[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
[  OK  ] Started Update UTMP about System Runlevel Changes.
         Starting Load/Save RF Kill Switch Status...
[  OK  ] Started Load/Save RF Kill Switch Status.

Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.1.3' (ECDSA) to the list of known hosts.
syzkaller login: [   28.002682] IPVS: ftp: loaded support on port[0] = 21
[   28.066164] chnl_net:caif_netlink_parms(): no params data found
[   28.124329] bridge0: port 1(bridge_slave_0) entered blocking state
[   28.130874] bridge0: port 1(bridge_slave_0) entered disabled state
[   28.138680] device bridge_slave_0 entered promiscuous mode
[   28.146456] bridge0: port 2(bridge_slave_1) entered blocking state
[   28.152837] bridge0: port 2(bridge_slave_1) entered disabled state
[   28.160551] device bridge_slave_1 entered promiscuous mode
[   28.176476] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   28.185492] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   28.202238] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   28.209491] team0: Port device team_slave_0 added
[   28.215035] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   28.222047] team0: Port device team_slave_1 added
[   28.236710] batman_adv: batadv0: Adding interface: batadv_slave_0
[   28.242937] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   28.268538] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   28.279802] batman_adv: batadv0: Adding interface: batadv_slave_1
[   28.286121] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   28.311343] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   28.322450] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   28.329981] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   28.347746] device hsr_slave_0 entered promiscuous mode
[   28.353343] device hsr_slave_1 entered promiscuous mode
[   28.359474] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   28.366534] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   28.424889] bridge0: port 2(bridge_slave_1) entered blocking state
[   28.431278] bridge0: port 2(bridge_slave_1) entered forwarding state
[   28.438322] bridge0: port 1(bridge_slave_0) entered blocking state
[   28.444742] bridge0: port 1(bridge_slave_0) entered forwarding state
[   28.472645] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[   28.478770] 8021q: adding VLAN 0 to HW filter on device bond0
[   28.487670] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   28.496257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   28.515931] bridge0: port 1(bridge_slave_0) entered disabled state
[   28.522878] bridge0: port 2(bridge_slave_1) entered disabled state
[   28.532724] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   28.539384] 8021q: adding VLAN 0 to HW filter on device team0
[   28.548080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   28.555743] bridge0: port 1(bridge_slave_0) entered blocking state
[   28.562083] bridge0: port 1(bridge_slave_0) entered forwarding state
[   28.580437] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   28.590792] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   28.602279] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   28.609215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   28.616878] bridge0: port 2(bridge_slave_1) entered blocking state
[   28.623208] bridge0: port 2(bridge_slave_1) entered forwarding state
[   28.630869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   28.638637] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   28.646326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   28.654040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   28.661478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   28.668303] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   28.679244] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[   28.686851] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   28.694303] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   28.705478] 8021q: adding VLAN 0 to HW filter on device batadv0
[   28.753804] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready
[   28.762946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   28.787672] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready
[   28.795120] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready
[   28.801525] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready
[   28.811069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   28.819387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   28.826432] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   28.834956] device veth0_vlan entered promiscuous mode
[   28.842611] device veth1_vlan entered promiscuous mode
[   28.849378] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready
[   28.858021] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready
[   28.868127] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready
[   28.877234] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   28.884975] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   28.892099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   28.901370] device veth0_macvtap entered promiscuous mode
[   28.907921] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready
[   28.916232] device veth1_macvtap entered promiscuous mode
[   28.925596] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready
[   28.935031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready
[   28.945946] batman_adv: batadv0: Interface activated: batadv_slave_0
[   28.952619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   28.961048] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   28.970371] batman_adv: batadv0: Interface activated: batadv_slave_1
[   28.978067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[   29.053471] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[   29.064138] netlink: 24 bytes leftover after parsing attributes in process `syz-executor230'.
[   29.078694] netlink: 72 bytes leftover after parsing attributes in process `syz-executor230'.
[   29.088614] netlink: 8 bytes leftover after parsing attributes in process `syz-executor230'.
[   29.097532] FAULT_INJECTION: forcing a failure.
