[info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts. 2019/09/23 11:45:38 fuzzer started 2019/09/23 11:45:40 dialing manager at 10.128.0.105:39541 2019/09/23 11:45:40 syscalls: 2425 2019/09/23 11:45:40 code coverage: CONFIG_KCOV is not enabled 2019/09/23 11:45:40 comparison tracing: CONFIG_KCOV is not enabled 2019/09/23 11:45:40 extra coverage: CONFIG_KCOV is not enabled 2019/09/23 11:45:40 setuid sandbox: enabled 2019/09/23 11:45:40 namespace sandbox: enabled 2019/09/23 11:45:40 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/23 11:45:40 fault injection: kernel does not have systematic fault injection support 2019/09/23 11:45:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/23 11:45:40 net packet injection: enabled 2019/09/23 11:45:40 net device setup: enabled 11:45:40 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='hash\x00') r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) write$binfmt_script(r7, &(0x7f0000000180)={'#! ', './file0', [], 0xa, "6d50d804cc9024d5d17befb1e547ebfec4c2ba95c36b7cfffa5e14a5482f"}, 0x29) 11:45:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) 11:45:40 executing program 5: prctl$PR_MCE_KILL(0x35, 0x0, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8j#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8{\x82 \x8f\xbb\x83^T\xcc\x13\x10\xa3\xb4\x81\xd5\x03\xfa\xc8\rt)\t\xa6;|\xd1\xa1\x8d@^\x00\x00\x00\x00\x00\x00\x00\x81\xc13\xba\xf0\xc0\xddKc\xa3g!\x1c\x00x\x00\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce\x00'/272) pread64(r0, 0x0, 0x0, 0x0) 11:45:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) vmsplice(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)='J', 0x1}], 0x1, 0x0) bind$alg(r3, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000140)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r1, 0x0, r5, 0x0, 0x200000, 0x0) 11:45:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x48, &(0x7f00000004c0)={0xef4, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) getpgrp(0xffffffffffffffff) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) r1 = getgid() getgroups(0x1, &(0x7f0000000380)=[r1]) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000a00)={"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"}) r3 = fcntl$getown(r2, 0x9) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000100)=0x0) tgkill(r3, r4, 0x40) r5 = geteuid() lchown(&(0x7f0000000000)='./file0\x00', r5, 0xffffffffffffffff) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x48, &(0x7f00000004c0)={0xef4, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x48, &(0x7f00000004c0)={0xef4, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) fstat(r2, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f00000000c0)=[r8, 0x0, 0xee01, 0xee00, 0x0]) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000480)={0x90, 0xfffffffffffffff5, 0x6, {0x6, 0x2, 0x1, 0xfff, 0xffffffffffffef1d, 0x186, {0x3, 0x0, 0x3a8, 0x7c, 0x6, 0x0, 0x6, 0x1200000, 0x0, 0x6, 0x0, r5, r8, 0xfff, 0x1}}}, 0x90) getpgid(0x0) r9 = geteuid() lchown(&(0x7f0000000000)='./file0\x00', r9, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f00000000c0)=[r10, 0x0, 0xee01, 0xee00, 0x0]) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000480)={0x90, 0xfffffffffffffff5, 0x6, {0x6, 0x2, 0x1, 0xfff, 0xffffffffffffef1d, 0x186, {0x3, 0x0, 0x3a8, 0x7c, 0x6, 0x0, 0x6, 0x1200000, 0x0, 0x6, 0x0, r9, r10, 0xfff, 0x1}}}, 0x90) r11 = getgid() getgroups(0x1, &(0x7f0000000380)=[r11]) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x100, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r12, 0x29, 0x48, &(0x7f00000004c0)={0xef4, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) r14 = gettid() perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xf) process_vm_writev(r14, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) 11:45:40 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(&(0x7f0000000200)='./bus\x00', 0xc8) r1 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000580)) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000000c0)=""/148) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) write$binfmt_script(r2, 0x0, 0x0) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000080)=0xffff) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4141, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000300)=0x5, 0x4) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) timerfd_gettime(r4, &(0x7f0000000380)) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x7c) close(r5) syzkaller login: [ 30.337436] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 30.346613] IPVS: Creating netns size=2712 id=1 [ 30.347453] IPv6: ADDRCONF(NETDEV_CHANGE): nr5: link becomes ready [ 30.349805] IPv6: ADDRCONF(NETDEV_CHANGE): nr4: link becomes ready [ 30.352520] IPv6: ADDRCONF(NETDEV_CHANGE): nr3: link becomes ready [ 30.360681] IPv6: ADDRCONF(NETDEV_CHANGE): nr2: link becomes ready [ 30.363472] IPv6: ADDRCONF(NETDEV_CHANGE): nr1: link becomes ready [ 30.383159] IPVS: ftp: loaded support on port[0] = 21 [ 30.395014] IPVS: Creating netns size=2712 id=2 [ 30.399722] IPVS: ftp: loaded support on port[0] = 21 [ 30.416334] IPVS: Creating netns size=2712 id=3 [ 30.421256] IPVS: ftp: loaded support on port[0] = 21 [ 30.437990] IPVS: Creating netns size=2712 id=4 [ 30.439984] kobject: 'dummy0' (ffff8800af9e7538): kobject_add_internal: parent: 'net', set: 'devices' [ 30.440188] kobject: 'dummy0' (ffff8800af9e7538): kobject_uevent_env [ 30.440193] kobject: 'dummy0' (ffff8800af9e7538): fill_kobj_path: path = '/devices/virtual/net/dummy0' [ 30.440221] kobject: 'queues' (ffff8800ad74b508): kobject_add_internal: parent: 'dummy0', set: '' [ 30.440226] kobject: 'queues' (ffff8800ad74b508): kobject_uevent_env [ 30.440227] kobject: 'queues' (ffff8800ad74b508): kobject_uevent_env: filter function caused the event to drop! [ 30.440229] kobject: 'rx-0' (ffff8800ad575610): kobject_add_internal: parent: 'queues', set: 'queues' [ 30.440240] kobject: 'rx-0' (ffff8800ad575610): kobject_uevent_env [ 30.440242] kobject: 'rx-0' (ffff8800ad575610): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/rx-0' [ 30.440264] kobject: 'tx-0' (ffff88012abccc18): kobject_add_internal: parent: 'queues', set: 'queues' [ 30.440297] kobject: 'tx-0' (ffff88012abccc18): kobject_uevent_env [ 30.440299] kobject: 'tx-0' (ffff88012abccc18): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/tx-0' [ 30.440443] kobject: 'batman_adv' (ffff8800ad6abe00): kobject_add_internal: parent: 'dummy0', set: '' [ 30.440462] kobject: 'batman_adv' (ffff8800ad6abe00): kobject_cleanup, parent ffff8800af9e7538 [ 30.440463] kobject: 'batman_adv' (ffff8800ad6abe00): auto cleanup kobject_del [ 30.440472] kobject: 'batman_adv' (ffff8800ad6abe00): calling ktype release [ 30.440473] kobject: (ffff8800ad6abe00): dynamic_kobj_release [ 30.440474] kobject: 'batman_adv': free name [ 30.440573] kobject: 'nlmon0' (ffff8800ad651538): kobject_add_internal: parent: 'net', set: 'devices' [ 30.440774] kobject: 'nlmon0' (ffff8800ad651538): kobject_uevent_env [ 30.440779] kobject: 'nlmon0' (ffff8800ad651538): fill_kobj_path: path = '/devices/virtual/net/nlmon0' [ 30.440803] kobject: 'queues' (ffff8800ad74b988): kobject_add_internal: parent: 'nlmon0', set: '' [ 30.440807] kobject: 'queues' (ffff8800ad74b988): kobject_uevent_env [ 30.440808] kobject: 'queues' (ffff8800ad74b988): kobject_uevent_env: filter function caused the event to drop! [ 30.440810] kobject: 'rx-0' (ffff8800ad575490): kobject_add_internal: