syzkaller
syzkaller login: [ 15.499830][ T28] kauditd_printk_skb: 31 callbacks suppressed
[ 15.499846][ T28] audit: type=1400 audit(1774549985.440:59): avc: denied { transition } for pid=224 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 15.504593][ T28] audit: type=1400 audit(1774549985.440:60): avc: denied { noatsecure } for pid=224 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 15.509295][ T28] audit: type=1400 audit(1774549985.450:61): avc: denied { write } for pid=224 comm="sh" path="pipe:[13799]" dev="pipefs" ino=13799 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[ 15.512879][ T28] audit: type=1400 audit(1774549985.450:62): avc: denied { rlimitinh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 15.515978][ T28] audit: type=1400 audit(1774549985.450:63): avc: denied { siginh } for pid=224 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
Warning: Permanently added '10.128.0.54' (ED25519) to the list of known hosts.
2026/03/26 18:33:15 parsed 1 programs
[ 25.388398][ T28] audit: type=1400 audit(1774549995.330:64): avc: denied { node_bind } for pid=282 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 25.409149][ T28] audit: type=1400 audit(1774549995.330:65): avc: denied { module_request } for pid=282 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 26.516951][ T28] audit: type=1400 audit(1774549996.460:66): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 26.520330][ T290] cgroup: Unknown subsys name 'net'
[ 26.539805][ T28] audit: type=1400 audit(1774549996.460:67): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 26.567105][ T28] audit: type=1400 audit(1774549996.490:68): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 26.567513][ T290] cgroup: Unknown subsys name 'devices'
[ 26.708653][ T290] cgroup: Unknown subsys name 'hugetlb'
[ 26.714320][ T290] cgroup: Unknown subsys name 'rlimit'
[ 26.827821][ T28] audit: type=1400 audit(1774549996.770:69): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 26.851056][ T28] audit: type=1400 audit(1774549996.770:70): avc: denied { create } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 26.871507][ T28] audit: type=1400 audit(1774549996.770:71): avc: denied { write } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 26.891866][ T28] audit: type=1400 audit(1774549996.770:72): avc: denied { read } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[ 26.912257][ T28] audit: type=1400 audit(1774549996.770:73): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 26.920329][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 26.985780][ T290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 27.687460][ T295] request_module fs-gadgetfs succeeded, but still no fs?
[ 28.142935][ T321] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.150081][ T321] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.157969][ T321] device bridge_slave_0 entered promiscuous mode
[ 28.165202][ T321] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.172431][ T321] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.179842][ T321] device bridge_slave_1 entered promiscuous mode
[ 28.229090][ T321] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.236177][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 28.243603][ T321] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.250831][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 28.271886][ T10] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.279516][ T10] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.287189][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 28.294677][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 28.304130][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 28.312837][ T10] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.320015][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 28.329153][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 28.337462][ T10] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.344495][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 28.357973][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 28.368146][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 28.382952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 28.394442][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 28.402888][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 28.410757][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 28.419508][ T321] device veth0_vlan entered promiscuous mode
[ 28.430358][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 28.439871][ T321] device veth1_macvtap entered promiscuous mode
[ 28.450682][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 28.461210][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 28.501318][ T321] syz-executor (321) used greatest stack depth: 21696 bytes left
2026/03/26 18:33:19 executed programs: 0
[ 29.124944][ T358] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.132048][ T358] bridge0: port 1(bridge_slave_0) entered disabled state
[ 29.139722][ T358] device bridge_slave_0 entered promiscuous mode
[ 29.146785][ T358] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.153838][ T358] bridge0: port 2(bridge_slave_1) entered disabled state
[ 29.161388][ T358] device bridge_slave_1 entered promiscuous mode
[ 29.220314][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 29.227941][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 29.237144][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 29.245587][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 29.253989][ T327] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.261078][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.268675][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 29.277730][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 29.286293][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 29.294478][ T327] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.301533][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.313116][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 29.321353][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 29.331108][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 29.346031][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 29.358676][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 29.366827][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 29.374432][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 29.383411][ T358] device veth0_vlan entered promiscuous mode
[ 29.399728][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 29.409061][ T358] device veth1_macvtap entered promiscuous mode
[ 29.419092][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 29.427978][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 29.442810][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 29.451383][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 29.478010][ T362] loop2: detected capacity change from 0 to 1024
[ 29.487991][ T362] =======================================================
[ 29.487991][ T362] WARNING: The mand mount option has been deprecated and
[ 29.487991][ T362] and is ignored by this kernel. Remove the mand
[ 29.487991][ T362] option from the mount to silence this warning.
