[ 38.371355] audit: type=1800 audit(1572864614.586:32): pid=7354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 43.615403] kauditd_printk_skb: 2 callbacks suppressed [ 43.615416] audit: type=1400 audit(1572864619.936:35): avc: denied { map } for pid=7527 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.18' (ECDSA) to the list of known hosts. [ 50.193752] audit: type=1400 audit(1572864626.516:36): avc: denied { map } for pid=7539 comm="syz-executor933" path="/root/syz-executor933013972" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 50.215671] IPVS: ftp: loaded support on port[0] = 21 [ 50.247192] audit: type=1400 audit(1572864626.566:37): avc: denied { create } for pid=7540 comm="syz-executor933" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 50.273167] audit: type=1400 audit(1572864626.566:38): avc: denied { write } for pid=7540 comm="syz-executor933" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 50.298179] audit: type=1400 audit(1572864626.566:39): avc: denied { read } for pid=7540 comm="syz-executor933" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 50.344319] chnl_net:caif_netlink_parms(): no params data found [ 50.375861] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.382697] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.389781] device bridge_slave_0 entered promiscuous mode [ 50.397176] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.403658] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.410565] device bridge_slave_1 entered promiscuous mode [ 50.426224] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 50.435258] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 50.450533] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 50.458166] team0: Port device team_slave_0 added [ 50.463638] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 50.470889] team0: Port device team_slave_1 added [ 50.476284] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.483547] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.533881] device hsr_slave_0 entered promiscuous mode [ 50.601529] device hsr_slave_1 entered promiscuous mode [ 50.672574] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 50.679480] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 50.693382] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.699872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.706853] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.713261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.744216] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 50.750310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.760334] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 50.769481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.788116] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.795483] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.803570] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.813650] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 50.819713] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.828580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.836305] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.842665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.853014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.860608] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.866996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.882150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.897119] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 50.907631] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 50.918607] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 50.925735] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.932965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.940454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready executing program [ 50.948235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.955793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.966979] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 50.975107] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 50.982004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 