Warning: Permanently added '10.128.1.140' (ED25519) to the list of known hosts.
2026/05/03 06:18:54 parsed 1 programs
[ 32.045662][ T28] audit: type=1400 audit(1777789134.932:64): avc: denied { node_bind } for pid=294 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 32.066463][ T28] audit: type=1400 audit(1777789134.932:65): avc: denied { module_request } for pid=294 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 33.170085][ T28] audit: type=1400 audit(1777789136.062:66): avc: denied { mounton } for pid=300 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 33.173521][ T300] cgroup: Unknown subsys name 'net'
[ 33.192892][ T28] audit: type=1400 audit(1777789136.062:67): avc: denied { mount } for pid=300 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 33.220123][ T28] audit: type=1400 audit(1777789136.092:68): avc: denied { unmount } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 33.220527][ T300] cgroup: Unknown subsys name 'devices'
[ 33.330056][ T300] cgroup: Unknown subsys name 'hugetlb'
[ 33.335702][ T300] cgroup: Unknown subsys name 'rlimit'
[ 33.478079][ T28] audit: type=1400 audit(1777789136.362:69): avc: denied { setattr } for pid=300 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 33.501300][ T28] audit: type=1400 audit(1777789136.372:70): avc: denied { create } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 33.521785][ T28] audit: type=1400 audit(1777789136.372:71): avc: denied { write } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 33.542079][ T28] audit: type=1400 audit(1777789136.372:72): avc: denied { read } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 33.562407][ T28] audit: type=1400 audit(1777789136.372:73): avc: denied { mounton } for pid=300 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 33.577504][ T304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
Setting up swapspace version 1, size = 127995904 bytes
[ 33.706103][ T300] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 34.402158][ T308] request_module fs-gadgetfs succeeded, but still no fs?
[ 34.896790][ T345] bridge0: port 1(bridge_slave_0) entered blocking state
[ 34.904410][ T345] bridge0: port 1(bridge_slave_0) entered disabled state
[ 34.911999][ T345] device bridge_slave_0 entered promiscuous mode
[ 34.919097][ T345] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.926168][ T345] bridge0: port 2(bridge_slave_1) entered disabled state
[ 34.933691][ T345] device bridge_slave_1 entered promiscuous mode
[ 34.981704][ T345] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.988793][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 34.996085][ T345] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.003145][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 35.023251][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 35.031408][ T328] bridge0: port 1(bridge_slave_0) entered disabled state
[ 35.039142][ T328] bridge0: port 2(bridge_slave_1) entered disabled state
[ 35.049783][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 35.058296][ T328] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.065350][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 35.074387][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 35.082656][ T328] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.089730][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 35.102175][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 35.111841][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 35.126490][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 35.138130][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 35.146245][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 35.154008][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 35.162266][ T345] device veth0_vlan entered promiscuous mode
[ 35.172931][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 35.182232][ T345] device veth1_macvtap entered promiscuous mode
[ 35.191643][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 35.201728][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 35.235885][ T345] syz-executor (345) used greatest stack depth: 21504 bytes left
