Warning: Permanently added '10.128.1.42' (ECDSA) to the list of known hosts. syzkaller login: [ 31.413185][ T3563] chnl_net:caif_netlink_parms(): no params data found [ 31.440614][ T3563] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.447867][ T3563] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.455775][ T3563] device bridge_slave_0 entered promiscuous mode [ 31.464330][ T3563] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.471481][ T3563] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.479513][ T3563] device bridge_slave_1 entered promiscuous mode [ 31.497681][ T3563] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.508427][ T3563] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.529686][ T3563] team0: Port device team_slave_0 added [ 31.536862][ T3563] team0: Port device team_slave_1 added [ 31.553470][ T3563] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.560544][ T3563] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.586680][ T3563] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.598598][ T3563] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.606128][ T3563] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.632310][ T3563] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.657346][ T3563] device hsr_slave_0 entered promiscuous mode [ 31.663845][ T3563] device hsr_slave_1 entered promiscuous mode [ 31.709745][ T3563] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 31.718151][ T3563] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 31.726334][ T3563] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 31.734762][ T3563] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 31.748761][ T3563] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.755870][ T3563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.763185][ T3563] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.770326][ T3563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.796005][ T3563] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.807250][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.815884][ T3590] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.824960][ T3590] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.832889][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 31.842972][ T3563] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.861611][ T3563] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.872528][ T3563] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.885757][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.894923][ T3590] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.901981][ T3590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.909986][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.918274][ T3590] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.925402][ T3590] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.933626][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 31.942080][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 31.950589][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.958789][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.967430][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 31.974937][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 31.988832][ T3563] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.996205][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 32.003583][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 32.067156][ T3563] device veth0_vlan entered promiscuous mode [ 32.074897][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.083565][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.091759][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.100259][ T3590] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.109236][ T3563] device veth1_vlan entered promiscuous mode [ 32.121864][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 32.129822][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 32.137907][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.147535][ T3563] device