Warning: Permanently added '10.128.0.185' (ED25519) to the list of known hosts.
2026/03/05 07:54:01 parsed 1 programs
[ 165.191955][ T29] audit: type=1400 audit(1772697241.965:62): avc: denied { node_bind } for pid=2963 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 165.221093][ T29] audit: type=1400 audit(1772697241.975:63): avc: denied { module_request } for pid=2963 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 169.301664][ T29] audit: type=1400 audit(1772697246.075:64): avc: denied { mounton } for pid=2973 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 169.330838][ T29] audit: type=1400 audit(1772697246.095:65): avc: denied { mount } for pid=2973 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 169.351471][ T2973] cgroup: Unknown subsys name 'net'
[ 169.371509][ T29] audit: type=1400 audit(1772697246.145:66): avc: denied { unmount } for pid=2973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 169.490079][ T2973] cgroup: Unknown subsys name 'cpuset'
[ 169.500669][ T2973] cgroup: Unknown subsys name 'rlimit'
[ 169.710734][ T29] audit: type=1400 audit(1772697246.475:67): avc: denied { setattr } for pid=2973 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 169.746165][ T29] audit: type=1400 audit(1772697246.485:68): avc: denied { create } for pid=2973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 169.778456][ T29] audit: type=1400 audit(1772697246.485:69): avc: denied { write } for pid=2973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 169.806855][ T29] audit: type=1400 audit(1772697246.485:70): avc: denied { read } for pid=2973 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 169.859625][ T29] audit: type=1400 audit(1772697246.625:71): avc: denied { sys_module } for pid=2973 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 170.034066][ T2977] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
Setting up swapspace version 1, size = 127995904 bytes
[ 170.121228][ T2973] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 172.324621][ T29] kauditd_printk_skb: 8 callbacks suppressed
[ 172.324645][ T29] audit: type=1400 audit(1772697249.095:80): avc: denied { execmem } for pid=2979 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 172.423029][ T29] audit: type=1400 audit(1772697249.135:81): avc: denied { read } for pid=2980 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 172.462561][ T29] audit: type=1400 audit(1772697249.135:82): avc: denied { open } for pid=2980 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 172.494542][ T29] audit: type=1400 audit(1772697249.135:83): avc: denied { mounton } for pid=2980 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 172.527855][ T29] audit: type=1400 audit(1772697249.225:84): avc: denied { mounton } for pid=2980 comm="syz-executor" path="/root/syzkaller.SGVrsx/syz-tmp" dev="sda1" ino=2030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[ 172.563359][ T29] audit: type=1400 audit(1772697249.225:85): avc: denied { mount } for pid=2980 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[ 172.604539][ T29] audit: type=1400 audit(1772697249.225:86): avc: denied { mounton } for pid=2980 comm="syz-executor" path="/root/syzkaller.SGVrsx/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[ 172.638793][ T29] audit: type=1400 audit(1772697249.225:87): avc: denied { mount } for pid=2980 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[ 172.672707][ T29] audit: type=1400 audit(1772697249.245:88): avc: denied { mounton } for pid=2980 comm="syz-executor" path="/root/syzkaller.SGVrsx/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[ 172.709627][ T29] audit: type=1400 audit(1772697249.245:89): avc: denied { mounton } for pid=2980 comm="syz-executor" path="/root/syzkaller.SGVrsx/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2584 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[ 172.806681][ T2980] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 178.890319][ T29] kauditd_printk_skb: 7 callbacks suppressed
[ 178.890364][ T29] audit: type=1400 audit(1772697255.655:97): avc: denied { create } for pid=3004 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 195.684447][ T29] audit: type=1400 audit(1772697272.455:98): avc: denied { create } for pid=3477 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1
[ 195.718127][ T29] audit: type=1400 audit(1772697272.475:99): avc: denied { sys_admin } for pid=3477 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 195.772544][ T29] audit: type=1400 audit(1772697272.535:100): avc: denied { sys_chroot } for pid=3478 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 196.025765][ T29] audit: type=1401 audit(1772697272.795:101): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768"
[ 196.129001][ T29] audit: type=1400 audit(1772697272.905:102): avc: denied { create } for pid=3486 comm="syz-executor" name="tun" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1
[ 196.159817][ T29] audit: type=1400 audit(1772697272.905:103): avc: denied { setattr } for pid=3486 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1
[ 196.192425][ T29] audit: type=1400 audit(1772697272.905:104): avc: denied { read write } for pid=3486 comm="syz-executor" name="tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1
[ 196.226591][ T29] audit: type=1400 audit(1772697272.905:105): avc: denied { open } for pid=3486 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=chr_file permissive=1
[ 196.319326][ T29] audit: type=1400 audit(1772697273.085:106): avc: denied { create } for pid=3489 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
2026/03/05 07:54:34 executed programs: 0
2026/03/05 07:54:54 executed programs: 2
[ 217.295875][ T29] audit: type=1400 audit(1772697294.065:107): avc: denied { read write } for pid=3957 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 217.325678][ T29] audit: type=1400 audit(1772697294.065:108): avc: denied { open } for pid=3957 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 217.357681][ T29] audit: type=1400 audit(1772697294.065:109): avc: denied { ioctl } for pid=3957 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 217.563317][ T10] usb 4-1: new high-speed USB device number 2 using dummy_hcd
[ 217.722980][ T10] usb 4-1: Using ep0 maxpacket: 32
[ 217.731297][ T10] usb 4-1: config 0 has too many interfaces: 197, using maximum allowed: 32
[ 217.742611][ T10] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 197
[ 217.756472][ T10] usb 4-1: config 0 has no interface number 0
[ 217.765551][ T10] usb 4-1: New USB device found, idVendor=1286, idProduct=2001, bcdDevice= 6.2d
[ 217.781196][ T10] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[ 217.797921][ T10] usb 4-1: config 0 descriptor??
