Warning: Permanently added '10.128.1.101' (ED25519) to the list of known hosts.
2025/12/01 14:59:54 parsed 1 programs
[ 22.581848][ T30] audit: type=1400 audit(1764601194.310:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 22.602679][ T30] audit: type=1400 audit(1764601194.310:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 23.540257][ T30] audit: type=1400 audit(1764601195.270:66): avc: denied { mounton } for pid=289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 23.541713][ T289] cgroup: Unknown subsys name 'net'
[ 23.563054][ T30] audit: type=1400 audit(1764601195.270:67): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 23.590448][ T30] audit: type=1400 audit(1764601195.290:68): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 23.590697][ T289] cgroup: Unknown subsys name 'devices'
[ 23.732078][ T289] cgroup: Unknown subsys name 'hugetlb'
[ 23.737712][ T289] cgroup: Unknown subsys name 'rlimit'
[ 24.005819][ T30] audit: type=1400 audit(1764601195.730:69): avc: denied { setattr } for pid=289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 24.029265][ T30] audit: type=1400 audit(1764601195.730:70): avc: denied { create } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 24.049978][ T30] audit: type=1400 audit(1764601195.730:71): avc: denied { write } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 24.070395][ T30] audit: type=1400 audit(1764601195.730:72): avc: denied { read } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[ 24.090610][ T30] audit: type=1400 audit(1764601195.730:73): avc: denied { mounton } for pid=289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 24.096441][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 24.145850][ T289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 24.584505][ T294] request_module fs-gadgetfs succeeded, but still no fs?
[ 24.990993][ T316] syz-executor (316) used greatest stack depth: 21920 bytes left
[ 25.130872][ T327] bridge0: port 1(bridge_slave_0) entered blocking state
[ 25.138139][ T327] bridge0: port 1(bridge_slave_0) entered disabled state
[ 25.145905][ T327] device bridge_slave_0 entered promiscuous mode
[ 25.153336][ T327] bridge0: port 2(bridge_slave_1) entered blocking state
[ 25.160423][ T327] bridge0: port 2(bridge_slave_1) entered disabled state
[ 25.167819][ T327] device bridge_slave_1 entered promiscuous mode
[ 25.215241][ T327] bridge0: port 2(bridge_slave_1) entered blocking state
[ 25.222325][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 25.229659][ T327] bridge0: port 1(bridge_slave_0) entered blocking state
[ 25.236816][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 25.257410][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 25.265180][ T10] bridge0: port 1(bridge_slave_0) entered disabled state
[ 25.272876][ T10] bridge0: port 2(bridge_slave_1) entered disabled state
[ 25.285676][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 25.293933][ T10] bridge0: port 1(bridge_slave_0) entered blocking state
[ 25.300998][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 25.310053][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 25.318305][ T10] bridge0: port 2(bridge_slave_1) entered blocking state
[ 25.325384][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 25.340551][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 25.349740][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 25.363437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 25.377538][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 25.385814][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 25.393388][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 25.401683][ T327] device veth0_vlan entered promiscuous mode
[ 25.415529][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 25.424822][ T327] device veth1_macvtap entered promiscuous mode