2026/05/03 06:18:58 executed programs: 0
[ 35.797752][ T372] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.804867][ T372] bridge0: port 1(bridge_slave_0) entered disabled state
[ 35.812395][ T372] device bridge_slave_0 entered promiscuous mode
[ 35.819483][ T372] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.826524][ T372] bridge0: port 2(bridge_slave_1) entered disabled state
[ 35.834647][ T372] device bridge_slave_1 entered promiscuous mode
[ 35.880778][ T372] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.887991][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 35.895250][ T372] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.902308][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 35.922471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 35.930169][ T10] bridge0: port 1(bridge_slave_0) entered disabled state
[ 35.937337][ T10] bridge0: port 2(bridge_slave_1) entered disabled state
[ 35.948241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 35.956501][ T10] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.963575][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 35.973114][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 35.981557][ T10] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.988644][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 36.001078][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 36.010995][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 36.025397][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 36.036822][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 36.045185][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 36.052927][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 36.067463][ T372] device veth0_vlan entered promiscuous mode
[ 36.077943][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 36.087239][ T372] device veth1_macvtap entered promiscuous mode
[ 36.097489][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 36.114927][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 36.140930][ T372] ------------[ cut here ]------------
[ 36.146426][ T372] WARNING: CPU: 0 PID: 372 at fs/inode.c:335 drop_nlink+0xc5/0x110
[ 36.154430][ T372] Modules linked in:
[ 36.158385][ T372] CPU: 0 PID: 372 Comm: syz-executor Not tainted syzkaller #0
[ 36.165864][ T372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
[ 36.176001][ T372] RIP: 0010:drop_nlink+0xc5/0x110
[ 36.181074][ T372] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 d3 ab f0 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 fb 0e ab ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c
[ 36.200761][ T372] RSP: 0018:ffffc90000987c38 EFLAGS: 00010293
[ 36.206848][ T372] RAX: ffffffff81c66755 RBX: ffff888121e96de0 RCX: ffff8881135c8000
[ 36.214885][ T372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 36.222948][ T372] RBP: ffffc90000987c60 R08: 0000000000000003 R09: 0000000000000004
[ 36.231003][ T372] R10: dffffc0000000000 R11: fffff52000130f78 R12: dffffc0000000000
[ 36.239017][ T372] R13: 1ffff110243d2dc5 R14: ffff888121e96e28 R15: 0000000000000000
[ 36.247006][ T372] FS: 00005555915ff500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[ 36.256112][ T372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 36.262745][ T372] CR2: 0000555591622948 CR3: 000000012d809000 CR4: 00000000003506b0
[ 36.270779][ T372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 36.278828][ T372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 36.286806][ T372] Call Trace:
[ 36.290148][ T372]
[ 36.293092][ T372] shmem_rmdir+0x5b/0x90
[ 36.297350][ T372] vfs_rmdir+0x393/0x500
[ 36.301640][ T372] incfs_kill_sb+0x105/0x220
[ 36.306260][ T372] deactivate_locked_super+0xb5/0x120
[ 36.311709][ T372] deactivate_super+0xaf/0xe0
[ 36.316410][ T372] cleanup_mnt+0x474/0x500
[ 36.320885][ T372] __cleanup_mnt+0x19/0x20
[ 36.325328][ T372] task_work_run+0x1e1/0x250
[ 36.330013][ T372] ? __cfi_task_work_run+0x10/0x10
[ 36.335167][ T372] ? __x64_sys_umount+0x12d/0x170
[ 36.340247][ T372] ? __cfi___x64_sys_umount+0x10/0x10
[ 36.345650][ T372] exit_to_user_mode_loop+0x9b/0xb0
[ 36.350914][ T372] exit_to_user_mode_prepare+0x87/0xd0
