[ OK ] Started Getty on tty1. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.86' (ECDSA) to the list of known hosts. syzkaller login: [ 32.896176] IPVS: ftp: loaded support on port[0] = 21 [ 32.967055] chnl_net:caif_netlink_parms(): no params data found [ 33.058771] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.065397] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.072480] device bridge_slave_0 entered promiscuous mode [ 33.080849] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.087781] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.095676] device bridge_slave_1 entered promiscuous mode [ 33.112862] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 33.121947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 33.140447] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 33.147902] team0: Port device team_slave_0 added [ 33.153359] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 33.161840] team0: Port device team_slave_1 added [ 33.177109] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.183370] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.208804] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.220316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.226637] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.252132] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.263280] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 33.271058] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 33.290895] device hsr_slave_0 entered promiscuous mode [ 33.296767] device hsr_slave_1 entered promiscuous mode [ 33.302918] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 33.310362] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 33.376371] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.382940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.389956] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.396405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.429233] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 33.436853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.445843] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 33.454007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.463290] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.471265] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.478694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 33.489217] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 33.495660] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.505570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.513908] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.520308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.535112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.542735] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.549139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.559779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 33.572195] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 33.580404] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 33.589078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.599583] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.610635] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 33.617030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 33.627720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.641159] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 33.649084] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 33.655865] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 33.667721] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.679674] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 