syzkaller syzkaller login: [ 15.499830][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 15.499846][ T28] audit: type=1400 audit(1774549985.440:59): avc: denied { transition } for pid=224 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.504593][ T28] audit: type=1400 audit(1774549985.440:60): avc: denied { noatsecure } for pid=224 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.509295][ T28] audit: type=1400 audit(1774549985.450:61): avc: denied { write } for pid=224 comm="sh" path="pipe:[13799]" dev="pipefs" ino=13799 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 15.512879][ T28] audit: type=1400 audit(1774549985.450:62): avc: denied { rlimitinh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.515978][ T28] audit: type=1400 audit(1774549985.450:63): avc: denied { siginh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.54' (ED25519) to the list of known hosts. 2026/03/26 18:33:15 parsed 1 programs [ 25.388398][ T28] audit: type=1400 audit(1774549995.330:64): avc: denied { node_bind } for pid=282 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 25.409149][ T28] audit: type=1400 audit(1774549995.330:65): avc: denied { module_request } for pid=282 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 26.516951][ T28] audit: type=1400 audit(1774549996.460:66): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.520330][ T290] cgroup: Unknown subsys name 'net' [ 26.539805][ T28] audit: type=1400 audit(1774549996.460:67): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.567105][ T28] audit: type=1400 audit(1774549996.490:68): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.567513][ T290] cgroup: Unknown subsys name 'devices' [ 26.708653][ T290] cgroup: Unknown subsys name 'hugetlb' [ 26.714320][ T290] cgroup: Unknown subsys name 'rlimit' [ 26.827821][ T28] audit: type=1400 audit(1774549996.770:69): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.851056][ T28] audit: type=1400 audit(1774549996.770:70): avc: denied { create } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.871507][ T28] audit: type=1400 audit(1774549996.770:71): avc: denied { write } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.891866][ T28] audit: type=1400 audit(1774549996.770:72): avc: denied { read } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.912257][ T28] audit: type=1400 audit(1774549996.770:73): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.920329][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.985780][ T290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.687460][ T295] request_module fs-gadgetfs succeeded, but still no fs? [ 28.142935][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.150081][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.157969][ T321] device bridge_slave_0 entered promiscuous mode [ 28.165202][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.172431][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.179842][ T321] device bridge_slave_1 entered promiscuous mode [ 28.229090][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.236177][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.243603][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.250831][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.271886][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.279516][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.287189][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.294677][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.304130][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.312837][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.320015][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.329153][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.337462][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.344495][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.357973][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.368146][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.382952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.394442][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.402888][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.410757][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.419508][ T321] device veth0_vlan entered promiscuous mode [ 28.430358][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.439871][ T321] device veth1_macvtap entered promiscuous mode [ 28.450682][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.461210][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.501318][ T321] syz-executor (321) used greatest stack depth: 21696 bytes left 2026/03/26 18:33:19 executed programs: 0 [ 29.124944][ T358] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.132048][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.139722][ T358] device bridge_slave_0 entered promiscuous mode [ 29.146785][ T358] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.153838][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.161388][ T358] device bridge_slave_1 entered promiscuous mode [ 29.220314][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.227941][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.237144][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.245587][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.253989][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.261078][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.268675][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.277730][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.286293][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.294478][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.301533][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.313116][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.321353][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.331108][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.346031][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.358676][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.366827][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.374432][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.383411][ T358] device veth0_vlan entered promiscuous mode [ 29.399728][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.409061][ T358] device veth1_macvtap entered promiscuous mode [ 29.419092][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.427978][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.442810][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.451383][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.478010][ T362] loop2: detected capacity change from 0 to 1024 [ 29.487991][ T362] ======================================================= [ 29.487991][ T362] WARNING: The mand mount option has been deprecated and [ 29.487991][ T362] and is ignored by this kernel. Remove the mand [ 29.487991][ T362] option from the mount to silence this warning. [ 29.487991][ T362] ======================================================= [ 29.531336][ T362] EXT4-fs: Ignoring removed oldalloc option [ 29.537700][ T362] EXT4-fs: Ignoring removed orlov option [ 29.548409][ T362] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 29.564114][ T362] ================================================================== [ 29.572260][ T362] BUG: KASAN: use-after-free in ext4_find_extent+0xbeb/0xe20 [ 29.580041][ T362] Read of size 4 at addr ffff88812fa1a018 by task syz.2.17/362 [ 29.587613][ T362] [ 29.589989][ T362] CPU: 0 PID: 362 Comm: syz.2.17 Not tainted syzkaller #0 [ 29.597217][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 29.607299][ T362] Call Trace: [ 29.610587][ T362] [ 29.613615][ T362] __dump_stack+0x21/0x24 [ 29.617957][ T362] dump_stack_lvl+0x110/0x170 [ 29.622639][ T362] ? __cfi_dump_stack_lvl+0x8/0x8 [ 29.627759][ T362] ? ext4_find_extent+0xbeb/0xe20 [ 29.632881][ T362] print_address_description+0x71/0x200 [ 29.638480][ T362] print_report+0x4a/0x60 [ 29.642840][ T362] kasan_report+0x122/0x150 [ 29.647358][ T362] ? ext4_find_extent+0xbeb/0xe20 [ 29.652406][ T362] __asan_report_load4_noabort+0x14/0x20 [ 29.658331][ T362] ext4_find_extent+0xbeb/0xe20 [ 29.663204][ T362] ext4_ext_remove_space+0x2de/0x40d0 [ 29.668675][ T362] ? __es_remove_extent+0xe01/0x1770 [ 29.674510][ T362] ? ext4_es_insert_extent+0x2d60/0x2d60 [ 29.680154][ T362] ? _raw_write_lock+0x94/0xf0 [ 29.684933][ T362] ? __cfi_ext4_ext_remove_space+0x10/0x10 [ 29.690744][ T362] ext4_punch_hole+0x77c/0xbd0 [ 29.695516][ T362] ext4_fallocate+0x2b6/0x1dc0 [ 29.700278][ T362] ? selinux_file_permission+0x2a5/0x510 [ 29.705914][ T362] ? fsnotify_perm+0x67/0x5b0 [ 29.710601][ T362] vfs_fallocate+0x4c5/0x5a0 [ 29.715192][ T362] do_vfs_ioctl+0x19cb/0x1cd0 [ 29.719867][ T362] ? __ia32_compat_sys_ioctl+0x860/0x860 [ 29.725589][ T362] ? __cfi_get_futex_key+0x10/0x10 [ 29.730716][ T362] ? futex_wake+0x5b7/0x8e0 [ 29.735236][ T362] ? ioctl_has_perm+0x1b8/0x4f0 [ 29.740100][ T362] ? ioctl_has_perm+0x3a6/0x4f0 [ 29.745046][ T362] ? has_cap_mac_admin+0x370/0x370 [ 29.750175][ T362] ? __kasan_slab_free+0x11/0x20 [ 29.755130][ T362] ? do_futex+0x2bf/0x430 [ 29.759480][ T362] ? selinux_file_ioctl+0x3a0/0x4d0 [ 29.764780][ T362] ? __cfi_do_futex+0x10/0x10 [ 29.769467][ T362] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 29.775022][ T362] ? __se_sys_futex+0x136/0x310 [ 29.779885][ T362] ? security_file_ioctl+0x95/0xc0 [ 29.785251][ T362] __se_sys_ioctl+0x9f/0x1b0 [ 29.789888][ T362] __x64_sys_ioctl+0x7b/0x90 [ 29.794488][ T362] x64_sys_call+0x58b/0x9a0 [ 29.799004][ T362] do_syscall_64+0x4c/0xa0 [ 29.803522][ T362] ? clear_bhb_loop+0x30/0x80 [ 29.808293][ T362] ? clear_bhb_loop+0x30/0x80 [ 29.813406][ T362] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 29.819657][ T362] RIP: 0033:0x7fed5259c799 [ 29.824256][ T362] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 29.843862][ T362] RSP: 002b:00007ffd9d148998 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 29.852281][ T362] RAX: ffffffffffffffda RBX: 00007fed52815fa0 RCX: 00007fed5259c799 [ 29.860265][ T362] RDX: 00002000000000c0 RSI: 0000000040305829 RDI: 0000000000000005 [ 29.868593][ T362] RBP: 00007fed52632c99 R08: 0000000000000000 R09: 0000000000000000 [ 29.876573][ T362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 29.885100][ T362] R13: 00007fed52815fac R14: 00007fed52815fa0 R15: 00007fed52815fa0 [ 29.893080][ T362] [ 29.896120][ T362] [ 29.898472][ T362] The buggy address belongs to the physical page: [ 29.904878][ T362] page:ffffea0004be8680 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12fa1a [ 29.915391][ T362] flags: 0x4000000000000000(zone=1) [ 29.920618][ T362] raw: 4000000000000000 ffffea0004be8688 ffffea0004be8688 0000000000000000 [ 29.929217][ T362] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 29.937803][ T362] page dumped because: kasan: bad access detected [ 29.944220][ T362] page_owner info is not present (never set?) [ 29.950394][ T362] [ 29.952765][ T362] Memory state around the buggy address: [ 29.958403][ T362] ffff88812fa19f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.966464][ T362] ffff88812fa19f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.974612][ T362] >ffff88812fa1a000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.982752][ T362] ^ [ 29.987611][ T362] ffff88812fa1a080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.995776][ T362] ffff88812fa1a100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.004006][ T362] ================================================================== [ 30.017154][ T362] Disabling lock debugging due to kernel taint [ 30.023985][ T362] ------------[ cut here ]------------ [ 30.029510][ T362] kernel BUG at fs/ext4/extents.c:3190! [ 30.035556][ T362] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 30.041643][ T362] CPU: 0 PID: 362 Comm: syz.2.17 Tainted: G B syzkaller #0 [ 30.050314][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 30.060377][ T362] RIP: 0010:ext4_split_extent_at+0xf62/0xf80 [ 30.066377][ T362] Code: ff ff 44 89 f1 80 e1 07 fe c1 38 c1 0f 8c 3f fb ff ff 4c 89 f7 49 89 f7 e8 9b b7 cf ff 4c 89 fe e9 2c fb ff ff e8 4e 7b 8a ff <0f> 0b e8 47 7b 8a ff 0f 0b e8 40 7b 8a ff 0f 0b e8 39 7b 8a ff 0f [ 30.086070][ T362] RSP: 0018:ffffc900007a74c0 EFLAGS: 00010293 [ 30.092175][ T362] RAX: ffffffff81e6f382 RBX: 0000000000000000 RCX: ffff8881130b0000 [ 30.100172][ T362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000041 [ 30.108148][ T362] RBP: ffffc900007a7630 R08: 0000000000000000 R09: 0000000050000028 [ 30.116213][ T362] R10: dffffc0000000000 R11: fffffbfff0f6e4fd R12: dffffc0000000000 [ 30.124279][ T362] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8881149b1100 [ 30.132255][ T362] FS: 000055556dd21500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 30.141223][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.147904][ T362] CR2: 000020000000f000 CR3: 000000010ed76000 CR4: 00000000003506b0 [ 30.155896][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.163899][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.171887][ T362] Call Trace: [ 30.175182][ T362] [ 30.178185][ T362] ? ext4_ext_try_to_merge_right+0x820/0x820 [ 30.184196][ T362] ext4_ext_remove_space+0x652/0x40d0 [ 30.189688][ T362] ? __es_remove_extent+0xe01/0x1770 [ 30.195183][ T362] ? ext4_es_insert_extent+0x2d60/0x2d60 [ 30.200846][ T362] ? _raw_write_lock+0x94/0xf0 [ 30.205633][ T362] ? __cfi_ext4_ext_remove_space+0x10/0x10 [ 30.211457][ T362] ext4_punch_hole+0x77c/0xbd0 [ 30.216261][ T362] ext4_fallocate+0x2b6/0x1dc0 [ 30.221052][ T362] ? selinux_file_permission+0x2a5/0x510 [ 30.226693][ T362] ? fsnotify_perm+0x67/0x5b0 [ 30.231377][ T362] vfs_fallocate+0x4c5/0x5a0 [ 30.235966][ T362] do_vfs_ioctl+0x19cb/0x1cd0 [ 30.240657][ T362] ? __ia32_compat_sys_ioctl+0x860/0x860 [ 30.246412][ T362] ? __cfi_get_futex_key+0x10/0x10 [ 30.251550][ T362] ? futex_wake+0x5b7/0x8e0 [ 30.256096][ T362] ? ioctl_has_perm+0x1b8/0x4f0 [ 30.260984][ T362] ? ioctl_has_perm+0x3a6/0x4f0 [ 30.265848][ T362] ? has_cap_mac_admin+0x370/0x370 [ 30.270971][ T362] ? __kasan_slab_free+0x11/0x20 [ 30.275926][ T362] ? do_futex+0x2bf/0x430 [ 30.280259][ T362] ? selinux_file_ioctl+0x3a0/0x4d0 [ 30.285635][ T362] ? __cfi_do_futex+0x10/0x10 [ 30.290323][ T362] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 30.295879][ T362] ? __se_sys_futex+0x136/0x310 [ 30.300749][ T362] ? security_file_ioctl+0x95/0xc0 [ 30.305874][ T362] __se_sys_ioctl+0x9f/0x1b0 [ 30.310468][ T362] __x64_sys_ioctl+0x7b/0x90 [ 30.315270][ T362] x64_sys_call+0x58b/0x9a0 [ 30.319786][ T362] do_syscall_64+0x4c/0xa0 [ 30.324328][ T362] ? clear_bhb_loop+0x30/0x80 [ 30.329010][ T362] ? clear_bhb_loop+0x30/0x80 [ 30.333690][ T362] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 30.339587][ T362] RIP: 0033:0x7fed5259c799 [ 30.344003][ T362] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 30.363627][ T362] RSP: 002b:00007ffd9d148998 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 30.372042][ T362] RAX: ffffffffffffffda RBX: 00007fed52815fa0 RCX: 00007fed5259c799 [ 30.380071][ T362] RDX: 00002000000000c0 RSI: 0000000040305829 RDI: 0000000000000005 [ 30.388178][ T362] RBP: 00007fed52632c99 R08: 0000000000000000 R09: 0000000000000000 [ 30.396193][ T362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 30.404213][ T362] R13: 00007fed52815fac R14: 00007fed52815fa0 R15: 00007fed52815fa0 [ 30.412222][ T362] [ 30.415343][ T362] Modules linked in: [ 30.422045][ T362] ---[ end trace 0000000000000000 ]--- [ 30.428221][ T362] RIP: 0010:ext4_split_extent_at+0xf62/0xf80 [ 30.434347][ T362] Code: ff ff 44 89 f1 80 e1 07 fe c1 38 c1 0f 8c 3f fb ff ff 4c 89 f7 49 89 f7 e8 9b b7 cf ff 4c 89 fe e9 2c fb ff ff e8 4e 7b 8a ff <0f> 0b e8 47 7b 8a ff 0f 0b e8 40 7b 8a ff 0f 0b e8 39 7b 8a ff 0f [ 30.454964][ T362] RSP: 0018:ffffc900007a74c0 EFLAGS: 00010293 [ 30.461418][ T362] RAX: ffffffff81e6f382 RBX: 0000000000000000 RCX: ffff8881130b0000 [ 30.469761][ T362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000041 [ 30.477885][ T362] RBP: ffffc900007a7630 R08: 0000000000000000 R09: 0000000050000028 [ 30.486065][ T362] R10: dffffc0000000000 R11: fffffbfff0f6e4fd R12: dffffc0000000000 [ 30.494303][ T362] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8881149b1100 [ 30.502333][ T362] FS: 000055556dd21500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 30.511428][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.518063][ T362] CR2: 00007fc50ba1f000 CR3: 000000010ed76000 CR4: 00000000003506a0 [ 30.526061][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.534362][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.542596][ T362] Kernel panic - not syncing: Fatal exception [ 30.549247][ T362] Kernel Offset: disabled [ 30.553661][ T362] Rebooting in 86400 seconds..