[   29.097532] name failslab, interval 1, probability 0, space 0, times 1
[   29.109240] CPU: 1 PID: 8200 Comm: syz-executor230 Not tainted 4.14.290-syzkaller #0
[   29.117105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
[   29.126438] Call Trace:
[   29.129024]  dump_stack+0x1b2/0x281
[   29.132645]  should_fail.cold+0x10a/0x149
[   29.136773]  should_failslab+0xd6/0x130
[   29.140757]  kmem_cache_alloc_trace+0x29a/0x3d0
[   29.145418]  qfq_change_class+0xbc0/0x13b0
[   29.149633]  ? qfq_deactivate_agg+0xa10/0xa10
[   29.154111]  ? nla_parse+0x157/0x1f0
[   29.157806]  ? qfq_deactivate_agg+0xa10/0xa10
[   29.162283]  tc_ctl_tclass+0x408/0xa60
[   29.166154]  ? qdisc_create+0xdb0/0xdb0
[   29.170103]  ? kmem_cache_free+0x23a/0x2b0
[   29.174348]  ? qdisc_create+0xdb0/0xdb0
[   29.178313]  rtnetlink_rcv_msg+0x3be/0xb10
[   29.182522]  ? rtnl_calcit.isra.0+0x3a0/0x3a0
[   29.187001]  ? __netlink_lookup+0x345/0x5d0
[   29.191313]  ? netdev_pick_tx+0x2e0/0x2e0
[   29.195438]  netlink_rcv_skb+0x125/0x390
[   29.199474]  ? rtnl_calcit.isra.0+0x3a0/0x3a0
[   29.203952]  ? netlink_ack+0x9a0/0x9a0
[   29.207823]  netlink_unicast+0x437/0x610
[   29.211875]  ? netlink_sendskb+0xd0/0xd0
[   29.215920]  ? __check_object_size+0x179/0x230
[   29.220488]  netlink_sendmsg+0x648/0xbc0
[   29.224542]  ? nlmsg_notify+0x1b0/0x1b0
[   29.228497]  ? kernel_recvmsg+0x210/0x210
[   29.232632]  ? security_socket_sendmsg+0x83/0xb0
[   29.237374]  ? nlmsg_notify+0x1b0/0x1b0
[   29.241329]  sock_sendmsg+0xb5/0x100
[   29.245037]  ___sys_sendmsg+0x6c8/0x800
[   29.249003]  ? get_pid_task+0x91/0x130
[   29.252885]  ? copy_msghdr_from_user+0x3b0/0x3b0
[   29.257631]  ? lock_downgrade+0x740/0x740
[   29.261759]  ? proc_fail_nth_write+0x7b/0x180
[   29.266234]  ? proc_tgid_io_accounting+0x7a0/0x7a0
[   29.271141]  ? _raw_spin_unlock+0x29/0x40
[   29.275286]  ? do_fault_around+0x35e/0x620
[   29.279507]  ? fsnotify+0x974/0x11b0
[   29.283197]  ? proc_tgid_io_accounting+0x7a0/0x7a0
[   29.288110]  ? __handle_mm_fault+0x80f/0x4620
[   29.292586]  ? vfs_write+0x35d/0x4d0
[   29.296277]  ? __fdget+0x167/0x1f0
[   29.299795]  ? sockfd_lookup_light+0xb2/0x160
[   29.305413]  __sys_sendmsg+0xa3/0x120
[   29.309194]  ? SyS_shutdown+0x160/0x160
[   29.313167]  ? SyS_read+0x210/0x210
[   29.316778]  ? __do_page_fault+0x159/0xad0
[   29.321041]  SyS_sendmsg+0x27/0x40
[   29.324600]  ? __sys_sendmsg+0x120/0x120
[   29.328664]  do_syscall_64+0x1d5/0x640
[   29.332720]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[   29.337907] RIP: 0033:0x7f4f7d6b1e69
[   29.341593] RSP: 002b:00007ffe7aed9248 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
executing program
[   29.349283] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f4f7d6b1e69
[   29.356533] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000006
[   29.365110] RBP: 00007ffe7aed9260 R08: 0000000000000001 R09: 0000000000000001
[   29.372369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007
[   29.379614] R13: 00000000000f4240 R14: 0000000000000000 R15: 0000000000000000
[   29.398936] netlink: 24 bytes leftover after parsing attributes in process `syz-executor230'.
