Warning: Permanently added '10.128.0.113' (ECDSA) to the list of known hosts. [ 982.222639] random: sshd: uninitialized urandom read (32 bytes read) [ 982.439449] audit: type=1400 audit(1581394855.423:37): avc: denied { map } for pid=7339 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/02/11 04:20:55 parsed 1 programs [ 983.417212] random: cc1: uninitialized urandom read (8 bytes read) [ 984.618369] audit: type=1400 audit(1581394857.603:38): avc: denied { map } for pid=7339 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1150 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/02/11 04:20:57 executed programs: 0 [ 984.661068] audit: type=1400 audit(1581394857.653:39): avc: denied { map } for pid=7339 comm="syz-execprog" path="/root/syzkaller-shm031816172" dev="sda1" ino=16461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 984.930964] IPVS: ftp: loaded support on port[0] = 21 [ 985.691487] chnl_net:caif_netlink_parms(): no params data found [ 985.734451] bridge0: port 1(bridge_slave_0) entered blocking state [ 985.741256] bridge0: port 1(bridge_slave_0) entered disabled state [ 985.748205] device bridge_slave_0 entered promiscuous mode [ 985.755414] bridge0: port 2(bridge_slave_1) entered blocking state [ 985.761862] bridge0: port 2(bridge_slave_1) entered disabled state [ 985.768824] device bridge_slave_1 entered promiscuous mode [ 985.782855] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 985.791867] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 985.807875] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 985.814985] team0: Port device team_slave_0 added [ 985.820657] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 985.827682] team0: Port device team_slave_1 added [ 985.840890] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 985.847127] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 985.872436] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 985.883268] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 985.889566] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 985.915865] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 985.926173] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 985.933654] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 985.981811] device hsr_slave_0 entered promiscuous mode [ 986.060272] device hsr_slave_1 entered promiscuous mode [ 986.140626] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 986.147619] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 986.195546] bridge0: port 2(bridge_slave_1) entered blocking state [ 986.202107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 986.208759] bridge0: port 1(bridge_slave_0) entered blocking state [ 986.215134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 986.244096] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 986.251120] 8021q: adding VLAN 0 to HW filter on device bond0 [ 986.258849] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 986.267526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 986.285658] bridge0: port 1(bridge_slave_0) entered disabled state [ 986.292647] bridge0: port 2(bridge_slave_1) entered disabled state [ 986.302805] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 986.308879] 8021q: adding VLAN 0 to HW filter on device team0 [ 986.316954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 986.324907] bridge0: port 1(bridge_slave_0) entered blocking state [ 986.331274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 986.340275] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 986.347809] bridge0: port 2(bridge_slave_1) entered blocking state [ 986.354167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 