[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[   88.165183][   T27] audit: type=1800 audit(1579437174.933:25): pid=9482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0
[   88.184983][   T27] audit: type=1800 audit(1579437174.933:26): pid=9482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0
[   88.238444][   T27] audit: type=1800 audit(1579437174.933:27): pid=9482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts.
2020/01/19 12:33:04 parsed 1 programs
2020/01/19 12:33:06 executed programs: 0
syzkaller login: [   99.989067][ T9654] IPVS: ftp: loaded support on port[0] = 21
[  100.047248][ T9654] chnl_net:caif_netlink_parms(): no params data found
[  100.075556][ T9654] bridge0: port 1(bridge_slave_0) entered blocking state
[  100.083001][ T9654] bridge0: port 1(bridge_slave_0) entered disabled state
[  100.092415][ T9654] device bridge_slave_0 entered promiscuous mode
[  100.100759][ T9654] bridge0: port 2(bridge_slave_1) entered blocking state
[  100.107975][ T9654] bridge0: port 2(bridge_slave_1) entered disabled state
[  100.115775][ T9654] device bridge_slave_1 entered promiscuous mode
[  100.133431][ T9654] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  100.144491][ T9654] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  100.163189][ T9654] team0: Port device team_slave_0 added
[  100.170460][ T9654] team0: Port device team_slave_1 added
[  100.184800][ T9654] batman_adv: batadv0: Adding interface: batadv_slave_0
[  100.191814][ T9654] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  100.217826][ T9654] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  100.230083][ T9654] batman_adv: batadv0: Adding interface: batadv_slave_1
[  100.237155][ T9654] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  100.263063][ T9654] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  100.327190][ T9654] device hsr_slave_0 entered promiscuous mode
[  100.365041][ T9654] device hsr_slave_1 entered promiscuous mode
[  100.494291][ T9654] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  100.557714][ T9654] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  100.607554][ T9654] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  100.657526][ T9654] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  100.707250][ T9654] bridge0: port 2(bridge_slave_1) entered blocking state
[  100.714402][ T9654] bridge0: port 2(bridge_slave_1) entered forwarding state
[  100.722310][ T9654] bridge0: port 1(bridge_slave_0) entered blocking state
[  100.729463][ T9654] bridge0: port 1(bridge_slave_0) entered forwarding state
[  100.773426][ T9654] 8021q: adding VLAN 0 to HW filter on device bond0
[  100.788086][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  100.798560][ T2921] bridge0: port 1(bridge_slave_0) entered disabled state
[  100.807050][ T2921] bridge0: port 2(bridge_slave_1) entered disabled state
[  100.815890][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  100.829171][ T9654] 8021q: adding VLAN 0 to HW filter on device team0
[  100.840578][ T3129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  100.849861][ T3129] bridge0: port 1(bridge_slave_0) entered blocking state
[  100.856959][ T3129] bridge0: port 1(bridge_slave_0) entered forwarding state
[  100.876556][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  100.885506][ T2921] bridge0: port 2(bridge_slave_1) entered blocking state
[  100.892607][ T2921] bridge0: port 2(bridge_slave_1) entered forwarding state
[  100.904497][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  100.913674][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  100.924255][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  100.941951][ T9654] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  100.954530][ T9654] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  100.966828][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  100.976329][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  100.994737][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  101.002178][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  101.009702][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  101.021572][ T9654] 8021q: adding VLAN 0 to HW filter on device batadv0
[  101.040255][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  101.059738][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  101.068242][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  101.078185][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  101.086782][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  101.097008][ T9654] device veth0_vlan entered promiscuous mode
[  101.108948][ T9654] device veth1_vlan entered promiscuous mode
[  101.129566][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  101.138232][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  101.146568][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  101.155897][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  101.167203][ T9654] device veth0_macvtap entered promiscuous mode
[  101.177267][ T9654] device veth1_macvtap entered promiscuous mode
[  101.193481][ T9654] batman_adv: batadv0: Interface activated: batadv_slave_0
[  101.201251][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  101.209934][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  101.217943][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  101.227053][ T2912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  101.239225][ T9654] batman_adv: batadv0: Interface activated: batadv_slave_1
[  101.246918][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  101.261101][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  101.325512][ T9657] ==================================================================
[  101.333758][ T9657] BUG: KASAN: slab-out-of-bounds in bitmap_ip_add+0xef/0xe60
[  101.341136][ T9657] Read of size 8 at addr ffff8880a6fac400 by task syz-executor.0/9657
[  101.349398][ T9657] 
[  101.351720][ T9657] CPU: 0 PID: 9657 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0
[  101.360292][ T9657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  101.370345][ T9657] Call Trace:
[  101.374341][ T9657]  dump_stack+0x197/0x210
[  101.378672][ T9657]  ? bitmap_ip_add+0xef/0xe60
[  101.383355][ T9657]  print_address_description.constprop.0.cold+0xd4/0x30b
[  101.390375][ T9657]  ? bitmap_ip_add+0xef/0xe60
[  101.395065][ T9657]  ? bitmap_ip_add+0xef/0xe60
[  101.399936][ T9657]  __kasan_report.cold+0x1b/0x41
[  101.404879][ T9657]  ? bitmap_ip_add+0xef/0xe60
[  101.409546][ T9657]  kasan_report+0x12/0x20
[  101.413888][ T9657]  check_memory_region+0x134/0x1a0
[  101.418998][ T9657]  __kasan_check_read+0x11/0x20
[  101.423853][ T9657]  bitmap_ip_add+0xef/0xe60
[  101.428480][ T9657]  bitmap_ip_uadt+0x73e/0xa10
[  101.433155][ T9657]  ? bitmap_ip_head+0x910/0x910
[  101.438053][ T9657]  ? bitmap_ip_kadt+0x5a0/0x5a0
[  101.442894][ T9657]  ? __kasan_check_write+0x14/0x20
[  101.447997][ T9657]  ? lock_set_class+0x3b1/0x7a0
[  101.452997][ T9657]  call_ad+0x1a0/0x5a0
[  101.457072][ T9657]  ? start_msg+0x220/0x220
[  101.461503][ T9657]  ? nla_memcpy+0xb0/0xb0
[  101.465848][ T9657]  ? __nla_parse+0x43/0x60
[  101.470281][ T9657]  ip_set_ad.isra.0+0x572/0xb20
[  101.475136][ T9657]  ? ip_set_nfnl_get_byindex+0x460/0x460
[  101.480779][ T9657]  ? nla_memcpy+0xb0/0xb0
[  101.485103][ T9657]  ? lock_downgrade+0x920/0x920
[  101.489955][ T9657]  ip_set_uadd+0x37/0x50
[  101.494203][ T9657]  ? ip_set_udel+0x50/0x50
[  101.498644][ T9657]  nfnetlink_rcv_msg+0xcf2/0xfb0
[  101.503579][ T9657]  ? nfnetlink_bind+0x2c0/0x2c0
[  101.508543][ T9657]  ? find_held_lock+0x35/0x130
[  101.513326][ T9657]  ? __local_bh_enable_ip+0x15a/0x270
[  101.518691][ T9657]  ? __dev_queue_xmit+0x175c/0x35c0
[  101.523884][ T9657]  ? __local_bh_enable_ip+0x15a/0x270
[  101.529254][ T9657]  ? lockdep_hardirqs_on+0x421/0x5e0
[  101.534539][ T9657]  ? __dev_queue_xmit+0x172e/0x35c0
[  101.539745][ T9657]  ? trace_hardirqs_on+0x67/0x240
[  101.544856][ T9657]  ? __dev_queue_xmit+0x172e/0x35c0
[  101.550055][ T9657]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  101.556291][ T9657]  ? apparmor_capable+0x497/0x900
[  101.561316][ T9657]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  101.567554][ T9657]  ? __kasan_check_read+0x11/0x20
[  101.572602][ T9657]  ? apparmor_cred_prepare+0x7b0/0x7b0
[  101.578059][ T9657]  netlink_rcv_skb+0x177/0x450
[  101.582843][ T9657]  ? nfnetlink_bind+0x2c0/0x2c0
[  101.587792][ T9657]  ? netlink_ack+0xb50/0xb50
[  101.592380][ T9657]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  101.598611][ T9657]  ? ns_capable_common+0x93/0x100
[  101.603648][ T9657]  ? ns_capable+0x20/0x30
[  101.607984][ T9657]  ? __netlink_ns_capable+0x104/0x140
[  101.613366][ T9657]  nfnetlink_rcv+0x1ba/0x460
[  101.617952][ T9657]  ? nfnetlink_rcv_batch+0x17a0/0x17a0
[  101.623423][ T9657]  ? netlink_deliver_tap+0x24a/0xbe0
[  101.628833][ T9657]  netlink_unicast+0x58c/0x7d0
[  101.633598][ T9657]  ? netlink_attachskb+0x870/0x870
[  101.638790][ T9657]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  101.644515][ T9657]  ? __check_object_size+0x3d/0x437
[  101.649739][ T9657]  netlink_sendmsg+0x91c/0xea0
[  101.654508][ T9657]  ? netlink_unicast+0x7d0/0x7d0
[  101.659437][ T9657]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  101.664979][ T9657]  ? apparmor_socket_sendmsg+0x2a/0x30
[  101.670451][ T9657]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  101.676682][ T9657]  ? security_socket_sendmsg+0x8d/0xc0
[  101.682150][ T9657]  ? netlink_unicast+0x7d0/0x7d0
[  101.687180][ T9657]  sock_sendmsg+0xd7/0x130
[  101.691584][ T9657]  ____sys_sendmsg+0x753/0x880
[  101.696351][ T9657]  ? kernel_sendmsg+0x50/0x50
[  101.701029][ T9657]  ? __fget+0x35d/0x550
[  101.705183][ T9657]  ? find_held_lock+0x35/0x130
[  101.709944][ T9657]  ___sys_sendmsg+0x100/0x170
[  101.714629][ T9657]  ? sendmsg_copy_msghdr+0x70/0x70
[  101.719741][ T9657]  ? __kasan_check_read+0x11/0x20
[  101.724763][ T9657]  ? __fget+0x37f/0x550
[  101.728920][ T9657]  ? ksys_dup3+0x3e0/0x3e0
[  101.733329][ T9657]  ? __fget_light+0x1a9/0x230
[  101.738004][ T9657]  ? __fdget+0x1b/0x20
[  101.742060][ T9657]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  101.748303][ T9657]  __sys_sendmsg+0x105/0x1d0
[  101.752895][ T9657]  ? __sys_sendmsg_sock+0xc0/0xc0
[  101.757922][ T9657]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  101.763393][ T9657]  ? do_syscall_64+0x26/0x790
[  101.768067][ T9657]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  101.774246][ T9657]  ? do_syscall_64+0x26/0x790
[  101.778927][ T9657]  __x64_sys_sendmsg+0x78/0xb0
[  101.783694][ T9657]  do_syscall_64+0xfa/0x790
[  101.788327][ T9657]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  101.794207][ T9657] RIP: 0033:0x45b159
[  101.798098][ T9657] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  101.817704][ T9657] RSP: 002b:00007fd1c3a14c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  101.826113][ T9657] RAX: ffffffffffffffda RBX: 00007fd1c3a156d4 RCX: 000000000045b159