50.992398] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.012990] audit: type=1400 audit(1572864627.336:40): avc: denied { name_bind } for pid=7546 comm="syz-executor933" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 51.036469] audit: type=1400 audit(1572864627.336:41): avc: denied { node_bind } for pid=7546 comm="syz-executor933" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 51.037659] FAULT_INJECTION: forcing a failure. [ 51.037659] name failslab, interval 1, probability 0, space 0, times 1 [ 51.060576] audit: type=1400 audit(1572864627.336:42): avc: denied { name_connect } for pid=7546 comm="syz-executor933" dest=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 51.072570] CPU: 0 PID: 7547 Comm: syz-executor933 Not tainted 4.19.81 #0 [ 51.100735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.110077] Call Trace: [ 51.112658] dump_stack+0x172/0x1f0 [ 51.116273] should_fail.cold+0xa/0x1b [ 51.120144] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 51.125230] ? lock_downgrade+0x880/0x880 [ 51.129367] __should_failslab+0x121/0x190 [ 51.133741] should_failslab+0x9/0x14 [ 51.137526] kmem_cache_alloc_trace+0x2cc/0x760 [ 51.142181] ? kmem_cache_alloc_trace+0x5a7/0x760 [ 51.147015] dccp_feat_entry_new+0x1b6/0x3b0 [ 51.151416] dccp_feat_push_confirm+0x2c/0x250 [ 51.155993] dccp_feat_parse_options+0x1643/0x1bc0 [ 51.160911] ? dccp_feat_server_ccid_dependencies+0x2a0/0x2a0 [ 51.166781] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 51.172315] ? dccp_ackvec_parsed_add+0x1c8/0x250 [ 51.177144] dccp_parse_options+0x69d/0x1250 [ 51.181544] dccp_rcv_established+0x42/0xb0 [ 51.185863] dccp_v4_do_rcv+0x13f/0x190 [ 51.189831] __release_sock+0x129/0x390 [ 51.193807] release_sock+0x59/0x1c0 [ 51.197504] dccp_sendmsg+0x683/0xd00 [ 51.201292] ? dccp_getsockopt+0xe0/0xe0 [ 51.205345] inet_sendmsg+0x141/0x5d0 [ 51.209142] ? ipip_gro_receive+0x100/0x100 [ 51.213445] sock_sendmsg+0xd7/0x130 [ 51.217155] ___sys_sendmsg+0x3e2/0x920 [ 51.221110] ? copy_msghdr_from_user+0x430/0x430 [ 51.225870] ? mark_held_locks+0x100/0x100 [ 51.230094] ? kasan_check_read+0x11/0x20 [ 51.234241] ? __might_fault+0x12b/0x1e0 [ 51.238283] ? find_held_lock+0x35/0x130 [ 51.242339] ? __might_fault+0x12b/0x1e0 [ 51.246406] __sys_sendmmsg+0x1bf/0x4e0 [ 51.250366] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 51.254671] ? kasan_check_write+0x14/0x20 [ 51.258897] ? __sb_end_write+0xd9/0x110 [ 51.262957] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 51.268476] ? fput+0x128/0x1a0 [ 51.271740] ? ksys_write+0x1f1/0x2d0 [ 51.275537] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 51.280275] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 51.285014] ? do_syscall_64+0x26/0x620 [ 51.288970] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.294328] ? do_syscall_64+0x26/0x620 [ 51.298289] __x64_sys_sendmmsg+0x9d/0x100 [ 51.302509] do_syscall_64+0xfd/0x620 [ 51.306294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.311465] RIP: 0033:0x448e39 [ 51.314642] Code: e8 8c 10 03 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 51.333542] RSP: 002b:00007fc261f4ccb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 51.341232] RAX: ffffffffffffffda RBX: 00007fc261f4ccc0 RCX: 0000000000448e39 [ 51.348483] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 51.355735] RBP: 0000000000000006 R08: 0000000000000001 R09: 0000000000000039 [ 51.362986] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006e49ec [ 51.370236] R13: 00007ffc68bd79bf R14: 00007fc261f4d9c0 R15: 0000000000000064 [ 51.380503] dccp_parse_options: DCCP(000000005d46a545): Option 32 (len=7) error=9 [ 51.389019] ================================================================== [ 51.396445] BUG: KASAN: use-after-free in ccid2_hc_tx_packet_recv+0x21ca/0x223b [ 51.403887] Read of size 1 at addr ffff8880811669e2 by task syz-executor933/7547 [ 51.411400] [ 51.413016] CPU: 0 PID: 7547 Comm: syz-executor933 Not tainted 4.19.81 #0 [ 51.419934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.429272] Call Trace: [ 51.431860] dump_stack+0x172/0x1f0 [ 51.435485] ? ccid2_hc_tx_packet_recv+0x21ca/0x223b [ 51.440574] print_address_description.cold+0x7c/0x20d [ 51.445844] ? ccid2_hc_tx_packet_recv+0x21ca/0x223b [ 51.450931] kasan_report.cold+0x8c/0x2ba [ 51.455066] __asan_report_load1_noabort+0x14/0x20 [ 51.459985] ccid2_hc_tx_packet_recv+0x21ca/0x223b [ 51.464932] ? ccid2_hc_tx_rto_expire+0x690/0x690 [ 51.469765] dccp_deliver_input_to_ccids+0x1f8/0x270 [ 51.474856] dccp_rcv_established+0x83/0xb0 [ 51.479178] dccp_v4_do_rcv+0x13f/0x190 [ 51.483143] __release_sock+0x129/0x390 [ 51.487105] release_sock+0x59/0x1c0 [ 51.490810] dccp_sendmsg+0x683/0xd00 [ 51.494609] ? dccp_getsockopt+0xe0/0xe0 [ 51.498664] inet_sendmsg+0x141/0x5d0 [ 51.502450] ? ipip_gro_receive+0x100/0x100 [ 51.506758] sock_sendmsg+0xd7/0x130 [ 51.510457] ___sys_sendmsg+0x3e2/0x920 [ 51.514418] ? copy_msghdr_from_user+0x430/0x430 [ 51.519160] ? mark_held_locks+0x100/0x100 [ 51.523380] ? kasan_check_read+0x11/0x20 [ 51.527516] ? __might_fault+0x12b/0x1e0 [ 51.531563] ? find_held_lock+0x35/0x130 [ 51.535617] ? __might_fault+0x12b/0x1e0 [ 51.539676] __sys_sendmmsg+0x1bf/0x4e0 [ 51.543638] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 51.547945] ? kasan_check_write+0x14/0x20 [ 51.552172] ? __sb_end_write+0xd9/0x110 [ 51.556218] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 51.561740] ? fput+0x128/0x1a0 [ 51.565001] ? ksys_write+0x1f1/0x2d0 [ 51.568788] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 51.573542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 51.578290] ? do_syscall_64+0x26/0x620 [ 51.582247] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.587603] ? do_syscall_64+0x26/0x620 [ 51.591565] __x64_sys_sendmmsg+0x9d/0x100 [ 51.595786] do_syscall_64+0xfd/0x620 [ 51.599587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.604759] RIP: 0033:0x448e39 [ 51.607938] Code: e8 8c 10 03 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 51.626823] RSP: 002b:00007fc261f4ccb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 51.634516] RAX: ffffffffffffffda RBX: 00007fc261f4ccc0 RCX: 0000000000448e39 [ 51.642642] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 51.649894] RBP: 0000000000000006 R08: 0000000000000001 R09: 0000000000000039 [ 51.657146] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006e49ec [ 51.664397] R13: 00007ffc68bd79bf R14: 00007fc261f4d9c0 R15: 0000000000000064 [ 51.671680] [ 51.673298] Allocated by task 7547: [ 51.676918] save_stack+0x45/0xd0 [ 51.680360] kasan_kmalloc+0xce/0xf0 [ 51.684058] __kmalloc_node_track_caller+0x51/0x80 [ 51.689060] __kmalloc_reserve.isra.0+0x40/0xf0 [ 51.693724] __alloc_skb+0x10b/0x5f0 [ 51.697429] dccp_send_ack+0xd6/0x360 [ 51.701225] ccid2_hc_rx_packet_recv+0x139/0x1b0 [ 51.705964] dccp_deliver_input_to_ccids+0xeb/0x270 [ 51.710977] dccp_rcv_established+0x83/0xb0 [ 51.715279] dccp_v4_do_rcv+0x13f/0x190 [ 51.720202] __sk_receive_skb+0x33c/0xbc0 [ 51.724331] dccp_v4_rcv+0xeb6/0x1b1d [ 51.728116] ip_local_deliver_finish+0x27e/0xc20 [ 51.732867] ip_local_deliver+0x1e9/0x520 [ 51.736996] ip_rcv_finish+0x1d9/0x2e0 [ 51.740867] ip_rcv+0xe8/0x3f0 [ 51.744044] __netif_receive_skb_one_core+0x113/0x1a0 [ 51.749215] __netif_receive_skb+0x2c/0x1d0 [ 51.753519] process_backlog+0x23a/0x7a0 [ 51.757562] net_rx_action+0x4f5/0x1070 [ 51.761525] __do_softirq+0x25c/0x921 [ 51.765302] [ 51.766911] Freed by task 7547: [ 51.770171] save_stack+0x45/0xd0 [ 51.773605] __kasan_slab_free+0x102/0x150 [ 51.777820] kasan_slab_free+0xe/0x10 [ 51.781617] kfree+0xcf/0x220 [ 51.784703] skb_free_head+0x99/0xc0 [ 51.788400] skb_release_data+0x57d/0x7d0 [ 51.792529] skb_release_all+0x4d/0x60 [ 51.796396] kfree_skb+0xe8/0x390 [ 51.799855] dccp_v4_do_rcv+0x166/0x190 [ 51.803811] __release_sock+0x129/0x390 [ 51.807766] release_sock+0x59/0x1c0 [ 51.811460] dccp_sendmsg+0x683/0xd00 [ 51.815243] inet_sendmsg+0x141/0x5d0 [ 51.819037] sock_sendmsg+0xd7/0x130 [ 51.822730] ___sys_sendmsg+0x3e2/0x920 [ 51.826685] __sys_sendmmsg+0x1bf/0x4e0 [ 51.830642] __x64_sys_sendmmsg+0x9d/0x100 [ 51.834892] do_syscall_64+0xfd/0x620 [ 51.838686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.843854] [ 51.845467] The buggy address belongs to the object at ffff888081166540 [ 51.845467] which belongs to the cache kmalloc-2048 of size 2048 [ 