Warning: Permanently added '10.128.0.153' (ECDSA) to the list of known hosts. 2020/02/10 07:13:50 parsed 1 programs 2020/02/10 07:13:52 executed programs: 0 [ 104.828120][ T9930] IPVS: ftp: loaded support on port[0] = 21 [ 104.886744][ T9930] chnl_net:caif_netlink_parms(): no params data found [ 104.922552][ T9930] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.930874][ T9930] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.938979][ T9930] device bridge_slave_0 entered promiscuous mode [ 104.947994][ T9930] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.955528][ T9930] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.963199][ T9930] device bridge_slave_1 entered promiscuous mode [ 104.980901][ T9930] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.991725][ T9930] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.011162][ T9930] team0: Port device team_slave_0 added [ 105.018694][ T9930] team0: Port device team_slave_1 added [ 105.033895][ T9930] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 105.041000][ T9930] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.067904][ T9930] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 105.080498][ T9930] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 105.087616][ T9930] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.113728][ T9930] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 105.186107][ T9930] device hsr_slave_0 entered promiscuous mode [ 105.223967][ T9930] device hsr_slave_1 entered promiscuous mode [ 105.328655][ T9930] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 105.396180][ T9930] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 105.436190][ T9930] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 105.495682][ T9930] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 105.546589][ T9930] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.553858][ T9930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.561942][ T9930] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.569112][ T9930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.612903][ T9930] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.626961][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.637473][ T3008] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.645817][ T3008] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.654882][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 105.667845][ T9930] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.678971][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.688072][ T2895] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.695420][ T2895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.706272][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.715566][ T3008] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.722600][ T3008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.745790][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.756389][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.765438][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 105.777468][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.789108][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.800727][ T9930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 105.819563][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 105.827624][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 105.840102][ T9930] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.859320][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.879354][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.888216][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.896393][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.908970][ T9930] device veth0_vlan entered promiscuous mode [ 105.921457][ T9930] device veth1_vlan entered promiscuous mode [ 105.943341][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 105.954231][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.968091][ T9930] device veth0_macvtap entered promiscuous mode [ 105.978485][ T9930] device veth1_macvtap entered promiscuous mode [ 105.994962][ T9930] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 106.002442][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 106.011321][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 106.019510][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 106.028444][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 106.040363][ T9930] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 106.048533][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 106.057784][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/02/10 07:13:57 executed programs: 80 2020/02/10 07:14:02 executed programs: 194 [ 118.408227][T11332] ================================================================== [ 118.416879][T11332] BUG: KASAN: use-after-free in sctp_sock_dump+0xaa3/0xb20 [ 118.425053][T11332] Read of size 8 at addr ffff8880a9171ca0 by task syz-executor.0/11332 [ 118.434731][T11332] [ 118.437115][T11332] CPU: 1 PID: 11332 Comm: syz-executor.0 Not tainted 5.5.0-syzkaller #0 [ 118.446613][T11332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.457432][T11332] Call Trace: [ 118.460898][T11332] dump_stack+0x197/0x210 [ 118.466177][T11332] ? sctp_sock_dump+0xaa3/0xb20 [ 118.471699][T11332] print_address_description.constprop.0.cold+0xd4/0x30b [ 118.478816][T11332] ? sctp_sock_dump+0xaa3/0xb20 [ 118.483826][T11332] ? sctp_sock_dump+0xaa3/0xb20 [ 118.489177][T11332] __kasan_report.cold+0x1b/0x32 [ 118.494630][T11332] ? sctp_sock_dump+0xaa3/0xb20 [ 118.499493][T11332] kasan_report+0x12/0x20 [ 118.504265][T11332] __asan_report_load8_noabort+0x14/0x20 [ 118.509895][T11332] sctp_sock_dump+0xaa3/0xb20 [ 118.515739][T11332] sctp_for_each_transport+0x2b4/0x350 [ 118.521528][T11332] ? sctp_tsp_dump_one+0x690/0x690 [ 118.527018][T11332] ? sctp_v6_copy_ip_options.cold+0x28/0x28 [ 118.533430][T11332] ? sctp_transport_get_next+0x150/0x150 [ 118.539619][T11332] ? sctp_for_each_endpoint+0x131/0x1c0 [ 118.545754][T11332] ? _raw_read_unlock_bh+0x2c/0x30 [ 118.552198][T11332] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 118.558403][T11332] ? sctp_for_each_endpoint+0x166/0x1c0 [ 118.564381][T11332] sctp_diag_dump+0x33e/0x450 [ 118.569118][T11332] ? sctp_diag_dump_one+0x4d0/0x4d0 [ 118.574870][T11332] ? kasan_kmalloc+0x9/0x10 [ 118.579635][T11332] ? __kmalloc_node_track_caller+0x4e/0x70 [ 118.585535][T11332] ? mutex_lock_nested+0x16/0x20 [ 118.590811][T11332] __inet_diag_dump+0x9e/0x130 [ 118.595659][T11332] inet_diag_dump+0x9b/0x110 [ 118.600794][T11332] netlink_dump+0x558/0xfb0 [ 118.606031][T11332] ? __netlink_sendskb+0xc0/0xc0 [ 118.611691][T11332] __netlink_dump_start+0x673/0x930 [ 118.616911][T11332] inet_diag_handler_cmd+0x262/0x320 [ 118.622203][T11332] ? inet_diag_rcv_msg_compat+0x350/0x350 [ 118.628046][T11332] ? sock_diag_rcv+0x1c/0x40 [ 118.632756][T11332] ? inet_diag_dump_compat+0x320/0x320 [ 118.638678][T11332] sock_diag_rcv_msg+0x319/0x410 [ 118.643644][T11332] netlink_rcv_skb+0x177/0x450 [ 118.648670][T11332] ? sock_diag_bind+0x80/0x80 [ 118.653659][T11332] ? netlink_ack+0xb50/0xb50 [ 118.658357][T11332] ? __kasan_check_read+0x11/0x20 [ 118.663408][T11332] sock_diag_rcv+0x2b/0x40 [ 118.669003][T11332] netlink_unicast+0x59e/0x7e0 [ 118.675692][T11332] ? netlink_attachskb+0x870/0x870 [ 