[  101.834091][ T9657] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003
[  101.842060][ T9657] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  101.850138][ T9657] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
[  101.858111][ T9657] R13: 00000000000008dc R14: 00000000004ca08f R15: 000000000075bf2c
[  101.866106][ T9657] 
[  101.868434][ T9657] Allocated by task 9657:
[  101.872761][ T9657]  save_stack+0x23/0x90
[  101.876912][ T9657]  __kasan_kmalloc.constprop.0+0xcf/0xe0
[  101.882534][ T9657]  kasan_kmalloc+0x9/0x10
[  101.886851][ T9657]  __kmalloc+0x163/0x770
[  101.891084][ T9657]  ip_set_alloc+0x38/0x5e
[  101.895422][ T9657]  bitmap_ip_create+0x6ec/0xc20
[  101.900378][ T9657]  ip_set_create+0x6f1/0x1500
[  101.905177][ T9657]  nfnetlink_rcv_msg+0xcf2/0xfb0
[  101.910105][ T9657]  netlink_rcv_skb+0x177/0x450
[  101.914854][ T9657]  nfnetlink_rcv+0x1ba/0x460
[  101.919437][ T9657]  netlink_unicast+0x58c/0x7d0
[  101.924185][ T9657]  netlink_sendmsg+0x91c/0xea0
[  101.928944][ T9657]  sock_sendmsg+0xd7/0x130
[  101.933356][ T9657]  ____sys_sendmsg+0x753/0x880
[  101.938115][ T9657]  ___sys_sendmsg+0x100/0x170
[  101.942788][ T9657]  __sys_sendmsg+0x105/0x1d0
[  101.947383][ T9657]  __x64_sys_sendmsg+0x78/0xb0
[  101.952147][ T9657]  do_syscall_64+0xfa/0x790
[  101.956648][ T9657]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  101.962522][ T9657] 
[  101.964840][ T9657] Freed by task 9437:
[  101.968820][ T9657]  save_stack+0x23/0x90
[  101.972984][ T9657]  __kasan_slab_free+0x102/0x150
[  101.977915][ T9657]  kasan_slab_free+0xe/0x10
[  101.982438][ T9657]  kfree+0x10a/0x2c0
[  101.986333][ T9657]  tomoyo_find_next_domain+0x6e7/0x1f6c
[  101.991875][ T9657]  tomoyo_bprm_check_security+0x124/0x1a0
[  101.997687][ T9657]  security_bprm_check+0x63/0xb0
[  102.002617][ T9657]  search_binary_handler+0x71/0x570
[  102.007810][ T9657]  __do_execve_file.isra.0+0x1329/0x22b0
[  102.013436][ T9657]  __x64_sys_execve+0x8f/0xc0
[  102.018108][ T9657]  do_syscall_64+0xfa/0x790
[  102.022613][ T9657]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  102.028524][ T9657] 
[  102.030844][ T9657] The buggy address belongs to the object at ffff8880a6fac400
[  102.030844][ T9657]  which belongs to the cache kmalloc-32 of size 32
[  102.044708][ T9657] The buggy address is located 0 bytes inside of
[  102.044708][ T9657]  32-byte region [ffff8880a6fac400, ffff8880a6fac420)
[  102.057704][ T9657] The buggy address belongs to the page:
[  102.063332][ T9657] page:ffffea00029beb00 refcount:1 mapcount:0 mapping:ffff8880aa4001c0 index:0xffff8880a6facfc1
[  102.073735][ T9657] raw: 00fffe0000000200 ffffea000278b788 ffffea0002996648 ffff8880aa4001c0
[  102.082328][ T9657] raw: ffff8880a6facfc1 ffff8880a6fac000 0000000100000034 0000000000000000
[  102.090909][ T9657] page dumped because: kasan: bad access detected
[  102.097415][ T9657] 
[  102.099726][ T9657] Memory state around the buggy address:
[  102.105344][ T9657]  ffff8880a6fac300: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc
[  102.113396][ T9657]  ffff8880a6fac380: 00 06 fc fc fc fc fc fc fb fb fb fb fc fc fc fc
[  102.121486][ T9657] >ffff8880a6fac400: 04 fc fc fc fc fc fc fc fb fb fb fb fc fc fc fc
[  102.129534][ T9657]                    ^
[  102.133596][ T9657]  ffff8880a6fac480: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc
[  102.141646][ T9657]  ffff8880a6fac500: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc
[  102.149708][ T9657] ==================================================================
[  102.157756][ T9657] Disabling lock debugging due to kernel taint
[  102.163957][ T9657] Kernel panic - not syncing: panic_on_warn set ...
