ 78.586032][ C0] user_mode_thread+0xcc/0x110 [ 78.590854][ C0] call_usermodehelper_exec_work+0xcb/0x180 [ 78.597186][ C0] process_one_work+0xa0e/0x1980 [ 78.602394][ C0] worker_thread+0x5ef/0xe50 [ 78.606989][ C0] kthread+0x370/0x450 [ 78.611088][ C0] ret_from_fork+0x69a/0xc80 [ 78.615736][ C0] ret_from_fork_asm+0x1a/0x30 [ 78.620841][ C0] page_owner free stack trace missing [ 78.626227][ C0] [ 78.628628][ C0] Memory state around the buggy address: [ 78.634620][ C0] ffffc900032bf900: f1 f1 f1 00 00 00 f3 f3 f3 f3 f3 00 00 00 00 00 [ 78.642692][ C0] ffffc900032bf980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 78.651015][ C0] >ffffc900032bfa00: 00 f1 f1 f1 f1 f1 f1 04 f2 04 f3 f3 f3 00 00 00 [ 78.659326][ C0] ^ [ 78.665330][ C0] ffffc900032bfa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 78.673395][ C0] ffffc900032bfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 78.681546][ C0] ================================================================== [ 78.689695][ C0] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 78.696989][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT(full) [ 78.705995][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 78.716167][ C0] Call Trace: [ 78.719451][ C0] [ 78.722289][ C0] dump_stack_lvl+0x100/0x190 [ 78.726965][ C0] vpanic+0x552/0x970 [ 78.731040][ C0] ? __pfx_vpanic+0x10/0x10 [ 78.735549][ C0] ? __pfx_vprintk_emit+0x10/0x10 [ 78.740583][ C0] ? carl9170_handle_command_response+0x21f/0xc50 [ 78.747049][ C0] panic+0xd1/0xe0 [ 78.750776][ C0] ? __pfx_panic+0x10/0x10 [ 78.755191][ C0] ? end_report.part.0+0x23/0x90 [ 78.760217][ C0] ? rcu_is_watching+0x12/0xc0 [ 78.765087][ C0] ? end_report.part.0+0x23/0x90 [ 78.770127][ C0] ? check_panic_on_warn+0x1f/0x90 [ 78.775501][ C0] check_panic_on_warn.cold+0x19/0x34 [ 78.780961][ C0] end_report.part.0+0x3a/0x90 [ 78.785829][ C0] kasan_report.cold+0xe/0x18 [ 78.790511][ C0] ? carl9170_handle_command_response+0x21f/0xc50 [ 78.797071][ C0] kasan_check_range+0x10f/0x1e0 [ 78.802022][ C0] __asan_memcpy+0x3c/0x60 [ 78.806436][ C0] carl9170_handle_command_response+0x21f/0xc50 [ 78.812677][ C0] carl9170_usb_rx_irq_complete+0xfc/0x1b0 [ 78.818481][ C0] __usb_hcd_giveback_urb+0x38d/0x610 [ 78.824289][ C0] usb_hcd_giveback_urb+0x3ca/0x4a0 [ 78.829479][ C0] dummy_timer+0xda1/0x36c0 [ 78.833995][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 78.839896][ C0] ? __pfx_dummy_timer+0x10/0x10 [ 78.844850][ C0] ? rcu_is_watching+0x12/0xc0 [ 78.849607][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 78.855582][ C0] ? __pfx_dummy_timer+0x10/0x10 [ 78.860512][ C0] __hrtimer_run_queues+0x470/0xa00 [ 78.865837][ C0] hrtimer_run_softirq+0x17d/0x2c0 [ 78.871031][ C0] handle_softirqs+0x1dd/0x9e0 [ 78.875792][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 78.881168][ C0] ? _raw_spin_unlock+0x28/0x50 [ 78.886144][ C0] ? __hrtimer_rearm_deferred+0x9b/0x740 [ 78.891884][ C0] __irq_exit_rcu+0x160/0x210 [ 78.896575][ C0] irq_exit_rcu+0x9/0x30 [ 78.900818][ C0] sysvec_apic_timer_interrupt+0x8f/0xb0 [ 78.906597][ C0] [ 78.909535][ C0] [ 78.912454][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 78.918425][ C0] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 78.924140][ C0] Code: d4 b4 01 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 63 9d 15 00 fb f4 7c f2 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 78.943916][ C0] RSP: 0018:ffffffff89407e10 EFLAGS: 00000246 [ 78.950075][ C0] RAX: 00000000000a0b09 RBX: ffffffff8942ca40 RCX: ffffffff8770e3f5 [ 78.958208][ C0] RDX: 0000000000000000 RSI: ffffffff890d1d42 RDI: ffffffff87b03fe0 [ 78.966258][ C0] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed103eac673d [ 78.974331][ C0] R10: ffff8881f56339eb R11: 0000000000000000 R12: 0000000000000000 [ 78.982659][ C0] R13: fffffbfff1285948 R14: 0000000000000000 R15: ffffffff8af1a1d0 [ 78.990632][ C0] ? ct_kernel_exit+0x125/0x180 [ 78.995512][ C0] default_idle+0x9/0x10 [ 78.999923][ C0] default_idle_call+0x6c/0xb0 [ 79.004675][ C0] do_idle+0x464/0x590 [ 79.008822][ C0] ? __pfx_do_idle+0x10/0x10 [ 79.013401][ C0] cpu_startup_entry+0x4f/0x60 [ 79.018177][ C0] rest_init+0x251/0x260 [ 79.022448][ C0] ? __pfx_x86_late_time_init+0x10/0x10 [ 79.027990][ C0] start_kernel+0x47f/0x480 [ 79.032513][ C0] x86_64_start_reservations+0x24/0x30 [ 79.037964][ C0] x86_64_start_kernel+0x12b/0x130 [ 79.043090][ C0] common_startup_64+0x13e/0x148 [ 79.048120][ C0] [ 79.052911][ C0] Kernel Offset: disabled [ 79.057244][ C0] Rebooting in 86400 seconds..