Warning: Permanently added '10.128.0.98' (ECDSA) to the list of known hosts. 2019/06/04 01:29:47 fuzzer started [ 59.787304] audit: type=1400 audit(1559611787.112:36): avc: denied { map } for pid=7843 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/04 01:29:50 dialing manager at 10.128.0.105:38735 2019/06/04 01:29:50 syscalls: 2460 2019/06/04 01:29:50 code coverage: enabled 2019/06/04 01:29:50 comparison tracing: enabled 2019/06/04 01:29:50 extra coverage: extra coverage is not supported by the kernel 2019/06/04 01:29:50 setuid sandbox: enabled 2019/06/04 01:29:50 namespace sandbox: enabled 2019/06/04 01:29:50 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/04 01:29:50 fault injection: enabled 2019/06/04 01:29:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/04 01:29:50 net packet injection: enabled 2019/06/04 01:29:50 net device setup: enabled 01:29:51 executing program 0: r0 = socket(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_int(r0, 0x1, 0x1f, 0x0, &(0x7f0000000000)) [ 64.516348] audit: type=1400 audit(1559611791.842:37): avc: denied { map } for pid=7860 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14741 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 64.634030] IPVS: ftp: loaded support on port[0] = 21 [ 64.644027] NET: Registered protocol family 30 [ 64.648648] Failed to register TIPC socket type 01:29:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8000000003a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$packet(0x11, 0xa, 0x300) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63", 0x4}], 0x1}, 0x0) [ 64.862506] IPVS: ftp: loaded support on port[0] = 21 [ 64.871833] NET: Registered protocol family 30 [ 64.876998] Failed to register TIPC socket type 01:29:52 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000100)={'ip6gre0\x00', @ifru_addrs=@hci}) [ 65.266949] IPVS: ftp: loaded support on port[0] = 21 [ 65.288080] NET: Registered protocol family 30 [ 65.292712] Failed to register TIPC socket type 01:29:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000200)) [ 65.809115] IPVS: ftp: loaded support on port[0] = 21 [ 65.827817] NET: Registered protocol family 30 [ 65.832452] Failed to register TIPC socket type 01:29:53 executing program 4: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0x0) [ 66.856459] IPVS: ftp: loaded support on port[0] = 21 [ 66.896121] NET: Registered protocol family 30 [ 66.900756] Failed to register TIPC socket type [ 67.209099] chnl_net:caif_netlink_parms(): no params data found [ 67.629326] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.716885] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.843359] device bridge_slave_0 entered promiscuous mode [ 67.968360] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.074032] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.162891] device bridge_slave_1 entered promiscuous mode [ 68.527492] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 68.790970] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 69.277064] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 69.447528] team0: Port device team_slave_0 added [ 69.657539] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 69.771850] team0: Port device team_slave_1 added [ 69.936153] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 70.086268] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 70.571846] device hsr_slave_0 entered promiscuous mode [ 70.736881] device hsr_slave_1 entered promiscuous mode [ 70.920209] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 71.038355] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 71.289710] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 71.915755] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.115372] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.282268] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.360733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.396134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.519295] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 72.604618] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.767901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.864672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 72.872966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.966798] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.973362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.097775] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.197788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.217541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.278297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.641169] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.647623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.108324] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.485093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.898656] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 