Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. 2019/03/07 15:58:23 fuzzer started 2019/03/07 15:58:28 dialing manager at 10.128.0.26:34047 2019/03/07 15:58:28 syscalls: 1 2019/03/07 15:58:28 code coverage: enabled 2019/03/07 15:58:28 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/07 15:58:28 extra coverage: extra coverage is not supported by the kernel 2019/03/07 15:58:28 setuid sandbox: enabled 2019/03/07 15:58:28 namespace sandbox: enabled 2019/03/07 15:58:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/07 15:58:28 fault injection: enabled 2019/03/07 15:58:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/07 15:58:28 net packet injection: enabled 2019/03/07 15:58:28 net device setup: enabled 16:01:36 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0x0, 0x2000000005}) [ 306.063462] IPVS: ftp: loaded support on port[0] = 21 [ 306.224985] chnl_net:caif_netlink_parms(): no params data found [ 306.310392] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.317040] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.325547] device bridge_slave_0 entered promiscuous mode [ 306.335817] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.342321] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.350811] device bridge_slave_1 entered promiscuous mode [ 306.386741] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 306.398679] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 306.433216] team0: Port device team_slave_0 added [ 306.442044] team0: Port device team_slave_1 added [ 306.729257] device hsr_slave_0 entered promiscuous mode [ 306.964837] device hsr_slave_1 entered promiscuous mode [ 307.160056] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.166677] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.174185] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.180731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.218641] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.227494] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.302660] 8021q: adding VLAN 0 to HW filter on device bond0 [ 307.325047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 307.332804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.347727] 8021q: adding VLAN 0 to HW filter on device team0 [ 307.362101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 307.370804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.379218] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.385771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.436154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 307.444919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.453146] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.459696] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.467498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 307.476746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 307.485978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 307.495309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 307.504401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 307.513680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.522780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 307.531483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 307.546464] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 307.555164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 307.563584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 307.576531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 307.630828] 8021q: adding VLAN 0 to HW filter on device batadv0 16:01:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 16:01:39 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0405519, &(0x7f00000002c0)={{0x48, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0}) 16:01:39 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000400)={{0x7, 0x0, 0x0, 0x0, 'syz0\x00'}}) 16:01:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x12, 0x100000000000000}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 16:01:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x12, 0x100000000000000}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 16:01:40 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10400, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000200)=0xe8) bind$xdp(r0, &(0x7f0000000240)={0x2c, 0x4, r1, 0x1a, 0xffffffffffffff9c}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x4, &(0x7f0000000280)='^*:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000340)='/dev/dsp\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r2, r0, 0x0, 0x9, &(0x7f0000000300)='/dev/dsp\x00', r3}, 0x30) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r0, &(0x7f0000000400)="bc1032c23bdb4ba2ee3c408fb79f6de308dfaec47076c1b71713d8f56a2fef2b444555024265de6b329e606300bbfdbd5e66998af7a73cc1e3808f7180d2a676b5f0ca1a74e35f0e8bc5a6cb4789065c2ad4e34f21d559921ec11029a0504f12", &(0x7f0000000480)=""/254}, 0x18) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000005c0)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000600)={0x0, 0x69, "6876d3c66b0f376f686a31c593d6fe3b34b9188b87056ff88b929ffacabd4c76dba968b4075e049c0e235b27d8e54fefbed3d75ce2152347548cf7e223d39f66f4386965f92eb16312786c821a822a3923ce778746fc4f4579f8e12406869bebf341086954bbdf6e75"}, &(0x7f0000000680)=0x71) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000006c0)={r4, 