Warning: Permanently added '10.128.0.4' (ED25519) to the list of known hosts. 2025/10/25 12:08:41 parsed 1 programs [ 26.025970][ T28] audit: type=1400 audit(1761394121.488:64): avc: denied { node_bind } for pid=284 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 26.046715][ T28] audit: type=1400 audit(1761394121.488:65): avc: denied { module_request } for pid=284 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 27.161416][ T28] audit: type=1400 audit(1761394122.618:66): avc: denied { mounton } for pid=292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.162749][ T292] cgroup: Unknown subsys name 'net' [ 27.184123][ T28] audit: type=1400 audit(1761394122.618:67): avc: denied { mount } for pid=292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.211414][ T28] audit: type=1400 audit(1761394122.648:68): avc: denied { unmount } for pid=292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.211604][ T292] cgroup: Unknown subsys name 'devices' [ 27.355746][ T292] cgroup: Unknown subsys name 'hugetlb' [ 27.361460][ T292] cgroup: Unknown subsys name 'rlimit' [ 27.502970][ T28] audit: type=1400 audit(1761394122.958:69): avc: denied { setattr } for pid=292 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.526194][ T28] audit: type=1400 audit(1761394122.968:70): avc: denied { create } for pid=292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.546650][ T28] audit: type=1400 audit(1761394122.968:71): avc: denied { write } for pid=292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.557753][ T294] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.567043][ T28] audit: type=1400 audit(1761394122.968:72): avc: denied { read } for pid=292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.595678][ T28] audit: type=1400 audit(1761394122.968:73): avc: denied { mounton } for pid=292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.633633][ T292] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.358514][ T297] request_module fs-gadgetfs succeeded, but still no fs? [ 28.730356][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.737830][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.745360][ T321] device bridge_slave_0 entered promiscuous mode [ 28.752313][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.759388][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.766826][ T321] device bridge_slave_1 entered promiscuous mode [ 28.816906][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.823983][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.831246][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.838311][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.858594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.866335][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.873682][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.882582][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.891170][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.898264][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.907819][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.916825][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.923868][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.936594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.946143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.960927][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.972351][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.980582][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.988285][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.997313][ T321] device veth0_vlan entered promiscuous mode [ 29.007395][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.016531][ T321] device veth1_macvtap entered promiscuous mode [ 29.026907][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.037064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.075993][ T321] syz-executor (321) used greatest stack depth: 21920 bytes left 2025/10/25 12:08:45 executed programs: 0 [ 29.597230][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.604330][ T364] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.611685][ T364] device bridge_slave_0 entered promiscuous mode [ 29.622759][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.629917][ T364] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.637508][ T364] device bridge_slave_1 entered promiscuous mode [ 29.692186][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.699264][ T364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.706715][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.713790][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.723392][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.730632][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.752135][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.759666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.769342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.777695][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.786998][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.794085][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.814982][ T43] device bridge_slave_1 left promiscuous mode [ 29.821198][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.828840][ T43] device bridge_slave_0 left promiscuous mode [ 29.835091][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.843333][ T43] device veth1_macvtap left promiscuous mode [ 29.849364][ T43] device veth0_vlan left promiscuous mode [ 29.948734][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.957094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.965639][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.972662][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.980046][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.988212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.996272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.004321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.012229][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.020691][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.030137][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.038123][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.047022][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.054512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.062305][ T364] device veth0_vlan entered promiscuous mode [ 30.072649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.081098][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.090277][ T364] device veth1_macvtap entered promiscuous mode [ 30.100428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.108151][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.116430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.125774][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.134402][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.160997][ T364] ------------[ cut here ]------------ [ 30.166555][ T364] WARNING: CPU: 1 PID: 364 at fs/inode.c:335 drop_nlink+0xc5/0x110 [ 30.174509][ T364] Modules linked in: [ 30.178409][ T364] CPU: 1 PID: 364 Comm: syz-executor Not tainted syzkaller #0 [ 30.185886][ T364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 30.195971][ T364] RIP: 0010:drop_nlink+0xc5/0x110 [ 30.201018][ T364] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 a3 e4 f0 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 9b 72 ac ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c [ 30.220805][ T364] RSP: 0018:ffffc90000987c38 EFLAGS: 00010293 [ 30.227236][ T364] RAX: ffffffff81c3ab85 RBX: ffff88812087ea18 RCX: ffff8881130f6540 [ 30.235284][ T364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 30.243549][ T364] RBP: ffffc90000987c60 R08: 0000000000000004 R09: 0000000000000003 [ 30.251703][ T364] R10: fffff52000130f78 R11: 1ffff92000130f78 R12: dffffc0000000000 [ 30.259698][ T364] R13: 1ffff1102410fd4c R14: ffff88812087ea60 R15: 0000000000000000 [ 30.267722][ T364] FS: 00005555917d5500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 30.276749][ T364] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.283602][ T364] CR2: 00005555917f84e8 CR3: 000000012da67000 CR4: 00000000003506a0 [ 30.291815][ T364] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.300035][ T364] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.308131][ T364] Call Trace: [ 30.311451][ T364] [ 30.314437][ T364] shmem_rmdir+0x5b/0x90 [ 30.318781][ T364] vfs_rmdir+0x393/0x500 [ 30.323279][ T364] incfs_kill_sb+0x105/0x220 [ 30.328164][ T364] deactivate_locked_super+0xb5/0x120 [ 30.333682][ T364] deactivate_super+0xaf/0xe0 [ 30.338997][ T364] cleanup_mnt+0x45f/0x4e0 [ 30.343718][ T364] __cleanup_mnt+0x19/0x20 [ 30.348221][ T364] task_work_run+0x1db/0x240 [ 30.352901][ T364] ? __cfi_task_work_run+0x10/0x10 [ 30.358134][ T364] ? __x64_sys_umount+0x125/0x160 [ 30.363270][ T364] ? __cfi___x64_sys_umount+0x10/0x10 [ 30.368770][ T364] exit_to_user_mode_loop+0x9b/0xb0 [ 30.374069][ T364] exit_to_user_mode_prepare+0x5a/0xa0 [ 30.379616][ T364] syscall_exit_to_user_mode+0x1a/0x30 [ 30.385151][ T364] do_syscall_64+0x58/0xa0 [ 30.389645][ T364] ? clear_bhb_loop+0x30/0x80 [ 30.394431][ T364] ? clear_bhb_loop+0x30/0x80 [ 30.399168][ T364] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 30.405129][ T364] RIP: 0033:0x7f25e1d902f7 [ 30.409599][ T364] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 30.429273][ T364] RSP: 002b:00007ffda8501b38 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 30.437858][ T364] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f25e1d902f7 [ 30.445891][ T364] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffda8501bf0 [ 30.454027][ T364] RBP: 00007ffda8501bf0 R08: 0000000000000000 R09: 0000000000000000 [ 30.462068][ T364] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffda8502c80 [ 30.470141][ T364] R13: 00007f25e1e11d7d R14: 00000000000075b6 R15: 00007ffda8502cc0 [ 30.478305][ T364] [ 30.481390][ T364] ---[ end trace 0000000000000000 ]--- [ 30.488585][ T364] ================================================================== [ 30.496670][ T364] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 [ 30.502925][ T364] Write of size 4 at addr 0000000000000170 by task syz-executor/364 [ 30.510913][ T364] [ 30.513255][ T364] CPU: 0 PID: 364 Comm: syz-executor Tainted: G W syzkaller #0 [ 30.522184][ T364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 30.532242][ T364] Call Trace: [ 30.535535][ T364] [ 30.538495][ T364] __dump_stack+0x21/0x24 [ 30.542859][ T364] dump_stack_lvl+0xee/0x150 [ 30.547451][ T364] ? __cfi_dump_stack_lvl+0x8/0x8 [ 30.552490][ T364] ? ihold+0x20/0x60 [ 30.556412][ T364] ? ihold+0x20/0x60 [ 30.560303][ T364] print_report+0x3d/0x60 [ 30.564640][ T364] kasan_report+0x122/0x150 [ 30.569144][ T364] ? ihold+0x20/0x60 [ 30.573035][ T364] kasan_check_range+0x280/0x290 [ 30.577972][ T364] __kasan_check_write+0x14/0x20 [ 30.582925][ T364] ihold+0x20/0x60 [ 30.586655][ T364] vfs_rmdir+0x25f/0x500 [ 30.590897][ T364] incfs_kill_sb+0x105/0x220 [ 30.595490][ T364] deactivate_locked_super+0xb5/0x120 [ 30.600860][ T364] deactivate_super+0xaf/0xe0 [ 30.605621][ T364] cleanup_mnt+0x45f/0x4e0 [ 30.610133][ T364] __cleanup_mnt+0x19/0x20 [ 30.614547][ T364] task_work_run+0x1db/0x240 [ 30.619186][ T364] ? __cfi_task_work_run+0x10/0x10 [ 30.624290][ T364] ? __x64_sys_umount+0x125/0x160 [ 30.629317][ T364] ? __cfi___x64_sys_umount+0x10/0x10 [ 30.634690][ T364] exit_to_user_mode_loop+0x9b/0xb0 [ 30.639885][ T364] exit_to_user_mode_prepare+0x5a/0xa0 [ 30.645351][ T364] syscall_exit_to_user_mode+0x1a/0x30 [ 30.650809][ T364] do_syscall_64+0x58/0xa0 [ 30.655229][ T364] ? clear_bhb_loop+0x30/0x80 [ 30.659901][ T364] ? clear_bhb_loop+0x30/0x80 [ 30.664572][ T364] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 30.670455][ T364] RIP: 0033:0x7f25e1d902f7 [ 30.674862][ T364] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 30.694479][ T364] RSP: 002b:00007ffda8501b38 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 30.702889][ T364] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f25e1d902f7 [ 30.710856][ T364] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffda8501bf0 [ 30.718850][ T364] RBP: 00007ffda8501bf0 R08: 0000000000000000 R09: 0000000000000000 [ 30.726819][ T364] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffda8502c80 [ 30.734785][ T364] R13: 00007f25e1e11d7d R14: 00000000000075b6 R15: 00007ffda8502cc0 [ 30.742761][ T364] [ 30.745774][ T364] ================================================================== [ 30.755263][ T364] Disabling lock debugging due to kernel taint [ 30.761468][ T364] BUG: kernel NULL pointer dereference, address: 0000000000000170 [ 30.769268][ T364] #PF: supervisor write access in kernel mode [ 30.775330][ T364] #PF: error_code(0x0002) - not-present page [ 30.781363][ T364] PGD 10967f067 P4D 10967f067 PUD 0 [ 30.786666][ T364] Oops: 0002 [#1] PREEMPT SMP KASAN [ 30.791864][ T364] CPU: 0 PID: 364 Comm: syz-executor Tainted: G B W syzkaller #0 [ 30.800797][ T364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 30.810849][ T364] RIP: 0010:ihold+0x26/0x60 [ 30.815354][ T364] Code: 33 36 7c df 55 48 89 e5 41 56 53 48 89 fb e8 01 6a ac ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 e0 db f0 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 f1 [ 30.835066][ T364] RSP: 0018:ffffc90000987c78 EFLAGS: 00010246 [ 30.841131][ T364] RAX: ffff8881130f6500 RBX: 0000000000000000 RCX: ffff8881130f6540 [ 30.849100][ T364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 30.857081][ T364] RBP: ffffc90000987c88 R08: dffffc0000000000 R09: fffffbfff0f2d8fd [ 30.865047][ T364] R10: fffffbfff0f2d8fd R11: 1ffffffff0f2d8fc R12: ffff88812087ea24 [ 30.873016][ T364] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 30.881068][ T364] FS: 00005555917d5500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 30.889996][ T364] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.896585][ T364] CR2: 0000000000000170 CR3: 000000012da67000 CR4: 00000000003506b0 [ 30.904557][ T364] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.912547][ T364] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.920610][ T364] Call Trace: [ 30.923889][ T364] [ 30.926819][ T364] vfs_rmdir+0x25f/0x500 [ 30.931075][ T364] incfs_kill_sb+0x105/0x220 [ 30.935687][ T364] deactivate_locked_super+0xb5/0x120 [ 30.941072][ T364] deactivate_super+0xaf/0xe0 [ 30.945763][ T364] cleanup_mnt+0x45f/0x4e0 [ 30.950184][ T364] __cleanup_mnt+0x19/0x20 [ 30.954605][ T364] task_work_run+0x1db/0x240 [ 30.959210][ T364] ? __cfi_task_work_run+0x10/0x10 [ 30.964329][ T364] ? __x64_sys_umount+0x125/0x160 [ 30.969365][ T364] ? __cfi___x64_sys_umount+0x10/0x10 [ 30.974777][ T364] exit_to_user_mode_loop+0x9b/0xb0 [ 30.979980][ T364] exit_to_user_mode_prepare+0x5a/0xa0 [ 30.985438][ T364] syscall_exit_to_user_mode+0x1a/0x30 [ 30.990904][ T364] do_syscall_64+0x58/0xa0 [ 30.995319][ T364] ? clear_bhb_loop+0x30/0x80 [ 30.999997][ T364] ? clear_bhb_loop+0x30/0x80 [ 31.004680][ T364] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 31.010678][ T364] RIP: 0033:0x7f25e1d902f7 [ 31.015112][ T364] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 31.034717][ T364] RSP: 002b:00007ffda8501b38 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 31.043151][ T364] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f25e1d902f7 [ 31.051122][ T364] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffda8501bf0 [ 31.059090][ T364] RBP: 00007ffda8501bf0 R08: 0000000000000000 R09: 0000000000000000 [ 31.067056][ T364] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffda8502c80 [ 31.075030][ T364] R13: 00007f25e1e11d7d R14: 00000000000075b6 R15: 00007ffda8502cc0 [ 31.083001][ T364] [ 31.086014][ T364] Modules linked in: [ 31.089937][ T364] CR2: 0000000000000170 [ 31.094086][ T364] ---[ end trace 0000000000000000 ]--- [ 31.099534][ T364] RIP: 0010:ihold+0x26/0x60 [ 31.104040][ T364] Code: 33 36 7c df 55 48 89 e5 41 56 53 48 89 fb e8 01 6a ac ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 e0 db f0 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 f1 [ 31.123644][ T364] RSP: 0018:ffffc90000987c78 EFLAGS: 00010246 [ 31.129712][ T364] RAX: ffff8881130f6500 RBX: 0000000000000000 RCX: ffff8881130f6540 [ 31.137702][ T364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 31.145685][ T364] RBP: ffffc90000987c88 R08: dffffc0000000000 R09: fffffbfff0f2d8fd [ 31.153655][ T364] R10: fffffbfff0f2d8fd R11: 1ffffffff0f2d8fc R12: ffff88812087ea24 [ 31.161630][ T364] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 31.169606][ T364] FS: 00005555917d5500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 31.178535][ T364] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 31.185116][ T364] CR2: 0000000000000170 CR3: 000000012da67000 CR4: 00000000003506b0 [ 31.193083][ T364] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 31.201050][ T364] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 31.209040][ T364] Kernel panic - not syncing: Fatal exception [ 31.215406][ T364] Kernel Offset: disabled [ 31.219728][ T364] Rebooting in 86400 seconds..