Warning: Permanently added '10.128.10.57' (ECDSA) to the list of known hosts. [ 40.997557] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/20 16:52:26 fuzzer started [ 41.094006] audit: type=1400 audit(1568998346.495:7): avc: denied { map } for pid=1778 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 41.717592] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/20 16:52:28 dialing manager at 10.128.0.26:45419 2019/09/20 16:52:28 syscalls: 1353 2019/09/20 16:52:28 code coverage: enabled 2019/09/20 16:52:28 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/20 16:52:28 extra coverage: extra coverage is not supported by the kernel 2019/09/20 16:52:28 setuid sandbox: enabled 2019/09/20 16:52:28 namespace sandbox: enabled 2019/09/20 16:52:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/20 16:52:28 fault injection: CONFIG_FAULT_INJECTION is not enabled 2019/09/20 16:52:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/20 16:52:28 net packet injection: enabled 2019/09/20 16:52:28 net device setup: enabled [ 44.199148] random: crng init done 16:53:17 executing program 0: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000200)) ptrace(0x10, r0) ptrace$setregset(0x1b, r0, 0x0, 0x0) 16:53:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) 16:53:17 executing program 5: bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 16:53:17 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x2) 16:53:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() sendmsg$sock(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="308a3ea51d4fa365f74e90679b404e6cf7e8e9ce8a5606bf4c54fb56043bf8da61196ca3f3341271b14dedf702e5ccc1383f9edb6283c0d4a800c4", 0x3b}], 0x1, 0x0, 0x186}, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xa2, 0xfffffffffffffff8, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 91.945890] audit: type=1400 audit(1568998397.345:8): avc: denied { map } for pid=1778 comm="syz-fuzzer" path="/root/syzkaller-shm129354559" dev="sda1" ino=16461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 16:53:17 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000200)) ptrace(0x10, r0) ptrace$setregset(0x420b, r0, 0x0, 0x0) [ 91.987940] audit: type=1400 audit(1568998397.385:9): avc: denied { map } for pid=1826 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 94.977510] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2723 comm=syz-executor.2 [ 94.990414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2723 comm=syz-executor.2 [ 95.002548] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2723 comm=syz-executor.2 [ 95.014889] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2723 comm=syz-executor.2 [ 95.026988] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2723 comm=syz-executor.2 [ 95.039110] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2723 comm=syz-executor.2 [ 95.051246] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2723 comm=syz-executor.2 [ 95.064268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2723 comm=syz-executor.2 16:53:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) 16:53:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) [ 95.079483] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2723 comm=syz-executor.2 [ 95.091830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=2723 comm=syz-executor.2 16:53:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) 16:53:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) dup3(0xffffffffffffffff, r2, 0x0) 16:53:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) dup3(0xffffffffffffffff, r2, 0x0) 16:53:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) dup3(0xffffffffffffffff, r2, 0x0) [ 95.779905] audit: type=1400 audit(1568998401.175:10): avc: denied { prog_load } for pid=2760 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 16:53:21 executing program 0: 16:53:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) 16:53:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) 16:53:21 executing program 5: clone(0x80001100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 16:53:21 executing program 3: 16:53:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000001600)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x3a, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 16:53:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) 16:53:22 executing program 0: 16:53:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000240)=@ccm_128={{0x303}, "fdb01a83b831a0b3", "6747c49038a0b29e1bee43040cc5b55b", "c7fb682d"}, 0x28) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(r0) 