Warning: Permanently added '10.128.0.158' (ECDSA) to the list of known hosts. [ 72.661054][ T8449] chnl_net:caif_netlink_parms(): no params data found [ 72.712378][ T8449] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.720161][ T8449] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.729261][ T8449] device bridge_slave_0 entered promiscuous mode [ 72.739524][ T8449] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.747145][ T8449] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.756180][ T8449] device bridge_slave_1 entered promiscuous mode [ 72.778907][ T8449] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.790497][ T8449] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.814304][ T8449] team0: Port device team_slave_0 added [ 72.822384][ T8449] team0: Port device team_slave_1 added [ 72.839419][ T8449] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.846522][ T8449] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.873433][ T8449] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.886260][ T8449] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.894344][ T8449] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.921333][ T8449] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.948761][ T8449] device hsr_slave_0 entered promiscuous mode [ 72.955452][ T8449] device hsr_slave_1 entered promiscuous mode [ 73.059782][ T8449] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.072935][ T8449] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.083995][ T8449] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.095114][ T8449] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.123094][ T8449] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.130299][ T8449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.138544][ T8449] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.145712][ T8449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.195427][ T8449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.210083][ T4858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.224042][ T4858] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.232931][ T4858] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.242059][ T4858] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 73.255341][ T8449] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.268158][ T4858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.277793][ T4858] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.285042][ T4858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.304608][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.314107][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.321793][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.345370][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.354673][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.363325][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.374936][ T8449] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 73.388144][ T8449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 73.397152][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 73.405925][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.432880][ T8449] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.440002][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 73.448449][ T3156] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 73.475864][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.494220][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.505417][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.513466][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.523759][ T8449] device veth0_vlan entered promiscuous mode [ 73.537071][ T8449] device veth1_vlan entered promiscuous mode [ 73.559820][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 73.568618][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 73.577903][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.589867][ T8449] device veth0_macvtap entered promiscuous mode [ 73.604348][ T8449] device veth1_macvtap entered promiscuous mode [ 73.623973][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 73.633601][ T8449] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.642071][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 