0x6}, &(0x7f0000000700)=0x8) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000740)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000f80)=0x5) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)={0x15, 0x7, 0x0, 0x5, 0x1, r0, 0x6}, 0x2c) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000001000)) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000001040)) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001080)={r4, 0x8, 0xfffffffffffffff8, 0x3}, &(0x7f00000010c0)=0x10) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000001140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r5, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80022000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x2c, r6, 0x300, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x3ff, @bearer=@l2={'eth', 0x3a, 'eql\x00'}}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) clock_gettime(0x7, &(0x7f0000001240)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001280)={0xffffffffffffffff}, 0x111, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000001300)={0xf, 0x8, 0xfa00, {r7, 0x4}}, 0x10) fdatasync(r5) syz_open_dev$sg(&(0x7f0000001340)='/dev/sg#\x00', 0xffffffff00000000, 0x20000) ioctl$RTC_WIE_ON(r0, 0x700f) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000001380)=0x1, 0x4) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000013c0)=0x80000001, 0x4) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000001440)={0x34, 0x0, &(0x7f0000001400)}) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000001480)) [ 309.870521] IPVS: ftp: loaded support on port[0] = 21 [ 310.065624] chnl_net:caif_netlink_parms(): no params data found 16:01:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x12, 0x100000000000000}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 310.177146] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.183691] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.192181] device bridge_slave_0 entered promiscuous mode [ 310.216506] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.223077] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.231418] device bridge_slave_1 entered promiscuous mode [ 310.285285] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 310.299004] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 310.333704] team0: Port device team_slave_0 added [ 310.344503] team0: Port device team_slave_1 added [ 310.650477] device hsr_slave_0 entered promiscuous mode [ 310.895055] device hsr_slave_1 entered promiscuous mode 16:01:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x12, 0x100000000000000}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 311.274852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 311.294828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 311.302433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 311.314368] 8021q: adding VLAN 0 to HW filter on device team0 [ 311.326628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 311.335919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.344272] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.350772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.386707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 311.395023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 311.403543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.411863] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.418441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.427994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 311.437301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 311.446523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 311.455497] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 311.464468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 311.473395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 311.483743] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 311.500310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 311.508799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 311.525641] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 311.538598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 311.547920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 311.556388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 311.595544] 8021q: adding VLAN 0 to HW filter on device batadv0 16:01:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000080)={0x14, 0x0, "b8c38bcb307e19a985b4246e10a44899968dfcd93009ada6"}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x2, @ipv4={[], [], @local}, 0x2}}, 0x7, 0x1}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={r2, 0x8001}, &(0x7f0000000200)=0x8) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000240)={0xff, @empty, 0x4e21, 0x0, 'ovf\x00', 0x10, 0xfffffffffffff476, 0x64}, 0x2c) 16:01:43 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20040, 0x18) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000000c0)=@fragment={0xac, 0x0, 0x6, 0x94da, 0x0, 0x4, 0x66}, 0x8) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r2) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) 16:01:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x12, 0x100000000000000}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 16:01:43 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20040, 0x18) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000000c0)=@fragment={0xac, 