33.689789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.722666] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 33.730043] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 33.736794] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 33.745973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.753493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.761246] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.769867] device veth0_vlan entered promiscuous mode [ 33.779173] device veth1_vlan entered promiscuous mode [ 33.785441] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 33.794443] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 33.805970] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 33.815667] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 33.823045] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 33.831964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.841465] device veth0_macvtap entered promiscuous mode [ 33.848279] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 33.856373] device veth1_macvtap entered promiscuous mode [ 33.866131] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 33.876591] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 33.887489] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.894452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.902682] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 33.913624] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.921048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 34.010872] netlink: 24 bytes leftover after parsing attributes in process `syz-executor409'. [ 34.025795] netlink: 72 bytes leftover after parsing attributes in process `syz-executor409'. [ 34.037421] netlink: 8 bytes leftover after parsing attributes in process `syz-executor409'. [ 34.046274] FAULT_INJECTION: forcing a failure. [ 34.046274] name failslab, interval 1, probability 0, space 0, times 1 [ 34.057571] CPU: 1 PID: 8303 Comm: syz-executor409 Not tainted 4.19.211-syzkaller #0 [ 34.065657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 34.075006] Call Trace: [ 34.077592] dump_stack+0x1fc/0x2ef [ 34.081207] should_fail.cold+0xa/0xf [ 34.085000] ? setup_fault_attr+0x200/0x200 [ 34.089313] ? lock_acquire+0x170/0x3c0 [ 34.093285] __should_failslab+0x115/0x180 [ 34.097525] should_failslab+0x5/0x10 [ 34.101315] kmem_cache_alloc_trace+0x284/0x380 [ 34.106279] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 34.110855] qfq_change_class+0xd2b/0x16f0 [ 34.115092] ? qfq_deactivate_agg+0xa60/0xa60 [ 34.119595] ? ___ratelimit+0x319/0x590 [ 34.123560] ? nla_parse+0x1b2/0x290 [ 34.127263] ? qfq_deactivate_agg+0xa60/0xa60 [ 34.131741] tc_ctl_tclass+0x501/0xcd0 [ 34.135617] ? qdisc_create+0x1130/0x1130 [ 34.139746] ? rtnetlink_rcv_msg+0x3fe/0xb80 [ 34.144137] ? mutex_trylock+0x1a0/0x1a0 [ 34.148189] ? qdisc_create+0x1130/0x1130 [ 34.152321] rtnetlink_rcv_msg+0x453/0xb80 [ 34.156540] ? rtnl_calcit.isra.0+0x430/0x430 [ 34.161026] ? memcpy+0x35/0x50 [ 34.164293] ? netdev_pick_tx+0x2f0/0x2f0 [ 34.168433] ? __copy_skb_header+0x414/0x500 [ 34.172835] ? kfree_skbmem+0x140/0x140 [ 34.176798] netlink_rcv_skb+0x160/0x440 [ 34.180846] ? rtnl_calcit.isra.0+0x430/0x430 [ 34.185334] ? netlink_ack+0xae0/0xae0 [ 34.189215] netlink_unicast+0x4d5/0x690 [ 34.193262] ? netlink_sendskb+0x110/0x110 [ 34.197483] ? _copy_from_iter_full+0x229/0x7c0 [ 34.202138] ? __phys_addr_symbol+0x2c/0x70 [ 34.206454] ? __check_object_size+0x17b/0x3e0 [ 34.211022] netlink_sendmsg+0x6c3/0xc50 [ 34.215077] ? aa_af_perm+0x230/0x230 [ 34.218859] ? nlmsg_notify+0x1f0/0x1f0 [ 34.222817] ? kernel_recvmsg+0x220/0x220 [ 34.226955] ? nlmsg_notify+0x1f0/0x1f0 [ 34.230977] sock_sendmsg+0xc3/0x120 [ 34.234678] ___sys_sendmsg+0x7bb/0x8e0 [ 34.238723] ? check_preemption_disabled+0x41/0x280 [ 34.243719] ? copy_msghdr_from_user+0x440/0x440 [ 34.248478] ? proc_fail_nth_write+0x95/0x1d0 [ 34.253215] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 34.258129] ? mark_held_locks+0xf0/0xf0 [ 34.262173] ? __vfs_write+0xff/0x770 [ 34.265954] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 34.270869] ? common_file_perm+0x4e5/0x850 [ 34.275184] ? kernel_read+0x110/0x110 [ 34.279163] ? vm_insert_page+0x9c0/0x9c0 [ 34.283306] ? fsnotify+0x84e/0xe10 [ 34.286923] ? vfs_write+0x3d7/0x540 [ 34.290622] ? __fdget+0x1a0/0x230 [ 34.294161] __x64_sys_sendmsg+0x132/0x220 [ 34.298389] ? __sys_sendmsg+0x1b0/0x1b0 [ 34.302445] ? vfs_write+0x393/0x540 [ 34.306258] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 34.311745] ? trace_hardirqs_off_caller+0x6e/0x210 [ 34.316767] ? do_syscall_64+0x21/0x620 [ 34.320727] do_syscall_64+0xf9/0x620 [ 34.324514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.329683] RIP: 0033:0x7fc456b90e69 [ 34.333391] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 34.352297] RSP: 002b:00007fff2b505fe8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e executing program [ 34.360005] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fc456b90e69 [ 34.367265] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000006 [ 34.374515] RBP: 00007fff2b506000 R08: 0000000000000001 R09: 0000000000000001 [ 34.381765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 34.389014] R13: 00000000000f4240 R14: 0000000000000000 R15: 0000000000000000 [ 34.408241] netlink: 24 bytes leftover after parsing attributes in process `syz-executor409'. [ 34.454929] netlink: 72 bytes leftover after parsing attributes in process `syz-executor409'. [ 34.464837] ================================================================== [ 34.472302] BUG: KASAN: use-after-free in qfq_find_class+0x162/0x190 [ 34.478780] Read of size 4 at addr ffff88809bbde480 by task syz-executor409/8308 [ 34.486308] [ 34.487923] CPU: 1 PID: 8308 Comm: syz-executor409 Not tainted 4.19.211-syzkaller #0 [ 34.495779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 34.505111] Call Trace: [ 34.507685] dump_stack+0x1fc/0x2ef [ 34.511306] print_address_description.cold+0x54/0x219 [ 34.516570] kasan_report_error.cold+0x8a/0x1b9 [ 34.521224] ? qfq_find_class+0x162/0x190 [ 34.525385] __asan_report_load4_noabort+0x88/0x90 [ 34.530320] ? qfq_find_class+0x162/0x190 [ 34.534461] qfq_find_class+0x162/0x190 [ 34.538432] ? qdisc_match_from_root+0x182/0x280 [ 34.543180] tc_ctl_tclass+0x765/0xcd0 [ 34.547070] ? qdisc_create+0x1130/0x1130 [ 34.551209] ? rtnetlink_rcv_msg+0x3fe/0xb80 [ 34.555605] ? mutex_trylock+0x1a0/0x1a0 [ 34.559667] ? qdisc_create+0x1130/0x1130 [ 34.563809] rtnetlink_rcv_msg+0x453/0xb80 [ 34.568115] ? rtnl_calcit.isra.0+0x430/0x430 [ 34.572597] ? memcpy+0x35/0x50 [ 34.575884] ? netdev_pick_tx+0x2f0/0x2f0 [ 34.580015] ? __copy_skb_header+0x414/0x500 [ 34.584404] ? kfree_skbmem+0x140/0x140 [ 34.588369] netlink_rcv_skb+0x160/0x440 [ 34.592426] ? rtnl_calcit.isra.0+0x430/0x430 [ 34.596992] ? netlink_ack+0xae0/0xae0 [ 34.600861] netlink_unicast+0x4d5/0x690 [ 34.604908] ? netlink_sendskb+0x110/0x110 [ 34.609137] ? _copy_from_iter_full+0x229/0x7c0 [ 34.613785] ? __phys_addr_symbol+0x2c/0x70 [ 34.618087] ? __check_object_size+0x17b/0x3e0 [ 34.622652] netlink_sendmsg+0x6c3/0xc50 [ 34.626694] ? aa_af_perm+0x230/0x230 [ 34.630473] ? nlmsg_notify+0x1f0/0x1f0 [ 34.634426] ? kernel_recvmsg+0x220/0x220 [ 34.638568] ? nlmsg_notify+0x1f0/0x1f0 [ 34.642535] sock_sendmsg+0xc3/0x120 [ 34.646255] ___sys_sendmsg+0x7bb/0x8e0 [ 34.650226] ? copy_msghdr_from_user+0x440/0x440 [ 34.654983] ? apparmor_file_receive+0x160/0x160 [ 34.659726] ? __lockdep_init_map+0x100/0x5a0 [ 34.664208] ? check_preemption_disabled+0x41/0x280 [ 34.669206] ? mark_held_locks+0xf0/0xf0 [ 34.673258] ? percpu_counter_add_batch+0x126/0x180 [ 34.678272] ? alloc_empty_file+0xd7/0x170 [ 34.682489] ? errseq_sample+0x56/0x70 [ 34.686370] ? alloc_file+0x326/0x4d0 [ 34.690204] ? __fd_install+0x1b4/0x610 [ 34.694171] ? __fdget+0x1a0/0x230 [ 34.697703] __x64_sys_sendmsg+0x132/0x220 [ 34.702385] ? __sys_sendmsg+0x1b0/0x1b0 [ 34.706447] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 34.711794] ? trace_hardirqs_off_caller+0x6e/0x210 [ 34.716791] ? do_syscall_64+0x21/0x620 [ 34.721704] do_syscall_64+0xf9/0x620 [ 34.725664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.730838] RIP: 0033:0x7fc456b90e69 [ 34.734533] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 34.753421] RSP: 002b:00007fff2b505fe8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 34.761180] RAX: ffffffffffffffda RBX: 00007fff2b506020 RCX: 00007fc456b90e69 [ 34.768434] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000005 [ 34.775682] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 [ 34.782943] R10: 0000000000000001 R11: 0000000000000246 R12: 00007fff2b506010 [ 34.790208] R13: 00000000000f4240 R14: 00000000000084d1 R15: 00007fff2b505ff4 [ 34.797465] [ 34.799075] Allocated by task 8303: [ 34.802686] kmem_cache_alloc_trace+0x12f/0x380 [ 34.807334] qfq_change_class+0x885/0x16f0 [ 34.811560] tc_ctl_tclass+0x501/0xcd0 [ 34.815427] rtnetlink_rcv_msg+0x453/0xb80 [ 34.819641] netlink_rcv_skb+0x160/0x440 [ 34.823679] netlink_unicast+0x4d5/0x690 [ 34.827730] netlink_sendmsg+0x6c3/0xc50 [ 34.831773] sock_sendmsg+0xc3/0x120 [ 34.835479] ___sys_sendmsg+0x7bb/0x8e0 [ 34.839433] __x64_sys_sendmsg+0x132/0x220 [ 34.843647] do_syscall_64+0xf9/0x620 [ 34.847428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.852589] [ 34.854191] Freed by task 8303: [ 34.857451] kfree+0xcc/0x210 [ 34.860538] qfq_change_class+0x11ff/0x16f0 [ 34.864847] tc_ctl_tclass+0x501/0xcd0 [ 34.868721] rtnetlink_rcv_msg+0x453/0xb80 [ 34.872946] netlink_rcv_skb+0x160/0x440 [ 34.876987] netlink_unicast+0x4d5/0x690 [ 34.881038] netlink_sendmsg+0x6c3/0xc50 [ 34.885079] sock_sendmsg+0xc3/0x120 [ 34.888770] ___sys_sendmsg+0x7bb/0x8e0 [ 34.892722] __x64_sys_sendmsg+0x132/0x220 [ 34.896952] do_syscall_64+0xf9/0x620 [ 34.900734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.905901] [ 34.907517] The buggy address belongs to the object at ffff88809bbde480 [ 34.907517] which belongs to the cache kmalloc-128 of size 128 [ 34.920159] The buggy address is located 0 bytes inside of [ 34.920159] 128-byte region [ffff88809bbde480, ffff88809bbde500) [ 34.931864] The buggy address belongs to the page: [ 34.936773] page:ffffea00026ef780 count:1 mapcount:0 mapping:ffff88813bff0640 index:0x0 [ 34.944906] flags: 0xfff00000000100(slab) [ 34.949035] raw: 00fff00000000100 ffffea00026b1708 ffffea0002ccfc88 ffff88813bff0640 [ 34.956901] raw: 0000000000000000 ffff88809bbde000 0000000100000015 0000000000000000 [ 34.964770] page dumped because: kasan: bad access detected [ 34.970457] [ 34.972075] Memory state around the buggy address: [ 34.976993] ffff88809bbde380: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.984331] ffff88809bbde400: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 34.991679] >ffff88809bbde480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.999023] ^ [ 