[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 83.982321][ T8430] sshd (8430) used greatest stack depth: 3816 bytes left Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. 2020/07/22 05:28:11 fuzzer started 2020/07/22 05:28:11 dialing manager at 10.128.0.26:36767 2020/07/22 05:28:11 syscalls: 3112 2020/07/22 05:28:11 code coverage: enabled 2020/07/22 05:28:11 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/07/22 05:28:11 extra coverage: enabled 2020/07/22 05:28:11 setuid sandbox: enabled 2020/07/22 05:28:11 namespace sandbox: enabled 2020/07/22 05:28:11 Android sandbox: enabled 2020/07/22 05:28:11 fault injection: enabled 2020/07/22 05:28:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/22 05:28:11 net packet injection: enabled 2020/07/22 05:28:11 net device setup: enabled 2020/07/22 05:28:11 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/22 05:28:11 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/22 05:28:11 USB emulation: /dev/raw-gadget does not exist 05:30:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/partitions\x00', 0x0, 0x0) read$char_usb(r2, 0x0, 0x0) lseek(r2, 0x8004, 0x0) [ 228.212613][ T32] audit: type=1400 audit(1595395823.380:8): avc: denied { execmem } for pid=8473 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 228.552730][ T8474] IPVS: ftp: loaded support on port[0] = 21 [ 228.792159][ T8474] chnl_net:caif_netlink_parms(): no params data found [ 229.037348][ T8474] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.044594][ T8474] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.054590][ T8474] device bridge_slave_0 entered promiscuous mode [ 229.067597][ T8474] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.074834][ T8474] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.084236][ T8474] device bridge_slave_1 entered promiscuous mode [ 229.129730][ T8474] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.145218][ T8474] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 229.191500][ T8474] team0: Port device team_slave_0 added [ 229.202476][ T8474] team0: Port device team_slave_1 added [ 229.244518][ T8474] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 229.252029][ T8474] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 229.278222][ T8474] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 229.291869][ T8474] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 229.299861][ T8474] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 229.326034][ T8474] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 229.552486][ T8474] device hsr_slave_0 entered promiscuous mode [ 229.706513][ T8474] device hsr_slave_1 entered promiscuous mode [ 230.114963][ T8474] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 230.174488][ T8474] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 230.414367][ T8474] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 230.534066][ T8474] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 230.781036][ T8474] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.808861][ T2310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.818201][ T2310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.835858][ T8474] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.861019][ T2310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.871129][ T2310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.880642][ T2310] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.888017][ T2310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.897020][ T2310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.907021][ T2310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.916460][ T2310] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.923678][ T2310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.940450][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.949869][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.968965][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.996404][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.007234][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.022993][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.033008][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.043444][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.062680][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.072525][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.091004][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.100797][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.115847][ T8474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.176629][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 231.184359][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 231.212820][ T8474] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.263305][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.273512][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.315251][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.327200][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.346255][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.355221][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.372888][ T8474] device