./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4121472013 <...> [ 5.662284][ T162] udevd[162]: starting eudev-3.2.11 [ 5.664363][ T161] udevd (161) used greatest stack depth: 23480 bytes left [ 6.779545][ T194] ip (194) used greatest stack depth: 23032 bytes left [ 12.603534][ T23] kauditd_printk_skb: 50 callbacks suppressed [ 12.603542][ T23] audit: type=1400 audit(1718075285.300:61): avc: denied { transition } for pid=282 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.607298][ T23] audit: type=1400 audit(1718075285.300:62): avc: denied { noatsecure } for pid=282 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.610166][ T23] audit: type=1400 audit(1718075285.300:63): avc: denied { write } for pid=282 comm="sh" path="pipe:[10567]" dev="pipefs" ino=10567 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 12.613293][ T23] audit: type=1400 audit(1718075285.310:64): avc: denied { rlimitinh } for pid=282 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.616376][ T23] audit: type=1400 audit(1718075285.310:65): avc: denied { siginh } for pid=282 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.120687][ T283] sshd (283) used greatest stack depth: 21464 bytes left Warning: Permanently added '10.128.1.161' (ED25519) to the list of known hosts. execve("./syz-executor4121472013", ["./syz-executor4121472013"], 0x7fffeffdb8f0 /* 10 vars */) = 0 brk(NULL) = 0x555556bb8000 brk(0x555556bb8d00) = 0x555556bb8d00 arch_prctl(ARCH_SET_FS, 0x555556bb8380) = 0 set_tid_address(0x555556bb8650) = 354 set_robust_list(0x555556bb8660, 24) = 0 rseq(0x555556bb8ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor4121472013", 4096) = 28 getrandom("\x12\x57\x9f\x04\xfd\xbe\x18\x3d", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555556bb8d00 brk(0x555556bd9d00) = 0x555556bd9d00 brk(0x555556bda000) = 0x555556bda000 mprotect(0x7f3bbd541000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 unshare(CLONE_NEWPID) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555556bb8650) = 356 ./strace-static-x86_64: Process 356 attached [pid 356] set_robust_list(0x555556bb8660, 24) = 0 [pid 356] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy) [pid 356] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 356] setsid() = 1 [pid 356] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0 [pid 356] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0 [pid 356] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0 [pid 356] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0 [pid 356] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0 [pid 356] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0 [pid 356] unshare(CLONE_NEWNS) = 0 [pid 356] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 [pid 356] unshare(CLONE_NEWIPC) = -1 EINVAL (Invalid argument) [pid 356] unshare(CLONE_NEWCGROUP) = 0 [pid 356] unshare(CLONE_NEWUTS) = 0 [pid 356] unshare(CLONE_SYSVSEM) = 0 [pid 356] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 356] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 356] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 356] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 356] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 356] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 356] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) [pid 356] getpid() = 1 [pid 356] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ, inheritable=0}) = 0 [pid 356] capset({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ, inheritable=0}) = 0 [ 21.346591][ T23] audit: type=1400 audit(1718075294.050:66): avc: denied { execmem } for pid=354 