[   29.453546] netlink: 72 bytes leftover after parsing attributes in process `syz-executor230'.
[   29.462660] ==================================================================
[   29.470109] BUG: KASAN: use-after-free in qfq_find_class+0x144/0x170
[   29.476578] Read of size 4 at addr ffff8880b370e300 by task syz-executor230/8205
[   29.484095] 
[   29.485709] CPU: 0 PID: 8205 Comm: syz-executor230 Not tainted 4.14.290-syzkaller #0
[   29.493582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
[   29.502912] Call Trace:
[   29.505486]  dump_stack+0x1b2/0x281
[   29.509107]  print_address_description.cold+0x54/0x1d3
[   29.514393]  kasan_report_error.cold+0x8a/0x191
[   29.519045]  ? qfq_find_class+0x144/0x170
[   29.523228]  __asan_report_load4_noabort+0x68/0x70
[   29.528146]  ? qfq_find_class+0x144/0x170
[   29.532268]  qfq_find_class+0x144/0x170
[   29.536262]  ? qdisc_match_from_root+0x14a/0x220
[   29.540993]  tc_ctl_tclass+0x5ca/0xa60
[   29.544859]  ? kfree_skbmem+0x98/0x100
[   29.548723]  ? qdisc_create+0xdb0/0xdb0
[   29.552678]  ? kmem_cache_free+0x23a/0x2b0
[   29.556887]  ? apparmor_capable+0xfa/0x4a0
[   29.561102]  ? qdisc_create+0xdb0/0xdb0
[   29.565053]  rtnetlink_rcv_msg+0x3be/0xb10
[   29.569262]  ? rtnl_calcit.isra.0+0x3a0/0x3a0
[   29.573748]  ? __netlink_lookup+0x345/0x5d0
[   29.578050]  ? netdev_pick_tx+0x2e0/0x2e0
[   29.582182]  netlink_rcv_skb+0x125/0x390
[   29.586218]  ? rtnl_calcit.isra.0+0x3a0/0x3a0
[   29.590697]  ? netlink_ack+0x9a0/0x9a0
[   29.594575]  netlink_unicast+0x437/0x610
[   29.598614]  ? netlink_sendskb+0xd0/0xd0
[   29.602649]  ? __check_object_size+0x179/0x230
[   29.607209]  netlink_sendmsg+0x648/0xbc0
[   29.611255]  ? nlmsg_notify+0x1b0/0x1b0
[   29.615205]  ? kernel_recvmsg+0x210/0x210
[   29.619329]  ? security_socket_sendmsg+0x83/0xb0
[   29.624059]  ? nlmsg_notify+0x1b0/0x1b0
[   29.628023]  sock_sendmsg+0xb5/0x100
[   29.631738]  ___sys_sendmsg+0x6c8/0x800
[   29.635705]  ? copy_msghdr_from_user+0x3b0/0x3b0
[   29.640436]  ? trace_hardirqs_on+0x10/0x10
[   29.644645]  ? trace_hardirqs_on+0x10/0x10
[   29.648858]  ? apparmor_file_alloc_security+0x129/0x800
[   29.654219]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[   29.659652]  ? __lockdep_init_map+0x100/0x560
[   29.664124]  ? __fd_install+0x1ec/0x5c0
[   29.668072]  ? lock_acquire+0x170/0x3f0
[   29.672018]  ? lock_downgrade+0x740/0x740
[   29.676147]  ? __fdget+0x167/0x1f0
[   29.679673]  ? sockfd_lookup_light+0xb2/0x160
[   29.684144]  __sys_sendmsg+0xa3/0x120
[   29.687917]  ? SyS_shutdown+0x160/0x160
[   29.691870]  ? move_addr_to_kernel+0x60/0x60
[   29.696268]  ? __do_page_fault+0x159/0xad0
[   29.700481]  SyS_sendmsg+0x27/0x40
[   29.704009]  ? __sys_sendmsg+0x120/0x120
[   29.708045]  do_syscall_64+0x1d5/0x640
[   29.711915]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[   29.717077] RIP: 0033:0x7f4f7d6b1e69
[   29.720795] RSP: 002b:00007ffe7aed9248 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   29.728700] RAX: ffffffffffffffda RBX: 00007ffe7aed9280 RCX: 00007f4f7d6b1e69