[ 25.434759][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 25.447537][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 25.478783][ T327] syz-executor (327) used greatest stack depth: 21216 bytes left
2025/12/01 14:59:57 executed programs: 0
[ 25.930885][ T362] bridge0: port 1(bridge_slave_0) entered blocking state
[ 25.937941][ T362] bridge0: port 1(bridge_slave_0) entered disabled state
[ 25.945543][ T362] device bridge_slave_0 entered promiscuous mode
[ 25.952428][ T362] bridge0: port 2(bridge_slave_1) entered blocking state
[ 25.959482][ T362] bridge0: port 2(bridge_slave_1) entered disabled state
[ 25.966908][ T362] device bridge_slave_1 entered promiscuous mode
[ 26.026367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 26.033900][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 26.042759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[ 26.051584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 26.059922][ T8] bridge0: port 1(bridge_slave_0) entered blocking state
[ 26.066947][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 26.074478][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[ 26.089174][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[ 26.097632][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 26.106001][ T8] bridge0: port 2(bridge_slave_1) entered blocking state
[ 26.113070][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 26.124914][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 26.140233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 26.153911][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 26.165462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 26.173786][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 26.181497][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 26.189770][ T362] device veth0_vlan entered promiscuous mode
[ 26.205609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 26.215160][ T362] device veth1_macvtap entered promiscuous mode
[ 26.224321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 26.239882][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 26.267661][ T362] ------------[ cut here ]------------
[ 26.273398][ T362] WARNING: CPU: 0 PID: 362 at fs/inode.c:335 drop_nlink+0xc5/0x110
[ 26.281571][ T362] Modules linked in:
[ 26.285505][ T362] CPU: 1 PID: 362 Comm: syz-executor Not tainted syzkaller #0
[ 26.293356][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 26.303797][ T362] RIP: 0010:drop_nlink+0xc5/0x110
[ 26.308925][ T362] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 03 35 f2 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 1b b1 b3 ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c
[ 26.328782][ T362] RSP: 0018:ffffc90001fd7ca8 EFLAGS: 00010293
[ 26.335079][ T362] RAX: ffffffff81b50dc5 RBX: ffff8881285c8fc8 RCX: ffff88810d2f4f00
[ 26.343148][ T362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 26.351334][ T362] RBP: ffffc90001fd7cd0 R08: 0000000000000004 R09: 0000000000000003
[ 26.359346][ T362] R10: fffff520003faf84 R11: 1ffff920003faf84 R12: dffffc0000000000
[ 26.367578][ T362] R13: 1ffff110250b9202 R14: ffff8881285c9010 R15: 0000000000000000
[ 26.375751][ T362] FS: 0000555561cd8500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[ 26.385131][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 26.392036][ T362] CR2: 0000555561cfb4e8 CR3: 0000000121fa7000 CR4: 00000000003506b0
[ 26.400100][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 26.408105][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 26.416365][ T362] Call Trace:
[ 26.419734][ T362]
[ 26.422695][ T362] shmem_rmdir+0x5b/0x90
[ 26.426964][ T362] vfs_rmdir+0x313/0x460
[ 26.431435][ T362] incfs_kill_sb+0x105/0x220
[ 26.436087][ T362] deactivate_locked_super+0xa0/0x100
[ 26.441730][ T362] deactivate_super+0xaf/0xe0
[ 26.446445][ T362] cleanup_mnt+0x446/0x500
[ 26.450934][ T362] __cleanup_mnt+0x19/0x20
[ 26.455372][ T362] task_work_run+0x127/0x190