[ 36.356396][ T372] syscall_exit_to_user_mode+0x1a/0x30
[ 36.361914][ T372] do_syscall_64+0x58/0xa0
[ 36.366534][ T372] ? clear_bhb_loop+0x30/0x80
[ 36.371310][ T372] ? clear_bhb_loop+0x30/0x80
[ 36.376036][ T372] entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 36.381998][ T372] RIP: 0033:0x7fc962d9e017
[ 36.386439][ T372] Code: a2 c7 05 dc 06 25 00 00 00 00 00 eb 96 e8 e1 12 00 00 90 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8
[ 36.406127][ T372] RSP: 002b:00007ffcf8c41908 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 36.414632][ T372] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fc962d9e017
[ 36.422707][ T372] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcf8c419c0
[ 36.430718][ T372] RBP: 00007ffcf8c419c0 R08: 00007ffcf8c429c0 R09: 00000000ffffffff
[ 36.438735][ T372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcf8c42a50
[ 36.446721][ T372] R13: 00007fc962e32120 R14: 0000000000008d0d R15: 00007ffcf8c42a90
[ 36.454811][ T372]
[ 36.457849][ T372] ---[ end trace 0000000000000000 ]---
[ 36.463490][ T372] ==================================================================
[ 36.471581][ T372] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60
[ 36.477854][ T372] Write of size 4 at addr 0000000000000170 by task syz-executor/372
[ 36.485825][ T372]
[ 36.488169][ T372] CPU: 1 PID: 372 Comm: syz-executor Tainted: G W syzkaller #0
[ 36.497125][ T372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
[ 36.507180][ T372] Call Trace:
[ 36.510457][ T372]
[ 36.513388][ T372] __dump_stack+0x21/0x24
[ 36.517719][ T372] dump_stack_lvl+0x110/0x170
[ 36.522396][ T372] ? __cfi_dump_stack_lvl+0x8/0x8
[ 36.527444][ T372] ? __cfi_call_rcu+0x10/0x10
[ 36.532147][ T372] ? ihold+0x20/0x60
[ 36.536042][ T372] ? ihold+0x20/0x60
[ 36.539957][ T372] print_report+0x3d/0x60
[ 36.544284][ T372] kasan_report+0x122/0x150
[ 36.548793][ T372] ? ihold+0x20/0x60
[ 36.552689][ T372] kasan_check_range+0x249/0x2a0
[ 36.557638][ T372] __kasan_check_write+0x14/0x20
[ 36.562591][ T372] ihold+0x20/0x60
[ 36.566315][ T372] vfs_rmdir+0x25f/0x500
[ 36.570560][ T372] incfs_kill_sb+0x105/0x220
[ 36.575168][ T372] deactivate_locked_super+0xb5/0x120
[ 36.580550][ T372] deactivate_super+0xaf/0xe0
[ 36.585234][ T372] cleanup_mnt+0x474/0x500
[ 36.589663][ T372] __cleanup_mnt+0x19/0x20
[ 36.594098][ T372] task_work_run+0x1e1/0x250
[ 36.598692][ T372] ? __cfi_task_work_run+0x10/0x10
[ 36.603978][ T372] ? __x64_sys_umount+0x12d/0x170
[ 36.609006][ T372] ? __cfi___x64_sys_umount+0x10/0x10
[ 36.614381][ T372] exit_to_user_mode_loop+0x9b/0xb0
[ 36.619584][ T372] exit_to_user_mode_prepare+0x87/0xd0
[ 36.625048][ T372] syscall_exit_to_user_mode+0x1a/0x30
[ 36.630521][ T372] do_syscall_64+0x58/0xa0
[ 36.634941][ T372] ? clear_bhb_loop+0x30/0x80
[ 36.639626][ T372] ? clear_bhb_loop+0x30/0x80
[ 36.644327][ T372] entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 36.650225][ T372] RIP: 0033:0x7fc962d9e017
[ 36.654660][ T372] Code: a2 c7 05 dc 06 25 00 00 00 00 00 eb 96 e8 e1 12 00 00 90 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8
[ 36.674271][ T372] RSP: 002b:00007ffcf8c41908 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 36.682695][ T372] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fc962d9e017
[ 36.690676][ T372] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcf8c419c0
[ 36.698672][ T372] RBP: 00007ffcf8c419c0 R08: 00007ffcf8c429c0 R09: 00000000ffffffff
[ 36.706744][ T372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcf8c42a50
[ 36.714730][ T372] R13: 00007fc962e32120 R14: 0000000000008d0d R15: 00007ffcf8c42a90
[ 36.722707][ T372]
[ 36.725728][ T372] ==================================================================
[ 36.734225][ T372] Disabling lock debugging due to kernel taint
[ 36.741880][ T372] BUG: kernel NULL pointer dereference, address: 0000000000000170
[ 36.749716][ T372] #PF: supervisor write access in kernel mode
[ 36.755800][ T372] #PF: error_code(0x0002) - not-present page
[ 36.761769][ T372] PGD 12ca3e067 P4D 12ca3e067 PUD 0
[ 36.767059][ T372] Oops: 0002 [#1] PREEMPT SMP KASAN
[ 36.772248][ T372] CPU: 1 PID: 372 Comm: syz-executor Tainted: G B W syzkaller #0
