[....] Starting periodic command scheduler: cron[ 45.934033] audit: type=1800 audit(1583911935.677:30): pid=8018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 50.207455] kauditd_printk_skb: 4 callbacks suppressed [ 50.207469] audit: type=1400 audit(1583911939.947:35): avc: denied { map } for pid=8192 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.23' (ECDSA) to the list of known hosts. [ 57.057782] audit: type=1400 audit(1583911946.797:36): avc: denied { map } for pid=8204 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/11 07:32:26 parsed 1 programs [ 58.877513] audit: type=1400 audit(1583911948.617:37): avc: denied { map } for pid=8204 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=92 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/03/11 07:32:28 executed programs: 0 [ 59.071264] IPVS: ftp: loaded support on port[0] = 21 [ 59.134639] chnl_net:caif_netlink_parms(): no params data found [ 59.185870] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.193168] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.200827] device bridge_slave_0 entered promiscuous mode [ 59.208513] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.215417] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.222666] device bridge_slave_1 entered promiscuous mode [ 59.240735] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.250199] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.267472] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.275123] team0: Port device team_slave_0 added [ 59.281086] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.288482] team0: Port device team_slave_1 added [ 59.304150] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 59.310949] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.336208] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 59.348106] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 59.354657] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 59.380029] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 59.390977] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.400064] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.461211] device hsr_slave_0 entered promiscuous mode [ 59.499279] device hsr_slave_1 entered promiscuous mode [ 59.539846] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 59.547129] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 59.603439] audit: type=1400 audit(1583911949.347:38): avc: denied { create } for pid=8222 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 59.626503] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.628624] audit: type=1400 audit(1583911949.347:39): avc: denied { write } for pid=8222 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 59.634012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.659479] audit: type=1400 audit(1583911949.347:40): avc: denied { read } for pid=8222 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 59.664808] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.694580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.734534] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 59.741617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.750735] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.761308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.781099] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.788609] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.796552] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 59.807923] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 59.814186] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.824032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.831855] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.838186] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.848457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.856389] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.863015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.881127] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.889389] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 59.902156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.916347] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 