[ 73.744162][ T27] audit: type=1800 audit(1582253234.021:26): pid=9798 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 74.658153][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 74.658164][ T27] audit: type=1800 audit(1582253234.951:29): pid=9798 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 74.684637][ T27] audit: type=1800 audit(1582253234.951:30): pid=9798 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.235' (ECDSA) to the list of known hosts. syzkaller login: [ 82.385157][ T9956] IPVS: ftp: loaded support on port[0] = 21 [ 82.441425][ T9956] chnl_net:caif_netlink_parms(): no params data found [ 82.478890][ T9956] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.486265][ T9956] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.493889][ T9956] device bridge_slave_0 entered promiscuous mode [ 82.502313][ T9956] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.509480][ T9956] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.517412][ T9956] device bridge_slave_1 entered promiscuous mode [ 82.533748][ T9956] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.544409][ T9956] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.562934][ T9956] team0: Port device team_slave_0 added [ 82.570019][ T9956] team0: Port device team_slave_1 added [ 82.584749][ T9956] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 82.591771][ T9956] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.618677][ T9956] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 82.630990][ T9956] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.638183][ T9956] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 82.664107][ T9956] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 82.717906][ T9956] device hsr_slave_0 entered promiscuous mode [ 82.766478][ T9956] device hsr_slave_1 entered promiscuous mode [ 82.864515][ T9956] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.919286][ T9956] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.978694][ T9956] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.018443][ T9956] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.080490][ T9956] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.087680][ T9956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.095178][ T9956] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.102275][ T9956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.142263][ T9956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.154605][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.165189][ T2686] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.173258][ T2686] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.181357][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 83.193746][ T9956] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.205045][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.213628][ T2719] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.220707][ T2719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.231870][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.241286][ T2686] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.248382][ T2686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.268178][ T3236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.285905][ T9956] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 83.297505][ T9956] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.310484][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.318372][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.327323][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.335989][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.346791][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.363330][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 83.370798][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 83.383024][ T9956] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.402423][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 