[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 94.099829] audit: type=1800 audit(1548009393.145:25): pid=10206 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 94.118979] audit: type=1800 audit(1548009393.155:26): pid=10206 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 94.138453] audit: type=1800 audit(1548009393.175:27): pid=10206 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.227' (ECDSA) to the list of known hosts. 2019/01/20 18:36:46 fuzzer started 2019/01/20 18:36:51 dialing manager at 10.128.0.26:39359 2019/01/20 18:36:52 syscalls: 1 2019/01/20 18:36:52 code coverage: enabled 2019/01/20 18:36:52 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/01/20 18:36:52 extra coverage: extra coverage is not supported by the kernel 2019/01/20 18:36:52 setuid sandbox: enabled 2019/01/20 18:36:52 namespace sandbox: enabled 2019/01/20 18:36:52 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/20 18:36:52 fault injection: enabled 2019/01/20 18:36:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/20 18:36:52 net packet injection: enabled 2019/01/20 18:36:52 net device setup: enabled 18:39:40 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x2, {0x2, 0x0, @broadcast}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x79, 0x7}) syzkaller login: [ 282.206996] IPVS: ftp: loaded support on port[0] = 21 [ 282.373292] chnl_net:caif_netlink_parms(): no params data found [ 282.450228] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.456948] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.465515] device bridge_slave_0 entered promiscuous mode [ 282.474946] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.481470] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.489874] device bridge_slave_1 entered promiscuous mode [ 282.525549] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 282.537881] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 282.570279] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 282.579279] team0: Port device team_slave_0 added [ 282.586561] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 282.595283] team0: Port device team_slave_1 added [ 282.601594] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 282.610749] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 282.725768] device hsr_slave_0 entered promiscuous mode [ 282.802833] device hsr_slave_1 entered promiscuous mode [ 282.973299] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 282.980995] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 283.011313] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.017926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.025299] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.031897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.123808] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 283.129929] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.144032] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 283.157473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.168149] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.176875] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.187481] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 283.206866] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 283.213026] 8021q: adding VLAN 0 to HW filter on device team0 [ 283.230218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.239022] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.245624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.284375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.292791] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.299281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.315260] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.324484] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 283.342881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 283.359478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 283.368901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 283.377615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.393973] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 283.405025] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 283.417289] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 283.423541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 283.434071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 283.442954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 283.475167] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 283.498547] 8021q: adding VLAN 0 to HW filter on device batadv0 18:39:42 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 18:39:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_emit_ethernet(0x207843, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300002, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 18:39:43 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 18:39:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x800000000105082) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='eth0-(eth0:\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f00000005c0)='./file0\x00') readahead(r0, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x102000000) 18:39:43 executing program 0: fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000100)=0x2, 0x497) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, 0x0, 0x0) [ 284.562302] hrtimer: interrupt took 32298 ns 18:39:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x4000) timerfd_gettime(r1, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r2, r0}}, 0x18) [ 285.396035] QAT: Invalid ioctl [ 285.406297] QAT: Invalid ioctl 18:39:44 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x80}, 'port0\x00'}) fcntl$setflags(r0, 0x2, 0x1) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x280}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40505330, &(0x7f0000000140)={{0x0, 0x100000001}, {0x7e}}) socketpair$unix(0x1, 0x801, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) 18:39:44 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x101000, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x400, 0x0) fanotify_mark(r0, 0x20, 0x8000001, r1, &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="02000000016800000000000004000000efff0000100000000000000020000000000000"], 0x24, 0x0) fallocate(r0, 0x50, 0x3, 0x7) llistxattr(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)=""/175, 0xaf) mount(&(0x7f0000000180)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='hpfs\x00', 0x0, &(0x7f0000000280)='[cgroup#vmnet0{selinux:+self[lo/keyring\x00') ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000140)={0x1, 0x0, {0x4, 0x9, 0xffff, 0x10000}}) fchmod(r1, 0x121) 18:39:44 