WARNING: can't dereference registers at 00000000000002d3 for ip entry_SYSCALL_64_after_hwframe+0x46/0xbb audit: type=1800 audit(1608081627.266:3): pid=9604 uid=0 auid=0 ses=4 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=15755 res=0 audit: type=1804 audit(1608081627.286:4): pid=9604 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir253497141/syzkaller.CEx7n1/2/file0" dev="sda1" ino=15755 res=1 audit: type=1800 audit(1608081627.586:5): pid=9634 uid=0 auid=0 ses=4 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=15784 res=0 syz-executor.4 (9634) used greatest stack depth: 24640 bytes left audit: type=1804 audit(1608081627.616:6): pid=9634 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir253497141/syzkaller.CEx7n1/3/file0" dev="sda1" ino=15784 res=1 audit: type=1800 audit(1608081628.066:7): pid=9658 uid=0 auid=0 ses=4 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=15761 res=0 L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. audit: type=1804 audit(1608081628.086:8): pid=9658 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir253497141/syzkaller.CEx7n1/4/file0" dev="sda1" ino=15761 res=1 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. Cannot find del_set index 0 as target netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. ip_tables: iptables: counters copy to user failed while replacing table raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! ip_tables: iptables: counters copy to user failed while replacing table XFS (loop1): Invalid superblock magic number XFS (loop1): Invalid superblock magic number XFS (loop1): Invalid superblock magic number REISERFS warning (device loop5): sh-2011 read_super_block: can't find a reiserfs filesystem on (dev loop5, block 16, size 4096) REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) XFS (loop1): Invalid superblock magic number FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) EXT4-fs (loop3): 1 orphan inode deleted EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue nla_parse: 1 callbacks suppressed netlink: 136 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 136 bytes leftover after parsing attributes in process `syz-executor.1'. EXT4-fs (loop3): 1 orphan inode deleted EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue netlink: 136 bytes leftover after parsing attributes in process `syz-executor.1'. EXT4-fs (loop3): 1 orphan inode deleted EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue netlink: 136 bytes leftover after parsing attributes in process `syz-executor.1'. EXT4-fs (loop3): 1 orphan inode deleted EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue