[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 94.535284] audit: type=1800 audit(1551909834.586:25): pid=10561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 94.554514] audit: type=1800 audit(1551909834.586:26): pid=10561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 94.573947] audit: type=1800 audit(1551909834.606:27): pid=10561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. 2019/03/06 22:04:09 fuzzer started 2019/03/06 22:04:15 dialing manager at 10.128.0.26:41055 2019/03/06 22:04:15 syscalls: 1 2019/03/06 22:04:15 code coverage: enabled 2019/03/06 22:04:15 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/06 22:04:15 extra coverage: extra coverage is not supported by the kernel 2019/03/06 22:04:15 setuid sandbox: enabled 2019/03/06 22:04:15 namespace sandbox: enabled 2019/03/06 22:04:15 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/06 22:04:15 fault injection: enabled 2019/03/06 22:04:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/06 22:04:15 net packet injection: enabled 2019/03/06 22:04:15 net device setup: enabled 22:07:26 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x3d) syzkaller login: [ 307.633583] IPVS: ftp: loaded support on port[0] = 21 [ 307.800991] chnl_net:caif_netlink_parms(): no params data found [ 307.877330] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.884039] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.892587] device bridge_slave_0 entered promiscuous mode [ 307.902664] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.909175] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.917768] device bridge_slave_1 entered promiscuous mode [ 307.954016] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 307.965662] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 308.001959] team0: Port device team_slave_0 added [ 308.010791] team0: Port device team_slave_1 added [ 308.168724] device hsr_slave_0 entered promiscuous mode [ 308.302869] device hsr_slave_1 entered promiscuous mode [ 308.467914] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.474555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.481862] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.488406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.585729] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.609102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.620419] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.630103] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.644581] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 308.664961] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.684375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.692697] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.699190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.755871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.764542] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.771048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.781208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 308.791355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 308.800517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.816829] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 308.825269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.847625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 308.897627] 8021q: adding VLAN 0 to HW filter on device batadv0 22:07:29 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff) 22:07:29 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r1, r0) 22:07:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'nr0\x01\x00\x00\xdf\xcf\x00', 0x3001}) close(r0) 22:07:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'nr0\x01\x00\x00\xdf\xcf\x00', 0x3001}) close(r0) 22:07:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, 0x0, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x4, 0x0, 0x0) 22:07:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x331, 0x0) 22:07:31 executing program 0: r0 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x200, 0x74) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'batadv0\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="32cae4783d32"}, 0x14) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8a, 0x8101) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe, 0x4820000}, 0xc) sendto$inet6(r0, &(0x7f0000000680)="050300000600000000000000c52cf7c21975e697b02f08006b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cff0f0000000000008161a6fd8f24286a07d057c3be255b33142fdd4acc82", 0x4c, 0x0, 0x0, 