0x0, 0x6, 0x94da, 0x0, 0x4, 0x66}, 0x8) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r2) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) 16:01:43 executing program 1: r0 = socket(0x6000800000000010, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40001, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x0, @addr=0x2}, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r2, 0x1}}, 0x18) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab80ff010052020000369321000300fd8ed69ad84e3d951eda008514fe050000000000ba6da9edf27595057d0000030510fa2c1e998656aa0700000046fe0000020704020800008c0000036c6c256f1a272f2e117c35ebc205214000a200040000897f78746758400600000000000000d7d556272f5baa000005de0d5b32c6436e7fbf6ab82088f8e1039fe280fc83be82f605f30c9ddef201082038f4f8b29d03ff46328326714d334f170e5bbab2ccd243f295ed946b57e583df150c3b0000000046a6a1ed7cf80a0000000000000000000000000000000000000008fbb468fb93314e04ff6923c0d333", 0xfc) readahead(r1, 0x800000000, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001480)=0x0) r4 = getpid() timerfd_settime(r1, 0x1, &(0x7f0000001500)={{0x77359400}}, &(0x7f0000001540)) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r1, &(0x7f00000014c0)={r1, r0, 0x7ff}) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000480)=""/4096, &(0x7f00000000c0)=0x1000) [ 312.487338] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 312.495138] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.1'. [ 312.512322] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 312.520052] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.1'. 16:01:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x8001, 0x30}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff31, &(0x7f00000001c0)={&(0x7f0000000500)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'ip6_vti0\x00'}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0xe98b}}, 0x0) 16:01:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000300)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000080)='./file0\x00', r1, r3) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x68, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev}, @in6, @in={0x2, 0x0, @dev}, @in, @in]}, 0x0) write(r0, &(0x7f0000000540)="150000000000080083a66dd2c86b6525000010", 0x13) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x501000, 0x0) write$P9_RGETATTR(r4, &(0x7f0000000580)={0xa0, 0x19, 0x1, {0x1003, {0x0, 0x4, 0x6}, 0x1e, r2, r3, 0x0, 0x99a, 0x7fff, 0x8, 0x401, 0x3, 0xc626, 0x9, 0x2, 0x10000, 0x9, 0x100000001, 0x2, 0xf8e, 0xd9}}, 0xa0) setxattr$security_smack_entry(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='security.SMACK64IPIN\x00', &(0x7f00000006c0)='ppp0^eth0:}%\x00', 0xd, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) r6 = getegid() r7 = socket$inet6(0xa, 0x7, 0x200) poll(&(0x7f0000000500)=[{r0, 0x400}, {r0}, {r0, 0x100}, {r7}, {r0, 0x2}], 0x5, 0x3) lchown(&(0x7f0000000000)='./file0\x00', r5, r6) 16:01:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)=0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}], {}, [{0x8, 0x7, r2}], {0x10, 0x5}, {0x20, 0x1}}, 0x34, 0xd212db7a8702e58) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="020b000007000000000021002d54166205001a00000c9a934d4fe600001000e0c99f3d653c00f0ff9da499df0005dc437eed486dd6000000"], 0x38}}, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000ac0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x458, 0x0, 0x430, 0x4f0, 0x430, 0x210, 0x5b0, 0x5b0, 0x5b0, 0x5b0, 0x5b0, 0x6, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x98, 0xc0}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@ip={@loopback, @initdev, 0x0, 0x0, 'rose0\x00', 'gre0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@initdev, @rand_addr, 0x0, 0x0, 'veth1_to_bond\x00', 'team_slave_1\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@uncond, 0x0, 0x98, 0xc0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b8) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0x3ff, 0x4) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000009c0), 0x4000000000002ab, 0x22, &(0x7f0000000a80)={0x0, r3+10000000}) 16:01:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x12, 0x100000000000000}, 0xfffffefd) 16:01:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') bind$alg(r0, &(0x7f0000000440)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x6) 16:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3b1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)={0x0, 0x8000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0xfffffffffffffee3) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60b40900000b0000060805023e0000000000ffe0"], 0x0) r4 = fcntl$dupfd(r1, 0x406, r1) faccessat(r4, &(0x7f0000000040)='./file0\x00', 0x100, 0x800) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 313.386048] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 16:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3b1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)={0x0, 0x8000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0xfffffffffffffee3) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60b40900000b0000060805023e0000000000ffe0"], 0x0) r4 = fcntl$dupfd(r1, 0x406, r1) faccessat(r4, &(0x7f0000000040)='./file0\x00', 0x100, 0x800) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3b1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)={0x0, 