[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [ 94.745450][ T26] audit: type=1400 audit(1579456384.792:37): avc: denied { watch } for pid=10370 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 94.791734][ T26] audit: type=1400 audit(1579456384.792:38): avc: denied { watch } for pid=10370 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.195' (ECDSA) to the list of known hosts. syzkaller login: [ 104.073235][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 104.073252][ T26] audit: type=1400 audit(1579456394.122:42): avc: denied { map } for pid=10471 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/01/19 17:53:14 parsed 1 programs [ 105.584740][ T26] audit: type=1400 audit(1579456395.632:43): avc: denied { map } for pid=10471 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=22405 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/01/19 17:53:15 executed programs: 0 [ 105.977451][T10488] IPVS: ftp: loaded support on port[0] = 21 [ 106.038343][T10488] chnl_net:caif_netlink_parms(): no params data found [ 106.067629][T10488] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.075158][T10488] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.083052][T10488] device bridge_slave_0 entered promiscuous mode [ 106.092131][T10488] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.099733][T10488] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.107611][T10488] device bridge_slave_1 entered promiscuous mode [ 106.125224][T10488] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 106.136105][T10488] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 106.156675][T10488] team0: Port device team_slave_0 added [ 106.164289][T10488] team0: Port device team_slave_1 added [ 106.179749][T10488] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 106.186887][T10488] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 106.212950][T10488] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 106.225648][T10488] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 106.232728][T10488] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 106.258842][T10488] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 106.322569][T10488] device hsr_slave_0 entered promiscuous mode [ 106.351227][T10488] device hsr_slave_1 entered promiscuous mode [ 106.455412][ T26] audit: type=1400 audit(1579456396.502:44): avc: denied { create } for pid=10488 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 106.458583][T10488] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 106.482407][ T26] audit: type=1400 audit(1579456396.502:45): avc: denied { write } for pid=10488 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 106.512432][ T26] audit: type=1400 audit(1579456396.502:46): avc: denied { read } for pid=10488 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 106.544276][T10488] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 106.592719][T10488] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 106.652762][T10488] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 106.713555][T10488] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.720774][T10488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.728448][T10488] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.735553][T10488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.777872][T10488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.793833][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.805545][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.813688][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.822931][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 106.835568][T10488] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.846696][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.855776][ T3094] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.862900][ T3094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.882110][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.891418][ T2987] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.898513][ T2987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.911923][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.921148][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.934048][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.949530][T10488] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 106.962274][T10488] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 106.974469][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.983785][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.992863][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.010393][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 107.017863][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 107.031400][T10488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.051173][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 107.060034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.081420][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 107.090073][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.099473][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.107344][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.117688][T10488] device veth0_vlan entered promiscuous mode [ 107.129410][T10488] device veth1_vlan entered promiscuous mode [ 107.151309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 107.159161][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 107.167866][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 107.176939][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 107.187614][T10488] device veth0_macvtap entered promiscuous mode [ 107.197835][T10488] device veth1_macvtap entered promiscuous mode [ 107.215405][T10488] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 107.223204][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 107.232724][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 107.241302][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 107.249719][ T3094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 107.261694][T10488] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 107.271969][ T2771] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 107.281404][ T2771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 107.296504][ T26] audit: type=1400 audit(1579456397.342:47): avc: denied { associate } for pid=10488 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 107.410763][ T26] audit: type=1400 audit(1579456397.452:48): avc: denied { create } for pid=10490 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 107.440687][ T26] audit: type=1400 audit(1579456397.462:49): avc: denied { write } for pid=10490 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 107.462808][T10495] ================================================================== [ 107.473589][T10495] BUG: KASAN: slab-out-of-bounds in bitmap_ip_test+0xde/0x170 [ 107.481156][T10495] Read of size 8 at addr ffff88809ec89e80 by task syz-executor.0/10495 [ 107.489375][T10495] [ 107.491694][T10495] CPU: 1 PID: 10495 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 107.500345][T10495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.510395][T10495] Call Trace: [ 107.513792][T10495] dump_stack+0x197/0x210 [ 107.518104][T10495] ? bitmap_ip_test+0xde/0x170 [ 107.522867][T10495] print_address_description.constprop.0.cold+0xd4/0x30b [ 107.529963][T10495] ? bitmap_ip_test+0xde/0x170 [ 107.534717][T10495] ? bitmap_ip_test+0xde/0x170 [ 107.539471][T10495] __kasan_report.cold+0x1b/0x41 [ 107.544391][T10495] ? bitmap_ip_test+0xde/0x170 [ 107.549145][T10495] kasan_report+0x12/0x20 [ 107.553457][T10495] check_memory_region+0x134/0x1a0 [ 107.558568][T10495] __kasan_check_read+0x11/0x20 [ 107.563411][T10495] bitmap_ip_test+0xde/0x170 [ 107.567986][T10495] bitmap_ip_uadt+0x87a/0xa10 [ 107.572694][T10495] ? bitmap_ip_destroy+0x1d0/0x1d0 [ 107.577806][T10495] ? bitmap_ip_kadt+0x5a0/0x5a0 [ 107.582645][T10495] ? nla_memcpy+0xb0/0xb0 [ 107.586972][T10495] ? ip_set_utest+0x4b0/0x8d0 [ 107.591643][T10495] ? __kasan_check_read+0x11/0x20 [ 107.596693][T10495] ip_set_utest+0x570/0x8d0 [ 107.601182][T10495] ? ip_set_put_byindex+0x490/0x490 [ 107.606418][T10495] ? __mutex_lock+0x458/0x13c0 [ 107.611230][T10495] ? ip_set_put_byindex+0x490/0x490 [ 107.616425][T10495] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 107.621360][T10495] ? nfnetlink_bind+0x2c0/0x2c0 [ 107.626194][T10495] ? avc_has_extended_perms+0x10f0/0x10f0 [ 107.631915][T10495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.638147][T10495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.644382][T10495] ? cred_has_capability+0x199/0x330 [ 107.649647][T10495] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 107.655269][T10495] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 107.660887][T10495] ? __local_bh_enable_ip+0x15a/0x270 [ 107.666249][T10495] ? __check_heap_object+0x53/0xb3 [ 107.671356][T10495] netlink_rcv_skb+0x177/0x450 [ 107.676099][T10495] ? nfnetlink_bind+0x2c0/0x2c0 [ 107.680930][T10495] ? netlink_ack+0xb50/0xb50 [ 107.685554][T10495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.692317][T10495] ? ns_capable_common+0x93/0x100 [ 107.697339][T10495] ? ns_capable+0x20/0x30 [ 107.701661][T10495] ? __netlink_ns_capable+0x104/0x140 [ 107.707021][T10495] nfnetlink_rcv+0x1ba/0x460 [ 107.711604][T10495] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 107.717040][T10495] ? netlink_deliver_tap+0x24a/0xbe0 [ 107.722320][T10495] netlink_unicast+0x58c/0x7d0 [ 107.727083][T10495] ? netlink_attachskb+0x870/0x870 [ 107.732195][T10495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.738429][T10495] netlink_sendmsg+0x91c/0xea0 [ 107.743191][T10495] ? netlink_unicast+0x7d0/0x7d0 [ 107.748124][T10495] ? tomoyo_socket_sendmsg+0x26/0x30 [ 107.753394][T10495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.759630][T10495] ? security_socket_sendmsg+0x8d/0xc0 [ 107.765073][T10495] ? netlink_unicast+0x7d0/0x7d0 [ 107.770003][T10495] sock_sendmsg+0xd7/0x130 [ 107.774415][T10495] ____sys_sendmsg+0x753/0x880 [ 107.779196][T10495] ? kernel_sendmsg+0x50/0x50 [ 107.783906][T10495] ? __fget+0x35d/0x550 [ 107.788044][T10495] ? find_held_lock+0x35/0x130 [ 107.792800][T10495] ___sys_sendmsg+0x100/0x170 [ 107.797466][T10495] ? sendmsg_copy_msghdr+0x70/0x70 [ 107.802629][T10495] ? __kasan_check_read+0x11/0x20 [ 107.807649][T10495] ? __fget+0x37f/0x550 [ 107.811794][T10495] ? ksys_dup3+0x3e0/0x3e0 [ 107.816195][T10495] ? __fget_light+0x1a9/0x230 [ 107.820864][T10495] ? __fdget+0x1b/0x20 [ 107.824925][T10495] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 107.831159][T10495] __sys_sendmsg+0x105/0x1d0 [ 107.835777][T10495] ? __sys_sendmsg_sock+0xc0/0xc0 [ 107.840799][T10495] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 107.846249][T10495] ? do_syscall_64+0x26/0x790 [ 107.850915][T10495] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.857078][T10495] ? do_syscall_64+0x26/0x790 [ 107.861741][T10495] __x64_sys_sendmsg+0x78/0xb0 [ 107.866499][T10495] do_syscall_64+0xfa/0x790 [ 107.870986][T10495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 107.876861][T10495] RIP: 0033:0x45b349 [ 107.880741][T10495] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 107.900334][T10495] RSP: 002b:00007fad7e3c7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 107.908776][T10495] RAX: ffffffffffffffda RBX: 00007fad7e3c86d4 RCX: 000000000045b349 [ 107.916739][T10495] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 107.924698][T10495] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 107.932658][T10495] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 107.940618][T10495] R13: 00000000000008ea R14: 00000000004ca43c R15: 000000000075bf2c [ 107.948589][T10495] [ 107.950900][T10495] Allocated by task 10492: [ 107.955306][T10495] save_stack+0x23/0x90 [ 107.959476][T10495] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 107.965093][T10495] kasan_kmalloc+0x9/0x10 [ 107.969405][T10495] __kmalloc+0x163/0x770 [ 