Warning: Permanently added '10.128.0.229' (ECDSA) to the list of known hosts. [ 997.441254] audit: type=1400 audit(1581333018.552:36): avc: denied { map } for pid=8141 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/02/10 11:10:18 parsed 1 programs [ 998.613467] audit: type=1400 audit(1581333019.722:37): avc: denied { map } for pid=8141 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17185 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2020/02/10 11:10:19 executed programs: 0 [ 998.814264] IPVS: ftp: loaded support on port[0] = 21 [ 998.872191] chnl_net:caif_netlink_parms(): no params data found [ 998.914208] bridge0: port 1(bridge_slave_0) entered blocking state [ 998.921216] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.928585] device bridge_slave_0 entered promiscuous mode [ 998.936030] bridge0: port 2(bridge_slave_1) entered blocking state [ 998.942881] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.950090] device bridge_slave_1 entered promiscuous mode [ 998.965557] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 998.974610] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 998.991040] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 998.999290] team0: Port device team_slave_0 added [ 999.005002] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 999.012695] team0: Port device team_slave_1 added [ 999.027307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 999.033662] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 999.058891] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 999.070701] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 999.076953] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 999.102370] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 999.113432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 999.121044] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 999.170764] device hsr_slave_0 entered promiscuous mode [ 999.208843] device hsr_slave_1 entered promiscuous mode [ 999.259512] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 999.266750] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 999.320835] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.327329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 999.334303] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.340700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 999.372950] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 999.380560] 8021q: adding VLAN 0 to HW filter on device bond0 [ 999.390539] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 999.399687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 999.418662] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.425913] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.434301] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 999.445781] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 999.452237] 8021q: adding VLAN 0 to HW filter on device team0 [ 999.461598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 999.469579] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.475939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 999.499201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 999.506835] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.513239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 999.521230] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 999.529752] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 999.537467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 999.545635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 999.553927] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 999.563683] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 999.569820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 999.582319] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 