986.366518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 986.376354] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 986.385264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 986.395392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 986.405129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 986.414279] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 986.420590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 986.432756] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 986.440882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 986.447562] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 986.457766] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 986.513575] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 986.523230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 986.556296] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 986.563720] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 986.570430] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 986.578999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 986.587004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 986.593904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 986.603760] device veth0_vlan entered promiscuous mode [ 986.612417] device veth1_vlan entered promiscuous mode [ 986.618140] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 986.626807] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 986.637852] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 986.647262] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 986.654828] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 986.662169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 986.671617] device veth0_macvtap entered promiscuous mode [ 986.677573] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 986.685413] device veth1_macvtap entered promiscuous mode [ 986.692618] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 986.699594] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 986.708763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 986.717348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 986.727243] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 986.734469] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 986.742913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 986.750655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 986.760248] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 986.767121] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 986.774403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 986.782071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/02/11 04:21:02 executed programs: 72 2020/02/11 04:21:07 executed programs: 266 [ 996.323237] NOHZ: local_softirq_pending 08 2020/02/11 04:21:12 executed programs: 455 2020/02/11 04:21:17 executed programs: 650 2020/02/11 04:21:22 executed programs: 841 2020/02/11 04:21:27 executed programs: 1033 2020/02/11 04:21:32 executed programs: 1218 [ 1023.789355] ================================================================== [ 1023.796986] BUG: KASAN: use-after-free in __lock_acquire+0x3098/0x4620 [ 1023.803669] Read of size 8 at addr ffff8880a8e598a0 by task syz-executor.0/14268 [ 1023.811212] [ 1023.812877] CPU: 1 PID: 14268 Comm: syz-executor.0 Not tainted 4.14.170-syzkaller #0 [ 1023.820731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1023.830086] Call Trace: [ 1023.832705] dump_stack+0x142/0x197 [ 1023.836417] ? __lock_acquire+0x3098/0x4620 [ 1023.840774] print_address_description.cold+0x7c/0x1dc [ 1023.846086] ? __lock_acquire+0x3098/0x4620 [ 1023.850394] kasan_report.cold+0xa9/0x2af [ 