T30] audit: type=1400 audit(1763804185.965:62): avc: denied { rlimitinh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 27.814311][ T30] audit: type=1400 audit(1763804185.965:63): avc: denied { siginh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
Warning: Permanently added '10.128.0.164' (ED25519) to the list of known hosts.
2025/11/22 09:36:39 parsed 1 programs
[ 41.550025][ T30] audit: type=1400 audit(1763804199.835:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 41.597848][ T30] audit: type=1400 audit(1763804199.835:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 43.550879][ T30] audit: type=1400 audit(1763804201.835:66): avc: denied { mounton } for pid=288 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 43.556162][ T288] cgroup: Unknown subsys name 'net'
[ 43.604614][ T30] audit: type=1400 audit(1763804201.835:67): avc: denied { mount } for pid=288 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 43.682387][ T30] audit: type=1400 audit(1763804201.905:68): avc: denied { unmount } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 43.682669][ T288] cgroup: Unknown subsys name 'devices'
[ 43.909147][ T288] cgroup: Unknown subsys name 'hugetlb'
[ 43.921235][ T288] cgroup: Unknown subsys name 'rlimit'
[ 44.127678][ T30] audit: type=1400 audit(1763804202.415:69): avc: denied { setattr } for pid=288 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 44.189440][ T30] audit: type=1400 audit(1763804202.415:70): avc: denied { create } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 44.202860][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
Setting up swapspace version 1, size = 127995904 bytes
[ 44.245801][ T30] audit: type=1400 audit(1763804202.415:71): avc: denied { write } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 44.328622][ T30] audit: type=1400 audit(1763804202.415:72): avc: denied { read } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 44.328949][ T288] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 44.373571][ T30] audit: type=1400 audit(1763804202.415:73): avc: denied { mounton } for pid=288 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 45.481866][ T296] request_module fs-gadgetfs succeeded, but still no fs?
[ 46.122528][ T306] syz-executor (306) used greatest stack depth: 21920 bytes left
[ 46.149886][ T310] bridge0: port 1(bridge_slave_0) entered blocking state
[ 46.181326][ T310] bridge0: port 1(bridge_slave_0) entered disabled state
[ 46.205803][ T310] device bridge_slave_0 entered promiscuous mode
[ 46.241205][ T310] bridge0: port 2(bridge_slave_1) entered blocking state
[ 46.272703][ T310] bridge0: port 2(bridge_slave_1) entered disabled state
[ 46.288137][ T310] device bridge_slave_1 entered promiscuous mode
[ 46.423555][ T310] bridge0: port 2(bridge_slave_1) entered blocking state
[ 46.445374][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 46.466178][ T310] bridge0: port 1(bridge_slave_0) entered blocking state
[ 46.486228][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 46.548707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 46.572956][ T8] bridge0: port 1(bridge_slave_0) entered disabled state
[ 46.590142][ T8] bridge0: port 2(bridge_slave_1) entered disabled state
[ 46.612685][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 46.626380][ T8] bridge0: port 1(bridge_slave_0) entered blocking state
[ 46.648254][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 46.684633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 46.715711][ T8] bridge0: port 2(bridge_slave_1) entered blocking state
[ 46.736189][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 46.780744][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 46.813947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 46.849247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 46.889173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 46.915890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 46.929388][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 46.947915][ T310] device veth0_vlan entered promiscuous mode
[ 46.988039][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 47.021520][ T310] device veth1_macvtap entered promiscuous mode
[ 47.045972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 47.080002][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 47.103252][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 47.204733][ T310] syz-executor (310) used greatest stack depth: 20544 bytes left