0x8000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0xfffffffffffffee3) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60b40900000b0000060805023e0000000000ffe0"], 0x0) r4 = fcntl$dupfd(r1, 0x406, r1) faccessat(r4, &(0x7f0000000040)='./file0\x00', 0x100, 0x800) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:01:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x12, 0x100000000000000}, 0xfffffefd) [ 314.129795] ------------[ cut here ]------------ [ 314.134636] kernel BUG at mm/kmsan/kmsan.c:266! [ 314.139488] invalid opcode: 0000 [#1] SMP [ 314.143699] CPU: 1 PID: 11296 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 314.150660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.160111] RIP: 0010:kmsan_memcpy_memmove_metadata+0xefe/0xf10 [ 314.166228] Code: fb ff ff 48 8b 04 25 10 90 c3 8b 4c 01 e0 4c 8b 45 d0 48 bf 00 00 00 00 80 77 00 00 49 89 fa e9 54 f9 ff ff 0f 0b 0f 0b 0f 0b <0f> 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 [ 314.185174] RSP: 0018:ffff888053b3f4a0 EFLAGS: 00010246 [ 314.190583] RAX: 00000000001c467a RBX: ffff8880da7a2000 RCX: 0000000000000000 [ 314.197896] RDX: 000000005a7b2000 RSI: ffff88805a7b2000 RDI: 0000778000000000 [ 314.205210] RBP: ffff888053b3f500 R08: ffff88805a7a2000 R09: 0000000000000000 [ 314.212096] BUG: non-zero pgtables_bytes on freeing mm: 28672 [ 314.212519] R10: 0000000000000160 R11: ffffffff8837aec0 R12: ffff88805a7a2000 16:01:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3b1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)={0x0, 0x8000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0xfffffffffffffee3) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60b40900000b0000060805023e0000000000ffe0"], 0x0) r4 = fcntl$dupfd(r1, 0x406, r1) faccessat(r4, &(0x7f0000000040)='./file0\x00', 0x100, 0x800) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 314.212549] R13: ffff88805a7a2000 R14: ffffc900202c1000 R15: 0000000000002000 [ 314.212597] FS: 00007f5e73e7a700(0000) GS:ffff88812fd00000(0000) knlGS:0000000000000000 [ 314.241262] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 314.247178] CR2: 00000000004cdeb0 CR3: 0000000090bfe000 CR4: 00000000001406e0 [ 314.254490] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 314.261797] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 314.269097] Call Trace: [ 314.271765] kmsan_memcpy_metadata+0xb/0x10 [ 314.276140] __msan_memcpy+0x58/0x70 [ 314.279917] default_write_copy_kernel+0xdf/0x150 [ 314.284819] interleaved_copy+0x1bf/0x1f0 [ 314.289013] ? fill_silence+0x420/0x420 [ 314.293050] __snd_pcm_lib_xfer+0x233b/0x33b0 [ 314.297608] ? __snd_pcm_lib_xfer+0x33b0/0x33b0 [ 314.302317] ? fill_silence+0x420/0x420 [ 314.306373] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 314.311629] snd_pcm_oss_write3+0x367/0x530 [ 314.316030] io_playback_transfer+0x18d/0x840 [ 314.320581] ? snd_pcm_plugin_build_io+0x730/0x730 [ 314.325566] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 314.330808] ? snd_pcm_plugin_build_io+0x730/0x730 [ 314.335793] snd_pcm_plug_write_transfer+0x598/0x750 [ 314.340968] snd_pcm_oss_write2+0x29c/0x9d0 [ 314.345357] snd_pcm_oss_write+0x60f/0x1450 [ 314.349759] ? snd_pcm_oss_read+0x1960/0x1960 [ 314.354320] __vfs_write+0x1e2/0xc20 [ 314.358100] ? rw_verify_area+0x35e/0x580 [ 314.362307] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 314.367548] vfs_write+0x481/0x920 [ 314.371151] __se_sys_write+0x17a/0x370 [ 314.375196] __x64_sys_write+0x4a/0x70 [ 314.379129] do_syscall_64+0xbc/0xf0 [ 314.382898] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.388130] RIP: 0033:0x457f29 [ 314.391367] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.410300] RSP: 002b:00007f5e73e79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 314.418062] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 314.425363] RDX: 00000000fffffefd RSI: 00000000200000c0 RDI: 0000000000000004 [ 314.432659] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 314.439967] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e73e7a6d4 [ 314.447268] R13: 00000000004c6ed7 R14: 00000000004dc798 R15: 00000000ffffffff [ 314.454571] Modules linked in: [ 314.458030] ---[ end trace 800a06623107ca3a ]--- [ 314.462853] RIP: 0010:kmsan_memcpy_memmove_metadata+0xefe/0xf10 [ 314.469022] Code: fb ff ff 48 8b 04 25 10 90 c3 8b 4c 01 e0 4c 8b 45 d0 48 bf 00 00 00 00 80 77 00 00 49 89 fa e9 54 f9 ff ff 0f 0b 0f 0b 0f 0b <0f> 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 [ 314.488091] RSP: 0018:ffff888053b3f4a0 EFLAGS: 00010246 [ 314.493505] RAX: 00000000001c467a RBX: ffff8880da7a2000 RCX: 0000000000000000 [ 314.500928] RDX: 000000005a7b2000 RSI: ffff88805a7b2000 RDI: 0000778000000000 [ 314.508307] RBP: ffff888053b3f500 R08: ffff88805a7a2000 R09: 0000000000000000 [ 314.515736] R10: 0000000000000160 R11: ffffffff8837aec0 R12: ffff88805a7a2000 [ 314.523057] R13: ffff88805a7a2000 R14: ffffc900202c1000 R15: 0000000000002000 [ 314.530486] FS: 00007f5e73e7a700(0000) GS:ffff88812fd00000(0000) knlGS:0000000000000000 [ 314.538826] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 314.544855] CR2: 00000000004cdeb0 CR3: 0000000090bfe000 CR4: 00000000001426e0 [ 314.552170] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 314.559591] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 314.566964] Kernel panic - not syncing: Fatal exception [ 314.573115] Kernel Offset: disabled [ 314.576780] Rebooting in 86400 seconds..