1023.854518] __asan_report_load8_noabort+0x14/0x20 [ 1023.859424] __lock_acquire+0x3098/0x4620 [ 1023.863559] ? mark_held_locks+0xb1/0x100 [ 1023.867738] ? __free_pages_ok+0x618/0xea0 [ 1023.871954] ? trace_hardirqs_on_caller+0x400/0x590 [ 1023.877056] ? trace_hardirqs_on+0x10/0x10 [ 1023.881269] ? __free_pages+0x61/0x90 [ 1023.885082] ? put_task_stack+0xc9/0x1e0 [ 1023.889138] ? finish_task_switch+0x489/0x650 [ 1023.893609] ? switch_mm_irqs_off+0x2c5/0xec0 [ 1023.898089] ? __schedule+0x7c0/0x1cd0 [ 1023.902087] lock_acquire+0x16f/0x430 [ 1023.905893] ? __lock_sock+0x13a/0x210 [ 1023.909802] _raw_spin_lock_bh+0x33/0x50 [ 1023.913880] ? __lock_sock+0x13a/0x210 [ 1023.917744] __lock_sock+0x13a/0x210 [ 1023.921431] ? sock_rfree+0x160/0x160 [ 1023.925225] ? lock_acquire+0x16f/0x430 [ 1023.929176] ? lock_sock_nested+0x3f/0x110 [ 1023.933402] ? finish_wait+0x260/0x260 [ 1023.937264] lock_sock_nested+0xee/0x110 [ 1023.941351] sctp_sock_dump+0x122/0xb00 [ 1023.945344] ? lock_downgrade+0x740/0x740 [ 1023.949473] ? _raw_spin_unlock+0x2d/0x50 [ 1023.953625] sctp_for_each_transport+0x251/0x2e0 [ 1023.958357] ? sctp_ep_dump+0x730/0x730 [ 1023.962305] ? sctp_v6_del_protocol+0x30/0x30 [ 1023.966775] ? sctp_transport_get_next+0x160/0x160 [ 1023.971680] ? trace_hardirqs_on+0xd/0x10 [ 1023.975802] ? sctp_for_each_endpoint+0x142/0x1a0 [ 1023.980618] sctp_diag_dump+0x2de/0x3c0 [ 1023.984567] ? sctp_diag_dump_one+0x470/0x470 [ 1023.989034] ? mutex_lock_nested+0x16/0x20 [ 1023.993240] ? mutex_lock_nested+0x16/0x20 [ 1023.997503] __inet_diag_dump+0x8e/0x120 [ 1024.001540] inet_diag_dump+0x8e/0x110 [ 1024.005486] netlink_dump+0x3fa/0xb10 [ 1024.009298] __netlink_dump_start+0x4e6/0x740 [ 1024.013779] inet_diag_handler_cmd+0x225/0x2e0 [ 1024.018335] ? inet_diag_rcv_msg_compat+0x2c0/0x2c0 [ 1024.023327] ? inet_diag_dump_compat+0x2d0/0x2d0 [ 1024.028101] sock_diag_rcv_msg+0x29e/0x3a0 [ 1024.032311] netlink_rcv_skb+0x14f/0x3c0 [ 1024.036346] ? sock_diag_bind+0x90/0x90 [ 1024.040297] ? lock_downgrade+0x740/0x740 [ 1024.044417] ? netlink_ack+0x9a0/0x9a0 [ 1024.048279] sock_diag_rcv+0x2b/0x40 [ 1024.051965] netlink_unicast+0x44d/0x650 [ 1024.055999] ? netlink_attachskb+0x6a0/0x6a0 [ 1024.060415] ? security_netlink_send+0x81/0xb0 [ 1024.065071] netlink_sendmsg+0x7c4/0xc60 [ 1024.069105] ? netlink_unicast+0x650/0x650 [ 1024.073316] ? security_socket_sendmsg+0x89/0xb0 [ 1024.078047] ? netlink_unicast+0x650/0x650 [ 1024.082260] sock_sendmsg+0xce/0x110 [ 1024.085947] sock_write_iter+0x25b/0x3b0 [ 1024.089977] ? sock_sendmsg+0x110/0x110 [ 1024.093953] ? selinux_file_open+0x420/0x420 [ 1024.098337] ? __might_sleep+0x2c/0xb0 [ 1024.102235] do_iter_readv_writev+0x418/0x670 [ 1024.106699] ? vfs_dedupe_file_range+0x8f0/0x8f0 [ 1024.111426] ? rw_verify_area+0xea/0x2b0 [ 1024.115457] do_iter_write+0x154/0x540 [ 1024.119337] ? dup_iter+0x260/0x260 [ 1024.122941] vfs_writev+0x170/0x2a0 [ 1024.126555] ? vfs_iter_write+0xb0/0xb0 [ 1024.130509] ? __fget+0x237/0x370 [ 1024.133933] ? __fget_light+0x172/0x1f0 [ 1024.137963] do_writev+0x10a/0x2d0 [ 1024.141478] ? vfs_writev+0x2a0/0x2a0 [ 1024.145253] ? SyS_readv+0x30/0x30 [ 1024.148779] SyS_writev+0x28/0x30 [ 1024.152205] do_syscall_64+0x1e8/0x640 [ 1024.156063] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1024.160878] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1024.166041] RIP: 0033:0x45b3b9 [ 1024.169204] RSP: 002b:00007f05a5187c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1024.176883] RAX: ffffffffffffffda RBX: 00007f05a51886d4 RCX: 000000000045b3b9 [ 1024.184127] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 000000000000000b [ 1024.191376] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1024.198622] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1024.205866] R13: 