[ 112.961349][ T27] audit: type=1800 audit(1579354741.068:36): pid=10478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 113.693236][ T27] audit: type=1400 audit(1579354741.808:37): avc: denied { watch } for pid=10573 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.21' (ECDSA) to the list of known hosts. syzkaller login: [ 122.154733][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 122.154748][ T27] audit: type=1400 audit(1579354750.268:42): avc: denied { map } for pid=10668 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/01/18 13:39:10 parsed 1 programs [ 124.146057][ T27] audit: type=1400 audit(1579354752.258:43): avc: denied { map } for pid=10668 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=22467 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/01/18 13:39:12 executed programs: 0 [ 124.415349][T10686] IPVS: ftp: loaded support on port[0] = 21 [ 124.524308][T10686] chnl_net:caif_netlink_parms(): no params data found [ 124.571907][T10686] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.579434][T10686] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.587851][T10686] device bridge_slave_0 entered promiscuous mode [ 124.598821][T10686] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.606258][T10686] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.614678][T10686] device bridge_slave_1 entered promiscuous mode [ 124.641267][T10686] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 124.652605][T10686] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 124.674677][T10686] team0: Port device team_slave_0 added [ 124.682491][T10686] team0: Port device team_slave_1 added [ 124.752419][T10686] device hsr_slave_0 entered promiscuous mode [ 124.789687][T10686] device hsr_slave_1 entered promiscuous mode [ 124.886053][ T27] audit: type=1400 audit(1579354752.998:44): avc: denied { create } for pid=10686 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 124.902313][T10686] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 124.912719][ T27] audit: type=1400 audit(1579354753.018:45): avc: denied { write } for pid=10686 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 124.943647][ T27] audit: type=1400 audit(1579354753.018:46): avc: denied { read } for pid=10686 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 125.002937][T10686] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 125.062132][T10686] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 125.122339][T10686] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 125.203092][T10686] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.211169][T10686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.220221][T10686] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.227478][T10686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.274699][T10686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 125.291809][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.302543][ T2795] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.311593][ T2795] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.321297][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 125.335286][T10686] 8021q: adding VLAN 0 to HW filter on device team0 [ 125.346938][ T2915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.355915][ T2915] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.363332][ T2915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.377784][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.386685][ T2796] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.394157][ T2796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.420468][ T2915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 125.429118][ T2915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 