./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2220127092 <...> [ 18.023771][ T24] audit: type=1400 audit(1754909333.310:62): avc: denied { rlimitinh } for pid=215 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.043114][ T24] audit: type=1400 audit(1754909333.310:63): avc: denied { siginh } for pid=215 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.233' (ED25519) to the list of known hosts. execve("./syz-executor2220127092", ["./syz-executor2220127092"], 0x7ffd4d5e9cb0 /* 10 vars */) = 0 brk(NULL) = 0x555558c0c000 brk(0x555558c0cd00) = 0x555558c0cd00 arch_prctl(ARCH_SET_FS, 0x555558c0c380) = 0 set_tid_address(0x555558c0c650) = 282 set_robust_list(0x555558c0c660, 24) = 0 rseq(0x555558c0cca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2220127092", 4096) = 28 getrandom("\x30\xbd\xf0\x9e\x68\xa4\x63\x36", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555558c0cd00 brk(0x555558c2dd00) = 0x555558c2dd00 brk(0x555558c2e000) = 0x555558c2e000 mprotect(0x7f765a8a4000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 mkdir("./syzkaller.tURkdt", 0700) = 0 chmod("./syzkaller.tURkdt", 0777) = 0 chdir("./syzkaller.tURkdt") = 0 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555558c0c650) = 283 ./strace-static-x86_64: Process 283 attached [pid 283] set_robust_list(0x555558c0c660, 24) = 0 [pid 283] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 283] getppid() = 0 [pid 283] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 283] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 283] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 283] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 283] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 283] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 283] unshare(CLONE_NEWNS) = 0 [pid 283] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 283] unshare(CLONE_NEWIPC) = -1 EINVAL (Invalid argument) [pid 283] unshare(CLONE_NEWCGROUP) = 0 [pid 283] unshare(CLONE_NEWUTS) = 0 [pid 283] unshare(CLONE_SYSVSEM) = 0 [pid 283] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 283] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 283] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 283] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 283] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 283] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 283] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 283] getpid() = 1 [pid 283] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<) = 0 [pid 283] umount2("./0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 283] openat(AT_FDCWD, "./0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 3 [pid 283] newfstatat(3, "", {st_mode=S_IFDIR|0700, st_size=80, ...}, AT_EMPTY_PATH) = 0 [pid 283] getdents64(3, 0x555558c0d6f0 /* 4 entries */, 32768) = 112 [pid 283] umount2("./0/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EBUSY (Device or resource busy) [pid 283] newfstatat(AT_FDCWD, "./0/file0", {st_mode=S_IFDIR|0700, st_size=80, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 283] umount2("./0/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EBUSY (Device or resource busy) [pid 283] openat(AT_FDCWD, "./0/file0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 4 [pid 283] newfstatat(4, "", {st_mode=S_IFDIR|0700, st_size=80, ...}, AT_EMPTY_PATH) = 0 [pid 283] getdents64(4, 0x555558c15730 /* 4 entries */, 32768) = 112 [pid 283] umount2("./0/file0/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = 0 [pid 283] umount2("./0/file0/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 283] newfstatat(AT_FDCWD, "./0/file0/file0", {st_mode=S_IFDIR|000, st_size=80, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 283] umount2("./0/file0/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 283] openat(AT_FDCWD, "./0/file0/file0", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 5 [pid 283] newfstatat(5, "", {st_mode=S_IFDIR|000, st_size=80, ...