73.653419][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.664442][ T8449] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.673641][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 73.682528][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.695621][ T8449] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.709386][ T8449] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.719460][ T8449] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.730292][ T8449] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 73.801853][ T8449] ================================================================== [ 73.810051][ T8449] BUG: KASAN: use-after-free in ipvlan_queue_xmit+0x158f/0x18a0 [ 73.817698][ T8449] Read of size 4 at addr ffff8880179147ff by task syz-executor408/8449 [ 73.826003][ T8449] [ 73.828326][ T8449] CPU: 0 PID: 8449 Comm: syz-executor408 Not tainted 5.13.0-rc7-syzkaller #0 [ 73.837062][ T8449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.847099][ T8449] Call Trace: [ 73.850375][ T8449] dump_stack+0x141/0x1d7 [ 73.854741][ T8449] ? ipvlan_queue_xmit+0x158f/0x18a0 [ 73.860015][ T8449] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 73.867046][ T8449] ? ipvlan_queue_xmit+0x158f/0x18a0 [ 73.872318][ T8449] ? ipvlan_queue_xmit+0x158f/0x18a0 [ 73.877583][ T8449] kasan_report.cold+0x7c/0xd8 [ 73.882339][ T8449] ? ipvlan_queue_xmit+0x158f/0x18a0 [ 73.887816][ T8449] ipvlan_queue_xmit+0x158f/0x18a0 [ 73.892927][ T8449] ? ipvlan_handle_mode_l3+0x140/0x140 [ 73.898391][ T8449] ? skb_network_protocol+0x148/0x580 [ 73.903757][ T8449] ? skb_crc32c_csum_help+0x70/0x70 [ 73.908960][ T8449] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 73.914942][ T8449] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 73.921198][ T8449] ? validate_xmit_xfrm+0x498/0x1050 [ 73.926551][ T8449] ? netif_skb_features+0x38d/0xb90 [ 73.931756][ T8449] ipvlan_start_xmit+0x45/0x190 [ 73.936608][ T8449] __dev_direct_xmit+0x527/0x730 [ 73.941535][ T8449] ? validate_xmit_skb_list+0x120/0x120 [ 73.947078][ T8449] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 73.953321][ T8449] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.959547][ T8449] ? netdev_pick_tx+0x14f/0xb00 [ 73.964393][ T8449] packet_direct_xmit+0x1a5/0x280 [ 73.969441][ T8449] packet_sendmsg+0x22ee/0x5310 [ 73.974304][ T8449] ? aa_sk_perm+0x31b/0xab0 [ 73.978798][ T8449] ? packet_create+0xac0/0xac0 [ 73.983555][ T8449] ? aa_af_perm+0x230/0x230 [ 73.988046][ T8449] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 73.994274][ T8449] ? packet_create+0xac0/0xac0 [ 73.999021][ T8449] sock_sendmsg+0xcf/0x120 [ 74.003424][ T8449] __sys_sendto+0x21c/0x320 [ 74.007923][ T8449] ? __ia32_sys_getpeername+0xb0/0xb0 [ 74.013284][ T8449] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.019260][ T8449] ? lock_downgrade+0x6e0/0x6e0 [ 74.024107][ T8449] ? lock_downgrade+0x6e0/0x6e0 [ 74.028959][ T8449] __x64_sys_sendto+0xdd/0x1b0 [ 74.033715][ T8449] ? lockdep_hardirqs_on+0x79/0x100 [ 74.039002][ T8449] ? syscall_enter_from_user_mode+0x27/0x70 [ 74.044885][ T8449] do_syscall_64+0x3a/0xb0 [ 74.049287][ T8449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.055171][ T8449] RIP: 0033:0x450f09 [ 74.059048][ T8449] Code: a5 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 74.078816][ T8449] RSP: 002b:00000000005eff28 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 74.087214][ T8449] RAX: ffffffffffffffda RBX: 000000000169d2b8 RCX: 0000000000450f09 [ 74.095179][ T8449] RDX: 000000000000000e RSI: 0000000020000080 RDI: 0000000000000005 [ 74.103175][ T8449] RBP: 00000000005eff70 R08: 0000000020000040 R09: 0000000000000014 [ 74.111149][ T8449] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000005eff70 [ 74.119124][ T8449] R13: 00000000005eff50 R14: 00000000004ce018 R15: 0000000000400538 [ 74.127112][ T8449] [ 74.129448][ T8449] Allocated by task 1: [ 74.133495][ T8449] kasan_save_stack+0x1b/0x40 [ 74.138171][ T8449] __kasan_slab_alloc+0x84/0xa0 [ 74.143003][ T8449] kmem_cache_alloc+0x219/0x3a0 [ 74.147955][ T8449] __alloc_file+0x21/0x280 [ 74.152353][ T8449] alloc_empty_file+0x6d/0x170 [ 74.157097][ T8449] path_openat+0xe3/0x27e0 [ 74.161524][ T8449] do_filp_open+0x190/0x3d0 [ 