parent: 'queues', set: 'queues' [ 30.440820] kobject: 'rx-0' (ffff8800ad575490): kobject_uevent_env [ 30.440822] kobject: 'rx-0' (ffff8800ad575490): fill_kobj_path: path = '/devices/virtual/net/nlmon0/queues/rx-0' [ 30.440843] kobject: 'tx-0' (ffff88012abcca18): kobject_add_internal: parent: 'queues', set: 'queues' [ 30.440875] kobject: 'tx-0' (ffff88012abcca18): kobject_uevent_env [ 30.440877] kobject: 'tx-0' (ffff88012abcca18): fill_kobj_path: path = '/devices/virtual/net/nlmon0/queues/tx-0' [ 30.441010] chnl_net:caif_netlink_parms(): no params data found [ 30.441023] kobject: 'caif0' (ffff8800ae357538): kobject_add_internal: parent: 'net', set: 'devices' [ 30.441219] kobject: 'caif0' (ffff8800ae357538): kobject_uevent_env [ 30.441223] kobject: 'caif0' (ffff8800ae357538): fill_kobj_path: path = '/devices/virtual/net/caif0' [ 30.441246] kobject: 'queues' (ffff8800ad74bd48): kobject_add_internal: parent: 'caif0', set: '' [ 30.441250] kobject: 'queues' (ffff8800ad74bd48): kobject_uevent_env [ 30.441251] kobject: 'queues' (ffff8800ad74bd48): kobject_uevent_env: filter function caused the event to drop! [ 30.441253] kobject: 'rx-0' (ffff8800ad575410): kobject_add_internal: parent: 'queues', set: 'queues' [ 30.441263] kobject: 'rx-0' (ffff8800ad575410): kobject_uevent_env [ 30.441265] kobject: 'rx-0' (ffff8800ad575410): fill_kobj_path: path = '/devices/virtual/net/caif0/queues/rx-0' [ 30.441286] kobject: 'tx-0' (ffff88012a7a6a18): kobject_add_internal: parent: 'queues', set: 'queues' [ 30.441319] kobject: 'tx-0' (ffff88012a7a6a18): kobject_uevent_env [ 30.441320] kobject: 'tx-0' (ffff88012a7a6a18): fill_kobj_path: path = '/devices/virtual/net/caif0/queues/tx-0' [ 30.442066] ------------[ cut here ]------------ [ 30.442074] WARNING: CPU: 1 PID: 5682 at net/batman-adv/main.c:750 batadv_tvlv_container_remove+0x7b/0x80() [ 30.442091] Kernel panic - not syncing: panic_on_warn set ... [ 30.442091] [ 30.442094] CPU: 1 PID: 5682 Comm: syz-executor.5 Not tainted 4.4.194 #0 [ 30.442095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.442099] 0000000000000082 ffff8800ad79b870 ffffffff818a6f22 0000000000000000 [ 30.442101] ffffffff82e96378 ffffffff8300ac2f ffff8800ad79b8e8 ffffffff8126f9bc [ 30.442103] ffff880000000008 ffff8800ad79b8f8 ffff8800ad79b898 ffffffff81274e1f [ 30.442104] Call Trace: [ 30.442110] [] dump_stack+0xa1/0xdf [ 30.442115] [] panic+0xd2/0x225 [ 30.442118] [] ? printk+0x48/0x4a [ 30.442121] [] warn_slowpath_common.cold+0x16/0x16 [ 30.442128] [] warn_slowpath_null+0x15/0x20 [ 30.442130] [] batadv_tvlv_container_remove+0x7b/0x80 [ 30.442133] [] batadv_tvlv_container_register+0xb3/0x120 [ 30.442135] [] batadv_dat_tvlv_container_update+0x26/0x40 [ 30.442137] [] batadv_dat_init+0x6a/0x80 [ 30.442139] [] batadv_mesh_init+0x239/0x290 [ 30.442142] [] batadv_softif_init_late+0x271/0x2c0 [ 30.442148] [] register_netdevice+0xfa/0x450 [ 30.442150] [] rtnl_newlink+0x8a5/0x910 [ 30.442152] [] ? rtnl_newlink+0x17d/0x910 [ 30.442155] [] rtnetlink_rcv_msg+0x170/0x1e0 [ 30.442160] [] ? trace_hardirqs_on+0xd/0x10 [ 30.442164] [] ? mutex_lock_nested+0x30a/0x5a0 [ 30.442166] [] ? rtnetlink_rcv+0x17/0x30 [ 30.442167] [] ? rtnetlink_rcv+0x30/0x30 [ 30.442170] [] netlink_rcv_skb+0x31/0xc0 [ 30.442172] [] rtnetlink_rcv+0x26/0x30 [ 30.442173] [] netlink_unicast+0x168/0x210 [ 30.442175] [] netlink_sendmsg+0x1f1/0x390 [ 30.442179] [] sock_sendmsg+0x35/0x40 [ 30.442180] [] SYSC_sendto+0xed/0x160 [ 30.442183] [] ? sock_alloc_file+0x8c/0x120 [ 30.442188] [] ? fd_install+0x22/0x30 [ 30.442191] [] ? lockdep_sys_exit_thunk+0x12/0x14 [ 30.442193] [] SyS_sendto+0x9/0x10 [ 30.442195] [] entry_SYSCALL_64_fastpath+0x1c/0x7c [ 30.444191] Kernel Offset: disabled [ 31.048400] Rebooting in 86400 seconds..