T30] audit: type=1400 audit(1763804185.965:62): avc: denied { rlimitinh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 27.814311][ T30] audit: type=1400 audit(1763804185.965:63): avc: denied { siginh } for pid=223 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.164' (ED25519) to the list of known hosts. 2025/11/22 09:36:39 parsed 1 programs [ 41.550025][ T30] audit: type=1400 audit(1763804199.835:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 41.597848][ T30] audit: type=1400 audit(1763804199.835:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 43.550879][ T30] audit: type=1400 audit(1763804201.835:66): avc: denied { mounton } for pid=288 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 43.556162][ T288] cgroup: Unknown subsys name 'net' [ 43.604614][ T30] audit: type=1400 audit(1763804201.835:67): avc: denied { mount } for pid=288 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.682387][ T30] audit: type=1400 audit(1763804201.905:68): avc: denied { unmount } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 43.682669][ T288] cgroup: Unknown subsys name 'devices' [ 43.909147][ T288] cgroup: Unknown subsys name 'hugetlb' [ 43.921235][ T288] cgroup: Unknown subsys name 'rlimit' [ 44.127678][ T30] audit: type=1400 audit(1763804202.415:69): avc: denied { setattr } for pid=288 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 44.189440][ T30] audit: type=1400 audit(1763804202.415:70): avc: denied { create } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.202860][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 44.245801][ T30] audit: type=1400 audit(1763804202.415:71): avc: denied { write } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.328622][ T30] audit: type=1400 audit(1763804202.415:72): avc: denied { read } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 44.328949][ T288] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 44.373571][ T30] audit: type=1400 audit(1763804202.415:73): avc: denied { mounton } for pid=288 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 45.481866][ T296] request_module fs-gadgetfs succeeded, but still no fs? [ 46.122528][ T306] syz-executor (306) used greatest stack depth: 21920 bytes left [ 46.149886][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.181326][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.205803][ T310] device bridge_slave_0 entered promiscuous mode [ 46.241205][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.272703][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.288137][ T310] device bridge_slave_1 entered promiscuous mode [ 46.423555][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.445374][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.466178][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.486228][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.548707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.572956][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.590142][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.612685][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.626380][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.648254][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.684633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.715711][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.736189][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.780744][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.813947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.849247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.889173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.915890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.929388][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.947915][ T310] device veth0_vlan entered promiscuous mode [ 46.988039][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 47.021520][ T310] device veth1_macvtap entered promiscuous mode [ 47.045972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 47.080002][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 47.103252][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 47.204733][ T310] syz-executor (310) used greatest stack depth: 20544 bytes left [ 47.385934][ T30] kauditd_printk_skb: 27 callbacks suppressed [ 47.385951][ T30] audit: type=1400 audit(1763804205.665:101): avc: denied { sys_admin } for pid=332 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 47.475595][ T30] audit: type=1400 audit(1763804205.755:102): avc: denied { sys_chroot } for pid=333 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 48.164125][ T45] device bridge_slave_1 left promiscuous mode [ 48.180657][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.202031][ T45] device bridge_slave_0 left promiscuous mode [ 48.222805][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.247125][ T45] device veth1_macvtap left promiscuous mode [ 48.267048][ T45] device veth0_vlan left promiscuous mode [ 48.581487][ T30] audit: type=1400 audit(1763804206.865:103): avc: denied { create } for pid=353 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2025/11/22 09:36:47 executed programs: 0 [ 49.226477][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.250170][ T362] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.274927][ T362] device bridge_slave_0 entered promiscuous mode [ 49.293841][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.309997][ T362] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.328321][ T362] device bridge_slave_1 entered promiscuous mode [ 49.484158][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.506234][ T362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.525681][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.543938][ T362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.624361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 49.661021][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.684915][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.720696][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.744014][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.764243][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.785448][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.805022][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.822375][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.864264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 49.884833][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 49.922829][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 49.963556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.001066][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.023228][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.052194][ T362] device veth0_vlan entered promiscuous mode [ 50.087358][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 50.120330][ T362] device veth1_macvtap entered promiscuous mode [ 50.149344][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 50.178761][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 50.202726][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 50.223484][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 50.306597][ T30] audit: type=1400 audit(1763804208.595:104): avc: denied { unmount } for pid=362 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 50.368182][ T362] ------------[ cut here ]------------ [ 50.383283][ T362] WARNING: CPU: 0 PID: 362 at fs/inode.c:335 drop_nlink+0xc5/0x110 [ 50.410005][ T362] Modules linked in: [ 50.424236][ T362] CPU: 0 PID: 362 Comm: syz-executor Not tainted syzkaller #0 [ 50.445427][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 50.481173][ T362] RIP: 0010:drop_nlink+0xc5/0x110 [ 50.489544][ T362] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 03 35 f2 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 1b b1 b3 ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c [ 50.555147][ T362] RSP: 0018:ffffc90000b57ca8 EFLAGS: 00010293 [ 50.573132][ T362] RAX: ffffffff81b50dc5 RBX: ffff88811e7f7a10 RCX: ffff88810bd70000 [ 50.600710][ T362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 50.621410][ T362] RBP: ffffc90000b57cd0 R08: 0000000000000004 R09: 0000000000000003 [ 50.642748][ T362] R10: fffff5200016af84 R11: 1ffff9200016af84 R12: dffffc0000000000 [ 50.664742][ T362] R13: 1ffff11023cfef4b R14: ffff88811e7f7a58 R15: 0000000000000000 [ 50.684573][ T362] FS: 000055558d809500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 50.709610][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.729724][ T362] CR2: 000000c0057e1000 CR3: 000000010fceb000 CR4: 00000000003506a0 [ 50.757177][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.783098][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.819054][ T362] Call Trace: [ 50.828339][ T362] [ 50.842598][ T362] shmem_rmdir+0x5b/0x90 [ 50.861330][ T362] vfs_rmdir+0x313/0x460 [ 50.868383][ T362] incfs_kill_sb+0x105/0x220 [ 50.895640][ T362] deactivate_locked_super+0xa0/0x100 [ 50.921713][ T362] deactivate_super+0xaf/0xe0 [ 50.938024][ T362] cleanup_mnt+0x446/0x500 [ 50.948849][ T362] __cleanup_mnt+0x19/0x20 [ 50.964870][ T362] task_work_run+0x127/0x190 [ 50.981320][ T362] exit_to_user_mode_loop+0xd0/0xe0 [ 50.997418][ T362] exit_to_user_mode_prepare+0x87/0xd0 [ 51.020167][ T362] syscall_exit_to_user_mode+0x1a/0x30 [ 51.043036][ T362] do_syscall_64+0x58/0xa0 [ 51.054316][ T362] ? clear_bhb_loop+0x50/0xa0 [ 51.079461][ T362] ? clear_bhb_loop+0x50/0xa0 [ 51.088503][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.118613][ T362] RIP: 0033:0x7f13dde1ca77 [ 51.129717][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 51.198156][ T362] RSP: 002b:00007fff05682bf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 51.223665][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f13dde1ca77 [ 51.255978][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fff05682cb0 [ 51.275944][ T362] RBP: 00007fff05682cb0 R08: 0000000000000000 R09: 0000000000000000 [ 51.301900][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fff05683d40 [ 51.320934][ T362] R13: 00007f13dde9fd7d R14: 000000000000c42a R15: 00007fff05683d80 [ 51.341055][ T362] [ 51.351040][ T362] ---[ end trace 2b716b4f5f2ae6b7 ]--- [ 51.365130][ T362] ================================================================== [ 51.389639][ T362] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 [ 51.407338][ T362] Write of size 4 at addr 0000000000000170 by task syz-executor/362 [ 51.449723][ T362] [ 51.461014][ T362] CPU: 0 PID: 362 Comm: syz-executor Tainted: G W syzkaller #0 [ 51.485629][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 51.514050][ T362] Call Trace: [ 51.522171][ T362] [ 51.530582][ T362] __dump_stack+0x21/0x30 [ 51.547190][ T362] dump_stack_lvl+0xee/0x150 [ 51.562266][ T362] ? show_regs_print_info+0x20/0x20 [ 51.569321][ T362] ? _raw_spin_lock+0x8e/0xe0 [ 51.584901][ T362] ? _raw_spin_trylock_bh+0x130/0x130 [ 51.600653][ T362] ? ihold+0x20/0x60 [ 51.606218][ T362] kasan_report+0xe7/0x140 [ 51.620810][ T362] ? ihold+0x20/0x60 [ 51.625923][ T362] kasan_check_range+0x280/0x290 [ 51.641226][ T362] __kasan_check_write+0x14/0x20 [ 51.656261][ T362] ihold+0x20/0x60 [ 51.666270][ T362] vfs_rmdir+0x1f0/0x460 [ 51.683989][ T362] incfs_kill_sb+0x105/0x220 [ 51.691666][ T362] deactivate_locked_super+0xa0/0x100 [ 51.713344][ T362] deactivate_super+0xaf/0xe0 [ 51.728079][ T362] cleanup_mnt+0x446/0x500 [ 51.743279][ T362] __cleanup_mnt+0x19/0x20 [ 51.749807][ T362] task_work_run+0x127/0x190 [ 51.767197][ T362] exit_to_user_mode_loop+0xd0/0xe0 [ 51.784430][ T362] exit_to_user_mode_prepare+0x87/0xd0 [ 51.805531][ T362] syscall_exit_to_user_mode+0x1a/0x30 [ 51.823133][ T362] do_syscall_64+0x58/0xa0 [ 51.845350][ T362] ? clear_bhb_loop+0x50/0xa0 [ 51.863724][ T362] ? clear_bhb_loop+0x50/0xa0 [ 51.883772][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.902165][ T362] RIP: 0033:0x7f13dde1ca77 [ 51.921313][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 51.984018][ T362] RSP: 002b:00007fff05682bf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 52.004161][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f13dde1ca77 [ 52.022700][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fff05682cb0 [ 52.047607][ T362] RBP: 00007fff05682cb0 R08: 0000000000000000 R09: 0000000000000000 [ 52.080744][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fff05683d40 [ 52.100706][ T362] R13: 00007f13dde9fd7d R14: 000000000000c42a R15: 00007fff05683d80 [ 52.132294][ T362] [ 52.140882][ T362] ================================================================== [ 52.157725][ T362] Disabling lock debugging due to kernel taint [ 52.170000][ T362] BUG: kernel NULL pointer dereference, address: 0000000000000170 [ 52.189943][ T362] #PF: supervisor write access in kernel mode [ 52.207372][ T362] #PF: error_code(0x0002) - not-present page [ 52.223468][ T362] PGD 12a1cf067 P4D 12a1cf067 PUD 0 [ 52.235178][ T362] Oops: 0002 [#1] PREEMPT SMP KASAN [ 52.248920][ T362] CPU: 1 PID: 362 Comm: syz-executor Tainted: G B W syzkaller #0 [ 52.269107][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 52.299464][ T362] RIP: 0010:ihold+0x26/0x60 [ 52.308701][ T362] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 31 a9 b3 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 f0 2c f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 b1 [ 52.362403][ T362] RSP: 0018:ffffc90000b57ce8 EFLAGS: 00010246 [ 52.386074][ T362] RAX: ffff88810bd70000 RBX: 0000000000000000 RCX: ffff88810bd70000 [ 52.405880][ T362] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff [ 52.427586][ T362] RBP: ffffc90000b57cf8 R08: 0000000000000004 R09: 0000000000000003 [ 52.445961][ T362] R10: fffffbfff0e1824c R11: 1ffffffff0e1824c R12: 1ffff110219b4228 [ 52.466566][ T362] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 52.484870][ T362] FS: 000055558d809500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 52.508601][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.529271][ T362] CR2: 0000000000000170 CR3: 000000010fceb000 CR4: 00000000003506a0 [ 52.545651][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 52.580544][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 52.601381][ T362] Call Trace: [ 52.607038][ T362] [ 52.617384][ T362] vfs_rmdir+0x1f0/0x460 [ 52.624927][ T362] incfs_kill_sb+0x105/0x220 [ 52.643649][ T362] deactivate_locked_super+0xa0/0x100 [ 52.659056][ T362] deactivate_super+0xaf/0xe0 [ 52.665813][ T362] cleanup_mnt+0x446/0x500 [ 52.682255][ T362] __cleanup_mnt+0x19/0x20 [ 52.694478][ T362] task_work_run+0x127/0x190 [ 52.704736][ T362] exit_to_user_mode_loop+0xd0/0xe0 [ 52.723692][ T362] exit_to_user_mode_prepare+0x87/0xd0 [ 52.740338][ T362] syscall_exit_to_user_mode+0x1a/0x30 [ 52.748490][ T362] do_syscall_64+0x58/0xa0 [ 52.764782][ T362] ? clear_bhb_loop+0x50/0xa0 [ 52.778697][ T362] ? clear_bhb_loop+0x50/0xa0 [ 52.787105][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.803596][ T362] RIP: 0033:0x7f13dde1ca77 [ 52.821993][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 52.883604][ T362] RSP: 002b:00007fff05682bf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 52.909105][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f13dde1ca77 [ 52.927709][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fff05682cb0 [ 52.961164][ T362] RBP: 00007fff05682cb0 R08: 0000000000000000 R09: 0000000000000000 [ 52.985100][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fff05683d40 [ 53.006096][ T362] R13: 00007f13dde9fd7d R14: 000000000000c42a R15: 00007fff05683d80 [ 53.028251][ T362] [ 53.041476][ T362] Modules linked in: [ 53.048031][ T362] CR2: 0000000000000170 [ 53.064419][ T362] ---[ end trace 2b716b4f5f2ae6b8 ]--- [ 53.082172][ T362] RIP: 0010:ihold+0x26/0x60 [ 53.098794][ T362] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 31 a9 b3 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 f0 2c f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 b1 [ 53.150123][ T362] RSP: 0018:ffffc90000b57ce8 EFLAGS: 00010246 [ 53.167600][ T362] RAX: ffff88810bd70000 RBX: 0000000000000000 RCX: ffff88810bd70000 [ 53.191784][ T362] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff [ 53.215984][ T362] RBP: ffffc90000b57cf8 R08: 0000000000000004 R09: 0000000000000003 [ 53.242033][ T362] R10: fffffbfff0e1824c R11: 1ffffffff0e1824c R12: 1ffff110219b4228 [ 53.270123][ T362] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 53.288475][ T362] FS: 000055558d809500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 53.308981][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.332274][ T362] CR2: 0000000000000170 CR3: 000000010fceb000 CR4: 00000000003506a0 [ 53.353651][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 53.381392][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 53.401394][ T362] Kernel panic - not syncing: Fatal exception [ 53.415034][ T362] Kernel Offset: disabled [ 53.425404][ T362] Rebooting in 86400 seconds..