Warning: Permanently added '10.128.1.140' (ED25519) to the list of known hosts. 2026/05/03 06:18:54 parsed 1 programs [ 32.045662][ T28] audit: type=1400 audit(1777789134.932:64): avc: denied { node_bind } for pid=294 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 32.066463][ T28] audit: type=1400 audit(1777789134.932:65): avc: denied { module_request } for pid=294 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 33.170085][ T28] audit: type=1400 audit(1777789136.062:66): avc: denied { mounton } for pid=300 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.173521][ T300] cgroup: Unknown subsys name 'net' [ 33.192892][ T28] audit: type=1400 audit(1777789136.062:67): avc: denied { mount } for pid=300 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.220123][ T28] audit: type=1400 audit(1777789136.092:68): avc: denied { unmount } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.220527][ T300] cgroup: Unknown subsys name 'devices' [ 33.330056][ T300] cgroup: Unknown subsys name 'hugetlb' [ 33.335702][ T300] cgroup: Unknown subsys name 'rlimit' [ 33.478079][ T28] audit: type=1400 audit(1777789136.362:69): avc: denied { setattr } for pid=300 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.501300][ T28] audit: type=1400 audit(1777789136.372:70): avc: denied { create } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.521785][ T28] audit: type=1400 audit(1777789136.372:71): avc: denied { write } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.542079][ T28] audit: type=1400 audit(1777789136.372:72): avc: denied { read } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.562407][ T28] audit: type=1400 audit(1777789136.372:73): avc: denied { mounton } for pid=300 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.577504][ T304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 33.706103][ T300] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 34.402158][ T308] request_module fs-gadgetfs succeeded, but still no fs? [ 34.896790][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.904410][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.911999][ T345] device bridge_slave_0 entered promiscuous mode [ 34.919097][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.926168][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.933691][ T345] device bridge_slave_1 entered promiscuous mode [ 34.981704][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.988793][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.996085][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.003145][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.023251][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.031408][ T328] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.039142][ T328] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.049783][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.058296][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.065350][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.074387][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.082656][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.089730][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.102175][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.111841][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.126490][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.138130][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.146245][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.154008][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.162266][ T345] device veth0_vlan entered promiscuous mode [ 35.172931][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.182232][ T345] device veth1_macvtap entered promiscuous mode [ 35.191643][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.201728][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 35.235885][ T345] syz-executor (345) used greatest stack depth: 21504 bytes left 2026/05/03 06:18:58 executed programs: 0 [ 35.797752][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.804867][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.812395][ T372] device bridge_slave_0 entered promiscuous mode [ 35.819483][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.826524][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.834647][ T372] device bridge_slave_1 entered promiscuous mode [ 35.880778][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.887991][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.895250][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.902308][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.922471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.930169][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.937337][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.948241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.956501][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.963575][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.973114][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.981557][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.988644][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.001078][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.010995][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.025397][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.036822][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.045185][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.052927][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.067463][ T372] device veth0_vlan entered promiscuous mode [ 36.077943][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.087239][ T372] device veth1_macvtap entered promiscuous mode [ 36.097489][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.114927][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.140930][ T372] ------------[ cut here ]------------ [ 36.146426][ T372] WARNING: CPU: 0 PID: 372 at fs/inode.c:335 drop_nlink+0xc5/0x110 [ 36.154430][ T372] Modules linked in: [ 36.158385][ T372] CPU: 0 PID: 372 Comm: syz-executor Not tainted syzkaller #0 [ 36.165864][ T372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 36.176001][ T372] RIP: 0010:drop_nlink+0xc5/0x110 [ 36.181074][ T372] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 d3 ab f0 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 fb 0e ab ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c [ 36.200761][ T372] RSP: 0018:ffffc90000987c38 EFLAGS: 00010293 [ 36.206848][ T372] RAX: ffffffff81c66755 RBX: ffff888121e96de0 RCX: ffff8881135c8000 [ 36.214885][ T372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 36.222948][ T372] RBP: ffffc90000987c60 R08: 0000000000000003 R09: 0000000000000004 [ 36.231003][ T372] R10: dffffc0000000000 R11: fffff52000130f78 R12: dffffc0000000000 [ 36.239017][ T372] R13: 1ffff110243d2dc5 R14: ffff888121e96e28 R15: 0000000000000000 [ 36.247006][ T372] FS: 00005555915ff500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 36.256112][ T372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 36.262745][ T372] CR2: 0000555591622948 CR3: 000000012d809000 CR4: 00000000003506b0 [ 36.270779][ T372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 36.278828][ T372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 36.286806][ T372] Call Trace: [ 36.290148][ T372] [ 36.293092][ T372] shmem_rmdir+0x5b/0x90 [ 36.297350][ T372] vfs_rmdir+0x393/0x500 [ 36.301640][ T372] incfs_kill_sb+0x105/0x220 [ 36.306260][ T372] deactivate_locked_super+0xb5/0x120 [ 36.311709][ T372] deactivate_super+0xaf/0xe0 [ 36.316410][ T372] cleanup_mnt+0x474/0x500 [ 36.320885][ T372] __cleanup_mnt+0x19/0x20 [ 36.325328][ T372] task_work_run+0x1e1/0x250 [ 36.330013][ T372] ? __cfi_task_work_run+0x10/0x10 [ 36.335167][ T372] ? __x64_sys_umount+0x12d/0x170 [ 36.340247][ T372] ? __cfi___x64_sys_umount+0x10/0x10 [ 36.345650][ T372] exit_to_user_mode_loop+0x9b/0xb0 [ 36.350914][ T372] exit_to_user_mode_prepare+0x87/0xd0 [ 36.356396][ T372] syscall_exit_to_user_mode+0x1a/0x30 [ 36.361914][ T372] do_syscall_64+0x58/0xa0 [ 36.366534][ T372] ? clear_bhb_loop+0x30/0x80 [ 36.371310][ T372] ? clear_bhb_loop+0x30/0x80 [ 36.376036][ T372] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 36.381998][ T372] RIP: 0033:0x7fc962d9e017 [ 36.386439][ T372] Code: a2 c7 05 dc 06 25 00 00 00 00 00 eb 96 e8 e1 12 00 00 90 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 [ 36.406127][ T372] RSP: 002b:00007ffcf8c41908 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 36.414632][ T372] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fc962d9e017 [ 36.422707][ T372] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcf8c419c0 [ 36.430718][ T372] RBP: 00007ffcf8c419c0 R08: 00007ffcf8c429c0 R09: 00000000ffffffff [ 36.438735][ T372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcf8c42a50 [ 36.446721][ T372] R13: 00007fc962e32120 R14: 0000000000008d0d R15: 00007ffcf8c42a90 [ 36.454811][ T372] [ 36.457849][ T372] ---[ end trace 0000000000000000 ]--- [ 36.463490][ T372] ================================================================== [ 36.471581][ T372] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 [ 36.477854][ T372] Write of size 4 at addr 0000000000000170 by task syz-executor/372 [ 36.485825][ T372] [ 36.488169][ T372] CPU: 1 PID: 372 Comm: syz-executor Tainted: G W syzkaller #0 [ 36.497125][ T372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 36.507180][ T372] Call Trace: [ 36.510457][ T372] [ 36.513388][ T372] __dump_stack+0x21/0x24 [ 36.517719][ T372] dump_stack_lvl+0x110/0x170 [ 36.522396][ T372] ? __cfi_dump_stack_lvl+0x8/0x8 [ 36.527444][ T372] ? __cfi_call_rcu+0x10/0x10 [ 36.532147][ T372] ? ihold+0x20/0x60 [ 36.536042][ T372] ? ihold+0x20/0x60 [ 36.539957][ T372] print_report+0x3d/0x60 [ 36.544284][ T372] kasan_report+0x122/0x150 [ 36.548793][ T372] ? ihold+0x20/0x60 [ 36.552689][ T372] kasan_check_range+0x249/0x2a0 [ 36.557638][ T372] __kasan_check_write+0x14/0x20 [ 36.562591][ T372] ihold+0x20/0x60 [ 36.566315][ T372] vfs_rmdir+0x25f/0x500 [ 36.570560][ T372] incfs_kill_sb+0x105/0x220 [ 36.575168][ T372] deactivate_locked_super+0xb5/0x120 [ 36.580550][ T372] deactivate_super+0xaf/0xe0 [ 36.585234][ T372] cleanup_mnt+0x474/0x500 [ 36.589663][ T372] __cleanup_mnt+0x19/0x20 [ 36.594098][ T372] task_work_run+0x1e1/0x250 [ 36.598692][ T372] ? __cfi_task_work_run+0x10/0x10 [ 36.603978][ T372] ? __x64_sys_umount+0x12d/0x170 [ 36.609006][ T372] ? __cfi___x64_sys_umount+0x10/0x10 [ 36.614381][ T372] exit_to_user_mode_loop+0x9b/0xb0 [ 36.619584][ T372] exit_to_user_mode_prepare+0x87/0xd0 [ 36.625048][ T372] syscall_exit_to_user_mode+0x1a/0x30 [ 36.630521][ T372] do_syscall_64+0x58/0xa0 [ 36.634941][ T372] ? clear_bhb_loop+0x30/0x80 [ 36.639626][ T372] ? clear_bhb_loop+0x30/0x80 [ 36.644327][ T372] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 36.650225][ T372] RIP: 0033:0x7fc962d9e017 [ 36.654660][ T372] Code: a2 c7 05 dc 06 25 00 00 00 00 00 eb 96 e8 e1 12 00 00 90 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 [ 36.674271][ T372] RSP: 002b:00007ffcf8c41908 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 36.682695][ T372] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fc962d9e017 [ 36.690676][ T372] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcf8c419c0 [ 36.698672][ T372] RBP: 00007ffcf8c419c0 R08: 00007ffcf8c429c0 R09: 00000000ffffffff [ 36.706744][ T372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcf8c42a50 [ 36.714730][ T372] R13: 00007fc962e32120 R14: 0000000000008d0d R15: 00007ffcf8c42a90 [ 36.722707][ T372] [ 36.725728][ T372] ================================================================== [ 36.734225][ T372] Disabling lock debugging due to kernel taint [ 36.741880][ T372] BUG: kernel NULL pointer dereference, address: 0000000000000170 [ 36.749716][ T372] #PF: supervisor write access in kernel mode [ 36.755800][ T372] #PF: error_code(0x0002) - not-present page [ 36.761769][ T372] PGD 12ca3e067 P4D 12ca3e067 PUD 0 [ 36.767059][ T372] Oops: 0002 [#1] PREEMPT SMP KASAN [ 36.772248][ T372] CPU: 1 PID: 372 Comm: syz-executor Tainted: G B W syzkaller #0 [ 36.781271][ T372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 36.791325][ T372] RIP: 