999.590723] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 999.597457] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 999.609210] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 999.621952] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 999.632075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 999.673414] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 999.680792] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 999.687571] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 999.699116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 999.706756] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 999.713835] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 999.723122] device veth0_vlan entered promiscuous mode [ 999.732915] device veth1_vlan entered promiscuous mode [ 999.739192] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 999.749189] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 999.760965] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 999.771214] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 999.779533] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 999.787824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 999.799289] device veth0_macvtap entered promiscuous mode [ 999.805722] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 999.814657] device veth1_macvtap entered promiscuous mode [ 999.823357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 999.832525] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 999.843005] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 999.850211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 999.859807] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 999.869905] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 999.876939] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 999.884781] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 999.892623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 999.972501] audit: type=1400 audit(1581333021.082:38): avc: denied { associate } for pid=8158 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 2020/02/10 11:10:24 executed programs: 118 2020/02/10 11:10:29 executed programs: 277 2020/02/10 11:10:34 executed programs: 433 2020/02/10 11:10:39 executed programs: 588 2020/02/10 11:10:45 executed programs: 745 2020/02/10 11:10:50 executed programs: 904 2020/02/10 11:10:55 executed programs: 1063 2020/02/10 11:11:00 executed programs: 1222 2020/02/10 11:11:05 executed programs: 1380 2020/02/10 11:11:10 executed programs: 1531 [ 1050.269750] NOHZ: local_softirq_pending 08 2020/02/10 11:11:15 executed programs: 1686 2020/02/10 11:11:20 executed programs: 1843 2020/02/10 11:11:25 executed programs: 1999 2020/02/10 11:11:30 executed programs: 2150 [ 1070.751991] NOHZ: local_softirq_pending 08 2020/02/10 11:11:35 executed programs: 2307 2020/02/10 11:11:40 executed programs: 2464 2020/02/10 11:11:45 executed programs: 2621 2020/02/10 11:11:50 executed programs: 2780 2020/02/10 11:11:55 executed programs: 2933 2020/02/10 11:12:00 executed programs: 3089 2020/02/10 11:12:05 executed programs: 3241 2020/02/10 11:12:10 executed programs: 3399 2020/02/10 11:12:15 executed programs: 3554 2020/02/10 11:12:20 executed programs: 3706 2020/02/10 11:12:25 executed programs: 3862 2020/02/10 11:12:30 executed programs: 4019 2020/02/10 11:12:35 executed programs: 4176 2020/02/10 11:12:40 executed programs: 4331 2020/02/10 11:12:45 executed programs: 4482 2020/02/10 11:12:50 executed programs: 4638 2020/02/10 11:12:55 executed programs: 4792 2020/02/10 11:13:00 executed programs: 4947 2020/02/10 11:13:05 executed programs: 5103 2020/02/10 11:13:10 executed programs: 5262 2020/02/10 11:13:15 executed programs: 5415 2020/02/10 11:13:20 executed programs: 5571 