veth0_macvtap entered promiscuous mode [ 32.155596][ T3563] device veth1_macvtap entered promiscuous mode [ 32.166936][ T3563] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.174438][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.183625][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.193432][ T3563] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.201065][ T142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.211306][ T3563] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 32.220205][ T3563] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.229060][ T3563] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.237846][ T3563] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 33.594890][ C0] vcan0: j1939_tp_rxtimer: 0xffff88807afb9400: rx timeout, send abort [ 33.603235][ C0] vcan0: j1939_tp_rxtimer: 0xffff88801fdffc00: rx timeout, send abort [ 33.611649][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff88807afb9400: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 33.625968][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff88801fdffc00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 33.640421][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff88807ec6dc00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 33.654730][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff88801fe31400: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 33.654764][ C1] vcan0: j1939_xtp_rx_dat_one: 0xffff88801fe31400: last 00 [ 33.669098][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff88807ec6e400: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 33.676460][ C1] vcan0: j1939_xtp_rx_dat_one: 0xffff88801fe31800: last 00 [ 33.700281][ C1] vcan0: j1939_xtp_rx_dat_one: 0xffff88801fe31800: Data of RX-looped back packet (00 ff ff ff ff ff ff) doesn't match TX data (00 00 00 00 00 00 00)! [ 33.715814][ C1] ================================================================== [ 33.723871][ C1] BUG: KASAN: use-after-free in j1939_xtp_rx_dat_one+0xe15/0xee0 [ 33.731893][ C1] Read of size 1 at addr ffff88802304ab8e by task ksoftirqd/1/21 [ 33.739605][ C1] [ 33.741917][ C1] CPU: 1 PID: 21 Comm: ksoftirqd/1 Tainted: G W 5.17.0-syzkaller-11407-gae085d7f9365 #0 [ 33.752924][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.762994][ C1] Call Trace: [ 33.766262][ C1] [ 33.769180][ C1] dump_stack_lvl+0xcd/0x134 [ 33.773769][ C1] print_address_description.constprop.0.cold+0xeb/0x495 [ 33.780783][ C1] ? j1939_xtp_rx_dat_one+0xe15/0xee0 [ 33.786169][ C1] kasan_report.cold+0xf4/0x1c6 [ 33.791010][ C1] ? j1939_xtp_rx_dat_one+0xe15/0xee0 [ 33.796372][ C1] j1939_xtp_rx_dat_one+0xe15/0xee0 [ 33.801561][ C1] ? trace_hardirqs_on+0x5b/0x1c0 [ 33.806603][ C1] j1939_tp_recv+0x6de/0xcb0 [ 33.811358][ C1] j1939_can_recv+0x6ff/0x9a0 [ 33.816022][ C1] ? j1939_netdev_notify+0x1d0/0x1d0 [ 33.821293][ C1] ? kmem_cache_free+0xdd/0x5a0 [ 33.826173][ C1] ? skb_free_head+0xac/0x110 [ 33.831011][ C1] ? j1939_netdev_notify+0x1d0/0x1d0 [ 33.836284][ C1] can_rcv_filter+0x5d4/0x8d0 [ 33.840947][ C1] can_receive+0x31d/0x580 [ 33.845350][ C1] ? call_timer_fn+0x213/0x6b0 [ 33.850098][ C1] can_rcv+0x120/0x1c0 [ 33.854149][ C1] ? can_receive+0x580/0x580 [ 33.858723][ C1] __netif_receive_skb_one_core+0x114/0x180 [ 33.864607][ C1] ? __netif_receive_skb_core+0x3a60/0x3a60 [ 33.870487][ C1] ? process_backlog+0x225/0x7c0 [ 33.875408][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 33.880244][ C1] ? rcu_read_lock_sched_held+0xd/0x70 [ 33.885686][ C1] ? lock_release+0x522/0x720 [ 33.890352][ C1] ? __run_timers.part.0+0x396/0xa30 [ 33.895709][ C1] __netif_receive_skb+0x24/0x1b0 [ 33.900821][ C1] process_backlog+0x3a0/0x7c0 [ 33.905683][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 33.910870][ C1] ? trace_hardirqs_on+0x5b/0x1c0 [ 33.915884][ C1] __napi_poll+0xb3/0x6e0 [ 33.920199][ C1] net_rx_action+0x8ec/0xc60 [ 33.924780][ C1] ? napi_threaded_poll+0x520/0x520 [ 33.929964][ C1] ? sched_clock_cpu+0x15/0x1f0 [ 33.934826][ C1] __do_softirq+0x29b/0x9c2 [ 33.939325][ C1] ? __irq_exit_rcu+0x180/0x180 [ 33.944172][ C1] run_ksoftirqd+0x2d/0x60 [ 33.948588][ C1] smpboot_thread_fn+0x645/0x9c0 [ 33.953528][ C1] ? sort_range+0x30/0x30 [ 33.957843][ C1] kthread+0x2e9/0x3a0 [ 33.961900][ C1] ? kthread_complete_and_exit+0x40/0x40 [ 33.967530][ C1] ret_from_fork+0x1f/0x30 [ 33.972089][ C1] [ 33.975093][ C1] [ 33.977420][ C1] Allocated by task 3606: [ 33.981726][ C1] kasan_save_stack+0x1e/0x40 [ 33.986397][ C1] __kasan_slab_alloc+0x90/0xc0 [ 33.991228][ C1] kmem_cache_alloc_node+0x255/0x3f0 [ 33.996499][ C1] __alloc_skb+0x215/0x340 [ 34.000990][ C1] alloc_skb_with_frags+0x93/0x730 [ 34.006085][ C1] sock_alloc_send_pskb+0x793/0x920 [ 34.011265][ C1] j1939_sk_sendmsg+0x6eb/0x13f0 [ 34.016187][ C1] sock_sendmsg+0xcf/0x120 [ 34.020604][ C1] sock_no_sendpage+0xf6/0x140 [ 34.025346][ C1] kernel_sendpage.part.0+0x1ff/0x7b0 [ 34.030700][ C1] sock_sendpage+0xdf/0x140 [ 34.035184][ C1] pipe_to_sendpage+0x2ad/0x380 [ 34.040017][ C1] __splice_from_pipe+0x43e/0x8a0 [ 34.045023][ C1] generic_splice_sendpage+0xd4/0x140 [ 34.050376][ C1] direct_splice_actor+0x110/0x180 [ 34.055469][ C1] splice_direct_to_actor+0x34b/0x8c0 [ 34.061019][ C1] do_splice_direct+0x1a7/0x270 [ 34.065867][ C1] do_sendfile+0xae0/0x1240 [ 34.070375][ C1] __x64_sys_sendfile64+0x1cc/0x210 [ 34.075566][ C1] do_syscall_64+0x35/0x80 [ 34.079976][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 34.085863][ C1] [ 34.088168][ C1] Freed by task 15: [ 34.091949][ C1] kasan_save_stack+0x1e/0x40 [ 34.096618][ C1] kasan_set_track+0x21/0x30 [ 34.101200][ C1] kasan_set_free_info+0x20/0x30 [ 34.106123][ C1] ____kasan_slab_free+0x166/0x1a0 [ 34.111225][ C1] slab_free_freelist_hook+0x8b/0x1c0 [ 34.116678][ C1] kmem_cache_free+0xdd/0x5a0 [ 34.121345][ C1] kfree_skbmem+0xef/0x1b0 [ 34.125747][ C1] kfree_skb_reason+0x85/0x110 [ 34.130501][ C1] j1939_xtp_rx_cts+0xbdb/0x1170 [ 34.135429][ C1] j1939_tp_recv+0x83c/0xcb0 [ 34.140004][ C1] j1939_can_recv+0x6ff/0x9a0 [ 34.144665][ C1] can_rcv_filter+0x5d4/0x8d0 [ 34.149346][ C1] can_receive+0x31d/0x580 [ 34.153887][ C1] can_rcv+0x120/0x1c0 [ 34.157945][ C1] __netif_receive_skb_one_core+0x114/0x180 [ 34.163920][ C1] __netif_receive_skb+0x24/0x1b0 [ 34.168937][ C1] process_backlog+0x3a0/0x7c0 [ 34.173690][ C1] __napi_poll+0xb3/0x6e0 [ 34.178206][ C1] net_rx_action+0x8ec/0xc60 [ 34.182784][ C1] __do_softirq+0x29b/0x9c2 [ 34.187281][ C1] [ 34.189583][ C1] The buggy address belongs to the object at ffff88802304ab40 [ 34.189583][ C1] which belongs to the cache skbuff_head_cache of size 232 [ 34.204142][ C1] The buggy address is located 78 bytes inside of [ 34.204142][ C1] 232-byte region [ffff88802304ab40, ffff88802304ac28) [ 34.217322][ C1] [ 34.219627][ C1] The buggy address belongs to the physical page: [ 34.226017][ C1] page:ffffea00008c1280 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2304a [ 34.236166][ C1] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 34.243791][ C1] raw: 00fff00000000200 0000000000000000 dead000000000122 ffff888140b8d500 [ 34.252382][ C1] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 34.260953][ C1] page dumped because: kasan: bad access detected [ 34.267350][ C1] page_owner tracks the page as allocated [ 34.273044][ C1] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY), pid 3590, tgid 3590 (kworker/1:3), ts 33637485571, free_ts 33296379898 [ 34.291268][ C1] get_page_from_freelist+0xba2/0x3df0 [ 34.296813][ C1] __alloc_pages+0x1b2/0x500 [ 34.301392][ C1] alloc_pages+0x1aa/0x310 [ 34.305795][ C1] allocate_slab+0x26c/0x3c0 [ 34.310371][ C1] ___slab_alloc+0x8df/0xf20 [ 34.314949][ C1] __slab_alloc.constprop.0+0x4d/0xa0 [ 34.320324][ C1] kmem_cache_alloc_node+0x122/0x3f0 [ 34.325596][ C1] __alloc_skb+0x215/0x340 [ 34.330000][ C1] ndisc_alloc_skb+0x134/0x320 [ 34.334749][ C1] ndisc_send_rs+0x37f/0x6f0 [ 34.339323][ C1] addrconf_dad_completed+0x37a/0xd30 [ 34.344677][ C1] addrconf_dad_work+0x79f/0x1340 [ 34.349690][ C1] process_one_work+0x996/0x1610 [ 34.354628][ C1] worker_thread+0x665/0x1080 [ 34.359289][ C1] kthread+0x2e9/0x3a0 [ 34.363345][ C1] ret_from_fork+0x1f/0x30 [ 34.367840][ C1] page last free stack trace: [ 34.372489][ C1] free_pcp_prepare+0x549/0xd20 [ 34.377328][ C1] free_unref_page+0x19/0x690 [ 34.381992][ C1] qlist_free_all+0x6a/0x170 [ 34.386571][ C1] kasan_quarantine_reduce+0x180/0x200 [ 34.392019][ C1] __kasan_slab_alloc+0xa2/0xc0 [ 34.396866][ C1] kmem_cache_alloc_node+0x255/0x3f0 [ 34.402248][ C1] __alloc_skb+0x215/0x340 [ 34.406653][ C1] alloc_skb_with_frags+0x93/0x730 [ 34.411756][ C1] sock_alloc_send_pskb+0x793/0x920 [ 34.416940][ C1] mld_newpack.isra.0+0x1be/0x750 [ 34.421960][ C1] add_grhead+0x283/0x360 [ 34.426283][ C1] add_grec+0x106a/0x1530 [ 34.430603][ C1] mld_send_initial_cr.part.0+0xf6/0x230 [ 34.436243][ C1] ipv6_mc_dad_complete+0x1d0/0x690 [ 34.441432][ C1] addrconf_dad_completed+0x9e8/0xd30 [ 34.446795][ C1] addrconf_dad_work+0x79f/0x1340 [ 34.451818][ C1] [ 34.454124][ C1] Memory state around the buggy address: [ 34.459730][ C1] ffff88802304aa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 34.467868][ C1] ffff88802304ab00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 34.475920][ C1] >ffff88802304ab80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.483963][ C1] ^ [ 34.488280][ C1] ffff88802304ac00: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 34.496330][ C1] ffff88802304ac80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.504372][ C1] ================================================================== [ 34.512482][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 34.519062][ C1] CPU: 1 PID: 21 Comm: ksoftirqd/1 Tainted: G W 5.17.0-syzkaller-11407-gae085d7f9365 #0 [ 34.530088][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.540144][ C1] Call Trace: [ 34.543420][ C1] [ 34.546346][ C1] dump_stack_lvl+0xcd/0x134 [ 34.550950][ C1] panic+0x2d7/0x636 [ 34.554853][ C1] ? panic_print_sys_info.part.0+0x10b/0x10b [ 34.560839][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 34.567004][ C1] ? trace_hardirqs_on+0x38/0x1c0 [ 34.572047][ C1] ? trace_hardirqs_on+0x51/0x1c0 [ 34.577091][ C1] ? j1939_xtp_rx_dat_one+0xe15/0xee0 [ 34.582478][ C1] end_report.part.0+0x3f/0x7c [ 34.587244][ C1] kasan_report.cold+0x93/0x1c6 [ 34.592098][ C1] ? j1939_xtp_rx_dat_one+0xe15/0xee0 [ 34.597481][ C1] j1939_xtp_rx_dat_one+0xe15/0xee0 [ 34.602694][ C1] ? trace_hardirqs_on+0x5b/0x1c0 [ 34.607730][ C1] j1939_tp_recv+0x6de/0xcb0 [ 34.612327][ C1] j1939_can_recv+0x6ff/0x9a0 [ 34.617013][ C1] ? j1939_netdev_notify+0x1d0/0x1d0 [ 34.622308][ C1] ? kmem_cache_free+0xdd/0x5a0 [ 34.627165][ C1] ? skb_free_head+0xac/0x110 [ 34.631853][ C1] ? j1939_netdev_notify+0x1d0/0x1d0 [ 34.637427][ C1] can_rcv_filter+0x5d4/0x8d0 [ 34.642282][ C1] can_receive+0x31d/0x580 [ 34.646726][ C1] ? call_timer_fn+0x213/0x6b0 [ 34.651512][ C1] can_rcv+0x120/0x1c0 [ 34.655596][ C1] ? can_receive+0x580/0x580 [ 34.660203][ C1] __netif_receive_skb_one_core+0x114/0x180 [ 34.666122][ C1] ? __netif_receive_skb_core+0x3a60/0x3a60 [ 34.672117][ C1] ? process_backlog+0x225/0x7c0 [ 34.677069][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 34.681938][ C1] ? rcu_read_lock_sched_held+0xd/0x70 [ 34.687591][ C1] ? lock_release+0x522/0x720 [ 34.692288][ C1] ? __run_timers.part.0+0x396/0xa30 [ 34.697594][ C1] __netif_receive_skb+0x24/0x1b0 [ 34.702641][ C1] process_backlog+0x3a0/0x7c0 [ 34.707425][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 34.712642][ C1] ? trace_hardirqs_on+0x5b/0x1c0 [ 34.717686][ C1] __napi_poll+0xb3/0x6e0 [ 34.722027][ C1] net_rx_action+0x8ec/0xc60 [ 34.726656][ C1] ? napi_threaded_poll+0x520/0x520 [ 34.731878][ C1] ? sched_clock_cpu+0x15/0x1f0 [ 34.736734][ C1] __do_softirq+0x29b/0x9c2 [ 34.741244][ C1] ? __irq_exit_rcu+0x180/0x180 [ 34.746100][ C1] run_ksoftirqd+0x2d/0x60 [ 34.750519][ C1] smpboot_thread_fn+0x645/0x9c0 [ 34.755465][ C1] ? sort_range+0x30/0x30 [ 34.759801][ C1] kthread+0x2e9/0x3a0 [ 34.763874][ C1] ? kthread_complete_and_exit+0x40/0x40 [ 34.769510][ C1] ret_from_fork+0x1f/0x30 [ 34.773933][ C1] [ 34.777603][ C1] Kernel Offset: disabled [ 34.781924][ C1] Rebooting in 86400 seconds..