Warning: Permanently added '10.128.0.112' (ED25519) to the list of known hosts.
2025/11/22 06:48:34 parsed 1 programs
[ 25.832419][ T30] audit: type=1400 audit(1763794114.420:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 25.853170][ T30] audit: type=1400 audit(1763794114.420:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 26.787959][ T30] audit: type=1400 audit(1763794115.380:66): avc: denied { mounton } for pid=288 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 26.789459][ T288] cgroup: Unknown subsys name 'net'
[ 26.810664][ T30] audit: type=1400 audit(1763794115.380:67): avc: denied { mount } for pid=288 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 26.837969][ T30] audit: type=1400 audit(1763794115.400:68): avc: denied { unmount } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 26.838339][ T288] cgroup: Unknown subsys name 'devices'
[ 27.009209][ T288] cgroup: Unknown subsys name 'hugetlb'
[ 27.014846][ T288] cgroup: Unknown subsys name 'rlimit'
[ 27.164874][ T30] audit: type=1400 audit(1763794115.750:69): avc: denied { setattr } for pid=288 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 27.188207][ T30] audit: type=1400 audit(1763794115.750:70): avc: denied { create } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 27.208926][ T30] audit: type=1400 audit(1763794115.750:71): avc: denied { write } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 27.216652][ T291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 27.229264][ T30] audit: type=1400 audit(1763794115.750:72): avc: denied { read } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[ 27.258046][ T30] audit: type=1400 audit(1763794115.750:73): avc: denied { mounton } for pid=288 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 27.290868][ T288] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 27.708657][ T293] request_module fs-gadgetfs succeeded, but still no fs?
[ 27.837976][ T298] syz-executor (298) used greatest stack depth: 21920 bytes left
[ 28.066834][ T322] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.073941][ T322] bridge0: port 1(bridge_slave_0) entered disabled state
[ 28.081609][ T322] device bridge_slave_0 entered promiscuous mode
[ 28.088516][ T322] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.095542][ T322] bridge0: port 2(bridge_slave_1) entered disabled state
[ 28.103076][ T322] device bridge_slave_1 entered promiscuous mode
[ 28.152508][ T322] bridge0: port 2(bridge_slave_1) entered blocking state
[ 28.159588][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 28.166972][ T322] bridge0: port 1(bridge_slave_0) entered blocking state
[ 28.174000][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 28.197103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 28.210941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 28.219436][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 28.231009][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 28.246214][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 28.255932][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 28.267994][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 28.276241][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 28.283874][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 28.291745][ T322] device veth0_vlan entered promiscuous mode
[ 28.302882][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 28.312115][ T322] device veth1_macvtap entered promiscuous mode
[ 28.321420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 28.331274][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 28.362863][ T322] syz-executor (322) used greatest stack depth: 21760 bytes left
2025/11/22 06:48:37 executed programs: 0
[ 29.029000][ T362] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.036063][ T362] bridge0: port 1(bridge_slave_0) entered disabled state
[ 29.043533][ T362] device bridge_slave_0 entered promiscuous mode
