[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 26.792897] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 30.496185] random: sshd: uninitialized urandom read (32 bytes read) [ 30.919667] random: sshd: uninitialized urandom read (32 bytes read) [ 31.656563] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.24' (ECDSA) to the list of known hosts. [ 37.235648] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/12 17:22:47 fuzzer started [ 38.752110] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 17:22:50 dialing manager at 10.128.0.26:45425 2018/09/12 17:22:50 syscalls: 1 2018/09/12 17:22:50 code coverage: enabled 2018/09/12 17:22:50 comparison tracing: enabled 2018/09/12 17:22:50 setuid sandbox: enabled 2018/09/12 17:22:50 namespace sandbox: enabled 2018/09/12 17:22:50 fault injection: enabled 2018/09/12 17:22:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/12 17:22:50 net packed injection: enabled 2018/09/12 17:22:50 net device setup: enabled [ 42.109397] random: crng init done 17:26:33 executing program 5: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000140), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 17:26:33 executing program 0: prctl$seccomp(0x24, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000240)) keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000640)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0), 0x8) connect$pptp(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) dup(0xffffffffffffffff) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000300)=""/7, &(0x7f0000000340)=0x7) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 17:26:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="0a5cc80700315f85715070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={&(0x7f0000000500), 0xc, &(0x7f0000000540)={&(0x7f00000015c0)=@ipv4_newroute={0x30, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_MULTIPATH={0x14, 0x9, {0x8}}, @RTA_OIF={0x8}]}, 0x30}}, 0x0) 17:26:33 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x20, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240)) fcntl$getown(0xffffffffffffff9c, 0x9) getuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0)) lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000017c0)) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc) geteuid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 17:26:33 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) getpgid(0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000180)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 17:26:33 executing program 2: prctl$setmm(0x8, 0x2, &(0x7f0000ffe000/0x1000)=nil) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) accept$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000003c0)=0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in6=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000840)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000880)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000008c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/self/net/pfkey\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000b80)) socket$pptp(0x18, 0x1, 0x2) perf_event_open$cgroup(&(0x7f0000000c00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000bc0)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) syz_open_dev$usbmon(&(0x7f0000000c80)='/dev/usbmon#\x00', 0x0, 0x0) accept4$llc(0xffffffffffffff9c, &(0x7f0000000cc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000d00)=0x10, 0x0) timerfd_create(0x0, 0x0) creat(&(0x7f0000000d40)='./file0\x00', 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000d80)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000dc0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) getgid() openat$audio(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/audio\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x0, 0x300) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/snapshot\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/uhid\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000f80)) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000010c0)=0xe8) getgroups(0x0, &(0x7f0000001100)) perf_event_open(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) accept(0xffffffffffffff9c, &(0x7f0000001200)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000001280)=0x80) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000012c0)) stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000200)=@proc, 0xc, &(0x7f0000000b00), 0x0, &(0x7f0000001440)}, 0x0) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() accept$alg(0xffffffffffffffff, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) sysfs$2(0x2, 0x0, &(0x7f0000000180)=""/119) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 264.131475] kasan: CONFIG_KASAN_INLINE enabled [ 264.136417] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 264.143878] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 264.150127] CPU: 0 PID: 5588 Comm: syz-executor5 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 264.158528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.167901] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 264.172666] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 264.191588] RSP: 0018:ffff8801beab7928 EFLAGS: 00010203 [ 264.196960] RAX: dffffc0000000000 RBX: ffff8801cbe49d00 RCX: ffffffff8160aca1 [ 264.204235] RDX: 0004200000000002 RSI: ffffffff833deb15 RDI: 0021000000000016 [ 264.211508] RBP: ffff8801beab7948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 264.218780] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801d7aec240 [ 264.226072] R13: 002100000000000e R14: ffff8801cbe49d98 R15: ffff8801cbe49d98 [ 264.233347] FS: 0000000001a5d940(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 264.241577] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 264.247515] CR2: 0000000000482e00 CR3: 00000001c0bfe000 CR4: 00000000001406f0 [ 264.254792] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 264.262075] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 264.269348] Call Trace: [ 264.272056] vfs_get_tree+0x1cb/0x5c0 [ 264.275868] mq_create_mount+0xe3/0x190 [ 264.279856] mq_init_ns+0x15a/0x210 [ 264.283490] copy_ipcs+0x3d2/0x580 [ 264.287052] ? ipcns_get+0xe0/0xe0 [ 264.290609] ? do_mount+0x1db0/0x1db0 [ 264.294412] ? kmem_cache_alloc+0x33a/0x730 [ 264.298742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.304288] ? perf_event_namespaces+0x136/0x400 [ 264.309081] create_new_namespaces+0x376/0x900 [ 264.313673] ? sys_ni_syscall+0x20/0x20 [ 264.317655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.323201] ? ns_capable_common+0x13f/0x170 [ 264.327618] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 264.332643] ksys_unshare+0x79c/0x10b0 [ 264.336543] ? walk_process_tree+0x440/0x440 [ 264.340964] ? lock_downgrade+0x900/0x900 [ 264.345124] ? kasan_check_read+0x11/0x20 [ 264.349277] ? do_raw_spin_unlock+0xa7/0x2f0 [ 264.353695] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 264.358289] ? kasan_check_write+0x14/0x20 [ 264.362537] ? do_raw_read_unlock+0x3f/0x60 [ 264.366865] ? do_syscall_64+0x9a/0x820 [ 264.370849] ? do_syscall_64+0x9a/0x820 [ 264.374835] ? lockdep_hardirqs_on+0x421/0x5c0 [ 264.379425] ? trace_hardirqs_on+0xbd/0x310 [ 264.383753] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.389127] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 264.394592] ? __ia32_sys_prlimit64+0x8c0/0x8c0 [ 264.399278] __x64_sys_unshare+0x31/0x40 [ 264.403351] do_syscall_64+0x1b9/0x820 [ 264.407246] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.412633] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.417568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.422421] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.427451] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.432476] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.437505] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.442366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.447563] RIP: 0033:0x459d87 [ 264.450765] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.469671] RSP: 002b:00007ffebb77a4d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 264.477386] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459d87 [ 264.484661] RDX: 0000000000000000 RSI: 00007ffebb77a4e0 RDI: 0000000008000000 [ 264.491933] RBP: 0000000000930b28 R08: 0000000000000000 R09: 0000000000000018 [ 264.499340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 264.506701] R13: 0000000000412cc0 R14: 0000000000000000 R15: 0000000000000000 [ 264.513981] Modules linked in: [ 264.517249] ---[ end trace 29d3b306ddc734b6 ]--- [ 264.522065] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 264.526834] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 264.545901] RSP: 0018:ffff8801beab7928 EFLAGS: 00010203 [ 264.551307] RAX: dffffc0000000000 RBX: ffff8801cbe49d00 RCX: ffffffff8160aca1 [ 264.558604] RDX: 0004200000000002 RSI: ffffffff833deb15 RDI: 0021000000000016 [ 264.565881] RBP: ffff8801beab7948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 264.573179] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801d7aec240 [ 264.580501] R13: 002100000000000e R14: ffff8801cbe49d98 R15: ffff8801cbe49d98 [ 264.587802] FS: 0000000001a5d940(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 264.596052] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 264.601957] CR2: 0000000000482e00 CR3: 00000001c0bfe000 CR4: 00000000001406f0 [ 264.609259] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 264.616534] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 264.623826] Kernel panic - not syncing: Fatal exception [ 264.630221] Kernel Offset: disabled [ 264.633854] Rebooting in 86400 seconds..