[ 217.888653][ T29] audit: type=1400 audit(1772697294.655:110): avc: denied { firmware_load } for pid=1128 comm="kworker/0:2" path="/lib/firmware/libertas/usb8388_olpc.bin" dev="sda1" ino=432 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1
[ 218.033990][ C0] usb8xxx: URB in failure status: -2
[ 218.215039][ C0] usb8xxx: URB in failure status: -71
[ 218.227617][ T10] usb 4-1: USB disconnect, device number 2
2026/03/05 07:55:01 executed programs: 5
2026/03/05 07:55:07 executed programs: 7
2026/03/05 07:55:13 executed programs: 9
2026/03/05 07:55:19 executed programs: 11
2026/03/05 07:55:25 executed programs: 13
2026/03/05 07:55:31 executed programs: 15
2026/03/05 07:55:37 executed programs: 17
2026/03/05 07:55:43 executed programs: 19
2026/03/05 07:55:49 executed programs: 21
2026/03/05 07:55:55 executed programs: 23
2026/03/05 07:56:01 executed programs: 25
2026/03/05 07:56:08 executed programs: 27
2026/03/05 07:56:14 executed programs: 29
2026/03/05 07:56:20 executed programs: 31
2026/03/05 07:56:26 executed programs: 33
2026/03/05 07:56:32 executed programs: 35
2026/03/05 07:56:38 executed programs: 37
2026/03/05 07:56:44 executed programs: 39
2026/03/05 07:56:50 executed programs: 41
2026/03/05 07:56:56 executed programs: 43
2026/03/05 07:57:02 executed programs: 45
2026/03/05 07:57:08 executed programs: 47
2026/03/05 07:57:14 executed programs: 49
2026/03/05 07:57:20 executed programs: 51
2026/03/05 07:57:26 executed programs: 53
[ 375.522930][ T30] INFO: task kworker/0:1:10 blocked for more than 143 seconds.
[ 375.530633][ T30] Not tainted syzkaller #0
[ 375.535677][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 375.544447][ T30] task:kworker/0:1 state:D stack:23304 pid:10 tgid:10 ppid:2 task_flags:0x4288060 flags:0x00080000
[ 375.556568][ T30] Workqueue: usb_hub_wq hub_event
[ 375.561656][ T30] Call Trace:
[ 375.564993][ T30]
[ 375.567952][ T30] __schedule+0xeb1/0x41f0
[ 375.572407][ T30] ? __pfx___schedule+0x10/0x10
[ 375.577328][ T30] ? find_held_lock+0x2b/0x80
[ 375.582051][ T30] ? schedule+0x2bf/0x390
[ 375.586495][ T30] schedule+0xdd/0x390
[ 375.590624][ T30] lbs_wait_for_firmware_load+0x11e/0x1e0
[ 375.596446][ T30] ? __pfx_lbs_wait_for_firmware_load+0x10/0x10
[ 375.602862][ T30] ? _raw_spin_unlock_irq+0x23/0x50
[ 375.608111][ T30] ? __pfx_autoremove_wake_function+0x10/0x10
[ 375.614248][ T30] ? usb_hcd_flush_endpoint+0x359/0x400
[ 375.619855][ T30] lbs_remove_card+0x84/0x390
[ 375.624619][ T30] if_usb_disconnect+0xaf/0x2e0
[ 375.629513][ T30] usb_unbind_interface+0x1dd/0x9e0
[ 375.634804][ T30] ? kernfs_remove_by_name_ns+0x9f/0xf0
[ 375.640411][ T30] ? __pfx_usb_unbind_interface+0x10/0x10
[ 375.646231][ T30] device_remove+0x12a/0x180
[ 375.650867][ T30] device_release_driver_internal+0x42e/0x600
[ 375.657067][ T30] bus_remove_device+0x22f/0x440
[ 375.662066][ T30] device_del+0x376/0x9b0
[ 375.666503][ T30] ? __pfx_device_del+0x10/0x10
[ 375.673038][ T30] ? kobject_put+0xb9/0x640
[ 375.677628][ T30] usb_disable_device+0x367/0x810
[ 375.692771][ T30] usb_disconnect+0x2e2/0x9a0
[ 375.697531][ T30] hub_event+0x1d0c/0x4af0
[ 375.702027][ T30] ? __lock_acquire+0x4a5/0x2630
2026/03/05 07:57:32 executed programs: 55
[ 375.732814][ T30] ? do_raw_spin_unlock+0x145/0x1e0