veth0_vlan entered promiscuous mode [ 231.404113][ T8474] device veth1_vlan entered promiscuous mode [ 231.456755][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 231.466328][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 231.475684][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.486303][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.501781][ T8474] device veth0_macvtap entered promiscuous mode [ 231.530590][ T8474] device veth1_macvtap entered promiscuous mode [ 231.581367][ T8474] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 231.590509][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 231.600730][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.610080][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.619986][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.652690][ T8474] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 231.682197][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.692265][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 05:30:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/partitions\x00', 0x0, 0x0) read$char_usb(r2, 0x0, 0x0) lseek(r2, 0x8004, 0x0) 05:30:27 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff38) [ 232.559761][ T32] audit: type=1800 audit(1595395827.730:9): pid=8707 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15724 res=0 [ 232.580473][ T32] audit: type=1804 audit(1595395827.730:10): pid=8707 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir178895883/syzkaller.o0lfuc/2/file0" dev="sda1" ino=15724 res=1 [ 232.656997][ T32] audit: type=1804 audit(1595395827.830:11): pid=8707 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir178895883/syzkaller.o0lfuc/2/file0" dev="sda1" ino=15724 res=1 [ 233.372137][ T32] audit: type=1804 audit(1595395828.540:12): pid=8710 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir178895883/syzkaller.o0lfuc/2/file0" dev="sda1" ino=15724 res=1 [ 233.398072][ T32] audit: type=1804 audit(1595395828.540:13): pid=8709 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir178895883/syzkaller.o0lfuc/2/file0" dev="sda1" ino=15724 res=1 05:30:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x12, 0x0, 0x0, 0x0, 0x0, "0000794b0000000000000010000000001000"}) 05:30:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') r3 = socket$netlink(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000bf) [ 233.782572][ T8719] ===================================================== [ 233.789577][ T8719] BUG: KMSAN: uninit-value in selinux_netlink_send+0x413/0xba0 [ 233.797127][ T8719] CPU: 1 PID: 8719 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 233.805694][ T8719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.815740][ T8719] Call Trace: [ 233.819032][ T8719] dump_stack+0x1df/0x240 [ 233.823352][ T8719] kmsan_report+0xf7/0x1e0 [ 233.827796][ T8719] __msan_warning+0x58/0xa0 [ 233.832390][ T8719] selinux_netlink_send+0x413/0xba0 [ 233.837608][ T8719] ? kmsan_get_metadata+0x11d/0x180 [ 233.842806][ T8719] ? kmsan_get_metadata+0x11d/0x180 [ 233.848077][ T8719] ? selinux_vm_enough_memory+0x1a0/0x1a0 [ 233.853783][ T8719] security_netlink_send+0xef/0x1e0 [ 233.858977][ T8719] netlink_sendmsg+0x1008/0x14d0 [ 233.864014][ T8719] ? netlink_getsockopt+0x1440/0x1440 [ 233.869435][ T8719] kernel_sendmsg+0x433/0x440 [ 233.874279][ T8719] sock_no_sendpage+0x235/0x300 [ 233.879125][ T8719] ? sock_no_mmap+0x30/0x30 [ 233.883620][ T8719] sock_sendpage+0x1e1/0x2c0 [ 233.888226][ T8719] pipe_to_sendpage+0x38c/0x4c0 [ 233.893070][ T8719] ? sock_fasync+0x250/0x250 [ 233.897657][ T8719] __splice_from_pipe+0x565/0xf00 [ 233.902764][ T8719] ? generic_splice_sendpage+0x2d0/0x2d0 [ 233.908408][ T8719] generic_splice_sendpage+0x1d5/0x2d0 [ 233.913870][ T8719] ? iter_file_splice_write+0x1800/0x1800 [ 233.919592][ T8719] direct_splice_actor+0x1fd/0x580 [ 233.924702][ T8719] ? kmsan_get_metadata+0x4f/0x180 [ 233.929807][ T8719] splice_direct_to_actor+0x6b2/0xf50 [ 233.935168][ T8719] ? do_splice_direct+0x580/0x580 [ 233.940224][ T8719] do_splice_direct+0x342/0x580 [ 233.945086][ T8719] do_sendfile+0x101b/0x1d40 [ 233.949700][ T8719] __se_compat_sys_sendfile+0x301/0x3c0 [ 233.955263][ T8719] ? kmsan_get_metadata+0x11d/0x180 [ 233.960480][ T8719] ? __ia32_sys_sendfile64+0x70/0x70 [ 233.965772][ T8719] __ia32_compat_sys_sendfile+0x56/0x70 [ 233.971319][ T8719] __do_fast_syscall_32+0x2aa/0x400 [ 233.976606][ T8719] do_fast_syscall_32+0x6b/0xd0 [ 233.981447][ T8719] do_SYSENTER_32+0x73/0x90 [ 233.985937][ T8719] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 233.992267][ T8719] RIP: 0023:0xf7f8c549 [ 233.996312][ T8719] Code: Bad RIP value. [ 234.000357][ T8719] RSP: 002b:00000000f5d870cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 234.008751][ T8719] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000000005 [ 234.016707][ T8719] RDX: 0000000000000000 RSI: 00000000800000bf RDI: 0000000000000000 [ 234.025105][ T8719] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 234.033076][ T8719] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 234.041033][ T8719] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 234.048998][ T8719] [ 234.051308][ T8719] Uninit was stored to