[ 29.487991][ T362] =======================================================
[ 29.531336][ T362] EXT4-fs: Ignoring removed oldalloc option
[ 29.537700][ T362] EXT4-fs: Ignoring removed orlov option
[ 29.548409][ T362] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback.
[ 29.564114][ T362] ==================================================================
[ 29.572260][ T362] BUG: KASAN: use-after-free in ext4_find_extent+0xbeb/0xe20
[ 29.580041][ T362] Read of size 4 at addr ffff88812fa1a018 by task syz.2.17/362
[ 29.587613][ T362]
[ 29.589989][ T362] CPU: 0 PID: 362 Comm: syz.2.17 Not tainted syzkaller #0
[ 29.597217][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
[ 29.607299][ T362] Call Trace:
[ 29.610587][ T362]
[ 29.613615][ T362] __dump_stack+0x21/0x24
[ 29.617957][ T362] dump_stack_lvl+0x110/0x170
[ 29.622639][ T362] ? __cfi_dump_stack_lvl+0x8/0x8
[ 29.627759][ T362] ? ext4_find_extent+0xbeb/0xe20
[ 29.632881][ T362] print_address_description+0x71/0x200
[ 29.638480][ T362] print_report+0x4a/0x60
[ 29.642840][ T362] kasan_report+0x122/0x150
[ 29.647358][ T362] ? ext4_find_extent+0xbeb/0xe20
[ 29.652406][ T362] __asan_report_load4_noabort+0x14/0x20
[ 29.658331][ T362] ext4_find_extent+0xbeb/0xe20
[ 29.663204][ T362] ext4_ext_remove_space+0x2de/0x40d0
[ 29.668675][ T362] ? __es_remove_extent+0xe01/0x1770
[ 29.674510][ T362] ? ext4_es_insert_extent+0x2d60/0x2d60
[ 29.680154][ T362] ? _raw_write_lock+0x94/0xf0
[ 29.684933][ T362] ? __cfi_ext4_ext_remove_space+0x10/0x10
[ 29.690744][ T362] ext4_punch_hole+0x77c/0xbd0
[ 29.695516][ T362] ext4_fallocate+0x2b6/0x1dc0
[ 29.700278][ T362] ? selinux_file_permission+0x2a5/0x510
[ 29.705914][ T362] ? fsnotify_perm+0x67/0x5b0
[ 29.710601][ T362] vfs_fallocate+0x4c5/0x5a0
[ 29.715192][ T362] do_vfs_ioctl+0x19cb/0x1cd0
[ 29.719867][ T362] ? __ia32_compat_sys_ioctl+0x860/0x860
[ 29.725589][ T362] ? __cfi_get_futex_key+0x10/0x10
[ 29.730716][ T362] ? futex_wake+0x5b7/0x8e0
[ 29.735236][ T362] ? ioctl_has_perm+0x1b8/0x4f0
[ 29.740100][ T362] ? ioctl_has_perm+0x3a6/0x4f0
[ 29.745046][ T362] ? has_cap_mac_admin+0x370/0x370
[ 29.750175][ T362] ? __kasan_slab_free+0x11/0x20
[ 29.755130][ T362] ? do_futex+0x2bf/0x430
[ 29.759480][ T362] ? selinux_file_ioctl+0x3a0/0x4d0
[ 29.764780][ T362] ? __cfi_do_futex+0x10/0x10
[ 29.769467][ T362] ? __cfi_selinux_file_ioctl+0x10/0x10
[ 29.775022][ T362] ? __se_sys_futex+0x136/0x310
[ 29.779885][ T362] ? security_file_ioctl+0x95/0xc0
[ 29.785251][ T362] __se_sys_ioctl+0x9f/0x1b0
[ 29.789888][ T362] __x64_sys_ioctl+0x7b/0x90
[ 29.794488][ T362] x64_sys_call+0x58b/0x9a0
[ 29.799004][ T362] do_syscall_64+0x4c/0xa0
[ 29.803522][ T362] ? clear_bhb_loop+0x30/0x80
[ 29.808293][ T362] ? clear_bhb_loop+0x30/0x80
[ 29.813406][ T362] entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 29.819657][ T362] RIP: 0033:0x7fed5259c799
[ 29.824256][ T362] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
[ 29.843862][ T362] RSP: 002b:00007ffd9d148998 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 29.852281][ T362] RAX: ffffffffffffffda RBX: 00007fed52815fa0 RCX: 00007fed5259c799
[ 29.860265][ T362] RDX: 00002000000000c0 RSI: 0000000040305829 RDI: 0000000000000005
[ 29.868593][ T362] RBP: 00007fed52632c99 R08: 0000000000000000 R09: 0000000000000000
[ 29.876573][ T362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 29.885100][ T362] R13: 00007fed52815fac R14: 00007fed52815fa0 R15: 00007fed52815fa0
[ 29.893080][ T362]
[ 29.896120][ T362]
[ 29.898472][ T362] The buggy address belongs to the physical page:
[ 29.904878][ T362] page:ffffea0004be8680 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12fa1a
[ 29.915391][ T362] flags: 0x4000000000000000(zone=1)
[ 29.920618][ T362] raw: 4000000000000000 ffffea0004be8688 ffffea0004be8688 0000000000000000
[ 29.929217][ T362] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 29.937803][ T362] page dumped because: kasan: bad access detected
[ 29.944220][ T362] page_owner info is not present (never set?)
