[ 49.897961] audit: type=1800 audit(1547297815.658:29): pid=8278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 49.945200] audit: type=1800 audit(1547297815.668:30): pid=8278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.59' (ECDSA) to the list of known hosts. syzkaller login: [ 826.719822] kauditd_printk_skb: 5 callbacks suppressed [ 826.719833] audit: type=1400 audit(1547298592.488:36): avc: denied { map } for pid=8464 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/01/12 13:09:53 parsed 1 programs [ 827.467537] audit: type=1400 audit(1547298593.228:37): avc: denied { map } for pid=8464 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15474 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2019/01/12 13:09:55 executed programs: 0 [ 829.293265] IPVS: ftp: loaded support on port[0] = 21 [ 829.366185] chnl_net:caif_netlink_parms(): no params data found [ 829.403791] bridge0: port 1(bridge_slave_0) entered blocking state [ 829.411145] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.418749] device bridge_slave_0 entered promiscuous mode [ 829.427064] bridge0: port 2(bridge_slave_1) entered blocking state [ 829.433553] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.440944] device bridge_slave_1 entered promiscuous mode [ 829.458163] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 829.467820] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 829.485862] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 829.494057] team0: Port device team_slave_0 added [ 829.499873] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 829.507057] team0: Port device team_slave_1 added [ 829.512598] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 829.520001] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 829.601434] device hsr_slave_0 entered promiscuous mode [ 829.659346] device hsr_slave_1 entered promiscuous mode [ 829.710037] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 829.717049] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 829.733527] bridge0: port 2(bridge_slave_1) entered blocking state [ 829.740070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 829.747022] bridge0: port 1(bridge_slave_0) entered blocking state [ 829.753448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 829.788760] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 829.796666] 8021q: adding VLAN 0 to HW filter on device bond0 [ 829.805804] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 829.815437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 829.835748] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.844235] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.852605] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 829.863373] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 829.869698] 8021q: adding VLAN 0 to HW filter on device team0 [ 829.878289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 829.887005] bridge0: port 1(bridge_slave_0) entered blocking state [ 829.893441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 829.911131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 829.918866] bridge0: port 2(bridge_slave_1) entered blocking state [ 829.925318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 829.933267] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 829.941589] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 829.952244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 829.967936] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 829.978199] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 829.989061] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 