[ 375.738105][ T30] ? __pfx_hub_event+0x10/0x10
[ 375.752494][ T30] ? debug_object_deactivate+0x2e4/0x3b0
[ 375.779754][ T30] ? rcu_is_watching+0x12/0xc0
[ 375.784784][ T30] process_one_work+0x9d7/0x1920
[ 375.789776][ T30] ? __pfx_process_one_work+0x10/0x10
[ 375.795484][ T30] ? __pfx_hub_event+0x10/0x10
[ 375.800308][ T30] worker_thread+0x5da/0xe40
[ 375.805355][ T30] ? __pfx_worker_thread+0x10/0x10
[ 375.810511][ T30] ? kthread+0x13a/0x450
[ 375.814826][ T30] ? __pfx_worker_thread+0x10/0x10
[ 375.820072][ T30] kthread+0x370/0x450
[ 375.824253][ T30] ? __pfx_kthread+0x10/0x10
[ 375.828878][ T30] ret_from_fork+0x6c3/0xcb0
[ 375.833571][ T30] ? __pfx_ret_from_fork+0x10/0x10
[ 375.838733][ T30] ? __switch_to+0x7aa/0x1120
[ 375.843531][ T30] ? __pfx_kthread+0x10/0x10
[ 375.848161][ T30] ret_from_fork_asm+0x1a/0x30
[ 375.853031][ T30]
[ 375.856162][ T30]
[ 375.856162][ T30] Showing all locks held in the system:
[ 375.865436][ T30] 5 locks held by kworker/0:1/10:
[ 375.870520][ T30] #0: ffff8881022b9d48 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920
[ 375.881423][ T30] #1: ffffc900000afd18 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920
[ 375.892772][ T30] #2: ffff88810bf3b198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1bd/0x4af0
[ 375.901777][ T30] #3: ffff88811d0e3198 (&dev->mutex){....}-{4:4}, at: usb_disconnect+0x10a/0x9a0
[ 375.911160][ T30] #4: ffff88811d0e1160 (&dev->mutex){....}-{4:4}, at: device_release_driver_internal+0xaa/0x600
[ 375.921840][ T30] 1 lock held by khungtaskd/30:
[ 375.926784][ T30] #0: ffffffff896e05a0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x3d/0x184
[ 375.936776][ T30] 2 locks held by kworker/0:2/1128:
[ 375.941988][ T30] #0: ffff88810006b548 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1287/0x1920
[ 375.952506][ T30] #1: ffffc9000392fd18 ((work_completion)(&fw_work->work)){+.+.}-{0:0}, at: process_one_work+0x93c/0x1920
[ 375.964124][ T30] 2 locks held by getty/2918:
[ 375.968816][ T30] #0: ffff8881158d30a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80
[ 375.978668][ T30] #1: ffffc900000432f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x419/0x1500
[ 375.988934][ T30]
[ 375.991307][ T30] =============================================
[ 375.991307][ T30]
[ 376.001711][ T30] NMI backtrace for cpu 0
[ 376.001777][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full)
[ 376.001807][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
[ 376.001835][ T30] Call Trace:
[ 376.001843][ T30]
[ 376.001854][ T30] dump_stack_lvl+0x100/0x190
[ 376.001895][ T30] nmi_cpu_backtrace.cold+0x12d/0x151
[ 376.001934][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10
[ 376.001985][ T30] nmi_trigger_cpumask_backtrace+0x1d7/0x230
[ 376.002019][ T30] sys_info+0x141/0x190
[ 376.002044][ T30] watchdog+0xd25/0x1050
[ 376.002084][ T30] ? __pfx_watchdog+0x10/0x10
[ 376.002115][ T30] ? __kthread_parkme+0x18c/0x230
[ 376.002159][ T30] ? kthread+0x13a/0x450
[ 376.002185][ T30] ? __pfx_watchdog+0x10/0x10
[ 376.002213][ T30] kthread+0x370/0x450
[ 376.002240][ T30] ? __pfx_kthread+0x10/0x10
[ 376.002270][ T30] ret_from_fork+0x6c3/0xcb0
[ 376.002309][ T30] ? __pfx_ret_from_fork+0x10/0x10
[ 376.002350][ T30] ? __switch_to+0x7aa/0x1120