[   29.735952] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000005
[   29.743201] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001
[   29.750450] R10: 0000000000000001 R11: 0000000000000246 R12: 00007ffe7aed9270
[   29.757716] R13: 00000000000f4240 R14: 0000000000007197 R15: 00007ffe7aed9254
[   29.764979] 
[   29.766602] Allocated by task 8200:
[   29.770273]  kasan_kmalloc+0xeb/0x160
[   29.774062]  kmem_cache_alloc_trace+0x131/0x3d0
[   29.778803]  qfq_change_class+0x478/0x13b0
[   29.783021]  tc_ctl_tclass+0x408/0xa60
[   29.786888]  rtnetlink_rcv_msg+0x3be/0xb10
[   29.791098]  netlink_rcv_skb+0x125/0x390
[   29.795133]  netlink_unicast+0x437/0x610
[   29.799194]  netlink_sendmsg+0x648/0xbc0
[   29.803232]  sock_sendmsg+0xb5/0x100
[   29.806918]  ___sys_sendmsg+0x6c8/0x800
[   29.810868]  __sys_sendmsg+0xa3/0x120
[   29.814651]  SyS_sendmsg+0x27/0x40
[   29.818174]  do_syscall_64+0x1d5/0x640
[   29.822044]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[   29.827205] 
[   29.828814] Freed by task 8200:
[   29.832071]  kasan_slab_free+0xc3/0x1a0
[   29.836021]  kfree+0xc9/0x250
[   29.839104]  qfq_change_class+0xfe8/0x13b0
[   29.843313]  tc_ctl_tclass+0x408/0xa60
[   29.847176]  rtnetlink_rcv_msg+0x3be/0xb10
[   29.851390]  netlink_rcv_skb+0x125/0x390
[   29.855427]  netlink_unicast+0x437/0x610
[   29.859460]  netlink_sendmsg+0x648/0xbc0
[   29.863493]  sock_sendmsg+0xb5/0x100
[   29.867185]  ___sys_sendmsg+0x6c8/0x800
[   29.871145]  __sys_sendmsg+0xa3/0x120
[   29.874922]  SyS_sendmsg+0x27/0x40
[   29.878447]  do_syscall_64+0x1d5/0x640
[   29.882320]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[   29.887481] 
[   29.889087] The buggy address belongs to the object at ffff8880b370e300
[   29.889087]  which belongs to the cache kmalloc-128 of size 128
[   29.901726] The buggy address is located 0 bytes inside of
[   29.901726]  128-byte region [ffff8880b370e300, ffff8880b370e380)
[   29.913395] The buggy address belongs to the page:
[   29.918298] page:ffffea0002cdc380 count:1 mapcount:0 mapping:ffff8880b370e000 index:0x0
[   29.926414] flags: 0xfff00000000100(slab)
[   29.930539] raw: 00fff00000000100 ffff8880b370e000 0000000000000000 0000000100000015
[   29.938401] raw: ffffea0002cf43a0 ffffea0002cd61e0 ffff88813fe74640 0000000000000000
[   29.946265] page dumped because: kasan: bad access detected
[   29.951944] 
[   29.953554] Memory state around the buggy address:
[   29.958458]  ffff8880b370e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   29.965966]  ffff8880b370e280: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   29.973300] >ffff8880b370e300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.980660]                    ^
[   29.984000]  ffff8880b370e380: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
[   29.991333]  ffff8880b370e400: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.998675] ==================================================================
[   30.006122] Disabling lock debugging due to kernel taint
[   30.016187] Kernel panic - not syncing: panic_on_warn set ...