75.236302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.409669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.835953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.844455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.295145] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.302291] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.324349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.558394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.799896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 77.005039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.012964] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.295092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 77.463072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.497654] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.704478] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 77.710564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.995495] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 78.121892] IPVS: ftp: loaded support on port[0] = 21 [ 78.225360] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.227260] NET: Registered protocol family 30 [ 78.328985] Failed to register TIPC socket type [ 78.372387] IPVS: ftp: loaded support on port[0] = 21 01:30:05 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0xc, 0xffffffffffffff9c, 0xa) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000680)=ANY=[]}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000340)='-:*+@\xffvmnet1.,\x00') ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x4) socket$kcm(0x29, 0x5, 0x0) [ 78.497718] NET: Registered protocol family 30 [ 78.498617] audit: type=1400 audit(1559611805.822:38): avc: denied { associate } for pid=7861 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 78.502360] Failed to register TIPC socket type 01:30:06 executing program 0: r0 = socket(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_int(r0, 0x1, 0x1f, 0x0, &(0x7f0000000000)) [ 79.327052] IPVS: ftp: loaded support on port[0] = 21 01:30:06 executing program 0: r0 = socket(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_int(r0, 0x1, 0x1f, 0x0, &(0x7f0000000000)) [ 79.409539] NET: Registered protocol family 30 [ 79.458087] Failed to register TIPC socket type [ 79.529162] IPVS: ftp: loaded support on port[0] = 21 [ 79.567551] NET: Registered protocol family 30 [ 79.572204] Failed to register TIPC socket type 01:30:06 executing program 0: r0 = socket(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_int(r0, 0x1, 0x1f, 0x0, &(0x7f0000000000)) 01:30:07 executing program 0: r0 = socket(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_int(r0, 0x1, 0x1f, 0x0, &(0x7f0000000000)) 01:30:07 executing program 0: r0 = socket(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_int(r0, 0x1, 0x1f, 0x0, &(0x7f0000000000)) 01:30:07 executing program 0: r0 = socket(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_int(r0, 0x1, 0x1f, 0x0, &(0x7f0000000000)) 01:30:07 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0xffe7) [ 82.035581] IPVS: ftp: loaded support on port[0] = 21 [ 82.045166] NET: Registered protocol family 30 [ 82.049774] Failed to register TIPC socket type [ 83.307775] IPVS: ftp: loaded support on port[0] = 21 [ 83.316019] NET: Registered protocol family 30 [ 83.320610] Failed to register TIPC socket type [ 83.534664] IPVS: ftp: loaded support on port[0] = 21 [ 83.549701] NET: Registered protocol family 30 [ 83.562245] Failed to register TIPC socket type [ 83.717430] IPVS: ftp: loaded support on port[0] = 21 [ 83.730061] IPVS: ftp: loaded support on port[0] = 21 [ 83.739691] NET: Registered protocol family 30 [ 83.744636] Failed to register TIPC socket type [ 83.757923] NET: Registered protocol family 30 [ 83.762545] Failed to register TIPC socket type [ 84.361091] IPVS: ftp: loaded support on port[0] = 21 [ 84.378880] NET: Registered protocol family 30 [ 84.403882] Failed to register TIPC socket type [ 86.825412] IPVS: ftp: loaded support on port[0] = 21 [ 86.832809] NET: Registered protocol family 30 [ 86.837486] Failed to register TIPC socket type [ 87.383442] IPVS: ftp: loaded support on port[0] = 21 [ 87.391468] NET: Registered protocol family 30 [ 87.396120] Failed to register TIPC