0x0) 22:07:31 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x111040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000040)={{0x297f6c9, 0x1}, 'port0\x00', 0x28, 0x0, 0x1, 0x3, 0x8000, 0xff, 0x0, 0x0, 0x2}) ioctl$TIOCCONS(r0, 0x541d) r1 = getpgrp(0x0) sched_getscheduler(r1) capset(&(0x7f0000000100)={0x39980732, r1}, &(0x7f0000000140)={0x0, 0xeb, 0x92, 0x4, 0xf0c, 0xfdf}) r2 = syz_open_dev$admmidi(&(0x7f0000000500)='/dev/admmidi#\x00', 0x6a0, 0x4080) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000740)=[{&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000200)="4b91aa69b06c4627e2c4c130b8baf33ab110d298b43b3f22fc20d247497f07a58e976567693ff4bb45fc29967be5bb41825e6d53e9fb712bbee84753abc565c183dbe5e0abcd05480d53d5617760d0eddb42a6f23cb6ac48bea936deab97fc8fe066a06c", 0x64}, {&(0x7f0000000280)="e9004c79e40044ef0c7263df5f3583f7e66dbc9fa59fe47ee7affb3d65e7b8b3c54bbc878b777f9631080a392276aab98ef7e46a032d5275eb77c04142bbfcbc9711beea4ad3028b87ec447d2103804c603822506da51b3d5a82596f", 0x5c}, {&(0x7f0000000300)="8fe9af88a883544da0d211e28dec995af361f74065b37de861f702070da948a0c3f94765ca16c932d0c8516d5e7095d0360b3ad72002007708c96f07d629e002e9c84d1d0e2c4cfa5c4c95ca267c90ae4cdcef38437d9ad636e16775f69cca6eb2982a92e117e486fb3a79fa485e48f693901aed9ab73646557273e7de23c11ce77737bd6523b175a348936869358142a4dcafc25937e772ab8f1b54ed6518198e309425b637a826685869b3f51130bca3b94fc410b8bce2dd620482e590f89d3591eb6c6f1cfa12f35fa4c6725ae7e174fc147356d9009d8a75a5cc3650d1a4e758a7bf4b5e0fc7779f2820c031875536", 0xf1}, {&(0x7f0000000400)="f6a5f6804a6f584cf3a76a95dcff6b5961d15e6cec6e96f5c6d77f53c5cd9ec7cb2d91b2c91ea957c683da78b0cb48c96b21e45dc226d862d9ca26d6fe04f3d8a3b51a4e8bb848247c2f355326c78c3e264e09a4e89421f2b1bb4d6714d3f3d6c424385a8d4d451dd074d54e5513ec1c88a4e86354d22ba2bc4f0ad70bc3b9f62423492edd3378a09430172dc55e3ed7c65a65dccc80cc08482585fc4f8db51fe296f738d9eeda3dd119a1c86986a171", 0xb0}], 0x4, &(0x7f0000000680)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r2, r0, r0]}, @rights={0x10}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r1, r3, r4}], 0x88, 0x4008080}], 0x1, 0x40) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000780)={0x0, 0x3, 0x7fffffff, 0x3, 0x100, 0x44a0}, &(0x7f00000007c0)=0x14) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000800)={r5, 0x2}, 0x8) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000840)={0x9, 0x80000000, 0x400, 0xfffffffffffffffe, 0x3, 0x2}) modify_ldt$write2(0x11, &(0x7f0000000880)={0x7ff, 0xffffffffffffffff, 0x1000, 0x1, 0xe, 0x9, 0x0, 0x2, 0x2d, 0xfffffffffffffc00}, 0x10) sendmsg$unix(r0, &(0x7f0000000d40)={&(0x7f00000008c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000940)="2e6355e4b492d6503091d1f3ea9647a09597ea73e100b1df57719084a967dfa3bf2860ccc9d943aa21bb41e560a6baa4b2d88b95ae82cbb8", 0x38}, {&(0x7f0000000980)="5e63c00afcdabcff769d8dfb7c4551d9c749913fb7c8a4c660f367b62c", 0x1d}, {&(0x7f00000009c0)="a93cf963dd2e418f04302d84e0ff53e1379d89", 0x13}, {&(0x7f0000000a00)="4be115ebae66fb11dd60ebf9725aa64b2beafd0281c1b88319f602162ec4f06eaf158c8220b84bae0b3956b5955fb468253d72", 0x33}, {&(0x7f0000000a40)="28c8eacb3bf8d7f6f657e4e27f94f916bf73b464507033bab40473dceed2c42bcc39273ce2d23f531d07467d2715c53f5daee26cba02c72f395d7f903b42b8746fe885891ea2ca8d89758fb11d019175478ad7f03dfbe7b78fe5958f1c17a95b4256c77f64e563e6856845911b42f2699dab956e9e73b69f8fc51a943a00972094764ea96a7383a4b0bd61", 0x8b}, {&(0x7f0000000b00)="6a4b36bc1496ee420094a7465330c720ffe937b8ccf6e956538f255b2be1765f53065608e3cafd270a031586540f8f546d9b76470959e72077840afb552eb986801759af39246b9c54d65ed13ac9cebbed8b", 0x52}, {&(0x7f0000000b80)="e8b742003be7e9", 0x7}, {&(0x7f0000000bc0)}, {&(0x7f0000000c00)="56af6dff83bee9667019991191d63e", 0xf}], 0x9, &(0x7f0000000d00)=[@rights={0x18, 0x1, 0x1, [r0, r0]}], 0x18, 0x20008801}, 0x20000000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000d80)={{0x4b, 0x9}, {0x6, 0xd2}, 0x200, 0x1, 0x8}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000e00)={&(0x7f0000ffa000/0x3000)=nil, 0x6, 0x7, 0x1, &(0x7f0000ffb000/0x2000)=nil, 0x6}) fsetxattr$security_capability(r2, &(0x7f0000000e40)='security.capability\x00', &(0x7f0000000e80)=@v2={0x2000000, [{0xf76cc5f, 0xb33}, {0x2, 0x3}]}, 0x14, 0x1) perf_event_open(&(0x7f0000000ec0)={0x2, 0x70, 0x7, 0x48, 0x1ff, 0xfffffffffffffffb, 0x0, 0x65f, 0x24000, 0x1, 0x1f, 0x80000000, 0x0, 0x3, 0x3ff, 0x8000000, 0x100000000, 0x6, 0x3f, 0x100, 0x7, 0x6000000000, 0xd9, 0x100000001, 0x9, 0x200, 0x8, 0x9, 0x4, 0x8, 0x6, 0x271, 0xc7b, 0x2, 0x7, 0xff, 0x53, 0x950, 0x0, 0xfffffffffffffffa, 0x2, @perf_config_ext={0x7fffffff, 