35.002726] ffff88809bbde500: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 35.010089] ffff88809bbde580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.017424] ================================================================== [ 35.024774] Disabling lock debugging due to kernel taint [ 35.034919] Kernel panic - not syncing: panic_on_warn set ... [ 35.034919] [ 35.042296] CPU: 1 PID: 8308 Comm: syz-executor409 Tainted: G B 4.19.211-syzkaller #0 [ 35.051557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 35.060916] Call Trace: [ 35.063506] dump_stack+0x1fc/0x2ef [ 35.067134] panic+0x26a/0x50e [ 35.070322] ? __warn_printk+0xf3/0xf3 [ 35.074186] ? preempt_schedule_common+0x45/0xc0 [ 35.078924] ? ___preempt_schedule+0x16/0x18 [ 35.083311] ? trace_hardirqs_on+0x55/0x210 [ 35.087621] kasan_end_report+0x43/0x49 [ 35.091576] kasan_report_error.cold+0xa7/0x1b9 [ 35.096247] ? qfq_find_class+0x162/0x190 [ 35.100399] __asan_report_load4_noabort+0x88/0x90 [ 35.105307] ? qfq_find_class+0x162/0x190 [ 35.109431] qfq_find_class+0x162/0x190 [ 35.113385] ? qdisc_match_from_root+0x182/0x280 [ 35.118131] tc_ctl_tclass+0x765/0xcd0 [ 35.121996] ? qdisc_create+0x1130/0x1130 [ 35.126136] ? rtnetlink_rcv_msg+0x3fe/0xb80 [ 35.130521] ? mutex_trylock+0x1a0/0x1a0 [ 35.134563] ? qdisc_create+0x1130/0x1130 [ 35.138699] rtnetlink_rcv_msg+0x453/0xb80 [ 35.142932] ? rtnl_calcit.isra.0+0x430/0x430 [ 35.147410] ? memcpy+0x35/0x50 [ 35.150685] ? netdev_pick_tx+0x2f0/0x2f0 [ 35.154822] ? __copy_skb_header+0x414/0x500 [ 35.159208] ? kfree_skbmem+0x140/0x140 [ 35.163161] netlink_rcv_skb+0x160/0x440 [ 35.167199] ? rtnl_calcit.isra.0+0x430/0x430 [ 35.171671] ? netlink_ack+0xae0/0xae0 [ 35.175541] netlink_unicast+0x4d5/0x690 [ 35.179584] ? netlink_sendskb+0x110/0x110 [ 35.183796] ? _copy_from_iter_full+0x229/0x7c0 [ 35.188626] ? __phys_addr_symbol+0x2c/0x70 [ 35.192935] ? __check_object_size+0x17b/0x3e0 [ 35.197669] netlink_sendmsg+0x6c3/0xc50 [ 35.201708] ? aa_af_perm+0x230/0x230 [ 35.205489] ? nlmsg_notify+0x1f0/0x1f0 [ 35.209449] ? kernel_recvmsg+0x220/0x220 [ 35.213587] ? nlmsg_notify+0x1f0/0x1f0 [ 35.217551] sock_sendmsg+0xc3/0x120 [ 35.221252] ___sys_sendmsg+0x7bb/0x8e0 [ 35.225210] ? copy_msghdr_from_user+0x440/0x440 [ 35.229950] ? apparmor_file_receive+0x160/0x160 [ 35.234687] ? __lockdep_init_map+0x100/0x5a0 [ 35.239175] ? check_preemption_disabled+0x41/0x280 [ 35.244250] ? mark_held_locks+0xf0/0xf0 [ 35.248403] ? percpu_counter_add_batch+0x126/0x180 [ 35.253452] ? alloc_empty_file+0xd7/0x170 [ 35.257680] ? errseq_sample+0x56/0x70 [ 35.261549] ? alloc_file+0x326/0x4d0 [ 35.265328] ? __fd_install+0x1b4/0x610 [ 35.269296] ? __fdget+0x1a0/0x230 [ 35.272862] __x64_sys_sendmsg+0x132/0x220 [ 35.277076] ? __sys_sendmsg+0x1b0/0x1b0 [ 35.281118] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 35.286465] ? trace_hardirqs_off_caller+0x6e/0x210 [ 35.291461] ? do_syscall_64+0x21/0x620 [ 35.295415] do_syscall_64+0xf9/0x620 [ 35.299197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.304372] RIP: 0033:0x7fc456b90e69 [ 35.308074] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 35.326975] RSP: 002b:00007fff2b505fe8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 35.334667] RAX: ffffffffffffffda RBX: 00007fff2b506020 RCX: 00007fc456b90e69 [ 35.341919] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000005 [ 35.349167] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001 [ 35.356415] R10: 0000000000000001 R11: 0000000000000246 R12: 00007fff2b506010 [ 35.363663] R13: 00000000000f4240 R14: 00000000000084d1 R15: 00007fff2b505ff4 [ 35.371338] Kernel Offset: disabled [ 35.374951] Rebooting in 86400 seconds..