socket type [ 87.690099] IPVS: ftp: loaded support on port[0] = 21 [ 87.705218] IPVS: ftp: loaded support on port[0] = 21 [ 87.719271] NET: Registered protocol family 30 [ 87.724808] list_add double add: new=ffffffff892e7630, prev=ffffffff890f3140, next=ffffffff892e7630. [ 87.743894] ------------[ cut here ]------------ [ 87.744575] Failed to register TIPC socket type [ 87.748674] kernel BUG at lib/list_debug.c:29! [ 87.766689] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 87.772079] CPU: 1 PID: 8537 Comm: syz-executor.5 Not tainted 4.19.47 #19 [ 87.779003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.788372] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 87.793561] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 a0 ae 81 87 e8 d0 f3 30 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 e0 af 81 87 e8 b9 f3 30 fe <0f> 0b 48 89 f1 48 c7 c7 60 af 81 87 4c 89 e6 e8 a5 f3 30 fe 0f 0b [ 87.812463] RSP: 0018:ffff8880764b7b88 EFLAGS: 00010282 [ 87.817836] RAX: 0000000000000058 RBX: ffffffff892e74a0 RCX: 0000000000000000 [ 87.825101] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed100ec96f63 [ 87.832369] RBP: ffff8880764b7ba0 R08: 0000000000000058 R09: ffffed1015d24fe9 [ 87.839643] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffffffff892e7630 [ 87.846918] R13: ffffffff892e7630 R14: ffffffff892e7630 R15: ffffffff892e75d0 [ 87.854190] FS: 0000000000d89940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 87.862418] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 87.868296] CR2: 00007ffd232f50e8 CR3: 00000000752f2000 CR4: 00000000001406e0 [ 87.875568] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 87.882846] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 87.890118] Call Trace: [ 87.892718] ? mutex_lock_nested+0x16/0x20 [ 87.896981] proto_register+0x459/0x8e0 [ 87.900965] tipc_socket_init+0x1c/0x70 [ 87.904944] tipc_init_net+0x2ed/0x570 [ 87.908830] ? tipc_exit_net+0x40/0x40 [ 87.912849] ops_init+0xb3/0x410 [ 87.917532] setup_net+0x2d3/0x740 [ 87.921076] ? lock_acquire+0x16f/0x3f0 [ 87.925059] ? ops_init+0x410/0x410 [ 87.928696] copy_net_ns+0x1df/0x340 [ 87.932410] create_new_namespaces+0x400/0x7b0 [ 87.937003] unshare_nsproxy_namespaces+0xc2/0x200 [ 87.941938] ksys_unshare+0x440/0x980 [ 87.945739] ? walk_process_tree+0x2c0/0x2c0 [ 87.950159] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 87.954918] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.960285] ? do_syscall_64+0x26/0x620 [ 87.964262] ? lockdep_hardirqs_on+0x415/0x5d0 [ 87.968848] __x64_sys_unshare+0x31/0x40 [ 87.972923] do_syscall_64+0xfd/0x620 [ 87.976734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 87.978361] IPVS: ftp: loaded support on port[0] = 21 [ 87.981927] RIP: 0033:0x45bd47 [ 87.990301] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 88.009214] RSP: 002b:00007fff9cc368e8 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 88.016931] RAX: ffffffffffffffda RBX: 000000000075c9a8 RCX: 000000000045bd47 [ 88.024203] RDX: 0000000000000000 RSI: 00007fff9cc36890 RDI: 0000000040000000 [ 88.031478] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 88.038755] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000075c9a8 [ 88.046031] R13: 00007fff9cc36b58 R14: 0000000000000000 R15: 0000000000000000 [ 88.053315] Modules linked in: [ 88.057058] ---[ end trace 101ca5e147474e63 ]--- [ 88.061952] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 88.067262] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 a0 ae 81 87 e8 d0 f3 30 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 e0 af 81 87 e8 b9 f3 30 fe <0f> 0b 48 89 f1 48 c7 c7 60 af 81 87 4c 89 e6 e8 a5 f3 30 fe 0f 0b [ 88.086227] RSP: 0018:ffff8880764b7b88 EFLAGS: 00010282 [ 88.091584] RAX: 0000000000000058 RBX: ffffffff892e74a0 RCX: 0000000000000000 [ 88.098927] RDX: 0000000000000000 RSI: ffffffff81559f66 RDI: ffffed100ec96f63 [ 88.106249] RBP: ffff8880764b7ba0 R08: 0000000000000058 R09: ffffed1015d24fe9 [ 88.113587] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffffffff892e7630 [ 88.120871] R13: ffffffff892e7630 R14: ffffffff892e7630 R15: ffffffff892e75d0 [ 88.128217] FS: 0000000000d89940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 88.136527] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 88.142516] CR2: 00007ffd232f50e8 CR3: 00000000752f2000 CR4: 00000000001406e0 [ 88.149880] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 88.157232] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 88.164569] Kernel panic - not syncing: Fatal exception [ 88.170641] Kernel Offset: disabled [ 88.174270] Rebooting in 86400 seconds..