0x1}, 0x0, 0x11, 0x9, 0x1, 0x0, 0xa06, 0x200}, r1, 0x8, r0, 0x3) accept4(r0, 0x0, &(0x7f0000000f40), 0x80800) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x3) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000f80)={0x5, 0x1000, 0xcf, 0x5, 0x9}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000fc0)={'team0\x00'}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001000)='/dev/video2\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001040)={0x7fff, 0x0, 0x2d1, 0x2, r5}, 0x10) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000001080)={0x2, 0x0, 0x1}) sendmsg$tipc(r2, &(0x7f0000001480)={&(0x7f00000010c0)=@nameseq={0x1e, 0x1, 0x1}, 0x10, &(0x7f00000013c0)=[{&(0x7f0000001100)="b953b7003ae569", 0x7}, {&(0x7f0000001140)="03a3784724fe79f4c0ea3106636d3f0861f2e9cdadd3f1cdbbc2cac9ea4f585d7eea82bc8141f8065f17a8314600184e3d5bf734e056c2ae2a276c661aa39d5004e41996ffa93d46250ca60bdca7f03201760d5cbd38511950e3fef9f1b0360f7e38eb7e0c7d5d96e4e7cbdbb539ccd06a5445c506b65c3e9b8374e31d5fcbe4be1d2e0a52c45ef5b94885b018c68b8afee1751cc65d978289512daaa1479fec2128042bc4fc08511b692ba4f46fcc10261bcbfeb2c1974b15ff55bf87ea8bed0d962fb84f93540f213e4e", 0xcb}, {&(0x7f0000001240)="b46cdcca9ffd9841aef7fe34dcf8c4dc422cf6e863057271d04e47152fb030bd86cab1d2b06ed5a5ba085f3ea5f4d3a6f8c40479b8fb0238f9b6dc3b074ff99b803e7a3d4ff835df131357587871c42426121082d7e7673808bb25888217f0528a4c42be0a4330cbf43b52b255f3823d64872d3edf", 0x75}, {&(0x7f00000012c0)}, {&(0x7f0000001300)="fbb23383d2f733a79298e38b7b7f0133808cbb63d65a58c481c5978234aa154f767f0b60801cc5c3341f8fc04aaaed3f7342a2dbdb0b03d7465f797c58ff850badd08f260fadf22ab685e40340880146e0dfde89297b6cc2399b19987c4d0c4055daad34cf4f4351643dd21fc816d4a3a4dcfff3c0c6455a924fc96e660243149db0f083c87aceef9389e091f5b77a84831d501a232193cd61719e3d74a9d2e7766e9b57321e3ae895f0d65db4f6314348d2b7a369", 0xb5}], 0x5, &(0x7f0000001440)="eac49559ca", 0x5}, 0x5) r6 = request_key(&(0x7f00000014c0)='pkcs7_test\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='/dev/rfkill\x00', 0xfffffffffffffffe) r7 = request_key(&(0x7f0000001600)='id_legacy\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)='team0\x00', 0xffffffffffffffff) keyctl$search(0xa, r6, &(0x7f0000001580)='encrypted\x00', &(0x7f00000015c0)={'syz', 0x3}, r7) 22:07:31 executing program 0: unshare(0x20400) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) close(r0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) 22:07:31 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x202000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/exec\x00') r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@initdev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f00000004c0)=0xe8) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000140)={0xe, 0x0, 0x2, 0x100000000, 0x32, "7e34af834c4fc7b7b2901b61ae09258dd1d80e9fcd5fd4af078f50ba6844d55a2ced6c279c06cba484ebb3b744ec1d3dfcb7"}, 0x3e) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fchown(0xffffffffffffffff, 0x0, r3) fsetxattr$system_posix_acl(r2, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0000b57700008bbf5376ba8d1c5b9a819a92368b6d12ae5116fddf7c"], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r4, 0x24, &(0x7f00000001c0)={0x1, 0x3, 0x0, 0x3, r1}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) [ 311.661304] IPVS: ftp: loaded support on port[0] = 21 [ 311.884555] chnl_net:caif_netlink_parms(): no params data found 22:07:32 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x202000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/exec\x00') r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@initdev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f00000004c0)=0xe8) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000140)={0xe, 0x0, 0x2, 0x100000000, 0x32, "7e34af834c4fc7b7b2901b61ae09258dd1d80e9fcd5fd4af078f50ba6844d55a2ced6c279c06cba484ebb3b744ec1d3dfcb7"}, 0x3e) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fchown(0xffffffffffffffff, 0x0, r3) fsetxattr$system_posix_acl(r2, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0000b57700008bbf5376ba8d1c5b9a819a92368b6d12ae5116fddf7c"], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r4, 0x24, &(0x7f00000001c0)={0x1, 0x3, 0x0, 0x3, r1}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) [ 312.000647] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.007246] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.021914] device bridge_slave_0 entered promiscuous mode [ 312.046755] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.053480] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.062079] device