[ 29.050409][ T362] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.057892][ T362] bridge0: port 2(bridge_slave_1) entered disabled state
[ 29.065512][ T362] device bridge_slave_1 entered promiscuous mode
[ 29.125335][ T362] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.132411][ T362] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.139795][ T362] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.146831][ T362] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.165817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 29.173839][ T8] bridge0: port 1(bridge_slave_0) entered disabled state
[ 29.181546][ T8] bridge0: port 2(bridge_slave_1) entered disabled state
[ 29.191907][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 29.200264][ T8] bridge0: port 1(bridge_slave_0) entered blocking state
[ 29.207320][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 29.215966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 29.224426][ T8] bridge0: port 2(bridge_slave_1) entered blocking state
[ 29.231501][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 29.243475][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 29.256536][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 29.270137][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 29.286899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 29.295141][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 29.302827][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 29.311397][ T362] device veth0_vlan entered promiscuous mode
[ 29.327218][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 29.336296][ T362] device veth1_macvtap entered promiscuous mode
[ 29.345709][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 29.361004][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 29.387112][ T362] ------------[ cut here ]------------
[ 29.392619][ T362] WARNING: CPU: 0 PID: 362 at fs/inode.c:335 drop_nlink+0xc5/0x110
[ 29.400798][ T362] Modules linked in:
[ 29.404724][ T362] CPU: 0 PID: 362 Comm: syz-executor Not tainted syzkaller #0
[ 29.412569][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 29.423122][ T362] RIP: 0010:drop_nlink+0xc5/0x110
[ 29.428476][ T362] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 03 35 f2 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 1b b1 b3 ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c
[ 29.448349][ T362] RSP: 0018:ffffc90000ab7ca8 EFLAGS: 00010293
[ 29.454464][ T362] RAX: ffffffff81b50dc5 RBX: ffff88811d9e4bf0 RCX: ffff88810d16cf00
[ 29.462508][ T362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 29.471017][ T362] RBP: ffffc90000ab7cd0 R08: 0000000000000004 R09: 0000000000000003
[ 29.479180][ T362] R10: fffff52000156f84 R11: 1ffff92000156f84 R12: dffffc0000000000
[ 29.487227][ T362] R13: 1ffff11023b3c987 R14: ffff88811d9e4c38 R15: 0000000000000000
[ 29.495459][ T362] FS: 0000555579a76500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[ 29.504510][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 29.511661][ T362] CR2: 0000555579a994e8 CR3: 0000000122065000 CR4: 00000000003506b0
[ 29.519809][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 29.527925][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 29.535947][ T362] Call Trace:
[ 29.539532][ T362]
[ 29.542499][ T362] shmem_rmdir+0x5b/0x90
[ 29.546796][ T362] vfs_rmdir+0x313/0x460
[ 29.547280][ T45] device bridge_slave_1 left promiscuous mode
[ 29.557000][ T362] incfs_kill_sb+0x105/0x220
[ 29.557605][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 29.561720][ T362] deactivate_locked_super+0xa0/0x100
[ 29.574402][ T45] device bridge_slave_0 left promiscuous mode
[ 29.574408][ T362] deactivate_super+0xaf/0xe0
[ 29.580883][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 29.585202][ T362] cleanup_mnt+0x446/0x500
[ 29.596786][ T362] __cleanup_mnt+0x19/0x20
[ 29.601344][ T362] task_work_run+0x127/0x190
[ 29.601572][ T45] device veth1_macvtap left promiscuous mode