[ 47.385934][ T30] kauditd_printk_skb: 27 callbacks suppressed
[ 47.385951][ T30] audit: type=1400 audit(1763804205.665:101): avc: denied { sys_admin } for pid=332 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 47.475595][ T30] audit: type=1400 audit(1763804205.755:102): avc: denied { sys_chroot } for pid=333 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 48.164125][ T45] device bridge_slave_1 left promiscuous mode
[ 48.180657][ T45] bridge0: port 2(bridge_slave_1) entered disabled state
[ 48.202031][ T45] device bridge_slave_0 left promiscuous mode
[ 48.222805][ T45] bridge0: port 1(bridge_slave_0) entered disabled state
[ 48.247125][ T45] device veth1_macvtap left promiscuous mode
[ 48.267048][ T45] device veth0_vlan left promiscuous mode
[ 48.581487][ T30] audit: type=1400 audit(1763804206.865:103): avc: denied { create } for pid=353 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
2025/11/22 09:36:47 executed programs: 0
[ 49.226477][ T362] bridge0: port 1(bridge_slave_0) entered blocking state
[ 49.250170][ T362] bridge0: port 1(bridge_slave_0) entered disabled state
[ 49.274927][ T362] device bridge_slave_0 entered promiscuous mode
[ 49.293841][ T362] bridge0: port 2(bridge_slave_1) entered blocking state
[ 49.309997][ T362] bridge0: port 2(bridge_slave_1) entered disabled state
[ 49.328321][ T362] device bridge_slave_1 entered promiscuous mode
[ 49.484158][ T362] bridge0: port 2(bridge_slave_1) entered blocking state
[ 49.506234][ T362] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 49.525681][ T362] bridge0: port 1(bridge_slave_0) entered blocking state
[ 49.543938][ T362] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 49.624361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 49.661021][ T10] bridge0: port 1(bridge_slave_0) entered disabled state
[ 49.684915][ T10] bridge0: port 2(bridge_slave_1) entered disabled state
[ 49.720696][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 49.744014][ T10] bridge0: port 1(bridge_slave_0) entered blocking state
[ 49.764243][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 49.785448][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 49.805022][ T10] bridge0: port 2(bridge_slave_1) entered blocking state
[ 49.822375][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 49.864264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 49.884833][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 49.922829][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 49.963556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 50.001066][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 50.023228][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 50.052194][ T362] device veth0_vlan entered promiscuous mode
[ 50.087358][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 50.120330][ T362] device veth1_macvtap entered promiscuous mode
[ 50.149344][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 50.178761][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 50.202726][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 50.223484][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 50.306597][ T30] audit: type=1400 audit(1763804208.595:104): avc: denied { unmount } for pid=362 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[ 50.368182][ T362] ------------[ cut here ]------------
[ 50.383283][ T362] WARNING: CPU: 0 PID: 362 at fs/inode.c:335 drop_nlink+0xc5/0x110
[ 50.410005][ T362] Modules linked in:
[ 50.424236][ T362] CPU: 0 PID: 362 Comm: syz-executor Not tainted syzkaller #0
[ 50.445427][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 50.481173][ T362] RIP: 0010:drop_nlink+0xc5/0x110
[ 50.489544][ T362] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 03 35 f2 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 1b b1 b3 ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c
[ 50.555147][ T362] RSP: 0018:ffffc90000b57ca8 EFLAGS: 00010293
[ 50.573132][ T362] RAX: ffffffff81b50dc5 RBX: ffff88811e7f7a10 RCX: ffff88810bd70000
[ 50.600710][ T362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 50.621410][ T362] RBP: ffffc90000b57cd0 R08: 0000000000000004 R09: 0000000000000003
[ 50.642748][ T362] R10: fffff5200016af84 R11: 1ffff9200016af84 R12: dffffc0000000000