[ 29.950394][ T362]
[ 29.952765][ T362] Memory state around the buggy address:
[ 29.958403][ T362] ffff88812fa19f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 29.966464][ T362] ffff88812fa19f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 29.974612][ T362] >ffff88812fa1a000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 29.982752][ T362] ^
[ 29.987611][ T362] ffff88812fa1a080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 29.995776][ T362] ffff88812fa1a100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 30.004006][ T362] ==================================================================
[ 30.017154][ T362] Disabling lock debugging due to kernel taint
[ 30.023985][ T362] ------------[ cut here ]------------
[ 30.029510][ T362] kernel BUG at fs/ext4/extents.c:3190!
[ 30.035556][ T362] invalid opcode: 0000 [#1] PREEMPT SMP KASAN
[ 30.041643][ T362] CPU: 0 PID: 362 Comm: syz.2.17 Tainted: G B syzkaller #0
[ 30.050314][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
[ 30.060377][ T362] RIP: 0010:ext4_split_extent_at+0xf62/0xf80
[ 30.066377][ T362] Code: ff ff 44 89 f1 80 e1 07 fe c1 38 c1 0f 8c 3f fb ff ff 4c 89 f7 49 89 f7 e8 9b b7 cf ff 4c 89 fe e9 2c fb ff ff e8 4e 7b 8a ff <0f> 0b e8 47 7b 8a ff 0f 0b e8 40 7b 8a ff 0f 0b e8 39 7b 8a ff 0f
[ 30.086070][ T362] RSP: 0018:ffffc900007a74c0 EFLAGS: 00010293
[ 30.092175][ T362] RAX: ffffffff81e6f382 RBX: 0000000000000000 RCX: ffff8881130b0000
[ 30.100172][ T362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000041
[ 30.108148][ T362] RBP: ffffc900007a7630 R08: 0000000000000000 R09: 0000000050000028
[ 30.116213][ T362] R10: dffffc0000000000 R11: fffffbfff0f6e4fd R12: dffffc0000000000
[ 30.124279][ T362] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8881149b1100
[ 30.132255][ T362] FS: 000055556dd21500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[ 30.141223][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.147904][ T362] CR2: 000020000000f000 CR3: 000000010ed76000 CR4: 00000000003506b0
[ 30.155896][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 30.163899][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 30.171887][ T362] Call Trace:
[ 30.175182][ T362]
[ 30.178185][ T362] ? ext4_ext_try_to_merge_right+0x820/0x820
[ 30.184196][ T362] ext4_ext_remove_space+0x652/0x40d0
[ 30.189688][ T362] ? __es_remove_extent+0xe01/0x1770
[ 30.195183][ T362] ? ext4_es_insert_extent+0x2d60/0x2d60
[ 30.200846][ T362] ? _raw_write_lock+0x94/0xf0
[ 30.205633][ T362] ? __cfi_ext4_ext_remove_space+0x10/0x10
[ 30.211457][ T362] ext4_punch_hole+0x77c/0xbd0
[ 30.216261][ T362] ext4_fallocate+0x2b6/0x1dc0
[ 30.221052][ T362] ? selinux_file_permission+0x2a5/0x510
[ 30.226693][ T362] ? fsnotify_perm+0x67/0x5b0
[ 30.231377][ T362] vfs_fallocate+0x4c5/0x5a0
[ 30.235966][ T362] do_vfs_ioctl+0x19cb/0x1cd0
[ 30.240657][ T362] ? __ia32_compat_sys_ioctl+0x860/0x860
[ 30.246412][ T362] ? __cfi_get_futex_key+0x10/0x10