[ 36.781271][ T372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
[ 36.791325][ T372] RIP: 0010:ihold+0x26/0x60
[ 36.795842][ T372] Code: 33 36 7c df 55 48 89 e5 41 56 53 48 89 fb e8 61 06 ab ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 10 a3 f0 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 51
[ 36.815544][ T372] RSP: 0018:ffffc90000987c78 EFLAGS: 00010246
[ 36.821637][ T372] RAX: ffff8881135c8000 RBX: 0000000000000000 RCX: ffff8881135c8000
[ 36.829610][ T372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 36.837593][ T372] RBP: ffffc90000987c88 R08: ffffffff87b757e7 R09: 1ffffffff0f6eafc
[ 36.845583][ T372] R10: dffffc0000000000 R11: fffffbfff0f6eafd R12: ffff888121e96dec
[ 36.853565][ T372] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000
[ 36.861543][ T372] FS: 00005555915ff500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
[ 36.870475][ T372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 36.877094][ T372] CR2: 0000000000000170 CR3: 000000012d809000 CR4: 00000000003506a0
[ 36.885103][ T372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 36.893101][ T372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 36.901079][ T372] Call Trace:
[ 36.904386][ T372]
[ 36.907321][ T372] vfs_rmdir+0x25f/0x500
[ 36.911581][ T372] incfs_kill_sb+0x105/0x220
[ 36.916181][ T372] deactivate_locked_super+0xb5/0x120
[ 36.921554][ T372] deactivate_super+0xaf/0xe0
[ 36.926231][ T372] cleanup_mnt+0x474/0x500
[ 36.930732][ T372] __cleanup_mnt+0x19/0x20
[ 36.935146][ T372] task_work_run+0x1e1/0x250
[ 36.939762][ T372] ? __cfi_task_work_run+0x10/0x10
[ 36.944883][ T372] ? __x64_sys_umount+0x12d/0x170
[ 36.949925][ T372] ? __cfi___x64_sys_umount+0x10/0x10
[ 36.955333][ T372] exit_to_user_mode_loop+0x9b/0xb0
[ 36.960559][ T372] exit_to_user_mode_prepare+0x87/0xd0
[ 36.966022][ T372] syscall_exit_to_user_mode+0x1a/0x30
[ 36.971489][ T372] do_syscall_64+0x58/0xa0
[ 36.975906][ T372] ? clear_bhb_loop+0x30/0x80
[ 36.980596][ T372] ? clear_bhb_loop+0x30/0x80
[ 36.985313][ T372] entry_SYSCALL_64_after_hwframe+0x68/0xd2
[ 36.991207][ T372] RIP: 0033:0x7fc962d9e017
[ 36.995620][ T372] Code: a2 c7 05 dc 06 25 00 00 00 00 00 eb 96 e8 e1 12 00 00 90 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8
[ 37.015294][ T372] RSP: 002b:00007ffcf8c41908 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 37.023717][ T372] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fc962d9e017
[ 37.031697][ T372] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcf8c419c0
[ 37.039675][ T372] RBP: 00007ffcf8c419c0 R08: 00007ffcf8c429c0 R09: 00000000ffffffff
[ 37.047656][ T372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcf8c42a50
[ 37.055632][ T372] R13: 00007fc962e32120 R14: 0000000000008d0d R15: 00007ffcf8c42a90
[ 37.063611][ T372]
[ 37.066631][ T372] Modules linked in:
[ 37.070542][ T372] CR2: 0000000000000170
[ 37.074707][ T372] ---[ end trace 0000000000000000 ]---
[ 37.080149][ T372] RIP: 0010:ihold+0x26/0x60
[ 37.084654][ T372] Code: 33 36 7c df 55 48 89 e5 41 56 53 48 89 fb e8 61 06 ab ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 10 a3 f0 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 51
[ 37.104256][ T372] RSP: 0018:ffffc90000987c78 EFLAGS: 00010246
[ 37.110335][ T372] RAX: ffff8881135c8000 RBX: 0000000000000000 RCX: ffff8881135c8000
[ 37.118335][ T372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 37.126324][ T372] RBP: ffffc90000987c88 R08: ffffffff87b757e7 R09: 1ffffffff0f6eafc
[ 37.134333][ T372] R10: dffffc0000000000 R11: fffffbfff0f6eafd R12: ffff888121e96dec
[ 37.142339][ T372] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000
[ 37.150317][ T372] FS: 00005555915ff500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
[ 37.159249][ T372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 37.165827][ T372] CR2: 0000000000000170 CR3: 000000012d809000 CR4: 00000000003506a0
[ 37.173798][ T372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 37.181769][ T372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 37.189741][ T372] Kernel panic - not syncing: Fatal exception
[ 37.196379][ T372] Kernel Offset: disabled
[ 37.200710][ T372] Rebooting in 86400 seconds..