829.995599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 830.004132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 830.011782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 830.024399] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 830.035847] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 830.046465] audit: type=1400 audit(1547298595.818:38): avc: denied { associate } for pid=8477 comm="syz-executor0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 830.114928] IPVS: ftp: loaded support on port[0] = 21 [ 830.156047] IPVS: ftp: loaded support on port[0] = 21 [ 830.212686] IPVS: ftp: loaded support on port[0] = 21 [ 830.258070] IPVS: ftp: loaded support on port[0] = 21 [ 830.323147] IPVS: ftp: loaded support on port[0] = 21 [ 830.370055] IPVS: ftp: loaded support on port[0] = 21 [ 830.428865] IPVS: ftp: loaded support on port[0] = 21 [ 830.476691] IPVS: ftp: loaded support on port[0] = 21 [ 830.535706] IPVS: ftp: loaded support on port[0] = 21 [ 830.580908] IPVS: ftp: loaded support on port[0] = 21 [ 830.641610] IPVS: ftp: loaded support on port[0] = 21 [ 830.684327] IPVS: ftp: loaded support on port[0] = 21 [ 830.745721] IPVS: ftp: loaded support on port[0] = 21 [ 830.845725] IPVS: ftp: loaded support on port[0] = 21 [ 830.946890] IPVS: ftp: loaded support on port[0] = 21 [ 831.017952] IPVS: ftp: loaded support on port[0] = 21 [ 831.126693] IPVS: ftp: loaded support on port[0] = 21 [ 831.198176] IPVS: ftp: loaded support on port[0] = 21 [ 831.309932] IPVS: ftp: loaded support on port[0] = 21 [ 831.373056] IPVS: ftp: loaded support on port[0] = 21 [ 831.420295] ================================================================== [ 831.427919] BUG: KASAN: use-after-free in __smc_diag_dump.isra.0+0x283c/0x2ba0 [ 831.435285] Read of size 8 at addr ffff88809d3ce9a0 by task syz-executor0/8536 [ 831.442650] [ 831.444276] CPU: 0 PID: 8536 Comm: syz-executor0 Not tainted 5.0.0-rc1+ #21 [ 831.451378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.460807] Call Trace: [ 831.463498] dump_stack+0x1db/0x2d0 [ 831.467133] ? dump_stack_print_info.cold+0x20/0x20 [ 831.472201] ? _raw_read_unlock_bh+0x31/0x40 [ 831.476701] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 831.481721] ? __smc_diag_dump.isra.0+0x283c/0x2ba0 [ 831.486791] print_address_description.cold+0x7c/0x20d [ 831.492072] ? __smc_diag_dump.isra.0+0x283c/0x2ba0 [ 831.497091] ? __smc_diag_dump.isra.0+0x283c/0x2ba0 [ 831.502130] kasan_report.cold+0x1b/0x40 [ 831.506222] ? __smc_diag_dump.isra.0+0x283c/0x2ba0 [ 831.511254] __asan_report_load8_noabort+0x14/0x20 [ 831.516186] __smc_diag_dump.isra.0+0x283c/0x2ba0 [ 831.521103] ? __kmalloc_reserve.isra.0+0x40/0xe0 [ 831.526015] ? netlink_dump+0x7c5/0x1070 [ 831.530086] ? smc_diag_handler_dump+0x350/0x350 [ 831.534866] ? ___sys_sendmsg+0x7ec/0x910 [ 831.539016] ? __sys_sendmsg+0x112/0x270 [ 831.543077] ? __x64_sys_sendmsg+0x78/0xb0 [ 831.547350] ? do_syscall_64+0x110/0x800 [ 831.551447] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.556816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 831.562358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 831.567942] ? check_preemption_disabled+0x48/0x290 [ 831.573020] ? __lock_is_held+0xb6/0x140 [ 831.577104] ? __kmalloc_node_track_caller+0x3d/0x70 [ 831.582217] ? lock_acquire+0x1db/0x570 [ 831.586195] ? smc_diag_dump_proto.isra.0+0xfb/0x3c0 [ 831.591305] ? lock_release+0xc40/0xc40 [ 831.595285] ? kasan_kmalloc+0x9/0x10 [ 831.599119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 831.604669] ? kasan_check_write+0x14/0x20 [ 831.608913] smc_diag_dump_proto.isra.0+0x2e7/0x3c0 [ 831.613941] ? __smc_diag_dump.isra.0+0x2ba0/0x2ba0 [ 831.618959] ? find_held_lock+0x35/0x120 [ 831.623056] smc_diag_dump+0x27/0x80 [ 831.626793] netlink_dump+0x5f2/0x1070 [ 831.630708] ? netlink_broadcast+0x50/0x50 [ 831.634963] __netlink_dump_start+0x5b4/0x7e0 [ 831.639472] smc_diag_handler_dump+0x2a7/0x350 [ 831.644068] ? smc_gid_be16_convert+0x2c0/0x2c0 [ 831.648738] ? lock_downgrade+0x910/0x910 [ 831.652906] ? smc_diag_dump_proto.isra.0+0x3c0/0x3c0 [ 831.658167] ? rcu_read_unlock_special+0x380/0x380 [ 831.663181] sock_diag_rcv_msg+0x322/0x410 [ 831.667442] netlink_rcv_skb+0x17d/0x410 [ 831.671547] ? sock_diag_bind+0x80/0x80 [ 831.675529] ? netlink_ack+0xba0/0xba0 [ 831.679445] sock_diag_rcv+0x2b/0x40 [ 831.683171] netlink_unicast+0x574/0x770 [ 831.687292] ? netlink_attachskb+0x980/0x980 [ 831.691704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 831.697265] netlink_sendmsg+0xa05/0xf90 [ 831.701325] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 831.706873] ? netlink_unicast+0x770/0x770 [ 831.711139] ? selinux_socket_sendmsg+0x36/0x40 [ 831.715816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 831.721358] ? security_socket_sendmsg+0x93/0xc0 [ 831.726115] ? netlink_unicast+0x770/0x770 [ 831.730357] sock_sendmsg+0xdd/0x130 [ 831.734076] ___sys_sendmsg+0x7ec/0x910 [ 831.738055] ? copy_msghdr_from_user+0x570/0x570 [ 831.742821] ? iterate_fd+0x4b0/0x4b0 [ 831.746659] ? __might_fault+0x12b/0x1e0 [ 831.750728] ? find_held_lock+0x35/0x120 [ 831.754795] ? __might_fault+0x12b/0x1e0 [ 831.758863] ? __fget_light+0x2db/0x420 [ 831.762841] ? fget_raw+0x20/0x20 [ 831.766295] ? lock_release+0xc40/0xc40 [ 831.770313] ? trace_hardirqs_off_caller+0x300/0x300 [ 831.775481] ? __fdget+0x1b/0x20 [ 831.778850] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 831.784388] ? sockfd_lookup_light+0xc2/0x160 [ 831.788904] __sys_sendmsg+0x112/0x270 [ 831.792803] ? __ia32_sys_shutdown+0x80/0x80 [ 831.797243] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.802642] ? trace_hardirqs_off_caller+0x300/0x300 [ 831.807762] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.812523] __x64_sys_sendmsg+0x78/0xb0 [ 831.816586] do_syscall_64+0x1a3/0x800 [ 831.820499] ? syscall_return_slowpath+0x5f0/0x5f0 [ 831.825455] ? prepare_exit_to_usermode+0x232/0x3b0 [ 831.830489] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 831.835347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.840538] RIP: 0033:0x457ec9 [ 831.843736] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 831.862635] RSP: 002b:00007f129b9eac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 831.870343] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 831.877615] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 000000000000000e [ 831.884884] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 831.892164] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f129b9eb6d4 [ 831.892177] R13: 00000000004c52f9 R14: 00000000004d8d58 R15: 00000000ffffffff [ 831.892197] [ 831.892241] Allocated by task 8537: [ 831.892259] save_stack+0x45/0xd0 [ 831.892275] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 831.892288] kasan_slab_alloc+0xf/0x20 [ 831.892300] kmem_cache_alloc+0x12d/0x710 [ 831.928508] sock_alloc_inode+0x1d/0x260 [ 831.932595] alloc_inode+0x66/0x190 [ 831.936218] new_inode_pseudo+0x71/0x1b0 [ 831.940288] sock_alloc+0x41/0x270 [ 831.943844] __sock_create+0x173/0x930 [ 831.947773] sock_create_kern+0x3b/0x50 [ 831.951801] smc_create+0x17f/0x3c0 [ 831.955436] __sock_create+0x532/0x930 [ 831.959321] __sys_socket+0x106/0x260 [ 831.963121] __x64_sys_socket+0x73/0xb0 [ 831.967097] do_syscall_64+0x1a3/0x800 [ 831.970978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.976159] [ 831.977809] Freed by task 8535: [ 831.981134] save_stack+0x45/0xd0 [ 831.984594] __kasan_slab_free+0x102/0x150 [ 831.988822] kasan_slab_free+0xe/0x10 [ 831.992633] kmem_cache_free+0x86/0x260 [ 831.996605] sock_destroy_inode+0x4f/0x60 [ 832.000746] destroy_inode+0x14f/0x1f0 [ 832.004626] evict+0x5c3/0x940 [ 832.007814] iput+0x67e/0xae0 [ 832.010915] __sock_release+0x1e6/0x250 [ 832.014901] sock_release+0x18/0x20 [ 832.018524] smc_release+0x29c/0x9c0 [ 832.022230] __sock_release+0xd3/0x250 [ 832.026336] sock_close+0x1b/0x30 [ 832.029811] __fput+0x3c5/0xb10 [ 832.033086] ____fput+0x16/0x20 [ 832.036384] task_work_run+0x1f4/0x2b0 [ 832.040273] exit_to_usermode_loop+0x32a/0x3b0 [ 832.044850] do_syscall_64+0x696/0x800 [ 832.048735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.053924] [ 832.055566] The buggy address belongs to the object at ffff88809d3ce980 [ 832.055566] which belongs to the cache sock_inode_cache(17:syz0) of size 976 [ 832.069560] The buggy address is located 32 bytes inside of [ 832.069560] 976-byte region [ffff88809d3ce980, ffff88809d3ced50) [ 832.081353] The buggy address belongs to the page: [ 832.086281] page:ffffea000274f380 count:1 mapcount:0 mapping:ffff88809a28d780 index:0xffff88809d3ceffd [ 832.095719] flags: 0x1fffc0000000200(slab) [ 832.099956] raw: 01fffc0000000200 ffffea00024b9c08 ffffea00025f8788 ffff88809a28d780 [ 832.107868] raw: ffff88809d3ceffd ffff88809d3ce080 0000000100000003 ffff8880a000a0c0 [ 832.115752] page dumped because: kasan: bad access detected [ 832.121468] page->mem_cgroup:ffff8880a000a0c0 [ 832.125984] [ 832.127599] Memory state around the buggy address: [ 832.132546] ffff88809d3ce880: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 832.139909] ffff88809d3ce900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 832.147266] >ffff88809d3ce980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 832.154622] ^ [ 832.159026] ffff88809d3cea00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 832.166379] ffff88809d3cea80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 832.173728] ================================================================== [ 832.181095] Disabling lock debugging due to kernel taint [ 832.187680] Kernel panic - not syncing: panic_on_warn set ... [ 832.193572] CPU: 0 PID: 8536 Comm: syz-executor0 Tainted: G B 5.0.0-rc1+ #21 [ 832.202064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.211405] Call Trace: [ 832.213993] dump_stack+0x1db/0x2d0 [ 832.217628] ? dump_stack_print_info.cold+0x20/0x20 [ 832.222698] panic+0x2cb/0x65c [ 832.225902] ? add_taint.cold+0x16/0x16 [ 832.229905] ? retint_kernel+0x2d/0x2d [ 832.233808] ? trace_hardirqs_on+0xb4/0x310 [ 832.238126] ? __smc_diag_dump.isra.0+0x283c/0x2ba0 [ 832.243147] end_report+0x47/0x4f [ 832.246620] ? __smc_diag_dump.isra.0+0x283c/0x2ba0 [ 832.251676] kasan_report.cold+0xe/0x40 [ 832.255646] ? __smc_diag_dump.isra.0+0x283c/0x2ba0 [ 832.260672] __asan_report_load8_noabort+0x14/0x20 [ 832.265596] __smc_diag_dump.isra.0+0x283c/0x2ba0 [ 832.270438] ? __kmalloc_reserve.isra.0+0x40/0xe0 [ 832.275277] ? netlink_dump+0x7c5/0x1070 [ 832.279348] ? smc_diag_handler_dump+0x350/0x350 [ 832.284098] ? ___sys_sendmsg+0x7ec/0x910 [ 832.288241] ? __sys_sendmsg+0x112/0x270 [ 832.292296] ? __x64_sys_sendmsg+0x78/0xb0 [ 832.296526] ? do_syscall_64+0x110/0x800 [ 