0010:ihold+0x26/0x60 [ 36.795842][ T372] Code: 33 36 7c df 55 48 89 e5 41 56 53 48 89 fb e8 61 06 ab ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 10 a3 f0 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 51 [ 36.815544][ T372] RSP: 0018:ffffc90000987c78 EFLAGS: 00010246 [ 36.821637][ T372] RAX: ffff8881135c8000 RBX: 0000000000000000 RCX: ffff8881135c8000 [ 36.829610][ T372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 36.837593][ T372] RBP: ffffc90000987c88 R08: ffffffff87b757e7 R09: 1ffffffff0f6eafc [ 36.845583][ T372] R10: dffffc0000000000 R11: fffffbfff0f6eafd R12: ffff888121e96dec [ 36.853565][ T372] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 36.861543][ T372] FS: 00005555915ff500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 36.870475][ T372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 36.877094][ T372] CR2: 0000000000000170 CR3: 000000012d809000 CR4: 00000000003506a0 [ 36.885103][ T372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 36.893101][ T372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 36.901079][ T372] Call Trace: [ 36.904386][ T372] [ 36.907321][ T372] vfs_rmdir+0x25f/0x500 [ 36.911581][ T372] incfs_kill_sb+0x105/0x220 [ 36.916181][ T372] deactivate_locked_super+0xb5/0x120 [ 36.921554][ T372] deactivate_super+0xaf/0xe0 [ 36.926231][ T372] cleanup_mnt+0x474/0x500 [ 36.930732][ T372] __cleanup_mnt+0x19/0x20 [ 36.935146][ T372] task_work_run+0x1e1/0x250 [ 36.939762][ T372] ? __cfi_task_work_run+0x10/0x10 [ 36.944883][ T372] ? __x64_sys_umount+0x12d/0x170 [ 36.949925][ T372] ? __cfi___x64_sys_umount+0x10/0x10 [ 36.955333][ T372] exit_to_user_mode_loop+0x9b/0xb0 [ 36.960559][ T372] exit_to_user_mode_prepare+0x87/0xd0 [ 36.966022][ T372] syscall_exit_to_user_mode+0x1a/0x30 [ 36.971489][ T372] do_syscall_64+0x58/0xa0 [ 36.975906][ T372] ? clear_bhb_loop+0x30/0x80 [ 36.980596][ T372] ? clear_bhb_loop+0x30/0x80 [ 36.985313][ T372] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 36.991207][ T372] RIP: 0033:0x7fc962d9e017 [ 36.995620][ T372] Code: a2 c7 05 dc 06 25 00 00 00 00 00 eb 96 e8 e1 12 00 00 90 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 [ 37.015294][ T372] RSP: 002b:00007ffcf8c41908 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 37.023717][ T372] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fc962d9e017 [ 37.031697][ T372] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcf8c419c0 [ 37.039675][ T372] RBP: 00007ffcf8c419c0 R08: 00007ffcf8c429c0 R09: 00000000ffffffff [ 37.047656][ T372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcf8c42a50 [ 37.055632][ T372] R13: 00007fc962e32120 R14: 0000000000008d0d R15: 00007ffcf8c42a90 [ 37.063611][ T372] [ 37.066631][ T372] Modules linked in: [ 37.070542][ T372] CR2: 0000000000000170 [ 37.074707][ T372] ---[ end trace 0000000000000000 ]--- [ 37.080149][ T372] RIP: 0010:ihold+0x26/0x60 [ 37.084654][ T372] Code: 33 36 7c df 55 48 89 e5 41 56 53 48 89 fb e8 61 06 ab ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 10 a3 f0 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 51 [ 37.104256][ T372] RSP: 0018:ffffc90000987c78 EFLAGS: 00010246 [ 37.110335][ T372] RAX: ffff8881135c8000 RBX: 0000000000000000 RCX: ffff8881135c8000 [ 37.118335][ T372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 37.126324][ T372] RBP: ffffc90000987c88 R08: ffffffff87b757e7 R09: 1ffffffff0f6eafc [ 37.134333][ T372] R10: dffffc0000000000 R11: fffffbfff0f6eafd R12: ffff888121e96dec [ 37.142339][ T372] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 37.150317][ T372] FS: 00005555915ff500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 37.159249][ T372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.165827][ T372] CR2: 0000000000000170 CR3: 000000012d809000 CR4: 00000000003506a0 [ 37.173798][ T372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 37.181769][ T372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 37.189741][ T372] Kernel panic - not syncing: Fatal exception [ 37.196379][ T372] Kernel Offset: disabled [ 37.200710][ T372] Rebooting in 86400 seconds..