[ 50.664742][ T362] R13: 1ffff11023cfef4b R14: ffff88811e7f7a58 R15: 0000000000000000
[ 50.684573][ T362] FS: 000055558d809500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 50.709610][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 50.729724][ T362] CR2: 000000c0057e1000 CR3: 000000010fceb000 CR4: 00000000003506a0
[ 50.757177][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 50.783098][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 50.819054][ T362] Call Trace:
[ 50.828339][ T362]
[ 50.842598][ T362] shmem_rmdir+0x5b/0x90
[ 50.861330][ T362] vfs_rmdir+0x313/0x460
[ 50.868383][ T362] incfs_kill_sb+0x105/0x220
[ 50.895640][ T362] deactivate_locked_super+0xa0/0x100
[ 50.921713][ T362] deactivate_super+0xaf/0xe0
[ 50.938024][ T362] cleanup_mnt+0x446/0x500
[ 50.948849][ T362] __cleanup_mnt+0x19/0x20
[ 50.964870][ T362] task_work_run+0x127/0x190
[ 50.981320][ T362] exit_to_user_mode_loop+0xd0/0xe0
[ 50.997418][ T362] exit_to_user_mode_prepare+0x87/0xd0
[ 51.020167][ T362] syscall_exit_to_user_mode+0x1a/0x30
[ 51.043036][ T362] do_syscall_64+0x58/0xa0
[ 51.054316][ T362] ? clear_bhb_loop+0x50/0xa0
[ 51.079461][ T362] ? clear_bhb_loop+0x50/0xa0
[ 51.088503][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 51.118613][ T362] RIP: 0033:0x7f13dde1ca77
[ 51.129717][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 51.198156][ T362] RSP: 002b:00007fff05682bf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 51.223665][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f13dde1ca77
[ 51.255978][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fff05682cb0
[ 51.275944][ T362] RBP: 00007fff05682cb0 R08: 0000000000000000 R09: 0000000000000000
[ 51.301900][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fff05683d40
[ 51.320934][ T362] R13: 00007f13dde9fd7d R14: 000000000000c42a R15: 00007fff05683d80
[ 51.341055][ T362]
[ 51.351040][ T362] ---[ end trace 2b716b4f5f2ae6b7 ]---
[ 51.365130][ T362] ==================================================================
[ 51.389639][ T362] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60
[ 51.407338][ T362] Write of size 4 at addr 0000000000000170 by task syz-executor/362
[ 51.449723][ T362]
[ 51.461014][ T362] CPU: 0 PID: 362 Comm: syz-executor Tainted: G W syzkaller #0
[ 51.485629][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 51.514050][ T362] Call Trace:
[ 51.522171][ T362]
[ 51.530582][ T362] __dump_stack+0x21/0x30
[ 51.547190][ T362] dump_stack_lvl+0xee/0x150
[ 51.562266][ T362] ? show_regs_print_info+0x20/0x20
[ 51.569321][ T362] ? _raw_spin_lock+0x8e/0xe0
[ 51.584901][ T362] ? _raw_spin_trylock_bh+0x130/0x130
[ 51.600653][ T362] ? ihold+0x20/0x60
[ 51.606218][ T362] kasan_report+0xe7/0x140
[ 51.620810][ T362] ? ihold+0x20/0x60
[ 51.625923][ T362] kasan_check_range+0x280/0x290
[ 51.641226][ T362] __kasan_check_write+0x14/0x20
[ 51.656261][ T362] ihold+0x20/0x60
[ 51.666270][ T362] vfs_rmdir+0x1f0/0x460
[ 51.683989][ T362] incfs_kill_sb+0x105/0x220
[ 51.691666][ T362] deactivate_locked_super+0xa0/0x100
[ 51.713344][ T362] deactivate_super+0xaf/0xe0
[ 51.728079][ T362] cleanup_mnt+0x446/0x500
[ 51.743279][ T362] __cleanup_mnt+0x19/0x20
[ 51.749807][ T362] task_work_run+0x127/0x190
[ 51.767197][ T362] exit_to_user_mode_loop+0xd0/0xe0
[ 51.784430][ T362] exit_to_user_mode_prepare+0x87/0xd0
[ 51.805531][ T362] syscall_exit_to_user_mode+0x1a/0x30
[ 51.823133][ T362] do_syscall_64+0x58/0xa0
[ 51.845350][ T362] ? clear_bhb_loop+0x50/0xa0
[ 51.863724][ T362] ? clear_bhb_loop+0x50/0xa0
[ 51.883772][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 51.902165][ T362] RIP: 0033:0x7f13dde1ca77
[ 51.921313][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 51.984018][ T362] RSP: 002b:00007fff05682bf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 52.004161][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f13dde1ca77
[ 52.022700][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fff05682cb0
[ 52.047607][ T362] RBP: 00007fff05682cb0 R08: 0000000000000000 R09: 0000000000000000
[ 52.080744][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fff05683d40
[ 52.100706][ T362] R13: 00007f13dde9fd7d R14: 000000000000c42a R15: 00007fff05683d80
[ 52.132294][ T362]
[ 52.140882][ T362] ==================================================================