59.926547] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 59.937598] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 59.944748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.952799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.962400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 59.975573] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 59.984389] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.991287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.003811] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.017173] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 60.027200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.066109] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 60.073710] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 60.080814] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 60.091433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.099455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.106406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.115810] device veth0_vlan entered promiscuous mode [ 60.126185] device veth1_vlan entered promiscuous mode [ 60.132925] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 60.140955] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 60.155612] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 60.164950] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 60.172635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 60.181071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 60.190701] device veth0_macvtap entered promiscuous mode [ 60.196934] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 60.206143] device veth1_macvtap entered promiscuous mode [ 60.213048] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 60.222283] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 60.232278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 60.242323] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 60.249842] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 60.256681] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 60.264540] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 60.272145] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 60.280453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.292818] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 60.300106] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 60.306724] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 60.314746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.432121] audit: type=1400 audit(1583911950.177:41): avc: denied { associate } for pid=8222 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 60.514815] ================================================================== [ 60.522351] BUG: KASAN: use-after-free in tcindex_set_parms+0x17d0/0x19d0 [ 60.529272] Write of size 16 at addr ffff88809f728930 by task syz-executor.0/8262 [ 60.536962] [ 60.538596] CPU: 1 PID: 8262 Comm: syz-executor.0 Not tainted 4.19.108-syzkaller #0 [ 60.546392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.555732] Call Trace: [ 60.558311] dump_stack+0x188/0x20d [ 60.561926] ? tcindex_set_parms+0x17d0/0x19d0 [ 60.566522] print_address_description.cold+0x7c/0x212 [ 60.571882] ? tcindex_set_parms+0x17d0/0x19d0 [ 60.576447] kasan_report.cold+0x88/0x2b9 [ 60.580582] tcindex_set_parms+0x17d0/0x19d0 [ 60.585008] ? avc_has_perm_noaudit+0x316/0x520 [ 60.589786] ? tcindex_alloc_perfect_hash+0x350/0x350 [ 60.594978] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 60.600218] ? validate_nla+0x328/0x800 [ 60.604190] ? tcindex_change+0x200/0x2d3 [ 60.608336] tcindex_change+0x200/0x2d3 [ 60.612305] ? tcindex_set_parms+0x19d0/0x19d0 [ 60.616876] ? tcindex_set_parms+0x19d0/0x19d0 [ 60.621459] tc_new_tfilter+0xa6b/0x1450 [ 60.625511] ? tc_del_tfilter+0xd40/0xd40 [ 60.629647] ? __mutex_lock+0x3cd/0x1300 [ 60.633696] ? selinux_ipv4_output+0x50/0x50 [ 60.638097] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 60.643357] ? kfree_skbmem+0xc1/0x140 [ 60.647241] ? tc_del_tfilter+0xd40/0xd40 [ 60.651375] rtnetlink_rcv_msg+0x453/0xaf0 [ 60.655710] ? rtnetlink_put_metrics+0x520/0x520 [ 60.660449] ? netdev_pick_tx+0x2f0/0x2f0 [ 60.664597] ? __copy_skb_header+0x2f0/0x510 [ 60.669014] ? sock_spd_release+0x270/0x270 [ 60.673545] netlink_rcv_skb+0x160/0x410 [ 60.677653] ? rtnetlink_put_metrics+0x520/0x520 [ 60.682428] ? netlink_ack+0xa60/0xa60 [ 60.686339] netlink_unicast+0x4d7/0x6a0 [ 60.690391] ? netlink_attachskb+0x710/0x710 [ 60.694807] netlink_sendmsg+0x80b/0xcd0 [ 60.698865] ? netlink_unicast+0x6a0/0x6a0 [ 60.703107] ? move_addr_to_kernel.part.0+0x110/0x110 [ 60.708397] ? netlink_unicast+0x6a0/0x6a0 [ 60.712673] sock_sendmsg+0xcf/0x120 [ 60.716521] ___sys_sendmsg+0x803/0x920 [ 60.720518] ? copy_msghdr_from_user+0x410/0x410 [ 60.725306] ? __fget+0x319/0x510 [ 60.728749] ? lock_downgrade+0x740/0x740 [ 60.732885] ? check_preemption_disabled+0x41/0x280 [ 60.737891] ? __fget+0x340/0x510 [ 60.741343] ? iterate_fd+0x350/0x350 [ 60.745134] ? __fget_light+0x1d1/0x230 [ 60.749110] __sys_sendmsg+0xec/0x1b0 [ 60.753213] ? __ia32_sys_shutdown+0x70/0x70 [ 60.757627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 60.762390] ? trace_hardirqs_off_caller+0x55/0x210 [ 60.767393] ? do_syscall_64+0x21/0x620 [ 60.771359] do_syscall_64+0xf9/0x620 [ 60.775165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 60.780350] RIP: 0033:0x45c4a9 [ 60.783547] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 60.802535] RSP: 002b:00007fafc3a11c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 60.810231] RAX: ffffffffffffffda RBX: 00007fafc3a126d4 RCX: 000000000045c4a9 [ 60.817499] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 60.824784] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 60.832166] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 60.839433] R13: 00000000000009fa R14: 00000000004cc777 R15: 000000000076bf2c [ 60.846737] [ 60.848352] Allocated by task 1: [ 60.851710] kasan_kmalloc+0xbf/0xe0 [ 60.855472] kmem_cache_alloc_trace+0x14d/0x7a0 [ 60.860142] call_usermodehelper_setup+0x77/0x2f0 [ 60.864980] kobject_uevent_env+0xc92/0x1160 [ 60.869374] driver_bound+0x19a/0x1f0 [ 60.873162] really_probe+0x4f2/0x650 [ 60.876973] driver_probe_device+0xfb/0x1a0 [ 60.881299] __device_attach_driver+0x21d/0x290 [ 60.885972] bus_for_each_drv+0x15c/0x1e0 [ 60.890133] __device_attach+0x21e/0x320 [ 60.894206] bus_probe_device+0x1ea/0x2a0 [ 60.898444] device_add+0xae6/0x1660 [ 60.902179] usb_set_configuration+0xf0f/0x1770 [ 60.906849] generic_probe+0xaf/0x110 [ 60.910636] usb_probe_device+0x9f/0x100 [ 60.914843] really_probe+0x47c/0x650 [ 60.918677] driver_probe_device+0xfb/0x1a0 [ 60.923001] __device_attach_driver+0x21d/0x290 [ 60.927664] bus_for_each_drv+0x15c/0x1e0 [ 60.931797] __device_attach+0x21e/0x320 [ 60.935857] bus_probe_device+0x1ea/0x2a0 [ 60.941560] device_add+0xae6/0x1660 [ 60.945279] usb_new_device+0x98a/0x1750 [ 60.949390] usb_add_hcd+0xb23/0x17b0 [ 60.953214] vhci_hcd_probe+0x166/0x230 [ 60.957189] platform_drv_probe+0x8d/0x160 [ 60.961480] really_probe+0x47c/0x650 [ 60.965271] driver_probe_device+0xfb/0x1a0 [ 60.969703] __device_attach_driver+0x21d/0x290 [ 60.974370] bus_for_each_drv+0x15c/0x1e0 [ 60.978502] __device_attach+0x21e/0x320 [ 60.982561] bus_probe_device+0x1ea/0x2a0 [ 60.986712] device_add+0xae6/0x1660 [ 60.990426] platform_device_add+0x355/0x6e0 [ 60.994840] vhci_hcd_init+0x344/0x488 [ 60.998718] do_one_initcall+0xf1/0x734 [ 61.002681] kernel_init_freeable+0x4c9/0x5bb [ 61.007278] kernel_init+0xd/0x1c0 [ 61.010911] ret_from_fork+0x24/0x30 [ 61.014732] [ 61.016348] Freed by task 2745: [ 61.019706] __kasan_slab_free+0xf7/0x140 [ 61.023843] kfree+0xce/0x220 [ 61.027046] umh_complete+0x81/0x90 [ 61.030667] call_usermodehelper_exec_async+0x542/0x630 [ 61.036032] ret_from_fork+0x24/0x30 [ 61.039861] [ 61.041480] The buggy address belongs to the object at ffff88809f728900 [ 61.041480] which belongs to the cache kmalloc-192 of size 192 [ 61.054229] The buggy address is located 48 bytes inside of [ 61.054229] 192-byte region [ffff88809f728900, ffff88809f7289c0) [ 61.066012] The buggy address belongs to the page: [ 61.070939] page:ffffea00027dca00 count:1 mapcount:0 mapping:ffff88812c3dc040 index:0x0 [ 61.079081] flags: 0xfffe0000000100(slab) [ 