[ 30.251550][ T362] ? futex_wake+0x5b7/0x8e0
[ 30.256096][ T362] ? ioctl_has_perm+0x1b8/0x4f0
[ 30.260984][ T362] ? ioctl_has_perm+0x3a6/0x4f0
[ 30.265848][ T362] ? has_cap_mac_admin+0x370/0x370
[ 30.270971][ T362] ? __kasan_slab_free+0x11/0x20
[ 30.275926][ T362] ? do_futex+0x2bf/0x430
[ 30.280259][ T362] ? selinux_file_ioctl+0x3a0/0x4d0
[ 30.285635][ T362] ? __cfi_do_futex+0x10/0x10
[ 30.290323][ T362] ? __cfi_selinux_file_ioctl+0x10/0x10
[ 30.295879][ T362] ? __se_sys_futex+0x136/0x310
[ 30.300749][ T362] ? security_file_ioctl+0x95/0xc0
[ 30.305874][ T362] __se_sys_ioctl+0x9f/0x1b0
[ 30.310468][ T362] __x64_sys_ioctl+0x7b/0x90
[ 30.315270][ T362] x64_sys_call+0x58b/0x9a0
[ 30.319786][ T362] do_syscall_64+0x4c/0xa0
[ 30.324328][ T362] ? clear_bhb_loop+0x30/0x80
[ 30.329010][ T362] ? clear_bhb_loop+0x30/0x80
[ 30.333690][ T362] entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 30.339587][ T362] RIP: 0033:0x7fed5259c799
[ 30.344003][ T362] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
[ 30.363627][ T362] RSP: 002b:00007ffd9d148998 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 30.372042][ T362] RAX: ffffffffffffffda RBX: 00007fed52815fa0 RCX: 00007fed5259c799
[ 30.380071][ T362] RDX: 00002000000000c0 RSI: 0000000040305829 RDI: 0000000000000005
[ 30.388178][ T362] RBP: 00007fed52632c99 R08: 0000000000000000 R09: 0000000000000000
[ 30.396193][ T362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 30.404213][ T362] R13: 00007fed52815fac R14: 00007fed52815fa0 R15: 00007fed52815fa0
[ 30.412222][ T362]
[ 30.415343][ T362] Modules linked in:
[ 30.422045][ T362] ---[ end trace 0000000000000000 ]---
[ 30.428221][ T362] RIP: 0010:ext4_split_extent_at+0xf62/0xf80
[ 30.434347][ T362] Code: ff ff 44 89 f1 80 e1 07 fe c1 38 c1 0f 8c 3f fb ff ff 4c 89 f7 49 89 f7 e8 9b b7 cf ff 4c 89 fe e9 2c fb ff ff e8 4e 7b 8a ff <0f> 0b e8 47 7b 8a ff 0f 0b e8 40 7b 8a ff 0f 0b e8 39 7b 8a ff 0f
[ 30.454964][ T362] RSP: 0018:ffffc900007a74c0 EFLAGS: 00010293
[ 30.461418][ T362] RAX: ffffffff81e6f382 RBX: 0000000000000000 RCX: ffff8881130b0000
[ 30.469761][ T362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000041
[ 30.477885][ T362] RBP: ffffc900007a7630 R08: 0000000000000000 R09: 0000000050000028
[ 30.486065][ T362] R10: dffffc0000000000 R11: fffffbfff0f6e4fd R12: dffffc0000000000
[ 30.494303][ T362] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8881149b1100
[ 30.502333][ T362] FS: 000055556dd21500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
[ 30.511428][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.518063][ T362] CR2: 00007fc50ba1f000 CR3: 000000010ed76000 CR4: 00000000003506a0
[ 30.526061][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 30.534362][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 30.542596][ T362] Kernel panic - not syncing: Fatal exception
[ 30.549247][ T362] Kernel Offset: disabled
[ 30.553661][ T362] Rebooting in 86400 seconds..