74.166020][ T8449] do_sys_openat2+0x16d/0x420 [ 74.170695][ T8449] __x64_sys_open+0x119/0x1c0 [ 74.175366][ T8449] do_syscall_64+0x3a/0xb0 [ 74.179816][ T8449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.185700][ T8449] [ 74.188031][ T8449] Freed by task 19: [ 74.191810][ T8449] kasan_save_stack+0x1b/0x40 [ 74.196470][ T8449] kasan_set_track+0x1c/0x30 [ 74.201211][ T8449] kasan_set_free_info+0x20/0x30 [ 74.206264][ T8449] __kasan_slab_free+0xfb/0x130 [ 74.211142][ T8449] slab_free_freelist_hook+0xdf/0x240 [ 74.216504][ T8449] kmem_cache_free+0x8a/0x740 [ 74.221192][ T8449] rcu_core+0x7ab/0x13b0 [ 74.225431][ T8449] __do_softirq+0x29b/0x9f6 [ 74.229917][ T8449] [ 74.232221][ T8449] Last potentially related work creation: [ 74.237922][ T8449] kasan_save_stack+0x1b/0x40 [ 74.242585][ T8449] kasan_record_aux_stack+0xe5/0x110 [ 74.247885][ T8449] call_rcu+0xb1/0x750 [ 74.251955][ T8449] task_work_run+0xdd/0x1a0 [ 74.256466][ T8449] exit_to_user_mode_prepare+0x281/0x290 [ 74.262081][ T8449] syscall_exit_to_user_mode+0x19/0x60 [ 74.267540][ T8449] do_syscall_64+0x47/0xb0 [ 74.271962][ T8449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.277841][ T8449] [ 74.280144][ T8449] Second to last potentially related work creation: [ 74.286776][ T8449] kasan_save_stack+0x1b/0x40 [ 74.291467][ T8449] kasan_record_aux_stack+0xe5/0x110 [ 74.296840][ T8449] task_work_add+0x3a/0x190 [ 74.301356][ T8449] fput_many.part.0+0xbb/0x170 [ 74.306112][ T8449] fput+0x3b/0x50 [ 74.309774][ T8449] path_openat+0x19a8/0x27e0 [ 74.314350][ T8449] do_filp_open+0x190/0x3d0 [ 74.318837][ T8449] do_sys_openat2+0x16d/0x420 [ 74.323537][ T8449] __x64_sys_open+0x119/0x1c0 [ 74.328194][ T8449] do_syscall_64+0x3a/0xb0 [ 74.332591][ T8449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.338503][ T8449] [ 74.340918][ T8449] The buggy address belongs to the object at ffff888017914780 [ 74.340918][ T8449] which belongs to the cache filp of size 464 [ 74.354569][ T8449] The buggy address is located 127 bytes inside of [ 74.354569][ T8449] 464-byte region [ffff888017914780, ffff888017914950) [ 74.367932][ T8449] The buggy address belongs to the page: [ 74.373541][ T8449] page:ffffea00005e4500 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x17914 [ 74.383679][ T8449] head:ffffea00005e4500 order:1 compound_mapcount:0 [ 74.390386][ T8449] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 74.398362][ T8449] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff8880111be640 [ 74.406931][ T8449] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 74.415529][ T8449] page dumped because: kasan: bad access detected [ 74.421928][ T8449] page_owner tracks the page as allocated [ 74.427670][ T8449] page last allocated via order 1, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, ts 66020679659, free_ts 60336647755 [ 74.446501][ T8449] get_page_from_freelist+0x1033/0x2b60 [ 74.452042][ T8449] __alloc_pages+0x1b2/0x500 [ 74.456612][ T8449] alloc_pages+0x18c/0x2a0 [ 74.461006][ T8449] allocate_slab+0x2c5/0x4c0 [ 74.465582][ T8449] ___slab_alloc+0x4a1/0x810 [ 74.470152][ T8449] __slab_alloc.constprop.0+0xa7/0xf0 [ 74.475506][ T8449] kmem_cache_alloc+0x34b/0x3a0 [ 74.480454][ T8449] __alloc_file+0x21/0x280 [ 74.484870][ T8449] alloc_empty_file+0x6d/0x170 [ 74.489620][ T8449] path_openat+0xe3/0x27e0 [ 74.494020][ T8449] do_filp_open+0x190/0x3d0 [ 74.498508][ T8449] do_sys_openat2+0x16d/0x420 [ 74.503165][ T8449] __x64_sys_open+0x119/0x1c0 [ 74.507819][ T8449] do_syscall_64+0x3a/0xb0 [ 74.512239][ T8449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.518128][ T8449] page last free stack trace: [ 74.522784][ T8449] free_pcp_prepare+0x223/0x300 [ 74.527678][ T8449] free_unref_page+0x12/0x1d0 [ 74.532392][ T8449] kasan_depopulate_vmalloc_pte+0x5c/0x70 [ 74.538200][ T8449] __apply_to_page_range+0x69a/0x1050 [ 74.543565][ T8449] kasan_release_vmalloc+0xa7/0xc0 [ 74.548657][ T8449] __purge_vmap_area_lazy+0x8f9/0x1c50 [ 74.554117][ T8449] _vm_unmap_aliases.part.0+0x3dd/0x4f0 [ 74.559643][ T8449] vm_unmap_aliases+0x47/0x50 [ 74.564315][ T8449] change_page_attr_set_clr+0x241/0x500 [ 74.569860][ T8449] set_memory_ro+0x78/0xa0 [ 74.574263][ T8449] bpf_int_jit_compile+0xe11/0x11b0 [ 74.579442][ T8449] bpf_prog_select_runtime+0x464/0x6a0 [ 74.584884][ T8449] bpf_migrate_filter+0x2dc/0x380 [ 74.589889][ T8449] bpf_prog_create_from_user+0x51b/0x660 [ 74.595510][ T8449] do_seccomp+0x38d/0x2870 [ 74.599914][ T8449] prctl_set_seccomp+0x4a/0x70 [ 74.604659][ T8449] [ 74.606968][ T8449] Memory state around the buggy address: [ 74.612588][ T8449] ffff888017914680: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 74.620630][ T8449] ffff888017914700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.628685][ T8449] >ffff888017914780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.636817][ T8449] ^ [ 74.644775][ T8449] ffff888017914800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.652833][ T8449] ffff888017914880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.660870][ T8449] ================================================================== [ 74.668906][ T8449] Disabling lock debugging due to kernel taint [ 74.675180][ T8449] Kernel panic - not syncing: panic_on_warn set ... [ 74.681771][ T8449] CPU: 0 PID: 8449 Comm: syz-executor408 Tainted: G B 5.13.0-rc7-syzkaller #0 [ 74.692022][ T8449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.702084][ T8449] Call Trace: [ 74.705406][ T8449] dump_stack+0x141/0x1d7 [ 74.709749][ T8449] panic+0x306/0x73d [ 74.713654][ T8449] ? __warn_printk+0xf3/0xf3 [ 74.718250][ T8449] ? asm_common_interrupt+0x1e/0x40 [ 74.723457][ T8449] ? trace_hardirqs_on+0x38/0x1c0 [ 74.728465][ T8449] ? trace_hardirqs_on+0x51/0x1c0 [ 74.733469][ T8449] ? ipvlan_queue_xmit+0x158f/0x18a0 [ 74.738736][ T8449] ? ipvlan_queue_xmit+0x158f/0x18a0 [ 74.744009][ T8449] end_report.cold+0x5a/0x5a [ 74.748582][ T8449] kasan_report.cold+0x6a/0xd8 [ 74.753331][ T8449] ? ipvlan_queue_xmit+0x158f/0x18a0 [ 74.758617][ T8449] ipvlan_queue_xmit+0x158f/0x18a0 [ 74.763708][ T8449] ? ipvlan_handle_mode_l3+0x140/0x140 [ 74.769145][ T8449] ? skb_network_protocol+0x148/0x580 [ 74.774500][ T8449] ? skb_crc32c_csum_help+0x70/0x70 [ 74.779677][ T8449] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.785649][ T8449] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 74.791883][ T8449] ? validate_xmit_xfrm+0x498/0x1050 [ 74.797155][ T8449] ? netif_skb_features+0x38d/0xb90 [ 74.802336][ T8449] ipvlan_start_xmit+0x45/0x190 [ 74.807171][ T8449] __dev_direct_xmit+0x527/0x730 [ 74.812090][ T8449] ? validate_xmit_skb_list+0x120/0x120 [ 74.817615][ T8449] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 74.823842][ T8449] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.830064][ T8449] ? netdev_pick_tx+0x14f/0xb00 [ 74.834926][ T8449] packet_direct_xmit+0x1a5/0x280 [ 74.839934][ T8449] packet_sendmsg+0x22ee/0x5310 [ 74.844792][ T8449] ? aa_sk_perm+0x31b/0xab0 [ 74.849373][ T8449] ? packet_create+0xac0/0xac0 [ 74.854129][ T8449] ? aa_af_perm+0x230/0x230 [ 74.858613][ T8449] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 74.864866][ T8449] ? packet_create+0xac0/0xac0 [ 74.869634][ T8449] sock_sendmsg+0xcf/0x120 [ 74.874030][ T8449] __sys_sendto+0x21c/0x320 [ 74.878514][ T8449] ? __ia32_sys_getpeername+0xb0/0xb0 [ 74.883869][ T8449] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.889925][ T8449] ? lock_downgrade+0x6e0/0x6e0 [ 74.894776][ T8449] ? lock_downgrade+0x6e0/0x6e0 [ 74.899610][ T8449] __x64_sys_sendto+0xdd/0x1b0 [ 74.904483][ T8449] ? lockdep_hardirqs_on+0x79/0x100 [ 74.909684][ T8449] ? syscall_enter_from_user_mode+0x27/0x70 [ 74.915575][ T8449] do_syscall_64+0x3a/0xb0 [ 74.920008][ T8449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.925889][ T8449] RIP: 0033:0x450f09 [ 74.929763][ T8449] Code: a5 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 74.949355][ T8449] RSP: 002b:00000000005eff28 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 74.957860][ T8449] RAX: ffffffffffffffda RBX: 000000000169d2b8 RCX: 0000000000450f09 [ 74.965818][ T8449] RDX: 000000000000000e RSI: 0000000020000080 RDI: 0000000000000005 [ 74.973869][ T8449] RBP: 00000000005eff70 R08: 0000000020000040 R09: 0000000000000014 [ 74.981824][ T8449] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000005eff70 [ 74.989774][ T8449] R13: 00000000005eff50 R14: 00000000004ce018 R15: 0000000000400538 [ 74.999041][ T8449] Kernel Offset: disabled [ 75.003446][ T8449] Rebooting in 86400 seconds..