[   30.016187] 
[   30.023552] CPU: 1 PID: 8205 Comm: syz-executor230 Tainted: G    B           4.14.290-syzkaller #0
[   30.032806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
[   30.042145] Call Trace:
[   30.044720]  dump_stack+0x1b2/0x281
[   30.048322]  panic+0x1f9/0x42d
[   30.051492]  ? add_taint.cold+0x16/0x16
[   30.055444]  ? ___preempt_schedule+0x16/0x18
[   30.059829]  kasan_end_report+0x43/0x49
[   30.063788]  kasan_report_error.cold+0xa7/0x191
[   30.068432]  ? qfq_find_class+0x144/0x170
[   30.072552]  __asan_report_load4_noabort+0x68/0x70
[   30.077455]  ? qfq_find_class+0x144/0x170
[   30.081582]  qfq_find_class+0x144/0x170
[   30.085530]  ? qdisc_match_from_root+0x14a/0x220
[   30.090259]  tc_ctl_tclass+0x5ca/0xa60
[   30.094119]  ? kfree_skbmem+0x98/0x100
[   30.097979]  ? qdisc_create+0xdb0/0xdb0
[   30.101924]  ? kmem_cache_free+0x23a/0x2b0
[   30.106135]  ? apparmor_capable+0xfa/0x4a0
[   30.110352]  ? qdisc_create+0xdb0/0xdb0
[   30.114397]  rtnetlink_rcv_msg+0x3be/0xb10
[   30.118632]  ? rtnl_calcit.isra.0+0x3a0/0x3a0
[   30.123099]  ? __netlink_lookup+0x345/0x5d0
[   30.127393]  ? netdev_pick_tx+0x2e0/0x2e0
[   30.131531]  netlink_rcv_skb+0x125/0x390
[   30.135567]  ? rtnl_calcit.isra.0+0x3a0/0x3a0
[   30.140034]  ? netlink_ack+0x9a0/0x9a0
[   30.143894]  netlink_unicast+0x437/0x610
[   30.147934]  ? netlink_sendskb+0xd0/0xd0
[   30.151969]  ? __check_object_size+0x179/0x230
[   30.156523]  netlink_sendmsg+0x648/0xbc0
[   30.160564]  ? nlmsg_notify+0x1b0/0x1b0
[   30.164511]  ? kernel_recvmsg+0x210/0x210
[   30.168645]  ? security_socket_sendmsg+0x83/0xb0
[   30.173374]  ? nlmsg_notify+0x1b0/0x1b0
[   30.177321]  sock_sendmsg+0xb5/0x100
[   30.181005]  ___sys_sendmsg+0x6c8/0x800
[   30.184955]  ? copy_msghdr_from_user+0x3b0/0x3b0
[   30.189686]  ? trace_hardirqs_on+0x10/0x10
[   30.193892]  ? trace_hardirqs_on+0x10/0x10
[   30.198106]  ? apparmor_file_alloc_security+0x129/0x800
[   30.203439]  ? rcu_lockdep_current_cpu_online+0xed/0x140
[   30.208876]  ? __lockdep_init_map+0x100/0x560
[   30.213342]  ? __fd_install+0x1ec/0x5c0
[   30.217288]  ? lock_acquire+0x170/0x3f0
[   30.221240]  ? lock_downgrade+0x740/0x740
[   30.225364]  ? __fdget+0x167/0x1f0
[   30.228876]  ? sockfd_lookup_light+0xb2/0x160
[   30.233342]  __sys_sendmsg+0xa3/0x120
[   30.237114]  ? SyS_shutdown+0x160/0x160
[   30.241162]  ? move_addr_to_kernel+0x60/0x60
[   30.245542]  ? __do_page_fault+0x159/0xad0
[   30.249747]  SyS_sendmsg+0x27/0x40
[   30.253257]  ? __sys_sendmsg+0x120/0x120
[   30.257303]  do_syscall_64+0x1d5/0x640
[   30.261174]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[   30.266353] RIP: 0033:0x7f4f7d6b1e69
[   30.270034] RSP: 002b:00007ffe7aed9248 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   30.277714] RAX: ffffffffffffffda RBX: 00007ffe7aed9280 RCX: 00007f4f7d6b1e69
[   30.285060] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000005
[   30.292316] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001
[   30.299556] R10: 0000000000000001 R11: 0000000000000246 R12: 00007ffe7aed9270
[   30.306799] R13: 00000000000f4240 R14: 0000000000007197 R15: 00007ffe7aed9254
[   30.314225] Kernel Offset: disabled
[   30.317830] Rebooting in 86400 seconds..