[ 52.157725][ T362] Disabling lock debugging due to kernel taint
[ 52.170000][ T362] BUG: kernel NULL pointer dereference, address: 0000000000000170
[ 52.189943][ T362] #PF: supervisor write access in kernel mode
[ 52.207372][ T362] #PF: error_code(0x0002) - not-present page
[ 52.223468][ T362] PGD 12a1cf067 P4D 12a1cf067 PUD 0
[ 52.235178][ T362] Oops: 0002 [#1] PREEMPT SMP KASAN
[ 52.248920][ T362] CPU: 1 PID: 362 Comm: syz-executor Tainted: G B W syzkaller #0
[ 52.269107][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
[ 52.299464][ T362] RIP: 0010:ihold+0x26/0x60
[ 52.308701][ T362] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 31 a9 b3 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 f0 2c f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 b1
[ 52.362403][ T362] RSP: 0018:ffffc90000b57ce8 EFLAGS: 00010246
[ 52.386074][ T362] RAX: ffff88810bd70000 RBX: 0000000000000000 RCX: ffff88810bd70000
[ 52.405880][ T362] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff
[ 52.427586][ T362] RBP: ffffc90000b57cf8 R08: 0000000000000004 R09: 0000000000000003
[ 52.445961][ T362] R10: fffffbfff0e1824c R11: 1ffffffff0e1824c R12: 1ffff110219b4228
[ 52.466566][ T362] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000
[ 52.484870][ T362] FS: 000055558d809500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 52.508601][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 52.529271][ T362] CR2: 0000000000000170 CR3: 000000010fceb000 CR4: 00000000003506a0
[ 52.545651][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 52.580544][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 52.601381][ T362] Call Trace:
[ 52.607038][ T362]
[ 52.617384][ T362] vfs_rmdir+0x1f0/0x460
[ 52.624927][ T362] incfs_kill_sb+0x105/0x220
[ 52.643649][ T362] deactivate_locked_super+0xa0/0x100
[ 52.659056][ T362] deactivate_super+0xaf/0xe0
[ 52.665813][ T362] cleanup_mnt+0x446/0x500
[ 52.682255][ T362] __cleanup_mnt+0x19/0x20
[ 52.694478][ T362] task_work_run+0x127/0x190
[ 52.704736][ T362] exit_to_user_mode_loop+0xd0/0xe0
[ 52.723692][ T362] exit_to_user_mode_prepare+0x87/0xd0
[ 52.740338][ T362] syscall_exit_to_user_mode+0x1a/0x30
[ 52.748490][ T362] do_syscall_64+0x58/0xa0
[ 52.764782][ T362] ? clear_bhb_loop+0x50/0xa0
[ 52.778697][ T362] ? clear_bhb_loop+0x50/0xa0
[ 52.787105][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0
[ 52.803596][ T362] RIP: 0033:0x7f13dde1ca77
[ 52.821993][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8
[ 52.883604][ T362] RSP: 002b:00007fff05682bf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[ 52.909105][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f13dde1ca77
[ 52.927709][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fff05682cb0
[ 52.961164][ T362] RBP: 00007fff05682cb0 R08: 0000000000000000 R09: 0000000000000000
[ 52.985100][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fff05683d40
[ 53.006096][ T362] R13: 00007f13dde9fd7d R14: 000000000000c42a R15: 00007fff05683d80
[ 53.028251][ T362]
[ 53.041476][ T362] Modules linked in:
[ 53.048031][ T362] CR2: 0000000000000170
[ 53.064419][ T362] ---[ end trace 2b716b4f5f2ae6b8 ]---
[ 53.082172][ T362] RIP: 0010:ihold+0x26/0x60
[ 53.098794][ T362] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 31 a9 b3 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 f0 2c f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 b1
[ 53.150123][ T362] RSP: 0018:ffffc90000b57ce8 EFLAGS: 00010246
[ 53.167600][ T362] RAX: ffff88810bd70000 RBX: 0000000000000000 RCX: ffff88810bd70000
[ 53.191784][ T362] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff
[ 53.215984][ T362] RBP: ffffc90000b57cf8 R08: 0000000000000004 R09: 0000000000000003
[ 53.242033][ T362] R10: fffffbfff0e1824c R11: 1ffffffff0e1824c R12: 1ffff110219b4228
[ 53.270123][ T362] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000
[ 53.288475][ T362] FS: 000055558d809500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[ 53.308981][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 53.332274][ T362] CR2: 0000000000000170 CR3: 000000010fceb000 CR4: 00000000003506a0
[ 53.353651][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 53.381392][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 53.401394][ T362] Kernel panic - not syncing: Fatal exception
[ 53.415034][ T362] Kernel Offset: disabled
[ 53.425404][ T362] Rebooting in 86400 seconds..