61.083221] raw: 00fffe0000000100 ffffea00027ddf08 ffffea00027dcc08 ffff88812c3dc040 [ 61.091103] raw: 0000000000000000 ffff88809f728000 0000000100000010 0000000000000000 [ 61.098970] page dumped because: kasan: bad access detected [ 61.104672] [ 61.106281] Memory state around the buggy address: [ 61.111205] ffff88809f728800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.118545] ffff88809f728880: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.125887] >ffff88809f728900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.133231] ^ [ 61.138141] ffff88809f728980: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.145505] ffff88809f728a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.152866] ================================================================== [ 61.160212] Disabling lock debugging due to kernel taint [ 61.169542] Kernel panic - not syncing: panic_on_warn set ... [ 61.169542] [ 61.176930] CPU: 1 PID: 8262 Comm: syz-executor.0 Tainted: G B 4.19.108-syzkaller #0 [ 61.186910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.196298] Call Trace: [ 61.198906] dump_stack+0x188/0x20d [ 61.202531] panic+0x26a/0x50e [ 61.205804] ? __warn_printk+0xf3/0xf3 [ 61.209683] ? preempt_schedule_common+0x4a/0xc0 [ 61.214439] ? tcindex_set_parms+0x17d0/0x19d0 [ 61.219014] ? ___preempt_schedule+0x16/0x18 [ 61.223427] ? trace_hardirqs_on+0x55/0x210 [ 61.227805] ? tcindex_set_parms+0x17d0/0x19d0 [ 61.232411] kasan_end_report+0x43/0x49 [ 61.236389] kasan_report.cold+0xa4/0x2b9 [ 61.240886] tcindex_set_parms+0x17d0/0x19d0 [ 61.245400] ? avc_has_perm_noaudit+0x316/0x520 [ 61.250062] ? tcindex_alloc_perfect_hash+0x350/0x350 [ 61.255246] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 61.260420] ? validate_nla+0x328/0x800 [ 61.264399] ? tcindex_change+0x200/0x2d3 [ 61.269240] tcindex_change+0x200/0x2d3 [ 61.273404] ? tcindex_set_parms+0x19d0/0x19d0 [ 61.278234] ? tcindex_set_parms+0x19d0/0x19d0 [ 61.282921] tc_new_tfilter+0xa6b/0x1450 [ 61.287133] ? tc_del_tfilter+0xd40/0xd40 [ 61.291308] ? __mutex_lock+0x3cd/0x1300 [ 61.295359] ? selinux_ipv4_output+0x50/0x50 [ 61.299769] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 61.304201] ? kfree_skbmem+0xc1/0x140 [ 61.308100] ? tc_del_tfilter+0xd40/0xd40 [ 61.312242] rtnetlink_rcv_msg+0x453/0xaf0 [ 61.316475] ? rtnetlink_put_metrics+0x520/0x520 [ 61.321236] ? netdev_pick_tx+0x2f0/0x2f0 [ 61.325376] ? __copy_skb_header+0x2f0/0x510 [ 61.329792] ? sock_spd_release+0x270/0x270 [ 61.334117] netlink_rcv_skb+0x160/0x410 [ 61.338172] ? rtnetlink_put_metrics+0x520/0x520 [ 61.342911] ? netlink_ack+0xa60/0xa60 [ 61.346800] netlink_unicast+0x4d7/0x6a0 [ 61.350869] ? netlink_attachskb+0x710/0x710 [ 61.355270] netlink_sendmsg+0x80b/0xcd0 [ 61.359320] ? netlink_unicast+0x6a0/0x6a0 [ 61.363542] ? move_addr_to_kernel.part.0+0x110/0x110 [ 61.368719] ? netlink_unicast+0x6a0/0x6a0 [ 61.372951] sock_sendmsg+0xcf/0x120 [ 61.376661] ___sys_sendmsg+0x803/0x920 [ 61.380637] ? copy_msghdr_from_user+0x410/0x410 [ 61.385510] ? __fget+0x319/0x510 [ 61.389123] ? lock_downgrade+0x740/0x740 [ 61.393568] ? check_preemption_disabled+0x41/0x280 [ 61.398795] ? __fget+0x340/0x510 [ 61.402240] ? iterate_fd+0x350/0x350 [ 61.406475] ? __fget_light+0x1d1/0x230 [ 61.410488] __sys_sendmsg+0xec/0x1b0 [ 61.414393] ? __ia32_sys_shutdown+0x70/0x70 [ 61.419521] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 61.424272] ? trace_hardirqs_off_caller+0x55/0x210 [ 61.429303] ? do_syscall_64+0x21/0x620 [ 61.433279] do_syscall_64+0xf9/0x620 [ 61.437449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 61.442897] RIP: 0033:0x45c4a9 [ 61.446116] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 61.465368] RSP: 002b:00007fafc3a11c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 61.473159] RAX: ffffffffffffffda RBX: 00007fafc3a126d4 RCX: 000000000045c4a9 [ 61.480460] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 61.487738] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 61.495123] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 61.502498] R13: 00000000000009fa R14: 00000000004cc777 R15: 000000000076bf2c [ 61.511921] Kernel Offset: disabled [ 61.515572] Rebooting in 86400 seconds..