51.858281] The buggy address is located 1186 bytes inside of [ 51.858281] 2048-byte region [ffff888081166540, ffff888081166d40) [ 51.870308] The buggy address belongs to the page: [ 51.875223] page:ffffea0002045980 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 51.885189] flags: 0x1fffc0000008100(slab|head) [ 51.889847] raw: 01fffc0000008100 ffffea000204f488 ffffea0002822408 ffff88812c3f0c40 [ 51.897724] raw: 0000000000000000 ffff888081166540 0000000100000003 0000000000000000 [ 51.905592] page dumped because: kasan: bad access detected [ 51.911278] [ 51.912885] Memory state around the buggy address: [ 51.917794] ffff888081166880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.925146] ffff888081166900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.932666] >ffff888081166980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.940056] ^ [ 51.946531] ffff888081166a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.953903] ffff888081166a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.961256] ================================================================== [ 51.968598] Disabling lock debugging due to kernel taint [ 51.976765] Kernel panic - not syncing: panic_on_warn set ... [ 51.976765] [ 51.984190] CPU: 0 PID: 7547 Comm: syz-executor933 Tainted: G B 4.19.81 #0 [ 51.992487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.001821] Call Trace: [ 52.004412] dump_stack+0x172/0x1f0 [ 52.008026] ? ccid2_hc_tx_packet_recv+0x21ca/0x223b [ 52.013113] panic+0x26a/0x50e [ 52.016291] ? __warn_printk+0xf3/0xf3 [ 52.020163] ? ccid2_hc_tx_packet_recv+0x21ca/0x223b [ 52.025264] ? preempt_schedule+0x4b/0x60 [ 52.029398] ? ___preempt_schedule+0x16/0x18 [ 52.033787] ? trace_hardirqs_on+0x5e/0x220 [ 52.038095] ? ccid2_hc_tx_packet_recv+0x21ca/0x223b [ 52.043180] kasan_end_report+0x47/0x4f [ 52.047138] kasan_report.cold+0xa9/0x2ba [ 52.051269] __asan_report_load1_noabort+0x14/0x20 [ 52.056184] ccid2_hc_tx_packet_recv+0x21ca/0x223b [ 52.062764] ? ccid2_hc_tx_rto_expire+0x690/0x690 [ 52.067607] dccp_deliver_input_to_ccids+0x1f8/0x270 [ 52.072717] dccp_rcv_established+0x83/0xb0 [ 52.077027] dccp_v4_do_rcv+0x13f/0x190 [ 52.080993] __release_sock+0x129/0x390 [ 52.084952] release_sock+0x59/0x1c0 [ 52.088652] dccp_sendmsg+0x683/0xd00 [ 52.092441] ? dccp_getsockopt+0xe0/0xe0 [ 52.096488] inet_sendmsg+0x141/0x5d0 [ 52.100270] ? ipip_gro_receive+0x100/0x100 [ 52.104575] sock_sendmsg+0xd7/0x130 [ 52.108285] ___sys_sendmsg+0x3e2/0x920 [ 52.112258] ? copy_msghdr_from_user+0x430/0x430 [ 52.116997] ? mark_held_locks+0x100/0x100 [ 52.121219] ? kasan_check_read+0x11/0x20 [ 52.125351] ? __might_fault+0x12b/0x1e0 [ 52.129410] ? find_held_lock+0x35/0x130 [ 52.133456] ? __might_fault+0x12b/0x1e0 [ 52.137504] __sys_sendmmsg+0x1bf/0x4e0 [ 52.141478] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 52.145964] ? kasan_check_write+0x14/0x20 [ 52.150184] ? __sb_end_write+0xd9/0x110 [ 52.154260] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 52.159780] ? fput+0x128/0x1a0 [ 52.163044] ? ksys_write+0x1f1/0x2d0 [ 52.166836] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 52.171582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 52.176320] ? do_syscall_64+0x26/0x620 [ 52.180276] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.185625] ? do_syscall_64+0x26/0x620 [ 52.189615] __x64_sys_sendmmsg+0x9d/0x100 [ 52.193838] do_syscall_64+0xfd/0x620 [ 52.197638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 52.202809] RIP: 0033:0x448e39 [ 52.205988] Code: e8 8c 10 03 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b 08 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 52.224878] RSP: 002b:00007fc261f4ccb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 52.232592] RAX: ffffffffffffffda RBX: 00007fc261f4ccc0 RCX: 0000000000448e39 [ 52.239846] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 52.247099] RBP: 0000000000000006 R08: 0000000000000001 R09: 0000000000000039 [ 52.254353] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006e49ec [ 52.261609] R13: 00007ffc68bd79bf R14: 00007fc261f4d9c0 R15: 0000000000000064 [ 52.270186] Kernel Offset: disabled [ 52.273809] Rebooting in 86400 seconds..