[  102.170556][ T9657] CPU: 0 PID: 9657 Comm: syz-executor.0 Tainted: G    B             5.5.0-rc6-syzkaller #0
[  102.180617][ T9657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  102.190663][ T9657] Call Trace:
[  102.194000][ T9657]  dump_stack+0x197/0x210
[  102.198319][ T9657]  panic+0x2e3/0x75c
[  102.202250][ T9657]  ? add_taint.cold+0x16/0x16
[  102.206915][ T9657]  ? trace_hardirqs_on+0x5e/0x240
[  102.211928][ T9657]  ? trace_hardirqs_on+0x5e/0x240
[  102.216936][ T9657]  ? bitmap_ip_add+0xef/0xe60
[  102.221702][ T9657]  end_report+0x47/0x4f
[  102.225837][ T9657]  ? bitmap_ip_add+0xef/0xe60
[  102.230499][ T9657]  __kasan_report.cold+0xe/0x41
[  102.235330][ T9657]  ? bitmap_ip_add+0xef/0xe60
[  102.239985][ T9657]  kasan_report+0x12/0x20
[  102.244312][ T9657]  check_memory_region+0x134/0x1a0
[  102.249419][ T9657]  __kasan_check_read+0x11/0x20
[  102.254278][ T9657]  bitmap_ip_add+0xef/0xe60
[  102.258855][ T9657]  bitmap_ip_uadt+0x73e/0xa10
[  102.263555][ T9657]  ? bitmap_ip_head+0x910/0x910
[  102.268391][ T9657]  ? bitmap_ip_kadt+0x5a0/0x5a0
[  102.273240][ T9657]  ? __kasan_check_write+0x14/0x20
[  102.278338][ T9657]  ? lock_set_class+0x3b1/0x7a0
[  102.283221][ T9657]  call_ad+0x1a0/0x5a0
[  102.287278][ T9657]  ? start_msg+0x220/0x220
[  102.291683][ T9657]  ? nla_memcpy+0xb0/0xb0
[  102.296017][ T9657]  ? __nla_parse+0x43/0x60
[  102.300498][ T9657]  ip_set_ad.isra.0+0x572/0xb20
[  102.305355][ T9657]  ? ip_set_nfnl_get_byindex+0x460/0x460
[  102.310984][ T9657]  ? nla_memcpy+0xb0/0xb0
[  102.315596][ T9657]  ? lock_downgrade+0x920/0x920
[  102.320436][ T9657]  ip_set_uadd+0x37/0x50
[  102.324665][ T9657]  ? ip_set_udel+0x50/0x50
[  102.329119][ T9657]  nfnetlink_rcv_msg+0xcf2/0xfb0
[  102.334205][ T9657]  ? nfnetlink_bind+0x2c0/0x2c0
[  102.339041][ T9657]  ? find_held_lock+0x35/0x130
[  102.343801][ T9657]  ? __local_bh_enable_ip+0x15a/0x270
[  102.349172][ T9657]  ? __dev_queue_xmit+0x175c/0x35c0
[  102.354357][ T9657]  ? __local_bh_enable_ip+0x15a/0x270
[  102.359718][ T9657]  ? lockdep_hardirqs_on+0x421/0x5e0
[  102.364993][ T9657]  ? __dev_queue_xmit+0x172e/0x35c0
[  102.370188][ T9657]  ? trace_hardirqs_on+0x67/0x240
[  102.375216][ T9657]  ? __dev_queue_xmit+0x172e/0x35c0
[  102.380412][ T9657]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  102.386644][ T9657]  ? apparmor_capable+0x497/0x900
[  102.391653][ T9657]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  102.397989][ T9657]  ? __kasan_check_read+0x11/0x20
[  102.403001][ T9657]  ? apparmor_cred_prepare+0x7b0/0x7b0
[  102.408456][ T9657]  netlink_rcv_skb+0x177/0x450
[  102.413315][ T9657]  ? nfnetlink_bind+0x2c0/0x2c0
[  102.418258][ T9657]  ? netlink_ack+0xb50/0xb50
[  102.422834][ T9657]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  102.429057][ T9657]  ? ns_capable_common+0x93/0x100