2020/02/10 11:13:25 executed programs: 5721 [ 1184.966529] ================================================================== [ 1184.974259] BUG: KASAN: use-after-free in sctp_sock_dump+0xaa3/0xb20 [ 1184.980819] Read of size 8 at addr ffff888092656320 by task syz-executor.0/4571 [ 1184.988259] [ 1184.989889] CPU: 0 PID: 4571 Comm: syz-executor.0 Not tainted 4.19.102-syzkaller #0 [ 1184.997672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1185.007037] Call Trace: [ 1185.009677] dump_stack+0x197/0x210 [ 1185.013337] ? sctp_sock_dump+0xaa3/0xb20 [ 1185.017491] print_address_description.cold+0x7c/0x20d [ 1185.022878] ? sctp_sock_dump+0xaa3/0xb20 [ 1185.027026] kasan_report.cold+0x8c/0x2ba [ 1185.031180] __asan_report_load8_noabort+0x14/0x20 [ 1185.036149] sctp_sock_dump+0xaa3/0xb20 [ 1185.040305] sctp_for_each_transport+0x2b4/0x350 [ 1185.045052] ? sctp_tsp_dump_one+0x690/0x690 [ 1185.049462] ? sctp_v6_copy_ip_options.cold+0x28/0x28 [ 1185.054725] ? sctp_transport_get_next+0x180/0x180 [ 1185.059671] ? sctp_for_each_endpoint+0x131/0x1c0 [ 1185.064589] ? _raw_read_unlock_bh+0x31/0x40 [ 1185.069002] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1185.074077] ? sctp_for_each_endpoint+0x166/0x1c0 [ 1185.078920] sctp_diag_dump+0x33e/0x450 [ 1185.083018] ? sctp_diag_dump_one+0x4d0/0x4d0 [ 1185.087515] ? __kmalloc_node_track_caller+0x51/0x80 [ 1185.092741] ? mutex_lock_nested+0x16/0x20 [ 1185.097045] __inet_diag_dump+0x9e/0x130 [ 1185.101101] inet_diag_dump+0x9b/0x110 [ 1185.105099] netlink_dump+0x427/0xbb0 [ 1185.109087] __netlink_dump_start+0x50d/0x710 [ 1185.113606] inet_diag_handler_cmd+0x262/0x320 [ 1185.118227] ? inet_diag_rcv_msg_compat+0x350/0x350 [ 1185.123302] ? sock_diag_rcv+0x1c/0x40 [ 1185.127184] ? inet_diag_dump_compat+0x320/0x320 [ 1185.132025] sock_diag_rcv_msg+0x319/0x410 [ 1185.136263] netlink_rcv_skb+0x17d/0x460 [ 1185.140320] ? sock_diag_bind+0x80/0x80 [ 1185.144296] ? netlink_ack+0xb30/0xb30 [ 1185.148232] ? kasan_check_read+0x11/0x20 [ 1185.152516] ? netlink_deliver_tap+0x254/0xc20 [ 1185.157118] sock_diag_rcv+0x2b/0x40 [ 1185.160850] netlink_unicast+0x53a/0x730 [ 1185.164956] ? netlink_attachskb+0x770/0x770 [ 1185.169976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1185.175648] netlink_sendmsg+0x8ae/0xd70 [ 1185.179723] ? netlink_unicast+0x730/0x730 [ 1185.184499] ? selinux_socket_sendmsg+0x36/0x40 [ 1185.189178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1185.194881] ? security_socket_sendmsg+0x8d/0xc0 [ 1185.199699] ? netlink_unicast+0x730/0x730 [ 1185.204276] sock_sendmsg+0xd7/0x130 [ 1185.207997] sock_write_iter+0x2cb/0x400 [ 1185.212072] ? sock_sendmsg+0x130/0x130 [ 1185.216084] ? inode_has_perm.isra.0+0x17e/0x210 [ 1185.221179] ? selinux_file_open+0x4a0/0x4a0 [ 1185.225601] do_iter_readv_writev+0x558/0x830 [ 1185.230131] ? vfs_dedupe_file_range+0x6f0/0x6f0 [ 1185.235288] ? security_file_permission+0x89/0x230 [ 1185.241022] ? rw_verify_area+0x118/0x360 [ 1185.245276] do_iter_write+0x184/0x5f0 [ 1185.249403] ? dup_iter+0x270/0x270 [ 1185.253035] ? __fget+0x340/0x540 [ 1185.257302] vfs_writev+0x1b3/0x2f0 [ 1185.261782] ? vfs_iter_write+0xb0/0xb0 [ 1185.266023] ? kasan_check_read+0x11/0x20 [ 1185.270371] ? iterate_fd+0x360/0x360 [ 1185.274473] ? kasan_check_read+0x11/0x20 [ 1185.278626] ? __fget_light+0x1a9/0x230 [ 1185.283261] do_writev+0x15e/0x370 [ 1185.287347] ? vfs_writev+0x2f0/0x2f0 [ 1185.291173] ? do_syscall_64+0x26/0x620 [ 1185.295197] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1185.301955] ? do_syscall_64+0x26/0x620 [ 1185.307237] __x64_sys_writev+0x75/0xb0 [ 1185.314267] do_syscall_64+0xfd/0x620 [ 1185.320998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1185.326361] RIP: 0033:0x45b399 [ 1185.329560] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1185.348479] RSP: 