comm="syz-executor412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.371652][ T23] audit: type=1400 audit(1718075294.070:67): avc: denied { mounton } for pid=356 comm="syz-executor412" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [pid 356] unshare(CLONE_NEWNETexecuting program ) = 0 [pid 356] openat(AT_FDCWD, "/proc/sys/net/ipv4/ping_group_range", O_WRONLY|O_CLOEXEC) = 3 [pid 356] write(3, "0 65535", 7) = 7 [pid 356] close(3) = 0 [pid 356] mkdir("/dev/binderfs", 0777) = 0 [pid 356] mount("binder", "/dev/binderfs", "binder", 0, NULL) = 0 [pid 356] symlink("/dev/binderfs", "./binderfs") = 0 [pid 356] write(1, "executing program\n", 18) = 18 [pid 356] memfd_create("syzkaller", 0) = 3 [pid 356] mmap(NULL, 138412032, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3bb508f000 [pid 356] write(3, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"..., 1048576) = 1048576 [pid 356] munmap(0x7f3bb508f000, 138412032) = 0 [pid 356] openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [pid 356] ioctl(4, LOOP_SET_FD, 3) = 0 [pid 356] close(3) = 0 [ 21.396528][ T23] audit: type=1400 audit(1718075294.070:68): avc: denied { mount } for pid=356 comm="syz-executor412" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 21.418985][ T23] audit: type=1400 audit(1718075294.080:69): avc: denied { mounton } for pid=356 comm="syz-executor412" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 21.440799][ T23] audit: type=1400 audit(1718075294.100:70): avc: denied { mounton } for pid=356 comm="syz-executor412" path="/dev/binderfs" dev="devtmpfs" ino=9951 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 21.463551][ T23] audit: type=1400 audit(1718075294.100:71): avc: denied { mount } for pid=356 comm="syz-executor412" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 21.485922][ T23] audit: type=1400 audit(1718075294.110:72): avc: denied { read write } for pid=356 comm="syz-executor412" name="loop0" dev="devtmpfs" ino=9209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 21.509984][ T23] audit: type=1400 audit(1718075294.110:73): avc: denied { open } for pid=356 comm="syz-executor412" path="/dev/loop0" dev="devtmpfs" ino=9209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [pid 356] close(4) = 0 [pid 356] mkdir("./file0", 0777) = 0 [ 21.533961][ T23] audit: type=1400 audit(1718075294.110:74): avc: denied { ioctl } for pid=356 comm="syz-executor412" path="/dev/loop0" dev="devtmpfs" ino=9209 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [pid 356] mount("/dev/loop0", "./file0", "ext4", 0, ",errors=continue") = 0 [pid 356] openat(AT_FDCWD, "./file0", O_RDONLY|O_DIRECTORY) = 3 [pid 356] chdir("./file0") = 0 [pid 356] openat(AT_FDCWD, "/dev/loop0", O_RDWR) = 4 [pid 356] ioctl(4, LOOP_CLR_FD) = 0 [pid 356] close(4) = 0 [pid 356] open("./bus", O_RDWR|O_CREAT|O_SYNC|O_NOATIME, 000) = 4 [pid 356] mount("/dev/loop0", "./bus", NULL, MS_BIND|MS_SLAVE|MS_STRICTATIME, NULL) = 0 [pid 356] open("./bus", O_RDWR|O_NOCTTY|O_SYNC|O_CLOEXEC) = 5 [pid 356] ioctl(5, BLKDISCARD, [0, 0]) = -1 EINVAL (Invalid argument) [pid 356] exit_group(1) = ? [ 21.590575][ T23] audit: type=1400 audit(1718075294.290:75): avc: denied { mounton } for pid=356 comm="syz-executor412" path="/root/file0" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 21.599146][ T356] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 21.638906][ T358] ------------[ cut here ]------------ [ 21.644180][ T358] kernel BUG at fs/buffer.c:3027! [ 21.649137][ T358] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 21.654944][ T358] CPU: 1 PID: 358 Comm: kmmpd-loop0 Not tainted 5.4.274-syzkaller-00016-gdd432c37afcd #0 [ 21.664564][ T358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 21.674485][ T358] RIP: 0010:submit_bh_wbc+0x831/0x850 [ 21.679673][ T358] Code: 10 80 e1 07 80 c1 03 38 c1 0f 8c 14 fe ff ff 48 8b 7c 24 10 e8 00 8d ea ff e9 05 fe ff ff e8 16 a8 ba ff 0f 0b e8 0f a8 ba ff <0f> 0b e8 08 a8 ba ff 0f 0b e8 01 a8 ba ff 0f 0b e8 fa a7 ba ff 0f [ 21.699120][ T358] RSP: 0018:ffff8881db9e7bf0 EFLAGS: 00010293 [ 21.705015][ T358] RAX: ffffffff81a99411 RBX: 0000000000000000 RCX: ffff8881dbd13f00 [ 21.712835][ T358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 21.720802][ T358] RBP: 0000000000003800 R08: ffffffff81a98c84 R09: ffffed103d1f6f90 [ 21.728613][ T358] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 21.736412][ T358] R13: ffff8881e8fb7c78 R14: 0000000000000001 R15: 0000000000000000 [ 21.744225][ T358] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 21.752991][ T358] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.759410][ T358] CR2: 00007f3bbd515db8 CR3: 00000001dbc51000 CR4: 00000000003406a0 [ 21.767238][ T358] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.775120][ T358] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.782934][ T358] Call Trace: [ 21.786072][ T358] ? __die+0xb4/0x100 [ 21.789881][ T358] ? die+0x26/0x50 [ 21.793437][ T358] ? do_trap+0x1e7/0x340 [ 21.797515][ T358] ? submit_bh_wbc+0x831/0x850 [ 21.802117][ T358] ? submit_bh_wbc+0x831/0x850 [ 21.806726][ T358] ? do_invalid_op+0xfb/0x110 [ 21.811229][ T358] ? submit_bh_wbc+0x831/0x850 [ 21.815839][ T358] ? invalid_op+0x1e/0x30 [ 21.819997][ T358] ? submit_bh_wbc+0xa4/0x850 [ 21.824514][ T358] ? submit_bh_wbc+0x831/0x850 [ 21.829110][ T358] ? submit_bh_wbc+0x831/0x850 [ 21.833711][ T358] ? debug_smp_processor_id+0x20/0x20 [ 21.838923][ T358] submit_bh+0x21/0x30 [ 21.842824][ T358] write_mmp_block+0x3ff/0x5b0 [ 21.847425][ T358] ? console_conditional_schedule+0x10/0x10 [ 21.853152][ T358] ? read_mmp_block+0x8a0/0x8a0 [ 21.857842][ T358] kmmpd+0x7de/0xa10 [ 21.861574][ T358] ? write_mmp_block+0x5b0/0x5b0 [ 21.866348][ T358] ? __wake_up_locked+0xb7/0x110 [ 21.871118][ T358] ? __kthread_parkme+0xb0/0x1b0 [ 21.875891][ T358] kthread+0x2da/0x360 [ 21.879797][ T358] ? write_mmp_block+0x5b0/0x5b0 [ 21.884569][ T358] ? kthread_blkcg+0xd0/0xd0 [ 21.888999][ T358] ret_from_fork+0x1f/0x30 [ 21.893247][ T358] Modules linked in: [ 21.897563][ T358] ---[ end trace 6edb76f276b7be42 ]--- [ 21.902829][ T358] RIP: 0010:submit_bh_wbc+0x831/0x850 [ 21.908222][ T358] Code: 10 80 e1 07 80 c1 03 38 c1 0f 8c 14 fe ff ff 48 8b 7c 24 10 e8 00 8d ea ff e9 05 fe ff ff e8 16 a8 ba ff 0f 0b e8 0f a8 ba ff <0f> 0b e8 08 a8 ba ff 0f 0b e8 01 a8 ba ff 0f 0b e8 fa a7 ba ff 0f [ 21.927656][ T358] RSP: 0018:ffff8881db9e7bf0 EFLAGS: 00010293 [ 21.933536][ T358] RAX: ffffffff81a99411 RBX: 0000000000000000 RCX: ffff8881dbd13f00 [ 21.941393][ T358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 21.949185][ T358] RBP: 0000000000003800 R08: ffffffff81a98c84 R09: ffffed103d1f6f90 [ 21.956987][ T358] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 21.964854][ T358] R13: ffff8881e8fb7c78 R14: 0000000000000001 R15: 0000000000000000 [ 21.972792][ T358] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 21.981532][ T358] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.987961][ T358] CR2: 00007f3bbd515db8 CR3: 00000001dbc51000 CR4: 00000000003406a0 [ 21.995753][ T358] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 22.003596][ T358] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 22.011386][ T358] Kernel panic - not syncing: Fatal exception [ 22.017349][ T358] Kernel Offset: disabled [ 22.021446][ T358] Rebooting in 86400 seconds..