832.300581] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.305939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.311471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.317007] ? check_preemption_disabled+0x48/0x290 [ 832.322025] ? __lock_is_held+0xb6/0x140 [ 832.326093] ? __kmalloc_node_track_caller+0x3d/0x70 [ 832.331205] ? lock_acquire+0x1db/0x570 [ 832.335186] ? smc_diag_dump_proto.isra.0+0xfb/0x3c0 [ 832.340287] ? lock_release+0xc40/0xc40 [ 832.344278] ? kasan_kmalloc+0x9/0x10 [ 832.348076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 832.353609] ? kasan_check_write+0x14/0x20 [ 832.357840] smc_diag_dump_proto.isra.0+0x2e7/0x3c0 [ 832.362869] ? __smc_diag_dump.isra.0+0x2ba0/0x2ba0 [ 832.367878] ? find_held_lock+0x35/0x120 [ 832.371952] smc_diag_dump+0x27/0x80 [ 832.375668] netlink_dump+0x5f2/0x1070 [ 832.379572] ? netlink_broadcast+0x50/0x50 [ 832.383816] __netlink_dump_start+0x5b4/0x7e0 [ 832.388328] smc_diag_handler_dump+0x2a7/0x350 [ 832.392914] ? smc_gid_be16_convert+0x2c0/0x2c0 [ 832.397587] ? lock_downgrade+0x910/0x910 [ 832.401737] ? smc_diag_dump_proto.isra.0+0x3c0/0x3c0 [ 832.406922] ? rcu_read_unlock_special+0x380/0x380 [ 832.411851] sock_diag_rcv_msg+0x322/0x410 [ 832.416082] netlink_rcv_skb+0x17d/0x410 [ 832.420139] ? sock_diag_bind+0x80/0x80 [ 832.424121] ? netlink_ack+0xba0/0xba0 [ 832.428011] sock_diag_rcv+0x2b/0x40 [ 832.431723] netlink_unicast+0x574/0x770 [ 832.435781] ? netlink_attachskb+0x980/0x980 [ 832.440203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.445744] netlink_sendmsg+0xa05/0xf90 [ 832.449801] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 832.455352] ? netlink_unicast+0x770/0x770 [ 832.459598] ? selinux_socket_sendmsg+0x36/0x40 [ 832.464276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.469806] ? security_socket_sendmsg+0x93/0xc0 [ 832.474573] ? netlink_unicast+0x770/0x770 [ 832.478804] sock_sendmsg+0xdd/0x130 [ 832.482513] ___sys_sendmsg+0x7ec/0x910 [ 832.486489] ? copy_msghdr_from_user+0x570/0x570 [ 832.491237] ? iterate_fd+0x4b0/0x4b0 [ 832.495034] ? __might_fault+0x12b/0x1e0 [ 832.499091] ? find_held_lock+0x35/0x120 [ 832.503149] ? __might_fault+0x12b/0x1e0 [ 832.507215] ? __fget_light+0x2db/0x420 [ 832.511191] ? fget_raw+0x20/0x20 [ 832.514652] ? lock_release+0xc40/0xc40 [ 832.518622] ? trace_hardirqs_off_caller+0x300/0x300 [ 832.523741] ? __fdget+0x1b/0x20 [ 832.527118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 832.532649] ? sockfd_lookup_light+0xc2/0x160 [ 832.537162] __sys_sendmsg+0x112/0x270 [ 832.541048] ? __ia32_sys_shutdown+0x80/0x80 [ 832.545467] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.550829] ? trace_hardirqs_off_caller+0x300/0x300 [ 832.555930] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 832.560689] __x64_sys_sendmsg+0x78/0xb0 [ 832.564748] do_syscall_64+0x1a3/0x800 [ 832.568631] ? syscall_return_slowpath+0x5f0/0x5f0 [ 832.573559] ? prepare_exit_to_usermode+0x232/0x3b0 [ 832.578573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 832.583415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.588618] RIP: 0033:0x457ec9 [ 832.591807] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 832.610701] RSP: 002b:00007f129b9eac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 832.618400] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 832.625671] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 000000000000000e [ 832.632933] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 832.640194] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f129b9eb6d4 [ 832.647457] R13: 00000000004c52f9 R14: 00000000004d8d58 R15: 00000000ffffffff [ 832.655898] Kernel Offset: disabled [ 832.659558] Rebooting in 86400 seconds..