16:53:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) 16:53:22 executing program 3: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="680000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000048001200100001006970366772657461700000003400020014000600fe8000000000000000000000000000aa14000700fe3b00000000000000000000000000aa08000100", @ANYRES32], 0x68}}, 0x0) 16:53:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) 16:53:22 executing program 0: 16:53:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) 16:53:22 executing program 3: 16:53:22 executing program 5: 16:53:22 executing program 0: 16:53:22 executing program 4: 16:53:22 executing program 5: 16:53:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 16:53:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) syz_open_pts(r2, 0x0) 16:53:22 executing program 3: 16:53:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) sendto$inet(r0, &(0x7f0000000100)="be", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)="b7", 0x1, 0x0, 0x0, 0x0) 16:53:22 executing program 3: 16:53:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 16:53:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) syz_open_pts(r2, 0x0) 16:53:22 executing program 4: 16:53:22 executing program 5: 16:53:22 executing program 3: [ 97.550747] kasan: CONFIG_KASAN_INLINE enabled [ 97.562398] kasan: GPF could be caused by NULL-ptr deref or user memory access 16:53:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) 16:53:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 16:53:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541d, 0x0) [ 97.619936] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 97.626732] Modules linked in: [ 97.629923] CPU: 0 PID: 2845 Comm: syz-executor.0 Not tainted 4.14.145+ #0 [ 97.636931] task: 0000000093367b25 task.stack: 00000000dc2ba18c [ 97.642994] RIP: 0010:tcp_sendmsg_locked+0x509/0x2f50 [ 97.648174] RSP: 0018:ffff88819f9bfae8 EFLAGS: 00010206 [ 97.653530] RAX: 0000000000000011 RBX: ffff8881d6ff6780 RCX: 0000000000000093 [ 97.660798] RDX: ffffffff8252ea80 RSI: ffffc90000571000 RDI: 0000000000000088 16:53:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCSETD(0xffffffffffffffff, 0x541d, 0x0) 16:53:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCSETD(0xffffffffffffffff, 0x541d, 0x0) [ 97.668084] RBP: ffff8881d3732a12 R08: 0000000000000001 R09: ffffed103a6e6588 [ 97.675348] R10: ffffed103a6e6587 R11: 0000000000000000 R12: ffff88819f9bfd90 [ 97.682614] R13: 0000000000000000 R14: ffff8881d3732a00 R15: dffffc0000000000 [ 97.689879] FS: 00007f2977b32700(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 97.698098] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 97.703976] CR2: 00007fac74475518 CR3: 00000001cd9ae001 CR4: 00000000001606b0 [ 97.711246] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 97.718505] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 97.725758] Call Trace: [ 97.728348] ? tcp_sendpage+0x60/0x60 [ 97.732130] ? __local_bh_enable_ip+0x65/0xc0 [ 97.736621] tcp_sendmsg+0x2b/0x40 [ 97.740140] inet_sendmsg+0x15b/0x520 [ 97.743916] ? inet_recvmsg+0x550/0x550 [ 97.747868] sock_sendmsg+0xb7/0x100 [ 97.751561] SyS_sendto+0x1de/0x2f0 [ 97.755166] ? SyS_getpeername+0x250/0x250 [ 97.759388] ? put_timespec64+0xbe/0x110 [ 97.763429] ? nsecs_to_jiffies+0x30/0x30 [ 97.767553] ? SyS_clock_gettime+0x7d/0xe0 [ 97.771762] ? do_clock_gettime+0xd0/0xd0 [ 97.775905] ? do_syscall_64+0x43/0x520 [ 97.779858] ? SyS_getpeername+0x250/0x250 [ 97.784072] do_syscall_64+0x19b/0x520 [ 97.787939] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 97.793102] RIP: 0033:0x459a09 [ 97.796269] RSP: 002b:00007f2977b31c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 97.803951] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a09 [ 97.811195] RDX: 0000000000000001 RSI: 0000000020000100 RDI: 0000000000000003 [ 97.818439] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 97.825683] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2977b326d4 [ 97.832931] R13: 00000000004c79ac R14: 00000000004dd400 R15: 00000000ffffffff [ 97.840201] Code: ee 2b de fe 48 85 db 0f 84 12 08 00 00 e8 e0 2b de fe 8b 84 24 08 01 00 00 49 8d bd 88 00 00 00 89 44 24 08 48 89 f8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 74 06 0f 8e 07 24 00 00 41 f6 85 88 00 00 [ 97.859307] RIP: tcp_sendmsg_locked+0x509/0x2f50 RSP: ffff88819f9bfae8 [ 97.874132] ---[ end trace c85507c11ba17678 ]--- [ 97.882513] Kernel panic - not syncing: Fatal exception [ 97.888451] Kernel Offset: 0x31800000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 97.899352] Rebooting in 86400 seconds..