[  102.434064][ T9657]  ? ns_capable+0x20/0x30
[  102.438378][ T9657]  ? __netlink_ns_capable+0x104/0x140
[  102.443738][ T9657]  nfnetlink_rcv+0x1ba/0x460
[  102.448310][ T9657]  ? nfnetlink_rcv_batch+0x17a0/0x17a0
[  102.453867][ T9657]  ? netlink_deliver_tap+0x24a/0xbe0
[  102.459143][ T9657]  netlink_unicast+0x58c/0x7d0
[  102.464010][ T9657]  ? netlink_attachskb+0x870/0x870
[  102.469131][ T9657]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  102.474840][ T9657]  ? __check_object_size+0x3d/0x437
[  102.480025][ T9657]  netlink_sendmsg+0x91c/0xea0
[  102.484799][ T9657]  ? netlink_unicast+0x7d0/0x7d0
[  102.489724][ T9657]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  102.495257][ T9657]  ? apparmor_socket_sendmsg+0x2a/0x30
[  102.500701][ T9657]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  102.506927][ T9657]  ? security_socket_sendmsg+0x8d/0xc0
[  102.512413][ T9657]  ? netlink_unicast+0x7d0/0x7d0
[  102.517334][ T9657]  sock_sendmsg+0xd7/0x130
[  102.521730][ T9657]  ____sys_sendmsg+0x753/0x880
[  102.526479][ T9657]  ? kernel_sendmsg+0x50/0x50
[  102.531141][ T9657]  ? __fget+0x35d/0x550
[  102.535281][ T9657]  ? find_held_lock+0x35/0x130
[  102.540031][ T9657]  ___sys_sendmsg+0x100/0x170
[  102.544740][ T9657]  ? sendmsg_copy_msghdr+0x70/0x70
[  102.549834][ T9657]  ? __kasan_check_read+0x11/0x20
[  102.554853][ T9657]  ? __fget+0x37f/0x550
[  102.559002][ T9657]  ? ksys_dup3+0x3e0/0x3e0
[  102.563403][ T9657]  ? __fget_light+0x1a9/0x230
[  102.568068][ T9657]  ? __fdget+0x1b/0x20
[  102.572169][ T9657]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  102.578395][ T9657]  __sys_sendmsg+0x105/0x1d0
[  102.582974][ T9657]  ? __sys_sendmsg_sock+0xc0/0xc0
[  102.587999][ T9657]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  102.593460][ T9657]  ? do_syscall_64+0x26/0x790
[  102.598131][ T9657]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  102.604185][ T9657]  ? do_syscall_64+0x26/0x790
[  102.608848][ T9657]  __x64_sys_sendmsg+0x78/0xb0
[  102.613593][ T9657]  do_syscall_64+0xfa/0x790
[  102.618087][ T9657]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  102.623959][ T9657] RIP: 0033:0x45b159
[  102.627834][ T9657] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  102.647427][ T9657] RSP: 002b:00007fd1c3a14c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  102.655825][ T9657] RAX: ffffffffffffffda RBX: 00007fd1c3a156d4 RCX: 000000000045b159
[  102.663781][ T9657] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003
[  102.671752][ T9657] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  102.679707][ T9657] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
[  102.687661][ T9657] R13: 00000000000008dc R14: 00000000004ca08f R15: 000000000075bf2c
[  102.696847][ T9657] Kernel Offset: disabled
[  102.701194][ T9657] Rebooting in 86400 seconds..