memory at: [ 234.056322][ T8719] kmsan_internal_chain_origin+0xad/0x130 [ 234.062025][ T8719] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 234.067994][ T8719] kmsan_memcpy_metadata+0xb/0x10 [ 234.072999][ T8719] __msan_memcpy+0x43/0x50 [ 234.077401][ T8719] _copy_from_iter_full+0xbfe/0x13b0 [ 234.082672][ T8719] netlink_sendmsg+0xfaa/0x14d0 [ 234.087516][ T8719] kernel_sendmsg+0x433/0x440 [ 234.092190][ T8719] sock_no_sendpage+0x235/0x300 [ 234.097083][ T8719] sock_sendpage+0x1e1/0x2c0 [ 234.101684][ T8719] pipe_to_sendpage+0x38c/0x4c0 [ 234.106543][ T8719] __splice_from_pipe+0x565/0xf00 [ 234.111551][ T8719] generic_splice_sendpage+0x1d5/0x2d0 [ 234.117004][ T8719] direct_splice_actor+0x1fd/0x580 [ 234.122111][ T8719] splice_direct_to_actor+0x6b2/0xf50 [ 234.127482][ T8719] do_splice_direct+0x342/0x580 [ 234.132424][ T8719] do_sendfile+0x101b/0x1d40 [ 234.137023][ T8719] __se_compat_sys_sendfile+0x301/0x3c0 [ 234.142685][ T8719] __ia32_compat_sys_sendfile+0x56/0x70 [ 234.148233][ T8719] __do_fast_syscall_32+0x2aa/0x400 [ 234.153443][ T8719] do_fast_syscall_32+0x6b/0xd0 [ 234.158292][ T8719] do_SYSENTER_32+0x73/0x90 [ 234.162807][ T8719] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 234.169203][ T8719] [ 234.171572][ T8719] Uninit was created at: [ 234.175821][ T8719] kmsan_save_stack_with_flags+0x3c/0x90 [ 234.181464][ T8719] kmsan_alloc_page+0xb9/0x180 [ 234.186217][ T8719] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 234.191743][ T8719] alloc_pages_current+0x672/0x990 [ 234.196835][ T8719] push_pipe+0x605/0xb70 [ 234.201057][ T8719] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 234.207116][ T8719] do_splice_to+0x4fc/0x14f0 [ 234.211695][ T8719] splice_direct_to_actor+0x45c/0xf50 [ 234.217231][ T8719] do_splice_direct+0x342/0x580 [ 234.222069][ T8719] do_sendfile+0x101b/0x1d40 [ 234.226704][ T8719] __se_compat_sys_sendfile+0x301/0x3c0 [ 234.232258][ T8719] __ia32_compat_sys_sendfile+0x56/0x70 [ 234.237792][ T8719] __do_fast_syscall_32+0x2aa/0x400 [ 234.242978][ T8719] do_fast_syscall_32+0x6b/0xd0 [ 234.247825][ T8719] do_SYSENTER_32+0x73/0x90 [ 234.252342][ T8719] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 234.258749][ T8719] ===================================================== [ 234.265661][ T8719] Disabling lock debugging due to kernel taint [ 234.271797][ T8719] Kernel panic - not syncing: panic_on_warn set ... [ 234.278381][ T8719] CPU: 1 PID: 8719 Comm: syz-executor.0 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 234.288857][ T8719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.299014][ T8719] Call Trace: [ 234.302298][ T8719] dump_stack+0x1df/0x240 [ 234.306618][ T8719] panic+0x3d5/0xc3e [ 234.310512][ T8719] kmsan_report+0x1df/0x1e0 [ 234.315006][ T8719] __msan_warning+0x58/0xa0 [ 234.319618][ T8719] selinux_netlink_send+0x413/0xba0 [ 234.324808][ T8719] ? kmsan_get_metadata+0x11d/0x180 [ 234.329994][ T8719] ? kmsan_get_metadata+0x11d/0x180 [ 234.335184][ T8719] ? selinux_vm_enough_memory+0x1a0/0x1a0 [ 234.340899][ T8719] security_netlink_send+0xef/0x1e0 [ 234.346091][ T8719] netlink_sendmsg+0x1008/0x14d0 [ 234.351039][ T8719] ? netlink_getsockopt+0x1440/0x1440 [ 234.356411][ T8719] kernel_sendmsg+0x433/0x440 [ 234.361087][ T8719] sock_no_sendpage+0x235/0x300 [ 234.365943][ T8719] ? sock_no_mmap+0x30/0x30 [ 234.370457][ T8719] sock_sendpage+0x1e1/0x2c0 [ 234.375069][ T8719] pipe_to_sendpage+0x38c/0x4c0 [ 234.379923][ T8719] ? sock_fasync+0x250/0x250 [ 234.384510][ T8719] __splice_from_pipe+0x565/0xf00 [ 234.389530][ T8719] ? generic_splice_sendpage+0x2d0/0x2d0 [ 234.395165][ T8719] generic_splice_sendpage+0x1d5/0x2d0 [ 234.400646][ T8719] ? iter_file_splice_write+0x1800/0x1800 [ 234.406367][ T8719] direct_splice_actor+0x1fd/0x580 [ 234.411470][ T8719] ? kmsan_get_metadata+0x4f/0x180 [ 234.416585][ T8719] splice_direct_to_actor+0x6b2/0xf50 [ 234.421944][ T8719] ? do_splice_direct+0x580/0x580 [ 234.426966][ T8719] do_splice_direct+0x342/0x580 [ 234.431813][ T8719] do_sendfile+0x101b/0x1d40 [ 234.436409][ T8719] __se_compat_sys_sendfile+0x301/0x3c0 [ 234.441943][ T8719] ? kmsan_get_metadata+0x11d/0x180 [ 234.447126][ T8719] ? __ia32_sys_sendfile64+0x70/0x70 [ 234.452398][ T8719] __ia32_compat_sys_sendfile+0x56/0x70 [ 234.457929][ T8719] __do_fast_syscall_32+0x2aa/0x400 [ 234.463208][ T8719] do_fast_syscall_32+0x6b/0xd0 [ 234.468119][ T8719] do_SYSENTER_32+0x73/0x90 [ 234.472610][ T8719] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 234.478927][ T8719] RIP: 0023:0xf7f8c549 [ 234.482989][ T8719] Code: Bad RIP value. [ 234.487159][ T8719] RSP: 002b:00000000f5d870cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 234.495786][ T8719] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000000005 [ 234.503758][ T8719] RDX: 0000000000000000 RSI: 00000000800000bf RDI: 0000000000000000 [ 234.511719][ T8719] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 234.519680][ T8719] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 234.527643][ T8719] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 234.536901][ T8719] Kernel Offset: 0x29600000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 234.548525][ T8719] Rebooting in 86400 seconds..