0000000000000cdd R14: 00000000004c9cc2 R15: 000000000075c07c [ 1024.213128] [ 1024.214766] Allocated by task 14267: [ 1024.218491] save_stack_trace+0x16/0x20 [ 1024.222483] save_stack+0x45/0xd0 [ 1024.225923] kasan_kmalloc+0xce/0xf0 [ 1024.229607] kasan_slab_alloc+0xf/0x20 [ 1024.233581] kmem_cache_alloc+0x12e/0x780 [ 1024.237702] sk_prot_alloc+0x67/0x2a0 [ 1024.241474] sk_alloc+0x39/0xd70 [ 1024.244851] inet6_create+0x2d8/0xe10 [ 1024.248623] __sock_create+0x2f6/0x620 [ 1024.252481] SyS_socket+0xd3/0x170 [ 1024.256001] do_syscall_64+0x1e8/0x640 [ 1024.259974] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1024.265134] [ 1024.266734] Freed by task 14267: [ 1024.270073] save_stack_trace+0x16/0x20 [ 1024.274031] save_stack+0x45/0xd0 [ 1024.277473] kasan_slab_free+0x75/0xc0 [ 1024.281382] kmem_cache_free+0x83/0x2b0 [ 1024.285338] __sk_destruct+0x3c5/0x650 [ 1024.289200] sk_destruct+0xa4/0xd0 [ 1024.292716] __sk_free+0x54/0x230 [ 1024.296140] sk_free+0x35/0x40 [ 1024.299304] sctp_close+0x5f0/0x730 [ 1024.302920] inet_release+0xec/0x1c0 [ 1024.306608] inet6_release+0x53/0x80 [ 1024.310332] __sock_release+0xce/0x2b0 [ 1024.314194] sock_close+0x1b/0x30 [ 1024.317646] __fput+0x275/0x7a0 [ 1024.320900] ____fput+0x16/0x20 [ 1024.324274] task_work_run+0x114/0x190 [ 1024.328155] get_signal+0x18a8/0x1cd0 [ 1024.331936] do_signal+0x86/0x19a0 [ 1024.335453] exit_to_usermode_loop+0x15c/0x220 [ 1024.340043] do_syscall_64+0x4bc/0x640 [ 1024.343910] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1024.349070] [ 1024.350672] The buggy address belongs to the object at ffff8880a8e59800 [ 1024.350672] which belongs to the cache SCTPv6 of size 1896 [ 1024.362951] The buggy address is located 160 bytes inside of [ 1024.362951] 1896-byte region [ffff8880a8e59800, ffff8880a8e59f68) [ 1024.374884] The buggy address belongs to the page: [ 1024.379787] page:ffffea0002a39640 count:1 mapcount:0 mapping:ffff8880a8e59000 index:0x0 [ 1024.388169] flags: 0xfffe0000000100(slab) [ 1024.392295] raw: 00fffe0000000100 ffff8880a8e59000 0000000000000000 0000000100000002 [ 1024.400150] raw: ffffea0002a2b460 ffffea00026cc4e0 ffff88809ac7e380 0000000000000000 [ 1024.408002] page dumped because: kasan: bad access detected [ 1024.413714] [ 1024.415323] Memory state around the buggy address: [ 1024.420228] ffff8880a8e59780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1024.427562] ffff8880a8e59800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1024.434898] >ffff8880a8e59880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1024.442267] ^ [ 1024.446648] ffff8880a8e59900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1024.453982] ffff8880a8e59980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1024.461443] ================================================================== [ 1024.468819] Disabling lock debugging due to kernel taint [ 1024.474470] Kernel panic - not syncing: panic_on_warn set ... [ 1024.474470] [ 1024.481875] CPU: 1 PID: 14268 Comm: syz-executor.0 Tainted: G B 4.14.170-syzkaller #0 [ 1024.490982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.500418] Call Trace: [ 1024.503024] dump_stack+0x142/0x197 [ 1024.506671] ? __lock_acquire+0x3098/0x4620 [ 1024.510969] panic+0x1f9/0x42d [ 1024.514135] ? add_taint.cold+0x16/0x16 [ 1024.518085] ? lock_downgrade+0x740/0x740 [ 1024.522247] kasan_end_report+0x47/0x4f [ 1024.526218] kasan_report.cold+0x130/0x2af [ 1024.530431] __asan_report_load8_noabort+0x14/0x20 [ 1024.535360] __lock_acquire+0x3098/0x4620 [ 1024.539482] ? mark_held_locks+0xb1/0x100 [ 1024.543603] ? __free_pages_ok+0x618/0xea0 [ 1024.547853] ? trace_hardirqs_on_caller+0x400/0x590 [ 1024.552851] ? trace_hardirqs_on+0x10/0x10 [ 1024.557064] ? __free_pages+0x61/0x90 [ 1024.560842] ? put_task_stack+0xc9/0x1e0 [ 1024.564889] ? finish_task_switch+0x489/0x650 [ 1024.569365] ? switch_mm_irqs_off+0x2c5/0xec0 [ 1024.573840] ? __schedule+0x7c0/0x1cd0 [ 1024.577841] lock_acquire+0x16f/0x430 [ 1024.581616] ? __lock_sock+0x13a/0x210 [ 1024.585478] _raw_spin_lock_bh+0x33/0x50 [ 1024.589596] ? __lock_sock+0x13a/0x210 [ 1024.593487] __lock_sock+0x13a/0x210 [ 1024.597174] ? sock_rfree+0x160/0x160 [ 1024.600956] ? lock_acquire+0x16f/0x430 [ 1024.605088] ? lock_sock_nested+0x3f/0x110 [ 1024.609295] ? finish_wait+0x260/0x260 [ 1024.613166] lock_sock_nested+0xee/0x110 [ 1024.617241] sctp_sock_dump+0x122/0xb00 [ 1024.621200] ? lock_downgrade+0x740/0x740 [ 1024.625321] ? _raw_spin_unlock+0x2d/0x50 [ 1024.629485] sctp_for_each_transport+0x251/0x2e0 [ 1024.634227] ? sctp_ep_dump+0x730/0x730 [ 1024.638179] ? sctp_v6_del_protocol+0x30/0x30 [ 1024.642651] ? sctp_transport_get_next+0x160/0x160 [ 1024.647564] ? trace_hardirqs_on+0xd/0x10 [ 1024.651702] ? sctp_for_each_endpoint+0x142/0x1a0 [ 1024.656519] sctp_diag_dump+0x2de/0x3c0 [ 1024.660471] ? sctp_diag_dump_one+0x470/0x470 [ 1024.664948] ? mutex_lock_nested+0x16/0x20 [ 1024.669166] ? mutex_lock_nested+0x16/0x20 [ 1024.673381] __inet_diag_dump+0x8e/0x120 [ 1024.677422] inet_diag_dump+0x8e/0x110 [ 1024.681286] netlink_dump+0x3fa/0xb10 [ 1024.685065] __netlink_dump_start+0x4e6/0x740 [ 1024.689535] inet_diag_handler_cmd+0x225/0x2e0 [ 1024.694124] ? inet_diag_rcv_msg_compat+0x2c0/0x2c0 [ 1024.699131] ? inet_diag_dump_compat+0x2d0/0x2d0 [ 1024.703866] sock_diag_rcv_msg+0x29e/0x3a0 [ 1024.708079] netlink_rcv_skb+0x14f/0x3c0 [ 1024.712116] ? sock_diag_bind+0x90/0x90 [ 1024.716069] ? lock_downgrade+0x740/0x740 [ 1024.720199] ? netlink_ack+0x9a0/0x9a0 [ 1024.724063] sock_diag_rcv+0x2b/0x40 [ 1024.727750] netlink_unicast+0x44d/0x650 [ 1024.731784] ? netlink_attachskb+0x6a0/0x6a0 [ 1024.736300] ? security_netlink_send+0x81/0xb0 [ 1024.740866] netlink_sendmsg+0x7c4/0xc60 [ 1024.744915] ? netlink_unicast+0x650/0x650 [ 1024.749140] ? security_socket_sendmsg+0x89/0xb0 [ 1024.753887] ? netlink_unicast+0x650/0x650 [ 1024.758100] sock_sendmsg+0xce/0x110 [ 1024.761799] sock_write_iter+0x25b/0x3b0 [ 1024.765838] ? sock_sendmsg+0x110/0x110 [ 1024.769830] ? selinux_file_open+0x420/0x420 [ 1024.774251] ? __might_sleep+0x2c/0xb0 [ 1024.778114] do_iter_readv_writev+0x418/0x670 [ 1024.782587] ? vfs_dedupe_file_range+0x8f0/0x8f0 [ 1024.787323] ? rw_verify_area+0xea/0x2b0 [ 1024.791357] do_iter_write+0x154/0x540 [ 1024.795221] ? dup_iter+0x260/0x260 [ 1024.798829] vfs_writev+0x170/0x2a0 [ 1024.802467] ? vfs_iter_write+0xb0/0xb0 [ 1024.806420] ? __fget+0x237/0x370 [ 1024.809849] ? __fget_light+0x172/0x1f0 [ 1024.813877] do_writev+0x10a/0x2d0 [ 1024.817408] ? vfs_writev+0x2a0/0x2a0 [ 1024.821183] ? SyS_readv+0x30/0x30 [ 1024.824698] SyS_writev+0x28/0x30 [ 1024.828126] do_syscall_64+0x1e8/0x640 [ 1024.831995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1024.836816] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1024.841983] RIP: 0033:0x45b3b9 [ 1024.845152] RSP: 002b:00007f05a5187c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1024.852887] RAX: ffffffffffffffda RBX: 00007f05a51886d4 RCX: 000000000045b3b9 [ 1024.860176] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 000000000000000b [ 1024.867419] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1024.874663] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1024.881905] R13: 0000000000000cdd R14: 00000000004c9cc2 R15: 000000000075c07c [ 1024.890677] Kernel Offset: disabled [ 1024.894302] Rebooting in 86400 seconds..