Warning: Permanently added '10.128.0.240' (ED25519) to the list of known hosts. 2025/10/20 08:02:30 parsed 1 programs [ 36.610306][ T30] audit: type=1400 audit(1760947350.540:64): avc: denied { node_bind } for pid=281 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 36.632926][ T30] audit: type=1400 audit(1760947350.540:65): avc: denied { module_request } for pid=281 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 37.699866][ T30] audit: type=1400 audit(1760947351.630:66): avc: denied { mounton } for pid=290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 37.701587][ T290] cgroup: Unknown subsys name 'net' [ 37.724686][ T30] audit: type=1400 audit(1760947351.630:67): avc: denied { mount } for pid=290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.752745][ T30] audit: type=1400 audit(1760947351.670:68): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.752969][ T290] cgroup: Unknown subsys name 'devices' [ 37.931900][ T290] cgroup: Unknown subsys name 'hugetlb' [ 37.938754][ T290] cgroup: Unknown subsys name 'rlimit' [ 38.093426][ T30] audit: type=1400 audit(1760947352.020:69): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 38.120862][ T30] audit: type=1400 audit(1760947352.020:70): avc: denied { create } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.142910][ T30] audit: type=1400 audit(1760947352.020:71): avc: denied { write } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.150981][ T292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 38.164065][ T30] audit: type=1400 audit(1760947352.020:72): avc: denied { read } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.196074][ T30] audit: type=1400 audit(1760947352.020:73): avc: denied { mounton } for pid=290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.270026][ T290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 39.040688][ T303] request_module fs-gadgetfs succeeded, but still no fs? [ 39.581020][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.589615][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.598770][ T333] device bridge_slave_0 entered promiscuous mode [ 39.606220][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.615313][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.624126][ T333] device bridge_slave_1 entered promiscuous mode [ 39.680511][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.689075][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.697423][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.705887][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.733436][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.743213][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.755273][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.765485][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.783311][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.793655][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.802029][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.812663][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.822412][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.830783][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.855535][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.870978][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.894794][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.918439][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.928252][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.937702][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.949795][ T333] device veth0_vlan entered promiscuous mode [ 39.967076][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.977135][ T333] device veth1_macvtap entered promiscuous mode [ 39.994981][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.006474][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2025/10/20 08:02:34 executed programs: 0 [ 40.496057][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.505262][ T362] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.517308][ T362] device bridge_slave_0 entered promiscuous mode [ 40.524919][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.533573][ T362] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.544542][ T362] device bridge_slave_1 entered promiscuous mode [ 40.627571][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.637562][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.652964][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 40.662184][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.672587][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.680443][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.689695][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 40.701986][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.711797][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.720277][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.730504][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.768269][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.778392][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.795437][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.813971][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.825965][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.837238][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.851978][ T362] device veth0_vlan entered promiscuous mode [ 40.867020][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.877578][ T362] device veth1_macvtap entered promiscuous