[ 29.605951][ T362] exit_to_user_mode_loop+0xd0/0xe0
[ 29.612182][ T45] device veth0_vlan left promiscuous mode
[ 29.617441][ T362] exit_to_user_mode_prepare+0x87/0xd0
[ 29.628675][ T362] syscall_exit_to_user_mode+0x1a/0x30
[ 29.634178][ T362] do_syscall_64+0x58/0xa0
[ 29.638703][ T362] ? clear_bhb_loop+0x50/0xa0
[ 29.643411][ T362] ? clear_bhb_loop+0x50/0xa0
[ 29.648319][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 29.654256][ T362] RIP: 0033:0x7fc8fcabda77
[ 29.658768][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 29.678590][ T362] RSP: 002b:00007ffc5c297ed8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 29.687367][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fc8fcabda77
[ 29.695400][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc5c297f90
[ 29.703488][ T362] RBP: 00007ffc5c297f90 R08: 0000000000000000 R09: 0000000000000000
[ 29.711562][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc5c299020
[ 29.719638][ T362] R13: 00007fc8fcb40d7d R14: 00000000000072b6 R15: 00007ffc5c299060
[ 29.727710][ T362]
[ 29.730762][ T362] ---[ end trace fef7a35c07ac2d1a ]---
[ 29.736272][ T362] ==================================================================
[ 29.744325][ T362] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60
[ 29.750583][ T362] Write of size 4 at addr 0000000000000170 by task syz-executor/362
[ 29.758560][ T362]
[ 29.760890][ T362] CPU: 0 PID: 362 Comm: syz-executor Tainted: G W syzkaller #0
[ 29.769732][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 29.779790][ T362] Call Trace:
[ 29.783072][ T362]
[ 29.786004][ T362] __dump_stack+0x21/0x30
[ 29.790339][ T362] dump_stack_lvl+0xee/0x150
[ 29.794935][ T362] ? show_regs_print_info+0x20/0x20
[ 29.800130][ T362] ? _raw_spin_lock+0x8e/0xe0
[ 29.804802][ T362] ? _raw_spin_trylock_bh+0x130/0x130
[ 29.810171][ T362] ? ihold+0x20/0x60
[ 29.814063][ T362] kasan_report+0xe7/0x140
[ 29.818475][ T362] ? ihold+0x20/0x60
[ 29.822363][ T362] kasan_check_range+0x280/0x290
[ 29.827293][ T362] __kasan_check_write+0x14/0x20
[ 29.832238][ T362] ihold+0x20/0x60
[ 29.835975][ T362] vfs_rmdir+0x1f0/0x460
[ 29.840309][ T362] incfs_kill_sb+0x105/0x220
[ 29.844926][ T362] deactivate_locked_super+0xa0/0x100
[ 29.850313][ T362] deactivate_super+0xaf/0xe0
[ 29.855000][ T362] cleanup_mnt+0x446/0x500
[ 29.859416][ T362] __cleanup_mnt+0x19/0x20
[ 29.863829][ T362] task_work_run+0x127/0x190
[ 29.868430][ T362] exit_to_user_mode_loop+0xd0/0xe0
[ 29.873641][ T362] exit_to_user_mode_prepare+0x87/0xd0
[ 29.879108][ T362] syscall_exit_to_user_mode+0x1a/0x30
[ 29.884574][ T362] do_syscall_64+0x58/0xa0
[ 29.889000][ T362] ? clear_bhb_loop+0x50/0xa0
[ 29.893685][ T362] ? clear_bhb_loop+0x50/0xa0
[ 29.898364][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 29.904256][ T362] RIP: 0033:0x7fc8fcabda77
[ 29.908670][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 29.928278][ T362] RSP: 002b:00007ffc5c297ed8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 29.936690][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fc8fcabda77
[ 29.944665][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc5c297f90
[ 29.952722][ T362] RBP: 00007ffc5c297f90 R08: 0000000000000000 R09: 0000000000000000
[ 29.960688][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc5c299020
[ 29.968658][ T362] R13: 00007fc8fcb40d7d R14: 00000000000072b6 R15: 00007ffc5c299060
[ 29.976662][ T362]
[ 29.979679][ T362] ==================================================================
[ 29.987904][ T362] Disabling lock debugging due to kernel taint
[ 29.994799][ T362] BUG: kernel NULL pointer dereference, address: 0000000000000170
[ 30.002633][ T362] #PF: supervisor write access in kernel mode
[ 30.008693][ T362] #PF: error_code(0x0002) - not-present page
[ 30.014777][ T362] PGD 12c8d2067 P4D 12c8d2067 PUD 0
[ 30.020065][ T362] Oops: 0002 [#1] PREEMPT SMP KASAN
[ 30.025261][ T362] CPU: 0 PID: 362 Comm: syz-executor Tainted: G B W syzkaller #0