002b:00007fe2f4277c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1185.356286] RAX: ffffffffffffffda RBX: 00007fe2f42786d4 RCX: 000000000045b399 [ 1185.363810] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 000000000000000c [ 1185.371777] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1185.379046] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1185.386321] R13: 0000000000000cdd R14: 00000000004c9cac R15: 000000000075c07c [ 1185.393787] [ 1185.395431] Allocated by task 4570: [ 1185.399095] save_stack+0x45/0xd0 [ 1185.402562] kasan_kmalloc+0xce/0xf0 [ 1185.406302] kmem_cache_alloc_trace+0x152/0x760 [ 1185.411044] sctp_endpoint_new+0x79/0xd70 [ 1185.415208] sctp_init_sock+0xb87/0x1290 [ 1185.419578] inet6_create+0x9bd/0xf70 [ 1185.423384] __sock_create+0x3d8/0x730 [ 1185.427281] __sys_socket+0x103/0x220 [ 1185.431186] __x64_sys_socket+0x73/0xb0 [ 1185.435343] do_syscall_64+0xfd/0x620 [ 1185.439364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1185.444544] [ 1185.446171] Freed by task 4570: [ 1185.449536] save_stack+0x45/0xd0 [ 1185.453000] __kasan_slab_free+0x102/0x150 [ 1185.457322] kasan_slab_free+0xe/0x10 [ 1185.461115] kfree+0xcf/0x220 [ 1185.464242] sctp_endpoint_put+0x239/0x2c0 [ 1185.468478] sctp_endpoint_free+0x77/0x90 [ 1185.472678] sctp_destroy_sock+0x9f/0x3e0 [ 1185.477430] sctp_v6_destroy_sock+0x16/0x30 [ 1185.481807] sk_common_release+0x6b/0x330 [ 1185.486579] sctp_close+0x4e4/0x860 [ 1185.490459] inet_release+0xe0/0x1f0 [ 1185.494300] inet6_release+0x53/0x80 [ 1185.498043] __sock_release+0xce/0x2a0 [ 1185.501938] sock_close+0x1b/0x30 [ 1185.505512] __fput+0x2dd/0x8b0 [ 1185.508793] ____fput+0x16/0x20 [ 1185.512261] task_work_run+0x145/0x1c0 [ 1185.516135] get_signal+0x1baa/0x1fc0 [ 1185.519942] do_signal+0x95/0x1960 [ 1185.523553] exit_to_usermode_loop+0x244/0x2c0 [ 1185.528130] do_syscall_64+0x53d/0x620 [ 1185.532015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1185.537202] [ 1185.538827] The buggy address belongs to the object at ffff888092656280 [ 1185.538827] which belongs to the cache kmalloc-512 of size 512 [ 1185.551695] The buggy address is located 160 bytes inside of [ 1185.551695] 512-byte region [ffff888092656280, ffff888092656480) [ 1185.563629] The buggy address belongs to the page: [ 1185.568559] page:ffffea0002499580 count:1 mapcount:0 mapping:ffff88812c31c940 index:0xffff888092656780 [ 1185.577996] flags: 0xfffe0000000100(slab) [ 1185.582138] raw: 00fffe0000000100 ffffea0002118bc8 ffffea000208e808 ffff88812c31c940 [ 1185.590029] raw: ffff888092656780 ffff888092656000 0000000100000005 0000000000000000 [ 1185.598083] page dumped because: kasan: bad access detected [ 1185.603790] [ 1185.605534] Memory state around the buggy address: [ 1185.610575] ffff888092656200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1185.617935] ffff888092656280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1185.625296] >ffff888092656300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1185.634371] ^ [ 1185.638783] ffff888092656380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1185.646317] ffff888092656400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1185.653700] ================================================================== [ 1185.661087] Disabling lock debugging due to kernel taint [ 1185.673681] Kernel panic - not syncing: panic_on_warn set ... [ 1185.673681] [ 1185.681076] CPU: 1 PID: 4571 Comm: syz-executor.0 Tainted: G B 4.19.102-syzkaller #0 [ 1185.690256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1185.699785] Call Trace: [ 1185.702366] dump_stack+0x197/0x210 [ 1185.705975] ? sctp_sock_dump+0xaa3/0xb20 [ 1185.710124] panic+0x26a/0x50e [ 1185.713351] ? __warn_printk+0xf3/0xf3 [ 1185.717261] ? sctp_sock_dump+0xaa3/0xb20 [ 1185.721405] ? preempt_schedule+0x4b/0x60 [ 1185.725560] ? ___preempt_schedule+0x16/0x18 [ 1185.729962] ? trace_hardirqs_on+0x5e/0x220 [ 1185.734404] ? sctp_sock_dump+0xaa3/0xb20 [ 1185.738580] kasan_end_report+0x47/0x4f [ 1185.742573] kasan_report.cold+0xa9/0x2ba [ 1185.746736] __asan_report_load8_noabort+0x14/0x20 [ 1185.751664] sctp_sock_dump+0xaa3/0xb20 [ 1185.755694] sctp_for_each_transport+0x2b4/0x350 [ 1185.760453] ? sctp_tsp_dump_one+0x690/0x690 [ 1185.765418] ? sctp_v6_copy_ip_options.cold+0x28/0x28 [ 1185.770626] ? sctp_transport_get_next+0x180/0x180 [ 1185.775555] ? sctp_for_each_endpoint+0x131/0x1c0 [ 1185.780402] ? _raw_read_unlock_bh+0x31/0x40 [ 1185.784943] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1185.790090] ? sctp_for_each_endpoint+0x166/0x1c0 [ 1185.794936] sctp_diag_dump+0x33e/0x450 [ 1185.799115] ? sctp_diag_dump_one+0x4d0/0x4d0 [ 1185.803745] ? __kmalloc_node_track_caller+0x51/0x80 [ 1185.808892] ? mutex_lock_nested+0x16/0x20 [ 1185.813222] __inet_diag_dump+0x9e/0x130 [ 1185.817296] inet_diag_dump+0x9b/0x110 [ 1185.821185] netlink_dump+0x427/0xbb0 [ 1185.824986] __netlink_dump_start+0x50d/0x710 [ 1185.829476] inet_diag_handler_cmd+0x262/0x320 [ 1185.834166] ? inet_diag_rcv_msg_compat+0x350/0x350 [ 1185.839172] ? sock_diag_rcv+0x1c/0x40 [ 1185.843058] ? inet_diag_dump_compat+0x320/0x320 [ 1185.847925] sock_diag_rcv_msg+0x319/0x410 [ 1185.852154] netlink_rcv_skb+0x17d/0x460 [ 1185.856214] ? sock_diag_bind+0x80/0x80 [ 1185.860196] ? netlink_ack+0xb30/0xb30 [ 1185.864603] ? kasan_check_read+0x11/0x20 [ 1185.868748] ? netlink_deliver_tap+0x254/0xc20 [ 1185.873340] sock_diag_rcv+0x2b/0x40 [ 1185.877051] netlink_unicast+0x53a/0x730 [ 1185.881139] ? netlink_attachskb+0x770/0x770 [ 1185.885555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1185.891101] netlink_sendmsg+0x8ae/0xd70 [ 1185.895288] ? netlink_unicast+0x730/0x730 [ 1185.899533] ? selinux_socket_sendmsg+0x36/0x40 [ 1185.904242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1185.909782] ? security_socket_sendmsg+0x8d/0xc0 [ 1185.914574] ? netlink_unicast+0x730/0x730 [ 1185.919066] sock_sendmsg+0xd7/0x130 [ 1185.922791] sock_write_iter+0x2cb/0x400 [ 1185.926859] ? sock_sendmsg+0x130/0x130 [ 1185.930833] ? inode_has_perm.isra.0+0x17e/0x210 [ 1185.935686] ? selinux_file_open+0x4a0/0x4a0 [ 1185.940158] do_iter_readv_writev+0x558/0x830 [ 1185.944758] ? vfs_dedupe_file_range+0x6f0/0x6f0 [ 1185.949522] ? security_file_permission+0x89/0x230 [ 1185.954456] ? rw_verify_area+0x118/0x360 [ 1185.958611] do_iter_write+0x184/0x5f0 [ 1185.962514] ? dup_iter+0x270/0x270 [ 1185.966142] ? __fget+0x340/0x540 [ 1185.969594] vfs_writev+0x1b3/0x2f0 [ 1185.973264] ? vfs_iter_write+0xb0/0xb0 [ 1185.977236] ? kasan_check_read+0x11/0x20 [ 1185.981377] ? iterate_fd+0x360/0x360 [ 1185.985235] ? kasan_check_read+0x11/0x20 [ 1185.989394] ? __fget_light+0x1a9/0x230 [ 1185.993396] do_writev+0x15e/0x370 [ 1185.996936] ? vfs_writev+0x2f0/0x2f0 [ 1186.000753] ? do_syscall_64+0x26/0x620 [ 1186.004838] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1186.010191] ? do_syscall_64+0x26/0x620 [ 1186.014204] __x64_sys_writev+0x75/0xb0 [ 1186.018183] do_syscall_64+0xfd/0x620 [ 1186.022002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1186.027630] RIP: 0033:0x45b399 [ 1186.030843] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1186.049740] RSP: 002b:00007fe2f4277c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1186.057450] RAX: ffffffffffffffda RBX: 00007fe2f42786d4 RCX: 000000000045b399 [ 1186.064951] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 000000000000000c [ 1186.072224] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1186.079599] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1186.086921] R13: 0000000000000cdd R14: 00000000004c9cac R15: 000000000075c07c [ 1186.096054] Kernel Offset: disabled [ 1186.099688] Rebooting in 86400 seconds..