[ 376.002376][ T30] ? __pfx_kthread+0x10/0x10
[ 376.002407][ T30] ret_from_fork_asm+0x1a/0x30
[ 376.002463][ T30]
[ 376.002472][ T30] Sending NMI from CPU 0 to CPUs 1:
[ 376.122069][ C1] NMI backtrace for cpu 1
[ 376.122089][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full)
[ 376.122116][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
[ 376.122129][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20
[ 376.122163][ C1] Code: ae b1 01 e9 13 e8 02 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d d3 e1 1d 00 fb f4 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[ 376.122190][ C1] RSP: 0018:ffffc9000013fe00 EFLAGS: 00000246
[ 376.122273][ C1] RAX: 0000000000083459 RBX: ffff8881022a1d00 RCX: ffffffff876898d5
[ 376.122289][ C1] RDX: 0000000000000000 RSI: ffffffff8901db96 RDI: ffffffff87afa420
[ 376.122303][ C1] RBP: 0000000000000001 R08: 0000000000000001 R09: ffffed103eae6725
[ 376.122317][ C1] R10: ffff8881f573392b R11: 0000000000000000 R12: ffffed10204543a0
[ 376.122331][ C1] R13: 0000000000000001 R14: ffffffff8aefe2d0 R15: 0000000000000000
[ 376.122349][ C1] FS: 0000000000000000(0000) GS:ffff8882687d3000(0000) knlGS:0000000000000000
[ 376.122370][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 376.122385][ C1] CR2: 00007fff54acaff8 CR3: 0000000116c30000 CR4: 00000000003506f0
[ 376.122400][ C1] Call Trace:
[ 376.122409][ C1]
[ 376.122416][ C1] default_idle+0x9/0x10
[ 376.122448][ C1] default_idle_call+0x6c/0xb0
[ 376.122480][ C1] do_idle+0x35b/0x4b0
[ 376.122518][ C1] ? __pfx_do_idle+0x10/0x10
[ 376.122557][ C1] cpu_startup_entry+0x4f/0x60
[ 376.122592][ C1] start_secondary+0x21d/0x2d0
[ 376.122627][ C1] ? __pfx_start_secondary+0x10/0x10
[ 376.122664][ C1] common_startup_64+0x13e/0x148
[ 376.122708][ C1]
[ 376.123102][ T30] Kernel panic - not syncing: hung_task: blocked tasks
[ 376.123152][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full)
[ 376.123233][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
[ 376.123277][ T30] Call Trace:
[ 376.123302][ T30]
[ 376.123329][ T30] dump_stack_lvl+0x100/0x190
[ 376.123422][ T30] vpanic+0x552/0x970
[ 376.123504][ T30] ? __pfx_vpanic+0x10/0x10
[ 376.123592][ T30] ? rcu_is_watching+0x12/0xc0
[ 376.123682][ T30] panic+0xd1/0xe0
[ 376.123762][ T30] ? __pfx_panic+0x10/0x10
[ 376.123852][ T30] ? nmi_trigger_cpumask_backtrace+0x1b5/0x230
[ 376.123943][ T30] ? nmi_trigger_cpumask_backtrace+0x1f6/0x230
[ 376.124027][ T30] ? nmi_trigger_cpumask_backtrace+0x200/0x230
[ 376.124107][ T30] ? watchdog.cold+0x198/0x1ca
[ 376.124189][ T30] ? watchdog+0xd35/0x1050
[ 376.124262][ T30] watchdog.cold+0x1a9/0x1ca
[ 376.124406][ T30] ? __pfx_watchdog+0x10/0x10
[ 376.124487][ T30] ? __kthread_parkme+0x18c/0x230
[ 376.124619][ T30] ? kthread+0x13a/0x450
[ 376.124685][ T30] ? __pfx_watchdog+0x10/0x10
[ 376.124764][ T30] kthread+0x370/0x450
[ 376.124823][ T30] ? __pfx_kthread+0x10/0x10
[ 376.124908][ T30] ret_from_fork+0x6c3/0xcb0
[ 376.125025][ T30] ? __pfx_ret_from_fork+0x10/0x10
[ 376.125142][ T30] ? __switch_to+0x7aa/0x1120
[ 376.125224][ T30] ? __pfx_kthread+0x10/0x10
[ 376.125309][ T30] ret_from_fork_asm+0x1a/0x30
[ 376.125459][ T30]
[ 376.431842][ T30] Kernel Offset: disabled
[ 376.436174][ T30] Rebooting in 86400 seconds..