[ 26.460045][ T362] exit_to_user_mode_loop+0xd0/0xe0
[ 26.465318][ T362] exit_to_user_mode_prepare+0x87/0xd0
[ 26.470968][ T362] syscall_exit_to_user_mode+0x1a/0x30
[ 26.476640][ T362] do_syscall_64+0x58/0xa0
[ 26.481255][ T362] ? clear_bhb_loop+0x50/0xa0
[ 26.486167][ T362] ? clear_bhb_loop+0x50/0xa0
[ 26.490932][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 26.497009][ T362] RIP: 0033:0x7f459a2b8a77
[ 26.501644][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 26.521979][ T362] RSP: 002b:00007ffcc3eec478 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 26.530512][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f459a2b8a77
[ 26.538529][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcc3eec530
[ 26.547126][ T362] RBP: 00007ffcc3eec530 R08: 0000000000000000 R09: 0000000000000000
[ 26.555378][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcc3eed5c0
[ 26.563429][ T362] R13: 00007f459a33bd7d R14: 0000000000006678 R15: 00007ffcc3eed600
[ 26.571923][ T362]
[ 26.575424][ T362] ---[ end trace cb78107a2d49a041 ]---
[ 26.581175][ T362] ==================================================================
[ 26.589303][ T362] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60
[ 26.595553][ T362] Write of size 4 at addr 0000000000000170 by task syz-executor/362
[ 26.603538][ T362]
[ 26.605879][ T362] CPU: 1 PID: 362 Comm: syz-executor Tainted: G W syzkaller #0
[ 26.614739][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 26.624795][ T362] Call Trace:
[ 26.628098][ T362]
[ 26.631029][ T362] __dump_stack+0x21/0x30
[ 26.635361][ T362] dump_stack_lvl+0xee/0x150
[ 26.639975][ T362] ? show_regs_print_info+0x20/0x20
[ 26.645203][ T362] ? _raw_spin_lock+0x8e/0xe0
[ 26.649895][ T362] ? _raw_spin_trylock_bh+0x130/0x130
[ 26.655262][ T362] ? ihold+0x20/0x60
[ 26.659153][ T362] kasan_report+0xe7/0x140
[ 26.663592][ T362] ? ihold+0x20/0x60
[ 26.667501][ T362] kasan_check_range+0x280/0x290
[ 26.672439][ T362] __kasan_check_write+0x14/0x20
[ 26.677374][ T362] ihold+0x20/0x60
[ 26.681092][ T362] vfs_rmdir+0x1f0/0x460
[ 26.685347][ T362] incfs_kill_sb+0x105/0x220
[ 26.689934][ T362] deactivate_locked_super+0xa0/0x100
[ 26.695319][ T362] deactivate_super+0xaf/0xe0
[ 26.699993][ T362] cleanup_mnt+0x446/0x500
[ 26.704408][ T362] __cleanup_mnt+0x19/0x20
[ 26.708819][ T362] task_work_run+0x127/0x190
[ 26.713407][ T362] exit_to_user_mode_loop+0xd0/0xe0
[ 26.718608][ T362] exit_to_user_mode_prepare+0x87/0xd0
[ 26.724059][ T362] syscall_exit_to_user_mode+0x1a/0x30
[ 26.729577][ T362] do_syscall_64+0x58/0xa0
[ 26.734080][ T362] ? clear_bhb_loop+0x50/0xa0
[ 26.739000][ T362] ? clear_bhb_loop+0x50/0xa0
[ 26.743693][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 26.749627][ T362] RIP: 0033:0x7f459a2b8a77
[ 26.754038][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 26.773976][ T362] RSP: 002b:00007ffcc3eec478 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 26.782394][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f459a2b8a77
[ 26.790394][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcc3eec530
[ 26.798390][ T362] RBP: 00007ffcc3eec530 R08: 0000000000000000 R09: 0000000000000000
[ 26.806365][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcc3eed5c0
[ 26.814412][ T362] R13: 00007f459a33bd7d R14: 0000000000006678 R15: 00007ffcc3eed600
[ 26.822409][ T362]
[ 26.825432][ T362] ==================================================================
[ 26.833488][ T362] Disabling lock debugging due to kernel taint
[ 26.842151][ T362] BUG: kernel NULL pointer dereference, address: 0000000000000170
[ 26.850120][ T362] #PF: supervisor write access in kernel mode
[ 26.856207][ T362] #PF: error_code(0x0002) - not-present page
[ 26.862212][ T362] PGD 128ab7067 P4D 128ab7067 PUD 0
[ 26.867504][ T362] Oops: 0002 [#1] PREEMPT SMP KASAN
[ 26.872803][ T362] CPU: 1 PID: 362 Comm: syz-executor Tainted: G B W syzkaller #0
