./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2636636302 <...> Warning: Permanently added '10.128.0.54' (ED25519) to the list of known hosts. execve("./syz-executor2636636302", ["./syz-executor2636636302"], 0x7ffebae48ce0 /* 10 vars */) = 0 brk(NULL) = 0x555555caa000 brk(0x555555caad00) = 0x555555caad00 arch_prctl(ARCH_SET_FS, 0x555555caa380) = 0 set_tid_address(0x555555caa650) = 354 set_robust_list(0x555555caa660, 24) = 0 rseq(0x555555caaca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2636636302", 4096) = 28 getrandom("\x6b\xbf\x3b\x42\x9a\xd6\x7e\xe6", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555555caad00 brk(0x555555ccbd00) = 0x555555ccbd00 brk(0x555555ccc000) = 0x555555ccc000 mprotect(0x7fd534946000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555555caa650) = 355 ./strace-static-x86_64: Process 355 attached [pid 355] set_robust_list(0x555555caa660, 24) = 0 [pid 355] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 355] setpgid(0, 0) = 0 [pid 355] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 355] write(3, "1000", 4) = 4 [pid 355] close(3) = 0 [pid 355] openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3 [pid 355] ioctl(3, KVM_CREATE_VM, 0) = 4 [pid 355] dup(4) = 5 [pid 355] ioctl(5, KVM_CREATE_VCPU, 0) = 6 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20000000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20001000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20002000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20003000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20004000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20005000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20006000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20007000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20008000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20009000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x2000a000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x2000b000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x2000c000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x2000d000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x2000e000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x2000f000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20010000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20011000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20012000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20013000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20014000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20015000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20016000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20017000}) = 0 [pid 355] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20000000}) = 0 [pid 355] ioctl(-1, KVM_GET_SREGS, 0x7ffe3a485c40) = -1 EBADF (Bad file descriptor) [pid 355] ioctl(6, KVM_RUN, 0) = 0 [pid 355] exit_group(0) = ? [ 21.940983][ T23] audit: type=1400 audit(1711837838.270:66): avc: denied { execmem } for pid=354 comm="syz-executor263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.948119][ T23] audit: type=1400 audit(1711837838.270:67): avc: denied { read } for pid=355 comm="syz-executor263" name="kvm" dev="devtmpfs" ino=9220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 21.950092][ T355] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 21.953328][ T23] audit: type=1400 audit(1711837838.270:68): avc: denied { open } for pid=355 comm="syz-executor263" path="/dev/kvm" dev="devtmpfs" ino=9220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 21.961316][ T23] audit: type=1400 audit(1711837838.270:69): avc: denied { ioctl } for pid=355 comm="syz-executor263" path="/dev/kvm" dev="devtmpfs" ino=9220 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [pid 355] +++ exited with 0 +++ --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=355, si_uid=0, si_status=0, si_utime=0, si_stime=4} --- restart_syscall(<... resuming interrupted clone ...>) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 358 attached [pid 358] set_robust_list(0x555555caa660, 24) = 0 [pid 358] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 358] setpgid(0, 0) = 0 [pid 358] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 358] write(3, "1000", 4) = 4 [pid 358] close(3) = 0 [pid 358] openat(AT_FDCWD, "/dev/kvm", O_RDONLY) = 3 [pid 358] ioctl(3, KVM_CREATE_VM, 0 [pid 354] <... clone resumed>, child_tidptr=0x555555caa650) = 358 [pid 358] <... ioctl resumed>) = 4 [pid 358] dup(4) = 5 [pid 358] ioctl(5, KVM_CREATE_VCPU, 0) = 6 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=0, flags=0, guest_phys_addr=0, memory_size=4096, userspace_addr=0x20000000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=1, flags=0, guest_phys_addr=0x1000, memory_size=4096, userspace_addr=0x20001000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=2, flags=0, guest_phys_addr=0x2000, memory_size=4096, userspace_addr=0x20002000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=3, flags=0, guest_phys_addr=0x3000, memory_size=4096, userspace_addr=0x20003000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=4, flags=0, guest_phys_addr=0x4000, memory_size=4096, userspace_addr=0x20004000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=5, flags=0, guest_phys_addr=0x5000, memory_size=4096, userspace_addr=0x20005000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=6, flags=0, guest_phys_addr=0x6000, memory_size=4096, userspace_addr=0x20006000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=7, flags=0, guest_phys_addr=0x7000, memory_size=4096, userspace_addr=0x20007000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=8, flags=0, guest_phys_addr=0x8000, memory_size=4096, userspace_addr=0x20008000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=9, flags=0, guest_phys_addr=0x9000, memory_size=4096, userspace_addr=0x20009000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=10, flags=0, guest_phys_addr=0xfec00000, memory_size=4096, userspace_addr=0x2000a000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=11, flags=0, guest_phys_addr=0xb000, memory_size=4096, userspace_addr=0x2000b000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=12, flags=0, guest_phys_addr=0xc000, memory_size=4096, userspace_addr=0x2000c000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=13, flags=0, guest_phys_addr=0xd000, memory_size=4096, userspace_addr=0x2000d000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=14, flags=0, guest_phys_addr=0xe000, memory_size=4096, userspace_addr=0x2000e000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=15, flags=0, guest_phys_addr=0xf000, memory_size=4096, userspace_addr=0x2000f000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=16, flags=0, guest_phys_addr=0x10000, memory_size=4096, userspace_addr=0x20010000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=17, flags=0, guest_phys_addr=0x11000, memory_size=4096, userspace_addr=0x20011000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=18, flags=0, guest_phys_addr=0x12000, memory_size=4096, userspace_addr=0x20012000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=19, flags=0, guest_phys_addr=0x13000, memory_size=4096, userspace_addr=0x20013000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=20, flags=0, guest_phys_addr=0x14000, memory_size=4096, userspace_addr=0x20014000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=21, flags=0, guest_phys_addr=0x15000, memory_size=4096, userspace_addr=0x20015000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=22, flags=0, guest_phys_addr=0x16000, memory_size=4096, userspace_addr=0x20016000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=23, flags=0, guest_phys_addr=0x17000, memory_size=4096, userspace_addr=0x20017000}) = 0 [pid 358] ioctl(4, KVM_SET_USER_MEMORY_REGION, {slot=65537, flags=0, guest_phys_addr=0x30000, memory_size=65536, userspace_addr=0x20000000}) = 0 [pid 358] ioctl(-1, KVM_GET_SREGS, 0x7ffe3a485c40) = -1 EBADF (Bad file descriptor) [ 22.056573][ T358] BUG: kernel NULL pointer dereference, address: 0000000000000086 [ 22.064196][ T358] #PF: supervisor instruction fetch in kernel mode [ 22.070521][ T358] #PF: error_code(0x0010) - not-present page [ 22.076364][ T358] PGD 1dc0dd067 P4D 1dc0dd067 PUD 1dc0de067 PMD 0 [ 22.082762][ T358] Oops: 0010 [#1] PREEMPT SMP KASAN [ 22.087796][ T358] CPU: 1 PID: 358 Comm: syz-executor263 Not tainted 5.4.268-syzkaller-00011-g47710d1d3563 #0 [ 22.097774][ T358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 22.107957][ T358] RIP: 0010:0x86 [ 22.111340][ T358] Code: Bad RIP value. [ 22.115240][ T358] RSP: 0018:ffff8881dc17f308 EFLAGS: 00010086 [ 22.121145][ T358] RAX: ffff8881dc17f338 RBX: dffffc0000000000 RCX: ffff8881dc02ee40 [ 22.129042][ T358] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 22.136858][ T358] RBP: 0000000000000ec0 R08: ffffffff82315341 R09: ffffffff811c9085 [ 22.144684][ T358] R10: ffff8881dc02ee40 R11: 0000000000000002 R12: ffffffff84601550 [ 22.152569][ T358] R13: fffffe0000000ec8 R14: ffff8881dc1a8000 R15: fffffe0000000ecb [ 22.160575][ T358] FS: 0000555555caa380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 22.169347][ T358] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.175847][ T358] CR2: 000000000000005c CR3: 00000001dc58f000 CR4: 00000000003426a0 [ 22.184005][ T358] Call Trace: [ 22.187150][ T358] ? __die+0xb4/0x100 [ 22.190955][ T358] ? no_context+0xbda/0xe50 [ 22.195292][ T358] ? is_prefetch+0x4b0/0x4b0 [ 22.199717][ T358] ? rcu_preempt_deferred_qs+0xa4/0x2b0 [ 22.205110][ T358] ? __do_page_fault+0xa7d/0xbb0 [ 22.209883][ T358] ? vmx_spec_ctrl_restore_host+0x83/0xfd [ 22.215435][ T358] ? __bad_area_nosemaphore+0xc0/0x460 [ 22.220733][ T358] ? page_fault+0x2f/0x40 [ 22.224901][ T358] ? __entry_text_end+0x4/0x4 [ 22.229403][ T358] ? vmx_handle_exit_irqoff+0x45/0x220 [ 22.234714][ T358] ? check_preemption_disabled+0x91/0x320 [ 22.240255][ T358] ? handle_external_interrupt_irqoff+0x148/0x2f0 [ 22.246512][ T358] ? handle_external_interrupt_irqoff+0x12a/0x2f0 [ 22.252752][ T358] ? __entry_text_end+0x4/0x4 [ 22.257264][ T358] ? vcpu_enter_guest+0x2d06/0x9f70 [ 22.262296][ T358] ? check_preemption_disabled+0x9f/0x320 [ 22.268200][ T358] ? debug_smp_processor_id+0x20/0x20 [ 22.273424][ T358] ? __free_pages_ok+0x847/0x950 [ 22.278179][ T358] ? __kvm_set_memory_region+0xda6/0xf60 [ 22.283649][ T358] ? kvm_vm_ioctl_set_memory_region+0x67/0x90 [ 22.289557][ T358] ? do_vfs_ioctl+0x742/0x1720 [ 22.294150][ T358] ? __x64_sys_ioctl+0xd4/0x110 [ 22.298835][ T358] ? do_syscall_64+0xca/0x1c0 [ 22.303366][ T358] ? local_bh_enable+0x20/0x20 [ 22.307955][ T358] ? __free_one_page+0x7f3/0xa60 [ 22.312726][ T358] ? _raw_spin_unlock+0x49/0x60 [ 22.317425][ T358] ? check_preemption_disabled+0x9f/0x320 [ 22.322979][ T358] ? set_pageblock_migratetype+0x150/0x150 [ 22.328610][ T358] ? kvm_mmu_change_mmu_pages+0x2dc/0x320 [ 22.334841][ T358] ? debug_smp_processor_id+0x20/0x20 [ 22.340050][ T358] ? synchronize_srcu_expedited+0x20/0x20 [ 22.345621][ T358] ? check_preemption_disabled+0x9f/0x320 [ 22.351157][ T358] ? llist_add_batch+0x91/0xb0 [ 22.355774][ T358] ? generic_exec_single+0x280/0x3e0 [ 22.360884][ T358] ? smp_call_function_single+0x4a0/0x4a0 [ 22.366434][ T358] ? update_load_avg+0x40f/0x1210 [ 22.371390][ T358] ? check_preemption_disabled+0x9f/0x320 [ 22.376932][ T358] ? smp_call_function_single+0x388/0x4a0 [ 22.382575][ T358] ? loaded_vmcs_clear+0x80/0x80 [ 22.387349][ T358] ? generic_smp_call_function_single_interrupt+0x10/0x10 [ 22.394290][ T358] ? check_preemption_disabled+0x9f/0x320 [ 22.399842][ T358] ? loaded_vmcs_clear+0x80/0x80 [ 22.404624][ T358] ? debug_smp_processor_id+0x20/0x20 [ 22.409826][ T358] ? check_preempt_wakeup+0x4f6/0x9f0 [ 22.415042][ T358] ? get_cpu_entry_area+0x8/0x30 [ 22.419807][ T358] ? vmx_vcpu_load_vmcs+0x655/0x8b0 [ 22.424841][ T358] ? read_msr+0x40/0x40 [ 22.428843][ T358] ? check_preemption_disabled+0x9f/0x320 [ 22.434500][ T358] ? debug_smp_processor_id+0x20/0x20 [ 22.439772][ T358] ? kvm_arch_vcpu_ioctl_run+0x748/0x18d0 [ 22.445349][ T358] ? kvm_vcpu_ioctl+0x7f9/0xd10 [ 22.450014][ T358] ? create_vcpu_fd+0x120/0x120 [ 22.454708][ T358] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 22.459760][ T358] ? _raw_spin_lock_irqsave+0x210/0x210 [ 22.465133][ T358] ? cgroup_update_frozen+0x157/0xab0 [ 22.470350][ T358] ? cgroup_update_frozen+0x157/0xab0 [ 22.475550][ T358] ? cgroup_leave_frozen+0x13c/0x290 [ 22.480670][ T358] ? ptrace_stop+0x6ee/0xa30 [ 22.485184][ T358] ? create_vcpu_fd+0x120/0x120 [ 22.489963][ T358] ? do_vfs_ioctl+0x742/0x1720 [ 22.494555][ T358] ? ioctl_preallocate+0x250/0x250 [ 22.499510][ T358] ? check_preemption_disabled+0x153/0x320 [ 22.505447][ T358] ? syscall_trace_enter+0x650/0x940 [ 22.510562][ T358] ? do_syscall_64+0x1c0/0x1c0 [ 22.515166][ T358] ? switch_fpu_return+0x1d4/0x410 [ 22.520205][ T358] ? security_file_ioctl+0x7d/0xa0 [ 22.525146][ T358] ? __x64_sys_ioctl+0xd4/0x110 [ 22.529831][ T358] ? do_syscall_64+0xca/0x1c0 [ 22.534441][ T358] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 22.540329][ T358] Modules linked in: [ 22.544062][ T358] CR2: 0000000000000086 [ 22.548055][ T358] ---[ end trace f04910615cf9265f ]--- [ 22.553352][ T358] RIP: 0010:0x86 [ 22.556742][ T358] Code: Bad RIP value. [ 22.560643][ T358] RSP: 0018:ffff8881dc17f308 EFLAGS: 00010086 [ 22.566540][ T358] RAX: ffff8881dc17f338 RBX: dffffc0000000000 RCX: ffff8881dc02ee40 [ 22.574363][ T358] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 22.582174][ T358] RBP: 0000000000000ec0 R08: ffffffff82315341 R09: ffffffff811c9085 [ 22.590154][ T358] R10: ffff8881dc02ee40 R11: 0000000000000002 R12: ffffffff84601550 [ 22.598134][ T358] R13: fffffe0000000ec8 R14: ffff8881dc1a8000 R15: fffffe0000000ecb [ 22.606127][ T358] FS: 0000555555caa380(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 22.615080][ T358] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 22.621672][ T358] CR2: 000000000000005c CR3: 00000001dc58f000 CR4: 00000000003426a0 [ 22.629846][ T358] Kernel panic - not syncing: Fatal exception [ 22.636538][ T358] Kernel Offset: disabled [ 22.640668][ T358] Rebooting in 86400 seconds..