hrtimer: interrupt took 42283 ns WARNING: can't dereference registers at 00000000000000b8 for ip entry_SYSCALL_64_after_hwframe+0x46/0xbb syz-executor.1 (9542): drop_caches: 2 syz-executor.1 (9584): drop_caches: 2 syz-executor.1 (9612): drop_caches: 2 syz-executor.1 (9618): drop_caches: 2 IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue encrypted_key: keyword 'new' not allowed when called from .update method netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. syz-executor.4 (10208) used greatest stack depth: 24520 bytes left