[ 30.034104][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 30.044156][ T362] RIP: 0010:ihold+0x26/0x60
[ 30.048683][ T362] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 31 a9 b3 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 f0 2c f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 b1
[ 30.068505][ T362] RSP: 0018:ffffc90000ab7ce8 EFLAGS: 00010246
[ 30.074573][ T362] RAX: ffff88810d16cf00 RBX: 0000000000000000 RCX: ffff88810d16cf00
[ 30.082538][ T362] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff
[ 30.090517][ T362] RBP: ffffc90000ab7cf8 R08: 0000000000000004 R09: 0000000000000003
[ 30.098507][ T362] R10: fffffbfff0e1824c R11: 1ffffffff0e1824c R12: 1ffff11021989628
[ 30.106483][ T362] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000
[ 30.114459][ T362] FS: 0000555579a76500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[ 30.123395][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.129985][ T362] CR2: 0000000000000170 CR3: 0000000122065000 CR4: 00000000003506b0
[ 30.137959][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 30.145928][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 30.153899][ T362] Call Trace:
[ 30.157178][ T362]
[ 30.160107][ T362] vfs_rmdir+0x1f0/0x460
[ 30.164353][ T362] incfs_kill_sb+0x105/0x220
[ 30.168942][ T362] deactivate_locked_super+0xa0/0x100
[ 30.174313][ T362] deactivate_super+0xaf/0xe0
[ 30.178990][ T362] cleanup_mnt+0x446/0x500
[ 30.183407][ T362] __cleanup_mnt+0x19/0x20
[ 30.187822][ T362] task_work_run+0x127/0x190
[ 30.192419][ T362] exit_to_user_mode_loop+0xd0/0xe0
[ 30.197621][ T362] exit_to_user_mode_prepare+0x87/0xd0
[ 30.203101][ T362] syscall_exit_to_user_mode+0x1a/0x30
[ 30.208673][ T362] do_syscall_64+0x58/0xa0
[ 30.213093][ T362] ? clear_bhb_loop+0x50/0xa0
[ 30.217765][ T362] ? clear_bhb_loop+0x50/0xa0
[ 30.222451][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 30.228362][ T362] RIP: 0033:0x7fc8fcabda77
[ 30.232787][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 30.252400][ T362] RSP: 002b:00007ffc5c297ed8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 30.260844][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fc8fcabda77
[ 30.268832][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffc5c297f90
[ 30.276824][ T362] RBP: 00007ffc5c297f90 R08: 0000000000000000 R09: 0000000000000000
[ 30.284823][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffc5c299020
[ 30.292787][ T362] R13: 00007fc8fcb40d7d R14: 00000000000072b6 R15: 00007ffc5c299060
[ 30.300762][ T362]
[ 30.303778][ T362] Modules linked in:
[ 30.307677][ T362] CR2: 0000000000000170
[ 30.312016][ T362] ---[ end trace fef7a35c07ac2d1b ]---
[ 30.317505][ T362] RIP: 0010:ihold+0x26/0x60
[ 30.322015][ T362] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 31 a9 b3 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 f0 2c f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 b1
[ 30.341618][ T362] RSP: 0018:ffffc90000ab7ce8 EFLAGS: 00010246
[ 30.347681][ T362] RAX: ffff88810d16cf00 RBX: 0000000000000000 RCX: ffff88810d16cf00
[ 30.355655][ T362] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff
[ 30.363622][ T362] RBP: ffffc90000ab7cf8 R08: 0000000000000004 R09: 0000000000000003
[ 30.371605][ T362] R10: fffffbfff0e1824c R11: 1ffffffff0e1824c R12: 1ffff11021989628
[ 30.379575][ T362] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000
[ 30.387637][ T362] FS: 0000555579a76500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[ 30.396581][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.403188][ T362] CR2: 0000000000000170 CR3: 0000000122065000 CR4: 00000000003506b0
[ 30.411154][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 30.419119][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 30.427096][ T362] Kernel panic - not syncing: Fatal exception
[ 30.433468][ T362] Kernel Offset: disabled
[ 30.437797][ T362] Rebooting in 86400 seconds..