125.438429][ T2915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.448505][ T2915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 125.460843][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.472659][T10686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 125.493204][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 125.501493][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 125.517149][T10686] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 125.536563][ T2915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 125.546464][ T2915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.568455][T10686] device veth0_vlan entered promiscuous mode [ 125.577686][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 125.586596][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.598159][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.606485][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.618566][T10686] device veth1_vlan entered promiscuous mode [ 125.635875][ T27] audit: type=1400 audit(1579354753.748:47): avc: denied { associate } for pid=10686 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 125.738767][ T27] audit: type=1400 audit(1579354753.848:48): avc: denied { create } for pid=10688 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 125.766516][ T27] audit: type=1400 audit(1579354753.878:49): avc: denied { write } for pid=10688 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 125.817104][T10694] ================================================================== [ 125.825575][T10694] BUG: KASAN: slab-out-of-bounds in bitmap_port_add+0xef/0xe60 [ 125.833477][T10694] Read of size 8 at addr ffff888094d6e280 by task syz-executor.0/10694 [ 125.842015][T10694] [ 125.844342][T10694] CPU: 1 PID: 10694 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 125.853016][T10694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.863067][T10694] Call Trace: [ 125.866572][T10694] dump_stack+0x197/0x210 [ 125.870952][T10694] ? bitmap_port_add+0xef/0xe60 [ 125.875888][T10694] print_address_description.constprop.0.cold+0xd4/0x30b [ 125.883022][T10694] ? bitmap_port_add+0xef/0xe60 [ 125.887871][T10694] ? bitmap_port_add+0xef/0xe60 [ 125.894823][T10694] __kasan_report.cold+0x1b/0x41 [ 125.899782][T10694] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 125.906030][T10694] ? bitmap_port_add+0xef/0xe60 [ 125.910883][T10694] kasan_report+0x12/0x20 [ 125.915229][T10694] check_memory_region+0x134/0x1a0 [ 125.920467][T10694] __kasan_check_read+0x11/0x20 [ 125.925335][T10694] bitmap_port_add+0xef/0xe60 [ 125.930014][T10694] bitmap_port_uadt+0x65d/0x8a0 [ 125.935042][T10694] ? bitmap_port_gc+0x4f0/0x4f0 [ 125.940071][T10694] ? bitmap_port_same_set+0x1a0/0x1a0 [ 125.945517][T10694] call_ad+0x1a0/0x5a0 [ 125.949633][T10694] ? start_msg+0x220/0x220 [ 125.954482][T10694] ? nla_memcpy+0xb0/0xb0 [ 125.958803][T10694] ? __nla_parse+0x43/0x60 [ 125.963341][T10694] ip_set_ad.isra.0+0x572/0xb20 [ 125.968218][T10694] ? ip_set_nfnl_get_byindex+0x460/0x460 [ 125.973862][T10694] ? nla_memcpy+0xb0/0xb0 [ 125.978256][T10694] ? lock_downgrade+0x920/0x920 [ 125.983296][T10694] ip_set_uadd+0x37/0x50 [ 125.987537][T10694] ? ip_set_udel+0x50/0x50 [ 125.991960][T10694] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 125.996957][T10694] ? nfnetlink_bind+0x2c0/0x2c0 [ 126.001805][T10694] ? avc_has_extended_perms+0x10f0/0x10f0 [ 126.007525][T10694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.013878][T10694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.020127][T10694] ? cred_has_capability+0x199/0x330 [ 126.025430][T10694] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 126.031063][T10694] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 