[ 26.881803][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 26.892037][ T362] RIP: 0010:ihold+0x26/0x60
[ 26.896549][ T362] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 31 a9 b3 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 f0 2c f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 b1
[ 26.916155][ T362] RSP: 0018:ffffc90001fd7ce8 EFLAGS: 00010246
[ 26.922226][ T362] RAX: ffff88810d2f4f00 RBX: 0000000000000000 RCX: ffff88810d2f4f00
[ 26.930198][ T362] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff
[ 26.938168][ T362] RBP: ffffc90001fd7cf8 R08: 0000000000000004 R09: 0000000000000003
[ 26.946131][ T362] R10: fffffbfff0e1824c R11: 1ffffffff0e1824c R12: 1ffff110219d0338
[ 26.954102][ T362] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000
[ 26.962096][ T362] FS: 0000555561cd8500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 26.971027][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 26.977610][ T362] CR2: 0000000000000170 CR3: 0000000121fa7000 CR4: 00000000003506a0
[ 26.985581][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 26.993551][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 27.001550][ T362] Call Trace:
[ 27.004848][ T362]
[ 27.007780][ T362] vfs_rmdir+0x1f0/0x460
[ 27.012038][ T362] incfs_kill_sb+0x105/0x220
[ 27.016634][ T362] deactivate_locked_super+0xa0/0x100
[ 27.022145][ T362] deactivate_super+0xaf/0xe0
[ 27.026821][ T362] cleanup_mnt+0x446/0x500
[ 27.031239][ T362] __cleanup_mnt+0x19/0x20
[ 27.035657][ T362] task_work_run+0x127/0x190
[ 27.040245][ T362] exit_to_user_mode_loop+0xd0/0xe0
[ 27.045535][ T362] exit_to_user_mode_prepare+0x87/0xd0
[ 27.051076][ T362] syscall_exit_to_user_mode+0x1a/0x30
[ 27.056553][ T362] do_syscall_64+0x58/0xa0
[ 27.060968][ T362] ? clear_bhb_loop+0x50/0xa0
[ 27.065647][ T362] ? clear_bhb_loop+0x50/0xa0
[ 27.070320][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 27.076221][ T362] RIP: 0033:0x7f459a2b8a77
[ 27.080635][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 27.100326][ T362] RSP: 002b:00007ffcc3eec478 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 27.108922][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f459a2b8a77
[ 27.116897][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffcc3eec530
[ 27.124866][ T362] RBP: 00007ffcc3eec530 R08: 0000000000000000 R09: 0000000000000000
[ 27.132870][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffcc3eed5c0
[ 27.140840][ T362] R13: 00007f459a33bd7d R14: 0000000000006678 R15: 00007ffcc3eed600
[ 27.148832][ T362]
[ 27.151851][ T362] Modules linked in:
[ 27.155794][ T362] CR2: 0000000000000170
[ 27.160055][ T362] ---[ end trace cb78107a2d49a042 ]---
[ 27.165506][ T362] RIP: 0010:ihold+0x26/0x60
[ 27.170034][ T362] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 31 a9 b3 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 f0 2c f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 b1
[ 27.189641][ T362] RSP: 0018:ffffc90001fd7ce8 EFLAGS: 00010246
[ 27.195714][ T362] RAX: ffff88810d2f4f00 RBX: 0000000000000000 RCX: ffff88810d2f4f00
[ 27.203692][ T362] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff
[ 27.211659][ T362] RBP: ffffc90001fd7cf8 R08: 0000000000000004 R09: 0000000000000003
[ 27.219627][ T362] R10: fffffbfff0e1824c R11: 1ffffffff0e1824c R12: 1ffff110219d0338
[ 27.227594][ T362] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000
[ 27.235564][ T362] FS: 0000555561cd8500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 27.244496][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 27.251080][ T362] CR2: 0000000000000170 CR3: 0000000121fa7000 CR4: 00000000003506a0
[ 27.259052][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 27.268745][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 27.276835][ T362] Kernel panic - not syncing: Fatal exception
[ 27.283508][ T362] Kernel Offset: disabled
[ 27.287844][ T362] Rebooting in 86400 seconds..