bridge_slave_1 entered promiscuous mode [ 312.129138] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 312.143245] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 312.185285] team0: Port device team_slave_0 added [ 312.194100] team0: Port device team_slave_1 added [ 312.267330] device hsr_slave_0 entered promiscuous mode [ 312.303205] device hsr_slave_1 entered promiscuous mode 22:07:32 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x202000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/exec\x00') r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@initdev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f00000004c0)=0xe8) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000140)={0xe, 0x0, 0x2, 0x100000000, 0x32, "7e34af834c4fc7b7b2901b61ae09258dd1d80e9fcd5fd4af078f50ba6844d55a2ced6c279c06cba484ebb3b744ec1d3dfcb7"}, 0x3e) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fchown(0xffffffffffffffff, 0x0, r3) fsetxattr$system_posix_acl(r2, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0000b57700008bbf5376ba8d1c5b9a819a92368b6d12ae5116fddf7c"], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r4, 0x24, &(0x7f00000001c0)={0x1, 0x3, 0x0, 0x3, r1}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) [ 312.361277] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.367912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.375184] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.381776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.520125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.544813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 312.556373] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.581873] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.599374] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 22:07:32 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x202000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/exec\x00') r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@initdev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f00000004c0)=0xe8) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000140)={0xe, 0x0, 0x2, 0x100000000, 0x32, "7e34af834c4fc7b7b2901b61ae09258dd1d80e9fcd5fd4af078f50ba6844d55a2ced6c279c06cba484ebb3b744ec1d3dfcb7"}, 0x3e) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fchown(0xffffffffffffffff, 0x0, r3) fsetxattr$system_posix_acl(r2, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0000b57700008bbf5376ba8d1c5b9a819a92368b6d12ae5116fddf7c"], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r4, 0x24, &(0x7f00000001c0)={0x1, 0x3, 0x0, 0x3, r1}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) [ 312.644498] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.684773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.693499] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.699991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.764234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 312.772529] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.779023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.789012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 312.823313] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 312.833326] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 312.864722] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 312.875179] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 312.883897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 312.892633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 22:07:33 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x202000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/exec\x00') r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@initdev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f00000004c0)=0xe8) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000140)={0xe, 0x0, 0x2, 0x100000000, 0x32, "7e34af834c4fc7b7b2901b61ae09258dd1d80e9fcd5fd4af078f50ba6844d55a2ced6c279c06cba484ebb3b744ec1d3dfcb7"}, 0x3e) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fchown(0xffffffffffffffff, 0x0, r3) fsetxattr$system_posix_acl(r2, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0000b57700008bbf5376ba8d1c5b9a819a92368b6d12ae5116fddf7c"], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r4, 0x24, &(0x7f00000001c0)={0x1, 0x3, 0x0, 0x3, r1}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) [ 312.942396] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 312.949673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 