107.973637][T10495] ip_set_alloc+0x38/0x5e [ 107.977970][T10495] bitmap_ip_create+0x6ec/0xc20 [ 107.982810][T10495] ip_set_create+0x6f1/0x1500 [ 107.987532][T10495] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 107.992896][T10495] netlink_rcv_skb+0x177/0x450 [ 107.997652][T10495] nfnetlink_rcv+0x1ba/0x460 [ 108.002224][T10495] netlink_unicast+0x58c/0x7d0 [ 108.006979][T10495] netlink_sendmsg+0x91c/0xea0 [ 108.011725][T10495] sock_sendmsg+0xd7/0x130 [ 108.016198][T10495] ____sys_sendmsg+0x753/0x880 [ 108.020949][T10495] ___sys_sendmsg+0x100/0x170 [ 108.025605][T10495] __sys_sendmsg+0x105/0x1d0 [ 108.030189][T10495] __x64_sys_sendmsg+0x78/0xb0 [ 108.034944][T10495] do_syscall_64+0xfa/0x790 [ 108.039442][T10495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.045353][T10495] [ 108.047676][T10495] Freed by task 10275: [ 108.051734][T10495] save_stack+0x23/0x90 [ 108.055880][T10495] __kasan_slab_free+0x102/0x150 [ 108.060808][T10495] kasan_slab_free+0xe/0x10 [ 108.065395][T10495] kfree+0x10a/0x2c0 [ 108.069284][T10495] tomoyo_supervisor+0xc2c/0xef0 [ 108.074204][T10495] tomoyo_env_perm+0x18e/0x210 [ 108.078995][T10495] tomoyo_find_next_domain+0x1354/0x1f6c [ 108.084633][T10495] tomoyo_bprm_check_security+0x124/0x1a0 [ 108.090671][T10495] security_bprm_check+0x63/0xb0 [ 108.095616][T10495] search_binary_handler+0x71/0x570 [ 108.100797][T10495] __do_execve_file.isra.0+0x1329/0x22b0 [ 108.106472][T10495] __x64_sys_execve+0x8f/0xc0 [ 108.111183][T10495] do_syscall_64+0xfa/0x790 [ 108.115680][T10495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.121554][T10495] [ 108.123867][T10495] The buggy address belongs to the object at ffff88809ec89e80 [ 108.123867][T10495] which belongs to the cache kmalloc-32 of size 32 [ 108.137779][T10495] The buggy address is located 0 bytes inside of [ 108.137779][T10495] 32-byte region [ffff88809ec89e80, ffff88809ec89ea0) [ 108.150770][T10495] The buggy address belongs to the page: [ 108.156387][T10495] page:ffffea00027b2240 refcount:1 mapcount:0 mapping:ffff8880aa4001c0 index:0xffff88809ec89fc1 [ 108.166788][T10495] raw: 00fffe0000000200 ffffea00027ae388 ffffea0002a50188 ffff8880aa4001c0 [ 108.175368][T10495] raw: ffff88809ec89fc1 ffff88809ec89000 000000010000003f 0000000000000000 [ 108.183942][T10495] page dumped because: kasan: bad access detected [ 108.190340][T10495] [ 108.192663][T10495] Memory state around the buggy address: [ 108.198283][T10495] ffff88809ec89d80: fb fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 108.206343][T10495] ffff88809ec89e00: 00 00 fc fc fc fc fc fc fb fb fb fb fc fc fc fc [ 108.214393][T10495] >ffff88809ec89e80: 04 fc fc fc fc fc fc fc 00 00 00 00 fc fc fc fc [ 108.222437][T10495] ^ [ 108.226487][T10495] ffff88809ec89f00: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 108.234537][T10495] ffff88809ec89f80: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 108.242581][T10495] ================================================================== [ 108.250667][T10495] Disabling lock debugging due to kernel taint [ 108.256895][T10495] Kernel panic - not syncing: panic_on_warn set ... [ 108.263487][T10495] CPU: 1 PID: 10495 Comm: syz-executor.0 Tainted: G B 5.5.0-rc6-syzkaller #0 [ 108.273539][T10495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.283578][T10495] Call Trace: [ 108.286898][T10495] dump_stack+0x197/0x210 [ 108.291217][T10495] panic+0x2e3/0x75c [ 108.295099][T10495] ? add_taint.cold+0x16/0x16 [ 108.299889][T10495] ? retint_kernel+0x2b/0x2b [ 108.304467][T10495] ? trace_hardirqs_on+0x5e/0x240 [ 108.309472][T10495] ? bitmap_ip_test+0xde/0x170 [ 108.314221][T10495] end_report+0x47/0x4f [ 108.318369][T10495] ? bitmap_ip_test+0xde/0x170 [ 108.323115][T10495] __kasan_report.cold+0xe/0x41 [ 108.327952][T10495] ? bitmap_ip_test+0xde/0x170 [ 108.332701][T10495] kasan_report+0x12/0x20 [ 108.337253][T10495] check_memory_region+0x134/0x1a0 [ 108.342348][T10495] __kasan_check_read+0x11/0x20 [ 108.347181][T10495] bitmap_ip_test+0xde/0x170 [ 108.351753][T10495] bitmap_ip_uadt+0x87a/0xa10 [ 108.356418][T10495] ? bitmap_ip_destroy+0x1d0/0x1d0 [ 108.361516][T10495] ? bitmap_ip_kadt+0x5a0/0x5a0 [ 108.366364][T10495] ? nla_memcpy+0xb0/0xb0 [ 108.370706][T10495] ? ip_set_utest+0x4b0/0x8d0 [ 108.375364][T10495] ? __kasan_check_read+0x11/0x20 [ 108.380365][T10495] ip_set_utest+0x570/0x8d0 [ 108.384954][T10495] ? ip_set_put_byindex+0x490/0x490 [ 108.390149][T10495] ? __mutex_lock+0x458/0x13c0 [ 108.394929][T10495] ? ip_set_put_byindex+0x490/0x490 [ 108.400202][T10495] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 108.405131][T10495] ? nfnetlink_bind+0x2c0/0x2c0 [ 108.409969][T10495] ? avc_has_extended_perms+0x10f0/0x10f0 [ 108.415680][T10495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.421915][T10495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.428162][T10495] ? cred_has_capability+0x199/0x330 [ 108.433448][T10495] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 108.439072][T10495] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 108.444687][T10495] ? __local_bh_enable_ip+0x15a/0x270 [ 108.450058][T10495] ? __check_heap_object+0x53/0xb3 [ 108.455159][T10495] netlink_rcv_skb+0x177/0x450 [ 108.459932][T10495] ? nfnetlink_bind+0x2c0/0x2c0 [ 108.464765][T10495] ? netlink_ack+0xb50/0xb50 [ 108.469355][T10495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.475580][T10495] ? ns_capable_common+0x93/0x100 [ 108.480588][T10495] ? ns_capable+0x20/0x30 [ 108.484911][T10495] ? __netlink_ns_capable+0x104/0x140 [ 108.490279][T10495] nfnetlink_rcv+0x1ba/0x460 [ 108.494862][T10495] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 108.500310][T10495] ? netlink_deliver_tap+0x24a/0xbe0 [ 108.505594][T10495] netlink_unicast+0x58c/0x7d0 [ 108.510370][T10495] ? netlink_attachskb+0x870/0x870 [ 108.515484][T10495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.521713][T10495] netlink_sendmsg+0x91c/0xea0 [ 108.526472][T10495] ? netlink_unicast+0x7d0/0x7d0 [ 108.531395][T10495] ? tomoyo_socket_sendmsg+0x26/0x30 [ 108.536675][T10495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.542900][T10495] ? security_socket_sendmsg+0x8d/0xc0 [ 108.548349][T10495] ? netlink_unicast+0x7d0/0x7d0 [ 108.553277][T10495] sock_sendmsg+0xd7/0x130 [ 108.557688][T10495] ____sys_sendmsg+0x753/0x880 [ 108.562444][T10495] ? kernel_sendmsg+0x50/0x50 [ 108.567104][T10495] ? __fget+0x35d/0x550 [ 108.571254][T10495] ? find_held_lock+0x35/0x130 [ 108.576002][T10495] ___sys_sendmsg+0x100/0x170 [ 108.580666][T10495] ? sendmsg_copy_msghdr+0x70/0x70 [ 108.585759][T10495] ? __kasan_check_read+0x11/0x20 [ 108.590782][T10495] ? __fget+0x37f/0x550 [ 108.594922][T10495] ? ksys_dup3+0x3e0/0x3e0 [ 108.599332][T10495] ? __fget_light+0x1a9/0x230 [ 108.603990][T10495] ? __fdget+0x1b/0x20 [ 108.608041][T10495] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 108.614270][T10495] __sys_sendmsg+0x105/0x1d0 [ 108.618854][T10495] ? __sys_sendmsg_sock+0xc0/0xc0 [ 108.623869][T10495] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 108.629319][T10495] ? do_syscall_64+0x26/0x790 [ 108.633985][T10495] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.640047][T10495] ? do_syscall_64+0x26/0x790 [ 108.644710][T10495] __x64_sys_sendmsg+0x78/0xb0 [ 108.649467][T10495] do_syscall_64+0xfa/0x790 [ 108.653963][T10495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 108.659836][T10495] RIP: 0033:0x45b349 [ 108.663721][T10495] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 108.683420][T10495] RSP: 002b:00007fad7e3c7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.691820][T10495] RAX: ffffffffffffffda RBX: 00007fad7e3c86d4 RCX: 000000000045b349 [ 108.699783][T10495] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 108.707940][T10495] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 108.715904][T10495] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 108.723864][T10495] R13: 00000000000008ea R14: 00000000004ca43c R15: 000000000075bf2c [ 108.733205][T10495] Kernel Offset: disabled [ 108.737537][T10495] Rebooting in 86400 seconds..