mode [ 40.887112][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.905635][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.936787][ T362] ------------[ cut here ]------------ [ 40.943552][ T362] WARNING: CPU: 1 PID: 362 at fs/inode.c:335 drop_nlink+0xc5/0x110 [ 40.953016][ T362] Modules linked in: [ 40.957405][ T362] CPU: 1 PID: 362 Comm: syz-executor Not tainted syzkaller #0 [ 40.966618][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 40.977892][ T362] RIP: 0010:drop_nlink+0xc5/0x110 [ 40.983688][ T362] Code: 1b 48 8d bb b8 04 00 00 be 08 00 00 00 e8 23 38 f2 ff f0 48 ff 83 b8 04 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 3b b7 b3 ff <0f> 0b eb 86 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5e ff ff ff 4c [ 41.007834][ T362] RSP: 0018:ffffc90003ff7ca8 EFLAGS: 00010293 [ 41.014964][ T362] RAX: ffffffff81b507d5 RBX: ffff888121215f28 RCX: ffff88810fe60000 [ 41.025120][ T362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 41.035038][ T362] RBP: ffffc90003ff7cd0 R08: 0000000000000004 R09: 0000000000000003 [ 41.045052][ T362] R10: fffff520007fef84 R11: 1ffff920007fef84 R12: dffffc0000000000 [ 41.054787][ T362] R13: 1ffff11024242bee R14: ffff888121215f70 R15: 0000000000000000 [ 41.063844][ T362] FS: 000055558a0aa500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 41.075259][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.082938][ T362] CR2: 000055558a0cd4e8 CR3: 000000012b548000 CR4: 00000000003506a0 [ 41.092509][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.092901][ T8] device bridge_slave_1 left promiscuous mode [ 41.102457][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 41.107689][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.117470][ T362] Call Trace: [ 41.130639][ T362] [ 41.130919][ T8] device bridge_slave_0 left promiscuous mode [ 41.133786][ T362] shmem_rmdir+0x5b/0x90 [ 41.140942][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.145078][ T362] vfs_rmdir+0x313/0x460 [ 41.158700][ T362] incfs_kill_sb+0x105/0x220 [ 41.164370][ T362] deactivate_locked_super+0xa0/0x100 [ 41.164704][ T8] device veth1_macvtap left promiscuous mode [ 41.171410][ T362] deactivate_super+0xaf/0xe0 [ 41.178557][ T8] device veth0_vlan left promiscuous mode [ 41.184097][ T362] cleanup_mnt+0x446/0x500 [ 41.195790][ T362] __cleanup_mnt+0x19/0x20 [ 41.202113][ T362] task_work_run+0x127/0x190 [ 41.209032][ T362] exit_to_user_mode_loop+0xd0/0xe0 [ 41.215148][ T362] exit_to_user_mode_prepare+0x87/0xd0 [ 41.221713][ T362] syscall_exit_to_user_mode+0x1a/0x30 [ 41.227654][ T362] do_syscall_64+0x58/0xa0 [ 41.233296][ T362] ? clear_bhb_loop+0x50/0xa0 [ 41.239383][ T362] ? clear_bhb_loop+0x50/0xa0 [ 41.245659][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.252557][ T362] RIP: 0033:0x7f65de1352f7 [ 41.258254][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 41.280145][ T362] RSP: 002b:00007ffe6599bbf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 41.290444][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f65de1352f7 [ 41.299986][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe6599bcb0 [ 41.308836][ T362] RBP: 00007ffe6599bcb0 R08: 0000000000000000 R09: 0000000000000000 [ 41.321549][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe6599cd40 [ 41.332774][ T362] R13: 00007f65de1b6d7d R14: 0000000000009fdb R15: 00007ffe6599cd80 [ 41.342348][ T362] [ 41.346281][ T362] ---[ end trace 3d6026fa4fdd7a99 ]--- [ 41.353242][ T362] ================================================================== [ 41.362046][ T362] BUG: KASAN: null-ptr-deref in ihold+0x20/0x60 [ 41.368481][ T362] Write of size 4 at addr 0000000000000170 by task syz-executor/362 [ 41.379114][ T362] [ 41.382126][ T362] CPU: 0 PID: 362 Comm: syz-executor Tainted: G W syzkaller #0 [ 41.393284][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 41.406455][ T362] Call Trace: [ 41.410410][ T362] [ 41.413741][ T362] __dump_stack+0x21/0x30 [ 41.419832][ T362] dump_stack_lvl+0xee/0x150 [ 41.425215][ T362] ? show_regs_print_info+0x20/0x20 [ 41.430625][ T362] ? _raw_spin_lock+0x8e/0xe0 [ 41.436289][ T362] ? _raw_spin_trylock_bh+0x130/0x130 [ 41.441805][ T362] ? ihold+0x20/0x60 [ 41.446397][ T362] kasan_report+0xe7/0x140 [ 41.451611][ T362] ? ihold+0x20/0x60 [ 41.456545][ T362] kasan_check_range+0x280/0x290 [ 41.462737][ T362] __kasan_check_write+0x14/0x20 [ 41.468707][ T362] ihold+0x20/0x60 [ 41.473616][ T362] vfs_rmdir+0x1f0/0x460 [ 41.478942][ T362] incfs_kill_sb+0x105/0x220 [ 41.484643][ T362] deactivate_locked_super+0xa0/0x100 [ 41.491052][ T362] deactivate_super+0xaf/0xe0 [ 41.497662][ T362] cleanup_mnt+0x446/0x500 [ 41.502967][ T362] __cleanup_mnt+0x19/0x20 [ 41.508085][ T362] task_work_run+0x127/0x190 [ 41.513411][ T362] exit_to_user_mode_loop+0xd0/0xe0 [ 41.519784][ T362] exit_to_user_mode_prepare+0x87/0xd0 [ 41.525944][ T362] syscall_exit_to_user_mode+0x1a/0x30 [ 41.532045][ T362] do_syscall_64+0x58/0xa0 [ 41.537422][ T362] ? clear_bhb_loop+0x50/0xa0 [ 41.542634][ T362] ? clear_bhb_loop+0x50/0xa0 [ 41.548168][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.554579][ T362] RIP: 0033:0x7f65de1352f7 [ 41.559818][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 41.583159][ T362] RSP: 002b:00007ffe6599bbf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 41.593436][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f65de1352f7 [ 41.604851][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe6599bcb0 [ 41.614787][ T362] RBP: 00007ffe6599bcb0 R08: 0000000000000000 R09: 0000000000000000 [ 