126.036823][T10694] ? __local_bh_enable_ip+0x15a/0x270 [ 126.042206][T10694] ? cache_grow_begin.cold+0x10/0x2f [ 126.047492][T10694] netlink_rcv_skb+0x177/0x450 [ 126.052260][T10694] ? nfnetlink_bind+0x2c0/0x2c0 [ 126.057280][T10694] ? netlink_ack+0xb50/0xb50 [ 126.061867][T10694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.068116][T10694] ? ns_capable_common+0x93/0x100 [ 126.073184][T10694] ? ns_capable+0x20/0x30 [ 126.077505][T10694] ? __netlink_ns_capable+0x104/0x140 [ 126.083048][T10694] nfnetlink_rcv+0x1ba/0x460 [ 126.087624][T10694] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 126.093075][T10694] ? netlink_deliver_tap+0x24a/0xbe0 [ 126.098362][T10694] netlink_unicast+0x58c/0x7d0 [ 126.103129][T10694] ? netlink_attachskb+0x870/0x870 [ 126.108239][T10694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.114655][T10694] netlink_sendmsg+0x91c/0xea0 [ 126.119667][T10694] ? netlink_unicast+0x7d0/0x7d0 [ 126.124776][T10694] ? tomoyo_socket_sendmsg+0x26/0x30 [ 126.130068][T10694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.136402][T10694] ? security_socket_sendmsg+0x8d/0xc0 [ 126.141940][T10694] ? netlink_unicast+0x7d0/0x7d0 [ 126.146884][T10694] sock_sendmsg+0xd7/0x130 [ 126.151491][T10694] ____sys_sendmsg+0x753/0x880 [ 126.156361][T10694] ? kernel_sendmsg+0x50/0x50 [ 126.161144][T10694] ? __fget+0x35d/0x550 [ 126.165466][T10694] ? find_held_lock+0x35/0x130 [ 126.171209][T10694] ___sys_sendmsg+0x100/0x170 [ 126.175886][T10694] ? sendmsg_copy_msghdr+0x70/0x70 [ 126.181257][T10694] ? __kasan_check_read+0x11/0x20 [ 126.186282][T10694] ? __fget+0x37f/0x550 [ 126.190434][T10694] ? ksys_dup3+0x3e0/0x3e0 [ 126.194862][T10694] ? __fget_light+0x1a9/0x230 [ 126.199544][T10694] ? __fdget+0x1b/0x20 [ 126.203623][T10694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 126.209932][T10694] __sys_sendmsg+0x105/0x1d0 [ 126.214549][T10694] ? __sys_sendmsg_sock+0xc0/0xc0 [ 126.219604][T10694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 126.225099][T10694] ? do_syscall_64+0x26/0x790 [ 126.229779][T10694] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.235901][T10694] ? do_syscall_64+0x26/0x790 [ 126.240596][T10694] __x64_sys_sendmsg+0x78/0xb0 [ 126.245471][T10694] do_syscall_64+0xfa/0x790 [ 126.250040][T10694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.256069][T10694] RIP: 0033:0x45aff9 [ 126.259962][T10694] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 126.279735][T10694] RSP: 002b:00007fc902bb2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 126.288679][T10694] RAX: ffffffffffffffda RBX: 00007fc902bb36d4 RCX: 000000000045aff9 [ 126.296772][T10694] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 126.304876][T10694] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 126.313389][T10694] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 126.321464][T10694] R13: 00000000000008c8 R14: 00000000004c9dfc R15: 000000000075bf2c [ 126.329539][T10694] [ 126.331866][T10694] Allocated by task 10690: [ 126.336367][T10694] save_stack+0x23/0x90 [ 126.340516][T10694] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 126.346142][T10694] kasan_kmalloc+0x9/0x10 [ 126.350470][T10694] __kmalloc+0x163/0x770 [ 126.354713][T10694] ip_set_alloc+0x38/0x5e [ 126.359027][T10694] bitmap_port_create+0x3dc/0x7c0 [ 126.368756][T10694] ip_set_create+0x6f1/0x1500 [ 126.373448][T10694] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 126.378411][T10694] netlink_rcv_skb+0x177/0x450 [ 126.383898][T10694] nfnetlink_rcv+0x1ba/0x460 [ 126.388603][T10694] netlink_unicast+0x58c/0x7d0 [ 126.393357][T10694] netlink_sendmsg+0x91c/0xea0 [ 126.398101][T10694] sock_sendmsg+0xd7/0x130 [ 126.402508][T10694] ____sys_sendmsg+0x753/0x880 [ 126.407397][T10694] ___sys_sendmsg+0x100/0x170 [ 