}, AT_EMPTY_PATH) = 0 [pid 283] getdents64(5, 0x555558c1d770 /* 4 entries */, 32768) = 112 [pid 283] umount2("./0/file0/file0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 283] newfstatat(AT_FDCWD, "./0/file0/file0/.incomplete", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 283] umount2("./0/file0/file0/.incomplete", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 283] openat(AT_FDCWD, "./0/file0/file0/.incomplete", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 6 [pid 283] newfstatat(6, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0 [pid 283] getdents64(6, 0x555558c257b0 /* 2 entries */, 32768) = 48 [pid 283] getdents64(6, 0x555558c257b0 /* 0 entries */, 32768) = 0 [pid 283] close(6) = 0 [pid 283] rmdir("./0/file0/file0/.incomplete") = 0 [pid 283] umount2("./0/file0/file0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 283] newfstatat(AT_FDCWD, "./0/file0/file0/.index", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_SYMLINK_NOFOLLOW) = 0 [pid 283] umount2("./0/file0/file0/.index", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [pid 283] openat(AT_FDCWD, "./0/file0/file0/.index", O_RDONLY|O_NONBLOCK|O_CLOEXEC|O_DIRECTORY) = 6 [pid 283] newfstatat(6, "", {st_mode=S_IFDIR|0700, st_size=40, ...}, AT_EMPTY_PATH) = 0 [pid 283] getdents64(6, 0x555558c257b0 /* 2 entries */, 32768) = 48 [pid 283] getdents64(6, 0x555558c257b0 /* 0 entries */, 32768) = 0 [pid 283] close(6) = 0 [pid 283] rmdir("./0/file0/file0/.index") = 0 [pid 283] getdents64(5, 0x555558c1d770 /* 0 entries */, 32768) = 0 [pid 283] close(5) = 0 [pid 283] rmdir("./0/file0/file0") = -1 EBUSY (Device or resource busy) [pid 283] umount2("./0/file0/file0", MNT_FORCE|UMOUNT_NOFOLLOW) = -1 EINVAL (Invalid argument) [ 32.760942][ T24] audit: type=1400 audit(1754909348.010:71): avc: denied { mounton } for pid=283 comm="syz-executor222" path="/root/syzkaller.tURkdt/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=14454 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 32.789574][ T24] audit: type=1400 audit(1754909348.020:72): avc: denied { unmount } for pid=283 comm="syz-executor222" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [pid 283] exit_group(1) = ? [ 32.810672][ T24] audit: type=1400 audit(1754909348.040:73): avc: denied { mounton } for pid=283 comm="syz-executor222" path="/dev/gadgetfs" dev="devtmpfs" ino=517 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 32.835391][ T283] ------------[ cut here ]------------ [ 32.841088][ T283] WARNING: CPU: 0 PID: 283 at fs/inode.c:304 drop_nlink+0xc5/0x110 [ 32.849351][ T283] Modules linked in: [ 32.853476][ T283] CPU: 0 PID: 283 Comm: syz-executor222 Not tainted 5.10.240-syzkaller #0 [ 32.862961][ T283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 32.873459][ T283] RIP: 0010:drop_nlink+0xc5/0x110 [ 32.878623][ T283] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 83 23 f2 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 eb 31 b8 ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c [ 32.898581][ T283] RSP: 0018:ffffc90000ba7b68 EFLAGS: 00010293 [ 32.904797][ T283] RAX: ffffffff81ab6e85 RBX: ffff88811a2c19c0 RCX: ffff888104dda780 [ 32.913016][ T283] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 32.921229][ T283] RBP: ffffc90000ba7b90 R08: 0000000000000004 R09: 0000000000000003 [ 32.929786][ T283] R10: fffff52000174f5c R11: 1ffff92000174f5c R12: dffffc0000000000 [ 32.938098][ T283] R13: 1ffff11023458341 R14: ffff88811a2c1a08 R15: 0000000000000000 [ 32.946304][ T283] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 32.955468][ T283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 32.962181][ T283] CR2: 00007f765a8ab1b0 CR3: 000000000620f000 CR4: 00000000003506b0 [ 32.970421][ T283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 32.978683][ T283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 32.987178][ T283] Call Trace: [ 32.990871][ T283] shmem_rmdir+0x5b/0x90 [ 32.995382][ T283] vfs_rmdir+0x1b3/0x3e0 [ 33.000048][ T283] incfs_kill_sb+0xfe/0x210 [ 33.004677][ T283] deactivate_locked_super+0xa0/0x100 [ 33.010429][ T283] deactivate_super+0xaf/0xe0 [ 33.015396][ T283] cleanup_mnt+0x446/0x500 [ 33.019950][ T283] __cleanup_mnt+0x19/0x20 [ 33.024624][ T283] task_work_run+0x127/0x190 [ 33.029514][ T283] do_exit+0xa4f/0x2480 [ 33.034168][ T283] ? put_task_struct+0x90/0x90 [ 33.039245][ T283] ? ptrace_notify+0x1c4/0x250 [ 33.044279][ T283] ? do_notify_parent+0x7e0/0x7e0 [ 33.049579][ T283] do_group_exit+0x141/0x310 [ 33.054470][ T283] __x64_sys_exit_group+0x3f/0x40 [ 33.059731][ T283] do_syscall_64+0x31/0x40 [ 33.064215][ T283] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.070265][ T283] RIP: 0033:0x7f765a82e789 [ 33.074727][ T283] Code: Unable to access opcode bytes at RIP 0x7f765a82e75f. [ 33.082193][ T283] RSP: 002b:00007ffcdbfc9ad8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 33.090800][ T283] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f765a82e789 [ 33.099115][ T283] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 33.107472][ T283] RBP: 00007f765a8aa350 R08: ffffffffffffffb8 R09: 0000000000000000 [ 33.115535][ T283] R10: 0000000000001000 R11: 0000000000000246 R12: 00007f765a8aa350 [ 33.123749][ T283] R13: 0000000000000000 R14: 00007f765a8aada0 R15: 00007f765a7ff760 [ 33.131821][ T283] ---[ end trace 1c2f746eddbed3ed ]--- [ 33.137584][ T283] ================================================================== [ 33.146041][ T283] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 [ 33.152429][ T283] Write of size 4 at addr 0000000000000170 by task syz-executor222/283 [ 33.160677][ T283] [ 33.163057][ T283] CPU: 0 PID: 283 Comm: syz-executor222 Tainted: G W 5.10.240-syzkaller #0 [ 33.173083][ T283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 33.183170][ T283] Call Trace: [ 33.186765][ T283] __dump_stack+0x21/0x24 [ 33.191486][ T283] dump_stack_lvl+0x169/0x1d8 [ 33.196668][ T283] ? thaw_kernel_threads+0x220/0x220 [ 33.202210][ T283] ? show_regs_print_info+0x18/0x18 [ 33.207507][ T283] ? _raw_spin_lock+0x8e/0xe0 [ 33.212319][ T283] ? _raw_spin_trylock_bh+0x130/0x130 [ 33.218055][ T283] ? ihold+0x20/0x60 [ 33.222417][ T283] kasan_report+0xd8/0x130 [ 33.226868][ T283] ? ihold+0x20/0x60 [ 33.231757][ T283] kasan_check_range+0x280/0x290 [ 33.236886][ T283] __kasan_check_write+0x14/0x20 [ 33.241956][ T283] ihold+0x20/0x60 [ 33.245721][ T283] vfs_rmdir+0x247/0x3e0 [ 33.250009][ T283] incfs_kill_sb+0xfe/0x210 [ 33.254559][ T283] deactivate_locked_super+0xa0/0x100 [ 33.260064][ T283] deactivate_super+0xaf/0xe0 [ 33.264906][ T283] cleanup_mnt+0x446/0x500 [ 33.269445][ T283] __cleanup_mnt+0x19/0x20 [ 33.273903][ T283] task_work_run+0x127/0x190 [ 33.278956][ T283] do_exit+0xa4f/0x2480 [ 33.283183][ T283] ? put_task_struct+0x90/0x90 [ 33.288469][ T283] ? ptrace_notify+0x1c4/0x250 [ 33.293272][ T283] ? do_notify_parent+0x7e0/0x7e0 [ 33.298816][ T283] do_group_exit+0x141/0x310 [ 33.303734][ T283] __x64_sys_exit_group+0x3f/0x40 [ 33.309277][ T283] do_syscall_64+0x31/0x40 [ 33.314090][ T283] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.320008][ T283] RIP: 0033:0x7f765a82e789 [ 33.324445][ T283] Code: Unable to access opcode bytes at RIP 0x7f765a82e75f. [ 33.331834][ T283] RSP: 002b:00007ffcdbfc9ad8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 33.340419][ T283] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f765a82e789 [ 33.348451][ T283] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 33.356732][ T283] RBP: 00007f765a8aa350 R08: ffffffffffffffb8 R09: 0000000000000000 [ 33.365085][ T283] R10: 0000000000001000 R11: 0000000000000246 R12: 00007f765a8aa350 [ 33.373150][ T283] R13: 0000000000000000 R14: 00007f765a8aada0 R15: 00007f765a7ff760 [ 33.381285][ T283] ================================================================== [ 33.389829][ T283] Disabling lock debugging due to kernel taint [ 33.396303][ T283] BUG: kernel NULL pointer dereference, address: 0000000000000170 [ 33.404275][ T283] #PF: supervisor write access in kernel mode [ 33.410579][ T283] #PF: error_code(0x0002) - not-present page [ 33.417041][ T283] PGD 0 P4D 0 [ 33.420505][ T283] Oops: 0002 [#1] PREEMPT SMP KASAN [ 33.425759][ T283] CPU: 0 PID: 283 Comm: syz-executor222 Tainted: G B W 5.10.240-syzkaller #0 [ 33.435873][ T283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 33.446212][ T283] RIP: 0010:ihold+0x26/0x60 [ 33.450780][ T283] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 01 2a b8 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 70 1b f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 81 [ 33.470995][ T283] RSP: 0018:ffffc90000ba7ba8 EFLAGS: 00010246 [ 33.477135][ T283] RAX: ffff888104dda700 RBX: 0000000000000000 RCX: 0000000000000282 [ 33.485264][ T283] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff [ 33.493514][ T283] RBP: ffffc90000ba7bb8 R08: 0000000000000004 R09: 0000000000000003 [ 33.501635][ T283] R10: fffffbfff0d8ec48 R11: 1ffffffff0d8ec48 R12: 1ffff110243084d2 [ 33.509667][ T283] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 33.517707][ T283] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 33.526801][ T283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.533530][ T283] CR2: 0000000000000170 CR3: 000000000620f000 CR4: 00000000003506b0 [ 33.541563][ T283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.549690][ T283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.557706][ T283] Call Trace: [ 33.561153][ T283] vfs_rmdir+0x247/0x3e0 [ 33.565567][ T283] incfs_kill_sb+0xfe/0x210 [ 33.570135][ T283] deactivate_locked_super+0xa0/0x100 [ 33.575751][ T283] deactivate_super+0xaf/0xe0 [ 33.580487][ T283] cleanup_mnt+0x446/0x500 [ 33.584984][ T283] __cleanup_mnt+0x19/0x20 [ 33.589560][ T283] task_work_run+0x127/0x190 [ 33.594563][ T283] do_exit+0xa4f/0x2480 [ 33.598808][ T283] ? put_task_struct+0x90/0x90 [ 33.603839][ T283] ? ptrace_notify+0x1c4/0x250 [ 33.608665][ T283] ? do_notify_parent+0x7e0/0x7e0 [ 33.613843][ T283] do_group_exit+0x141/0x310 [ 33.618515][ T283] __x64_sys_exit_group+0x3f/0x40 [ 33.623697][ T283] do_syscall_64+0x31/0x40 [ 33.628293][ T283] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.634255][ T283] RIP: 0033:0x7f765a82e789 [ 33.638807][ T283] Code: Unable to access opcode bytes at RIP 0x7f765a82e75f. [ 33.646495][ T283] RSP: 002b:00007ffcdbfc9ad8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 33.655185][ T283] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f765a82e789 [ 33.663305][ T283] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 33.671609][ T283] RBP: 00007f765a8aa350 R08: ffffffffffffffb8 R09: 0000000000000000 [ 33.679952][ T283] R10: 0000000000001000 R11: 0000000000000246 R12: 00007f765a8aa350 [ 33.688080][ T283] R13: 0000000000000000 R14: 00007f765a8aada0 R15: 00007f765a7ff760 [ 33.696372][ T283] Modules linked in: [ 33.700618][ T283] CR2: 0000000000000170 [ 33.704844][ T283] ---[ end trace 1c2f746eddbed3ee ]--- [ 33.710385][ T283] RIP: 0010:ihold+0x26/0x60 [ 33.715130][ T283] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 01 2a b8 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 70 1b f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 81 [ 33.735056][ T283] RSP: 0018:ffffc90000ba7ba8 EFLAGS: 00010246 [ 33.741211][ T283] RAX: ffff888104dda700 RBX: 0000000000000000 RCX: 0000000000000282 [ 33.749646][ T283] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff [ 33.758040][ T283] RBP: ffffc90000ba7bb8 R08: 0000000000000004 R09: 0000000000000003 [ 33.766363][ T283] R10: fffffbfff0d8ec48 R11: 1ffffffff0d8ec48 R12: 1ffff110243084d2 [ 33.774529][ T283] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [ 33.783275][ T283] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 33.792360][ T283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.799434][ T283] CR2: 0000000000000170 CR3: 000000000620f000 CR4: 00000000003506b0 [ 33.807550][ T283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.815748][ T283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.823767][ T283] Kernel panic - not syncing: Fatal exception [ 33.830231][ T283] Kernel Offset: disabled [ 33.834587][ T283] Rebooting in 86400 seconds..