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000240)={0x6eb, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffff000, 0x1, 0x100}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000200), 0x10) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3, 0x0, &(0x7f0000000200)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10081, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0xffffffffffffffb4, @random="9cd5033bc08a"}) 18:39:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x8c, r2, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x65}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x804e}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={0x0, 0x80000001}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={r3, 0x40}, &(0x7f00000002c0)=0x8) fsetxattr$security_evm(r0, &(0x7f0000000300)='security.evm\x00', &(0x7f0000000340)=@v1={0x2, "841359"}, 0x4, 0x2) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000380)={0x40, 0x3, 0x5}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f00000003c0)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-net\x00', 0x2, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10042014}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x44, r2, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000580)={0x6001, 0x1000, 0x7ff, 0x0, 0x81}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000600)={0x2, 0x0, 0x2}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000640)={@local, @empty, @broadcast}, 0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000006c0)={r4, 0x38, &(0x7f0000000680)=[@in6={0xa, 0x4e22, 0x9, @empty, 0xffffffff}, @in6={0xa, 0x4e20, 0x8, @rand_addr="60d28eee7fcfa16782aabdf94d2a67e9", 0x3}]}, &(0x7f0000000700)=0x10) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000740), &(0x7f0000000780)=0x4) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f00000007c0)=""/67) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000840)=0x1, 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000880)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000008c0)={r5, 0x80000, r1}) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x4002000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x54, r2, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x8080}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000ac0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000a80)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000b00)={0x10, 0x30, 0xfa00, {&(0x7f0000000a40), 0x1, {0xa, 0x4e22, 0x40, @empty, 0x5f5b}, r7}}, 0x38) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000b40)) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000b80)=0x55) write$cgroup_int(r1, &(0x7f0000000bc0)=0x3, 0x12) ioctl$DRM_IOCTL_GET_MAP(r6, 0xc0286404, &(0x7f0000000c00)={&(0x7f0000ffe000/0x2000)=nil, 0xfffffffffffffe00, 0x7, 0x48, &(0x7f0000ffd000/0x1000)=nil, 0x9a8}) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/video0\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000d00)={'filter\x00', 0x0, 0x3, 0x2d, [], 0x0, &(0x7f0000000c80), &(0x7f0000000cc0)=""/45}, &(0x7f0000000d80)=0x78) [ 285.832006] ------------[ cut here ]------------ [ 285.836827] kernel BUG at mm/kmsan/kmsan.c:266! [ 285.841639] invalid opcode: 0000 [#1] SMP [ 285.845859] CPU: 0 PID: 10418 Comm: syz-executor0 Not tainted 5.0.0-rc1+ #7 [ 285.853008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.862469] RIP: 0010:kmsan_memcpy_memmove_metadata+0xefe/0xf10 [ 285.868590] Code: fb ff ff 48 8b 04 25 10 90 c3 8b 4c 01 e0 4c 8b 45 d0 48 bf 00 00 00 00 80 77 00 00 49 89 fa e9 54 f9 ff ff 0f 0b 0f 0b 0f 0b <0f> 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 [ 285.887541] RSP: 0018:ffff88806a8afca8 EFLAGS: 00010202 [ 285.892959] RAX: 0000000000000001 RBX: ffffc9009852e000 RCX: 999999e00000002e [ 285.900280] RDX: 00000003ffffffff RSI: 0000000000000176 RDI: 0000778000000000 [ 285.907620] RBP: ffff88806a8afd08 R08: ffffc9001852e000 R09: 0000000000000000 [ 285.914924] R10: 000040801852e000 R11: ffffc900185fffff R12: ffffc9001852e000 [ 285.922231] R13: 0000000000000000 R14: ffffc9001853d000 R15: 0000000000003760 [ 285.929554] FS: 00007f942a69b700(0000) GS:ffff88812fc00000(0000) knlGS:0000000000000000 [ 285.937829] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 285.943752] CR2: 0000000000738000 CR3: 000000006b153000 CR4: 00000000001406f0 [ 285.951083] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 285.958391] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 285.965722] Call Trace: [ 285.968395] kmsan_memcpy_metadata+0xb/0x10 [ 285.972774] __msan_memcpy+0x58/0x70 [ 285.976551] write_ldt+0xa3a/0xf00 [ 285.980208] __se_sys_modify_ldt+0xe8/0x580 [ 285.984610] ? syscall_return_slowpath+0xb2/0x650 [ 285.989542] ? __msan_get_context_state+0x9/0x20 [ 285.994362] __x64_sys_modify_ldt+0x45/0x60 [ 285.998735] do_syscall_64+0xbc/0xf0 [ 286.002563] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 286.007799] RIP: 0033:0x458099 [ 286.011059] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.029996] RSP: 002b:00007f942a69ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000009a [ 286.037750] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458099 [ 286.045065] RDX: 0000000000000010 RSI: 0000000020000240 RDI: 0000000000000011 [ 286.052378] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 286.059703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f942a69b6d4 [ 286.067008] R13: 00000000004c3ddf R14: 00000000004d6d90 R15: 00000000ffffffff [ 286.074320] Modules linked in: [ 286.079846] ---[ end trace d667758c8a741ac7 ]--- [ 286.084752] RIP: 0010:kmsan_memcpy_memmove_metadata+0xefe/0xf10 [ 286.090874] Code: fb ff ff 48 8b 04 25 10 90 c3 8b 4c 01 e0 4c 8b 45 d0 48 bf 00 00 00 00 80 77 00 00 49 89 fa e9 54 f9 ff ff 0f 0b 0f 0b 0f 0b <0f> 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 [ 286.110002] RSP: 0018:ffff88806a8afca8 EFLAGS: 00010202 [ 286.115493] RAX: 0000000000000001 RBX: ffffc9009852e000 RCX: 999999e00000002e [ 286.122884] RDX: 00000003ffffffff RSI: 0000000000000176 RDI: 0000778000000000 [ 286.130214] RBP: ffff88806a8afd08 R08: ffffc9001852e000 R09: 0000000000000000 [ 286.137669] R10: 000040801852e000 R11: ffffc900185fffff R12: ffffc9001852e000 [ 286.145081] R13: 0000000000000000 R14: ffffc9001853d000 R15: 0000000000003760 [ 286.152477] FS: 00007f942a69b700(0000) GS:ffff88812fc00000(0000) knlGS:0000000000000000 [ 286.160756] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 286.166802] CR2: 0000000000738000 CR3: 000000006b153000 CR4: 00000000001406f0 [ 286.174198] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 286.181525] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 286.188952] Kernel panic - not syncing: Fatal exception [ 286.195304] Kernel Offset: disabled [ 286.198966] Rebooting in 86400 seconds..