22:07:33 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x202000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/exec\x00') r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@initdev, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f00000004c0)=0xe8) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000140)={0xe, 0x0, 0x2, 0x100000000, 0x32, "7e34af834c4fc7b7b2901b61ae09258dd1d80e9fcd5fd4af078f50ba6844d55a2ced6c279c06cba484ebb3b744ec1d3dfcb7"}, 0x3e) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fchown(0xffffffffffffffff, 0x0, r3) fsetxattr$system_posix_acl(r2, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0000b57700008bbf5376ba8d1c5b9a819a92368b6d12ae5116fddf7c"], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r4, 0x24, &(0x7f00000001c0)={0x1, 0x3, 0x0, 0x3, r1}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) [ 313.544798] ------------[ cut here ]------------ [ 313.549650] kernel BUG at mm/kmsan/kmsan.c:266! [ 313.554673] invalid opcode: 0000 [#1] SMP [ 313.558890] CPU: 0 PID: 10796 Comm: syz-executor.1 Not tainted 5.0.0+ #11 [ 313.565849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.575304] RIP: 0010:kmsan_memcpy_memmove_metadata+0xefe/0xf10 [ 313.581417] Code: fb ff ff 48 8b 04 25 10 90 c3 8b 4c 01 e0 4c 8b 45 d0 48 bf 00 00 00 00 80 77 00 00 49 89 fa e9 54 f9 ff ff 0f 0b 0f 0b 0f 0b <0f> 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 [ 313.600372] RSP: 0018:ffff888059c2fca8 EFLAGS: 00010246 [ 313.605787] RAX: 00000000001bf59e RBX: ffffc9009e5c2000 RCX: 0000000000000000 [ 313.613104] RDX: 0000000059786000 RSI: ffff888059786000 RDI: 0000778000000000 [ 313.620419] RBP: ffff888059c2fd08 R08: ffffc9001e5c2000 R09: 0000000000000000 [ 313.627737] R10: 0000778000000000 R11: ffffc9001e7fffff R12: ffffc9001e5c2000 [ 313.635050] R13: ffffc9001e5c2000 R14: ffffc9001e62b000 R15: 0000000000004000 [ 313.642368] FS: 00007fb2026a1700(0000) GS:ffff88812fc00000(0000) knlGS:0000000000000000 [ 313.650639] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 313.656561] CR2: 000000000073c000 CR3: 0000000059795000 CR4: 00000000001406f0 [ 313.663885] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 313.671191] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 313.678487] Call Trace: [ 313.681157] kmsan_memcpy_metadata+0xb/0x10 [ 313.685544] __msan_memcpy+0x58/0x70 [ 313.689315] write_ldt+0xa3a/0xf00 [ 313.692945] __se_sys_modify_ldt+0xe8/0x580 [ 313.697332] ? syscall_return_slowpath+0xb2/0x650 [ 313.702243] ? __msan_get_context_state+0x9/0x20 [ 313.707054] __x64_sys_modify_ldt+0x45/0x60 [ 313.711432] do_syscall_64+0xbc/0xf0 [ 313.715227] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 313.720460] RIP: 0033:0x457f29 [ 313.723707] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.742667] RSP: 002b:00007fb2026a0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000009a [ 313.750445] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 313.757757] RDX: 0000000000000010 RSI: 0000000020000880 RDI: 0000000000000011 [ 313.765065] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 313.772383] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb2026a16d4 [ 313.779698] R13: 00000000004c3ce5 R14: 00000000004d6ee8 R15: 00000000ffffffff [ 313.787020] Modules linked in: [ 313.790562] ---[ end trace 9cba271ad72d1689 ]--- [ 313.795479] RIP: 0010:kmsan_memcpy_memmove_metadata+0xefe/0xf10 [ 313.801691] Code: fb ff ff 48 8b 04 25 10 90 c3 8b 4c 01 e0 4c 8b 45 d0 48 bf 00 00 00 00 80 77 00 00 49 89 fa e9 54 f9 ff ff 0f 0b 0f 0b 0f 0b <0f> 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 [ 313.820754] RSP: 0018:ffff888059c2fca8 EFLAGS: 00010246 [ 313.826280] RAX: 00000000001bf59e RBX: ffffc9009e5c2000 RCX: 0000000000000000 [ 313.833692] RDX: 0000000059786000 RSI: ffff888059786000 RDI: 0000778000000000 [ 313.841014] RBP: ffff888059c2fd08 R08: ffffc9001e5c2000 R09: 0000000000000000 [ 313.848454] R10: 0000778000000000 R11: ffffc9001e7fffff R12: ffffc9001e5c2000 [ 313.855852] R13: ffffc9001e5c2000 R14: ffffc9001e62b000 R15: 0000000000004000 [ 313.863302] FS: 00007fb2026a1700(0000) GS:ffff88812fc00000(0000) knlGS:0000000000000000 [ 313.871739] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 313.877667] CR2: 000000000073c000 CR3: 0000000059795000 CR4: 00000000001406f0 [ 313.885120] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 313.892538] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 313.899847] Kernel panic - not syncing: Fatal exception [ 313.905994] Kernel Offset: disabled [ 313.909653] Rebooting in 86400 seconds..