118.680826][T11332] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 118.686559][T11332] ? __check_object_size+0x3d/0x437 [ 118.691770][T11332] netlink_sendmsg+0x91c/0xea0 [ 118.696536][T11332] ? netlink_unicast+0x7e0/0x7e0 [ 118.701460][T11332] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 118.707026][T11332] ? apparmor_socket_sendmsg+0x2a/0x30 [ 118.712535][T11332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 118.718782][T11332] ? security_socket_sendmsg+0x8d/0xc0 [ 118.724373][T11332] ? netlink_unicast+0x7e0/0x7e0 [ 118.729311][T11332] sock_sendmsg+0xd7/0x130 [ 118.733832][T11332] sock_write_iter+0x2cb/0x400 [ 118.738597][T11332] ? sock_sendmsg+0x130/0x130 [ 118.743299][T11332] ? common_file_perm+0x2f3/0x940 [ 118.748472][T11332] do_iter_readv_writev+0x5f8/0x8f0 [ 118.753901][T11332] ? no_seek_end_llseek_size+0x70/0x70 [ 118.759366][T11332] ? apparmor_file_permission+0x27/0x30 [ 118.765314][T11332] ? rw_verify_area+0x126/0x360 [ 118.770419][T11332] do_iter_write+0x184/0x610 [ 118.775372][T11332] ? dup_iter+0x260/0x260 [ 118.779872][T11332] vfs_writev+0x1b3/0x2f0 [ 118.784216][T11332] ? vfs_iter_write+0xb0/0xb0 [ 118.788906][T11332] ? __kasan_check_read+0x11/0x20 [ 118.794269][T11332] ? ksys_dup3+0x3e0/0x3e0 [ 118.798747][T11332] ? __kasan_check_read+0x11/0x20 [ 118.803789][T11332] ? __fget_light+0x1ad/0x270 [ 118.808489][T11332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 118.814733][T11332] do_writev+0x2b0/0x330 [ 118.819230][T11332] ? vfs_writev+0x2f0/0x2f0 [ 118.823897][T11332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 118.829360][T11332] ? do_syscall_64+0x26/0x790 [ 118.834135][T11332] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 118.840201][T11332] ? do_syscall_64+0x26/0x790 [ 118.845115][T11332] __x64_sys_writev+0x75/0xb0 [ 118.849900][T11332] do_syscall_64+0xfa/0x790 [ 118.854556][T11332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 118.860483][T11332] RIP: 0033:0x45b399 [ 118.864410][T11332] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 118.884375][T11332] RSP: 002b:00007f54a2c5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 118.893773][T11332] RAX: ffffffffffffffda RBX: 00007f54a2c5f6d4 RCX: 000000000045b399 [ 118.901741][T11332] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 000000000000000c [ 118.909713][T11332] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 118.917685][T11332] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 118.925651][T11332] R13: 0000000000000cdd R14: 00000000004c9cac R15: 000000000075c07c [ 118.933626][T11332] [ 118.935945][T11332] Allocated by task 11331: [ 118.940374][T11332] save_stack+0x23/0x90 [ 118.944530][T11332] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 118.950268][T11332] kasan_kmalloc+0x9/0x10 [ 118.954701][T11332] kmem_cache_alloc_trace+0x158/0x790 [ 118.960075][T11332] sctp_endpoint_new+0x79/0xc80 [ 118.964920][T11332] sctp_init_sock+0xd00/0x1460 [ 118.969691][T11332] inet6_create+0x9ce/0xf80 [ 118.974205][T11332] __sock_create+0x3ce/0x730 [ 118.978794][T11332] __sys_socket+0x103/0x220 [ 118.983782][T11332] __x64_sys_socket+0x73/0xb0 [ 118.988511][T11332] do_syscall_64+0xfa/0x790 [ 118.993308][T11332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 118.999189][T11332] [ 119.001531][T11332] Freed by task 11331: [ 119.005606][T11332] save_stack+0x23/0x90 [ 119.009759][T11332] __kasan_slab_free+0x102/0x150 [ 119.014693][T11332] kasan_slab_free+0xe/0x10 [ 119.019193][T11332] kfree+0x10a/0x2c0 [ 119.023128][T11332] sctp_endpoint_put+0x22d/0x2d0 [ 119.028055][T11332] sctp_endpoint_free+0x77/0x90 [ 119.033048][T11332] sctp_destroy_sock+0x9f/0x3e0 [ 119.037893][T11332] sctp_v6_destroy_sock+0x16/0x30 [ 119.042906][T11332] sk_common_release+0x6b/0x390 [ 119.047767][T11332] sctp_close+0x553/0x960 [ 119.052246][T11332] inet_release+0xed/0x200 [ 119.056759][T11332] inet6_release+0x53/0x80 [ 119.061187][T11332] __sock_release+0xce/0x280 [ 119.065796][T11332] sock_close+0x1e/0x30 [ 119.069938][T11332] __fput+0x2ff/0x890 [ 119.074085][T11332] ____fput+0x16/0x20 [ 119.078062][T11332] task_work_run+0x145/0x1c0 [ 119.082680][T11332] get_signal+0x206e/0x24f0 [ 119.087213][T11332] do_signal+0x87/0x1700 [ 119.091501][T11332] exit_to_usermode_loop+0x286/0x380 [ 119.096998][T11332] do_syscall_64+0x676/0x790 [ 119.101587][T11332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 119.107508][T11332] [ 119.109876][T11332] The buggy address belongs to the object at ffff8880a9171c00 [ 119.109876][T11332] which belongs to the cache kmalloc-512 of size 512 [ 119.123924][T11332] The buggy address is located 160 bytes inside of [ 119.123924][T11332] 512-byte region [ffff8880a9171c00, ffff8880a9171e00) [ 119.137187][T11332] The buggy address belongs to the page: [ 119.142856][T11332] page:ffffea0002a45c40 refcount:1 mapcount:0 mapping:ffff8880aa400a80 index:0x0 [ 119.151959][T11332] flags: 0xfffe0000000200(slab) [ 119.156852][T11332] raw: 00fffe0000000200 ffffea00028a09c8 ffffea000252cec8 ffff8880aa400a80 [ 119.165429][T11332] raw: 0000000000000000 ffff8880a9171000 0000000100000004 0000000000000000 [ 119.174002][T11332] page dumped because: kasan: bad access detected [ 119.180462][T11332] [ 119.183480][T11332] Memory state around the buggy address: [ 119.189120][T11332] ffff8880a9171b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 119.197206][T11332] ffff8880a9171c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 119.205263][T11332] >ffff8880a9171c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 119.213315][T11332] ^ [ 119.218473][T11332] ffff8880a9171d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 119.227085][T11332] ffff8880a9171d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 119.236335][T11332] ================================================================== [ 119.244948][T11332] Disabling lock debugging due to kernel taint [ 119.259218][T11332] Kernel panic - not syncing: panic_on_warn set ... [ 119.265924][T11332] CPU: 1 PID: 11332 Comm: syz-executor.0 Tainted: G B 5.5.0-syzkaller #0 [ 119.276275][T11332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.287179][T11332] Call Trace: [ 119.290827][T11332] dump_stack+0x197/0x210 [ 119.295167][T11332] panic+0x2e3/0x75c [ 119.299241][T11332] ? add_taint.cold+0x16/0x16 [ 119.304088][T11332] ? sctp_sock_dump+0xaa3/0xb20 [ 119.309030][T11332] ? preempt_schedule+0x4b/0x60 [ 119.313871][T11332] ? ___preempt_schedule+0x16/0x18 [ 119.318970][T11332] ? trace_hardirqs_on+0x5e/0x240 [ 119.323999][T11332] ? sctp_sock_dump+0xaa3/0xb20 [ 119.328989][T11332] end_report+0x47/0x4f [ 119.333506][T11332] ? sctp_sock_dump+0xaa3/0xb20 [ 119.338411][T11332] __kasan_report.cold+0xe/0x32 [ 119.343270][T11332] ? sctp_sock_dump+0xaa3/0xb20 [ 119.348115][T11332] kasan_report+0x12/0x20 [ 119.352576][T11332] __asan_report_load8_noabort+0x14/0x20 [ 119.358824][T11332] sctp_sock_dump+0xaa3/0xb20 [ 119.363722][T11332] sctp_for_each_transport+0x2b4/0x350 [ 119.370076][T11332] ? sctp_tsp_dump_one+0x690/0x690 [ 119.375183][T11332] ? sctp_v6_copy_ip_options.cold+0x28/0x28 [ 119.381341][T11332] ? sctp_transport_get_next+0x150/0x150 [ 119.387704][T11332] ? sctp_for_each_endpoint+0x131/0x1c0 [ 119.393404][T11332] ? _raw_read_unlock_bh+0x2c/0x30 [ 119.398527][T11332] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 119.404558][T11332] ? sctp_for_each_endpoint+0x166/0x1c0 [ 119.410383][T11332] sctp_diag_dump+0x33e/0x450 [ 119.415240][T11332] ? sctp_diag_dump_one+0x4d0/0x4d0 [ 119.420433][T11332] ? kasan_kmalloc+0x9/0x10 [ 119.424970][T11332] ? __kmalloc_node_track_caller+0x4e/0x70 [ 119.431106][T11332] ? mutex_lock_nested+0x16/0x20 [ 119.436894][T11332] __inet_diag_dump+0x9e/0x130 [ 119.441788][T11332] inet_diag_dump+0x9b/0x110 [ 119.446738][T11332] netlink_dump+0x558/0xfb0 [ 119.451332][T11332] ? __netlink_sendskb+0xc0/0xc0 [ 119.456329][T11332] __netlink_dump_start+0x673/0x930 [ 119.462671][T11332] inet_diag_handler_cmd+0x262/0x320 [ 119.468210][T11332] ? inet_diag_rcv_msg_compat+0x350/0x350 [ 119.474107][T11332] ? sock_diag_rcv+0x1c/0x40 [ 119.479072][T11332] ? inet_diag_dump_compat+0x320/0x320 [ 119.484717][T11332] sock_diag_rcv_msg+0x319/0x410 [ 119.489797][T11332] netlink_rcv_skb+0x177/0x450 [ 119.494700][T11332] ? sock_diag_bind+0x80/0x80 [ 119.499493][T11332] ? netlink_ack+0xb50/0xb50 [ 119.504556][T11332] ? __kasan_check_read+0x11/0x20 [ 119.509667][T11332] sock_diag_rcv+0x2b/0x40 [ 119.514347][T11332] netlink_unicast+0x59e/0x7e0 [ 119.519308][T11332] ? netlink_attachskb+0x870/0x870 [ 119.524878][T11332] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 119.530730][T11332] ? __check_object_size+0x3d/0x437 [ 119.536106][T11332] netlink_sendmsg+0x91c/0xea0 [ 119.540865][T11332] ? netlink_unicast+0x7e0/0x7e0 [ 119.545910][T11332] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 119.551792][T11332] ? apparmor_socket_sendmsg+0x2a/0x30 [ 119.557276][T11332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 119.563545][T11332] ? security_socket_sendmsg+0x8d/0xc0 [ 119.569455][T11332] ? netlink_unicast+0x7e0/0x7e0 [ 119.575102][T11332] sock_sendmsg+0xd7/0x130 [ 119.579523][T11332] sock_write_iter+0x2cb/0x400 [ 119.585180][T11332] ? sock_sendmsg+0x130/0x130 [ 119.592544][T11332] ? common_file_perm+0x2f3/0x940 [ 119.597825][T11332] do_iter_readv_writev+0x5f8/0x8f0 [ 119.603348][T11332] ? no_seek_end_llseek_size+0x70/0x70 [ 119.609122][T11332] ? apparmor_file_permission+0x27/0x30 [ 119.615108][T11332] ? rw_verify_area+0x126/0x360 [ 119.619980][T11332] do_iter_write+0x184/0x610 [ 119.624856][T11332] ? dup_iter+0x260/0x260 [ 119.629376][T11332] vfs_writev+0x1b3/0x2f0 [ 119.635009][T11332] ? vfs_iter_write+0xb0/0xb0 [ 119.639697][T11332] ? __kasan_check_read+0x11/0x20 [ 119.644779][T11332] ? ksys_dup3+0x3e0/0x3e0 [ 119.649365][T11332] ? __kasan_check_read+0x11/0x20 [ 119.655347][T11332] ? __fget_light+0x1ad/0x270 [ 119.660384][T11332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 119.666639][T11332] do_writev+0x2b0/0x330 [ 119.670918][T11332] ? vfs_writev+0x2f0/0x2f0 [ 119.675413][T11332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 119.680857][T11332] ? do_syscall_64+0x26/0x790 [ 119.685601][T11332] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 119.691663][T11332] ? do_syscall_64+0x26/0x790 [ 119.696340][T11332] __x64_sys_writev+0x75/0xb0 [ 119.702294][T11332] do_syscall_64+0xfa/0x790 [ 119.706806][T11332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 119.712811][T11332] RIP: 0033:0x45b399 [ 119.716885][T11332] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 119.736608][T11332] RSP: 002b:00007f54a2c5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 119.745013][T11332] RAX: ffffffffffffffda RBX: 00007f54a2c5f6d4 RCX: 000000000045b399 [ 119.752988][T11332] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 000000000000000c [ 119.761149][T11332] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 119.769243][T11332] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 119.777378][T11332] R13: 0000000000000cdd R14: 00000000004c9cac R15: 000000000075c07c [ 119.786502][T11332] Kernel Offset: disabled [ 119.790893][T11332] Rebooting in 86400 seconds..