126.412058][T10694] __sys_sendmsg+0x105/0x1d0 [ 126.416740][T10694] __x64_sys_sendmsg+0x78/0xb0 [ 126.421557][T10694] do_syscall_64+0xfa/0x790 [ 126.426074][T10694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 126.431971][T10694] [ 126.434379][T10694] Freed by task 10472: [ 126.438464][T10694] save_stack+0x23/0x90 [ 126.442613][T10694] __kasan_slab_free+0x102/0x150 [ 126.447647][T10694] kasan_slab_free+0xe/0x10 [ 126.452150][T10694] kfree+0x10a/0x2c0 [ 126.456048][T10694] security_cred_free+0xa9/0x110 [ 126.460973][T10694] put_cred_rcu+0x129/0x4b0 [ 126.465588][T10694] rcu_core+0x570/0x1540 [ 126.469822][T10694] rcu_core_si+0x9/0x10 [ 126.474206][T10694] __do_softirq+0x262/0x98c [ 126.478691][T10694] [ 126.481006][T10694] The buggy address belongs to the object at ffff888094d6e280 [ 126.481006][T10694] which belongs to the cache kmalloc-32 of size 32 [ 126.495085][T10694] The buggy address is located 0 bytes inside of [ 126.495085][T10694] 32-byte region [ffff888094d6e280, ffff888094d6e2a0) [ 126.508347][T10694] The buggy address belongs to the page: [ 126.514003][T10694] page:ffffea0002535b80 refcount:1 mapcount:0 mapping:ffff8880aa4001c0 index:0xffff888094d6efc1 [ 126.524418][T10694] raw: 00fffe0000000200 ffffea00028549c8 ffffea000287c348 ffff8880aa4001c0 [ 126.533088][T10694] raw: ffff888094d6efc1 ffff888094d6e000 000000010000003f 0000000000000000 [ 126.541985][T10694] page dumped because: kasan: bad access detected [ 126.548386][T10694] [ 126.550875][T10694] Memory state around the buggy address: [ 126.556589][T10694] ffff888094d6e180: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 126.564859][T10694] ffff888094d6e200: fb fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 126.573016][T10694] >ffff888094d6e280: 04 fc fc fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 126.581313][T10694] ^ [ 126.585373][T10694] ffff888094d6e300: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 126.590110][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 126.593436][T10694] ffff888094d6e380: fb fb fb fb fc fc fc fc 00 00 01 fc fc fc fc fc [ 126.604236][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 126.609079][T10694] ================================================================== [ 126.609092][T10694] Disabling lock debugging due to kernel taint [ 126.630812][T10694] Kernel panic - not syncing: panic_on_warn set ... [ 126.637519][T10694] CPU: 1 PID: 10694 Comm: syz-executor.0 Tainted: G B 5.5.0-rc6-syzkaller #0 [ 126.647570][T10694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.657635][T10694] Call Trace: [ 126.660968][T10694] dump_stack+0x197/0x210 [ 126.665345][T10694] panic+0x2e3/0x75c [ 126.669240][T10694] ? add_taint.cold+0x16/0x16 [ 126.673981][T10694] ? trace_hardirqs_on+0x5e/0x240 [ 126.679025][T10694] ? trace_hardirqs_on+0x5e/0x240 [ 126.684181][T10694] ? bitmap_port_add+0xef/0xe60 [ 126.689016][T10694] end_report+0x47/0x4f [ 126.693173][T10694] ? bitmap_port_add+0xef/0xe60 [ 126.698082][T10694] __kasan_report.cold+0xe/0x41 [ 126.703115][T10694] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 126.709786][T10694] ? bitmap_port_add+0xef/0xe60 [ 126.714787][T10694] kasan_report+0x12/0x20 [ 126.719120][T10694] check_memory_region+0x134/0x1a0 [ 126.724229][T10694] __kasan_check_read+0x11/0x20 [ 126.729068][T10694] bitmap_port_add+0xef/0xe60 [ 126.733746][T10694] bitmap_port_uadt+0x65d/0x8a0 [ 126.738654][T10694] ? bitmap_port_gc+0x4f0/0x4f0 [ 126.743509][T10694] ? bitmap_port_same_set+0x1a0/0x1a0 [ 126.748910][T10694] call_ad+0x1a0/0x5a0 [ 126.752981][T10694] ? start_msg+0x220/0x220 [ 126.757743][T10694] ? nla_memcpy+0xb0/0xb0 [ 126.762071][T10694] ? __nla_parse+0x43/0x60 [ 126.766651][T10694] ip_set_ad.isra.0+0x572/0xb20 [ 126.771497][T10694] ? ip_set_nfnl_get_byindex+0x460/0x460 [ 126.777139][T10694] ? nla_memcpy+0xb0/0xb0 [ 126.781554][T10694] ? lock_downgrade+0x920/0x920 [ 126.786413][T10694] ip_set_uadd+0x37/0x50 [ 126.790652][T10694] ? ip_set_udel+0x50/0x50 [ 126.795075][T10694] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 126.800161][T10694] ? nfnetlink_bind+0x2c0/0x2c0 [ 126.805019][T10694] ? avc_has_extended_perms+0x10f0/0x10f0 [ 126.810742][T10694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.817770][T10694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.824018][T10694] ? cred_has_capability+0x199/0x330 [ 126.829313][T10694] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 126.834950][T10694] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 126.840577][T10694] ? __local_bh_enable_ip+0x15a/0x270 [ 126.846746][T10694] ? cache_grow_begin.cold+0x10/0x2f [ 126.852051][T10694] netlink_rcv_skb+0x177/0x450 [ 126.856829][T10694] ? nfnetlink_bind+0x2c0/0x2c0 [ 126.861678][T10694] ? netlink_ack+0xb50/0xb50 [ 126.866269][T10694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.872512][T10694] ? ns_capable_common+0x93/0x100 [ 126.877717][T10694] ? ns_capable+0x20/0x30 [ 126.882049][T10694] ? __netlink_ns_capable+0x104/0x140 [ 126.887428][T10694] nfnetlink_rcv+0x1ba/0x460 [ 126.892037][T10694] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 126.897508][T10694] ? netlink_deliver_tap+0x24a/0xbe0 [ 126.902793][T10694] netlink_unicast+0x58c/0x7d0 [ 126.907693][T10694] ? netlink_attachskb+0x870/0x870 [ 126.912807][T10694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.919066][T10694] netlink_sendmsg+0x91c/0xea0 [ 126.923984][T10694] ? netlink_unicast+0x7d0/0x7d0 [ 126.928970][T10694] ? tomoyo_socket_sendmsg+0x26/0x30 [ 126.934258][T10694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 126.940650][T10694] ? security_socket_sendmsg+0x8d/0xc0 [ 126.946229][T10694] ? netlink_unicast+0x7d0/0x7d0 [ 126.951156][T10694] sock_sendmsg+0xd7/0x130 [ 126.955588][T10694] ____sys_sendmsg+0x753/0x880 [ 126.960353][T10694] ? kernel_sendmsg+0x50/0x50 [ 126.965028][T10694] ? __fget+0x35d/0x550 [ 126.969181][T10694] ? find_held_lock+0x35/0x130 [ 126.973951][T10694] ___sys_sendmsg+0x100/0x170 [ 126.978633][T10694] ? sendmsg_copy_msghdr+0x70/0x70 [ 126.983742][T10694] ? __kasan_check_read+0x11/0x20 [ 126.989057][T10694] ? __fget+0x37f/0x550 [ 126.993311][T10694] ? ksys_dup3+0x3e0/0x3e0 [ 126.997715][T10694] ? __fget_light+0x1a9/0x230 [ 127.002533][T10694] ? __fdget+0x1b/0x20 [ 127.006589][T10694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 127.012848][T10694] __sys_sendmsg+0x105/0x1d0 [ 127.017457][T10694] ? __sys_sendmsg_sock+0xc0/0xc0 [ 127.022480][T10694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 127.027945][T10694] ? do_syscall_64+0x26/0x790 [ 127.032610][T10694] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 127.038833][T10694] ? do_syscall_64+0x26/0x790 [ 127.043510][T10694] __x64_sys_sendmsg+0x78/0xb0 [ 127.048279][T10694] do_syscall_64+0xfa/0x790 [ 127.052776][T10694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 127.058748][T10694] RIP: 0033:0x45aff9 [ 127.062814][T10694] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 127.082512][T10694] RSP: 002b:00007fc902bb2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 127.090933][T10694] RAX: ffffffffffffffda RBX: 00007fc902bb36d4 RCX: 000000000045aff9 [ 127.099861][T10694] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 127.107843][T10694] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 127.115813][T10694] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 127.123784][T10694] R13: 00000000000008c8 R14: 00000000004c9dfc R15: 000000000075bf2c [ 127.133518][T10694] Kernel Offset: disabled [ 127.137874][T10694] Rebooting in 86400 seconds..