41.625032][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe6599cd40 [ 41.637913][ T362] R13: 00007f65de1b6d7d R14: 0000000000009fdb R15: 00007ffe6599cd80 [ 41.650700][ T362] [ 41.655846][ T362] ================================================================== [ 41.667464][ T362] Disabling lock debugging due to kernel taint [ 41.678388][ T362] BUG: kernel NULL pointer dereference, address: 0000000000000170 [ 41.680896][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 41.680913][ T30] audit: type=1400 audit(1760947355.610:105): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 41.686875][ T362] #PF: supervisor write access in kernel mode [ 41.697334][ T30] audit: type=1400 audit(1760947355.610:106): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 41.719121][ T362] #PF: error_code(0x0002) - not-present page [ 41.719142][ T362] PGD 12b66a067 P4D 12b66a067 PUD 0 [ 41.719167][ T362] Oops: 0002 [#1] PREEMPT SMP KASAN [ 41.719202][ T362] CPU: 0 PID: 362 Comm: syz-executor Tainted: G B W syzkaller #0 [ 41.727256][ T30] audit: type=1400 audit(1760947355.610:107): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 41.752559][ T362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 41.752580][ T362] RIP: 0010:ihold+0x26/0x60 [ 41.752611][ T362] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 51 af b3 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 10 30 f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 d1 [ 41.752627][ T362] RSP: 0018:ffffc90003ff7ce8 EFLAGS: 00010246 [ 41.752646][ T362] RAX: ffff88810fe60000 RBX: 0000000000000000 RCX: ffff88810fe60000 [ 41.752660][ T362] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff [ 41.760599][ T30] audit: type=1400 audit(1760947355.610:108): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 41.764896][ T362] RBP: ffffc90003ff7cf8 R08: 0000000000000004 R09: 0000000000000003 [ 41.770886][ T30] audit: type=1400 audit(1760947355.610:109): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 41.780954][ T362] R10: fffffbfff0e1824c R11: 1ffffffff0e1824c R12: 1ffff1102198bd7c [ 41.780979][ T362] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 41.780991][ T362] FS: 000055558a0aa500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 41.781008][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.781021][ T362] CR2: 0000000000000170 CR3: 000000012b548000 CR4: 00000000003506b0 [ 41.781037][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.807568][ T30] audit: type=1400 audit(1760947355.610:110): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 41.819253][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 41.819276][ T362] Call Trace: [ 41.819283][ T362] [ 41.819290][ T362] vfs_rmdir+0x1f0/0x460 [ 41.819318][ T362] incfs_kill_sb+0x105/0x220 [ 41.825031][ T30] audit: type=1400 audit(1760947355.610:111): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 41.849532][ T362] deactivate_locked_super+0xa0/0x100 [ 41.849617][ T362] deactivate_super+0xaf/0xe0 [ 41.849635][ T362] cleanup_mnt+0x446/0x500 [ 41.849655][ T362] __cleanup_mnt+0x19/0x20 [ 41.849679][ T362] task_work_run+0x127/0x190 [ 41.849696][ T362] exit_to_user_mode_loop+0xd0/0xe0 [ 42.108494][ T362] exit_to_user_mode_prepare+0x87/0xd0 [ 42.114098][ T362] syscall_exit_to_user_mode+0x1a/0x30 [ 42.120038][ T362] do_syscall_64+0x58/0xa0 [ 42.124668][ T362] ? clear_bhb_loop+0x50/0xa0 [ 42.129475][ T362] ? clear_bhb_loop+0x50/0xa0 [ 42.135062][ T362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.142297][ T362] RIP: 0033:0x7f65de1352f7 [ 42.146847][ T362] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 42.168560][ T362] RSP: 002b:00007ffe6599bbf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 42.176988][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f65de1352f7 [ 42.185301][ T362] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffe6599bcb0 [ 42.193978][ T362] RBP: 00007ffe6599bcb0 R08: 0000000000000000 R09: 0000000000000000 [ 42.202407][ T362] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ffe6599cd40 [ 42.211181][ T362] R13: 00007f65de1b6d7d R14: 0000000000009fdb R15: 00007ffe6599cd80 [ 42.220543][ T362] [ 42.223678][ T362] Modules linked in: [ 42.227688][ T362] CR2: 0000000000000170 [ 42.232114][ T362] ---[ end trace 3d6026fa4fdd7a9a ]--- [ 42.237756][ T362] RIP: 0010:ihold+0x26/0x60 [ 42.242289][ T362] Code: 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 51 af b3 ff 48 8d bb 70 01 00 00 be 04 00 00 00 e8 10 30 f2 ff 41 be 01 00 00 00 44 0f c1 b3 70 01 00 00 41 ff c6 bf 02 00 00 00 44 89 f6 e8 d1 [ 42.262954][ T362] RSP: 0018:ffffc90003ff7ce8 EFLAGS: 00010246 [ 42.269142][ T362] RAX: ffff88810fe60000 RBX: 0000000000000000 RCX: ffff88810fe60000 [ 42.278293][ T362] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000ffffffff [ 42.286860][ T362] RBP: ffffc90003ff7cf8 R08: 0000000000000004 R09: 0000000000000003 [ 42.295074][ T362] R10: fffffbfff0e1824c R11: 1ffffffff0e1824c R12: 1ffff1102198bd7c [ 42.303265][ T362] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 42.311345][ T362] FS: 000055558a0aa500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 42.321601][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.328840][ T362] CR2: 0000000000000170 CR3: 000000012b548000 CR4: 00000000003506b0 [ 42.336982][ T362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 42.345989][ T362] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 42.357630][ T362] Kernel panic - not syncing: Fatal exception [ 42.366093][ T362] Kernel Offset: disabled [ 42.371400][ T362] Rebooting in 86400 seconds..