83.420355][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.428894][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.436778][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.446942][ T9956] device veth0_vlan entered promiscuous mode [ 83.458346][ T9956] device veth1_vlan entered promiscuous mode [ 83.479572][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 83.488510][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 83.499002][ T9956] device veth0_macvtap entered promiscuous mode [ 83.509286][ T9956] device veth1_macvtap entered promiscuous mode [ 83.524877][ T9956] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 83.538902][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 83.547675][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 83.555399][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 83.564300][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 83.575016][ T9956] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 83.582877][ T3237] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 83.592084][ T3237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 83.736375][ C1] ================================================================== [ 83.744558][ C1] BUG: KASAN: use-after-free in find_match+0xb39/0xc90 [ 83.751405][ C1] Read of size 8 at addr ffff88809fa18320 by task kworker/1:19/2721 [ 83.759360][ C1] [ 83.761714][ C1] CPU: 1 PID: 2721 Comm: kworker/1:19 Not tainted 5.6.0-rc2-syzkaller #0 [ 83.770098][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.780143][ C1] Workqueue: ipv6_addrconf addrconf_dad_work [ 83.786101][ C1] Call Trace: [ 83.789363][ C1] [ 83.792195][ C1] dump_stack+0x197/0x210 [ 83.796515][ C1] ? find_match+0xb39/0xc90 [ 83.801017][ C1] print_address_description.constprop.0.cold+0xd4/0x30b [ 83.808019][ C1] ? find_match+0xb39/0xc90 [ 83.812515][ C1] ? find_match+0xb39/0xc90 [ 83.817037][ C1] __kasan_report.cold+0x1b/0x32 [ 83.821980][ C1] ? find_match+0xb39/0xc90 [ 83.826527][ C1] kasan_report+0x12/0x20 [ 83.830855][ C1] __asan_report_load8_noabort+0x14/0x20 [ 83.836481][ C1] find_match+0xb39/0xc90 [ 83.840806][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 83.845810][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 83.851610][ C1] __find_rr_leaf+0x14e/0x750 [ 83.856294][ C1] ? nexthop_is_blackhole+0x690/0x690 [ 83.861683][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 83.867820][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 83.872823][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 83.878612][ C1] ? unwind_dump+0x100/0x100 [ 83.883240][ C1] fib6_table_lookup+0x697/0xdb0 [ 83.888238][ C1] ? rt6_age_exceptions+0x130/0x130 [ 83.893426][ C1] ? __kasan_check_read+0x11/0x20 [ 83.898443][ C1] ip6_pol_route+0x1f6/0xa70 [ 83.903038][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 83.908583][ C1] ? flow_hash_from_keys+0x2c4/0x8c0 [ 83.913911][ C1] ? mark_lock+0xc2/0x1220 [ 83.918343][ C1] ip6_pol_route_input+0x65/0x80 [ 83.923268][ C1] fib6_rule_lookup+0x133/0x7d0 [ 83.928104][ C1] ? ip6_pol_route+0xa70/0xa70 [ 83.932846][ C1] ? fib6_lookup+0x340/0x340 [ 83.937429][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 83.943653][ C1] ? nf_conntrack_icmpv6_error+0x3c1/0x560 [ 83.949441][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 83.955348][ C1] ip6_route_input_lookup+0xb7/0xd0 [ 83.960530][ C1] ip6_route_input+0x5f0/0xa40 [ 83.965274][ C1] ? ip6_route_check_nh+0x670/0x670 [ 83.970470][ C1] ? cpuup_canceled+0xf8/0x1d0 [ 83.975227][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 83.980230][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 83.986033][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 83.991743][ C1] ip6_rcv_finish+0x17a/0x310 [ 83.996419][ C1] ipv6_rcv+0x10e/0x420 [ 84.000564][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 84.006006][ C1] ? __lock_acquire+0x16f2/0x4a00 [ 84.011030][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 84.016935][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 84.022383][ C1] __netif_receive_skb_one_core+0x113/0x1a0 [ 84.028256][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 84.034129][ C1] ? lock_acquire+0x190/0x410 [ 84.038785][ C1] ? process_backlog+0x1b5/0x780 [ 84.043705][ C1] __netif_receive_skb+0x2c/0x1d0 [ 84.048720][ C1] process_backlog+0x226/0x780 [ 84.053460][ C1] ? net_rx_action+0x27b/0x1120 [ 84.058325][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 84.063615][ C1] net_rx_action+0x508/0x1120 [ 84.068286][ C1] ? napi_busy_loop+0x970/0x970 [ 84.073135][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 84.078669][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 84.084719][ C1] ? ip6_finish_output2+0x10d3/0x25c0 [ 84.090089][ C1] ? trace_hardirqs_on+0x67/0x240 [ 84.095102][ C1] __do_softirq+0x262/0x98c [ 84.099603][ C1] ? ip6_finish_output2+0x10d3/0x25c0 [ 84.104969][ C1] do_softirq_own_stack+0x2a/0x40 [ 84.109971][ C1] [ 84.112890][ C1] do_softirq.part.0+0x11a/0x170 [ 84.117808][ C1] __local_bh_enable_ip+0x211/0x270 [ 84.122988][ C1] ip6_finish_output2+0x1101/0x25c0 [ 84.128168][ C1] ? ip6_mtu+0x2e6/0x450 [ 84.132398][ C1] ? ip6_frag_next+0xb20/0xb20 [ 84.137142][ C1] ? lock_downgrade+0x920/0x920 [ 84.141980][ C1] ? __kasan_check_read+0x11/0x20 [ 84.146994][ C1] __ip6_finish_output+0x444/0xaa0 [ 84.152089][ C1] ? __ip6_finish_output+0x444/0xaa0 [ 84.157377][ C1] ip6_finish_output+0x38/0x1f0 [ 84.162351][ C1] ip6_output+0x25e/0x880 [ 84.166664][ C1] ? ip6_finish_output+0x1f0/0x1f0 [ 84.171794][ C1] ? __ip6_finish_output+0xaa0/0xaa0 [ 84.177098][ C1] ndisc_send_skb+0xf1f/0x1490 [ 84.181855][ C1] ? nf_hook.constprop.0+0x560/0x560 [ 84.187129][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.193352][ C1] ? skb_set_owner_w+0x265/0x410 [ 84.198271][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 84.203971][ C1] ndisc_send_ns+0x3a9/0x850 [ 84.208540][ C1] ? mark_held_locks+0xa4/0xf0 [ 84.213283][ C1] ? ndisc_netdev_event+0x5e0/0x5e0 [ 84.218459][ C1] ? lockdep_hardirqs_on+0x421/0x5e0 [ 84.223721][ C1] ? addrconf_dad_work+0xb2c/0x11d0 [ 84.228896][ C1] ? trace_hardirqs_on+0x67/0x240 [ 84.233897][ C1] ? addrconf_dad_work+0xb2c/0x11d0 [ 84.239100][ C1] addrconf_dad_work+0xbf3/0x11d0 [ 84.244120][ C1] ? addrconf_dad_completed+0xbb0/0xbb0 [ 84.249670][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 84.255630][ C1] ? trace_hardirqs_on+0x67/0x240 [ 84.260643][ C1] process_one_work+0xa05/0x17a0 [ 84.265559][ C1] ? mark_held_locks+0xf0/0xf0 [ 84.270312][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 84.275661][ C1] ? lock_acquire+0x190/0x410 [ 84.280348][ C1] worker_thread+0x98/0xe40 [ 84.284857][ C1] kthread+0x361/0x430 [ 84.288904][ C1] ? process_one_work+0x17a0/0x17a0 [ 84.294077][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 84.299797][ C1] ret_from_fork+0x24/0x30 [ 84.304199][ C1] [ 84.306504][ C1] Allocated by task 9956: [ 84.310811][ C1] save_stack+0x23/0x90 [ 84.314956][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 84.320566][ C1] kasan_kmalloc+0x9/0x10 [ 84.324869][ C1] __kmalloc_node+0x4e/0x70 [ 84.329356][ C1] kvmalloc_node+0x68/0x100 [ 84.333855][ C1] alloc_netdev_mqs+0x98/0xe40 [ 84.338595][ C1] vti6_init_net+0x244/0x810 [ 84.343161][ C1] ops_init+0xb3/0x420 [ 84.347206][ C1] setup_net+0x2d5/0x8b0 [ 84.351422][ C1] copy_net_ns+0x29e/0x5a0 [ 84.355821][ C1] create_new_namespaces+0x403/0xb50 [ 84.361086][ C1] unshare_nsproxy_namespaces+0xc2/0x200 [ 84.366693][ C1] ksys_unshare+0x444/0x980 [ 84.371174][ C1] __x64_sys_unshare+0x31/0x40 [ 84.375916][ C1] do_syscall_64+0xfa/0x790 [ 84.380400][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 84.386262][ C1] [ 84.388570][ C1] Freed by task 9956: [ 84.392541][ C1] save_stack+0x23/0x90 [ 84.396684][ C1] __kasan_slab_free+0x102/0x150 [ 84.401615][ C1] kasan_slab_free+0xe/0x10 [ 84.406103][ C1] kfree+0x10a/0x2c0 [ 84.409987][ C1] __netdev_name_node_alt_destroy+0x1ff/0x2a0 [ 84.416040][ C1] netdev_name_node_alt_destroy+0x57/0x80 [ 84.421745][ C1] rtnl_linkprop.isra.0+0x575/0x6f0 [ 84.426919][ C1] rtnl_dellinkprop+0x46/0x60 [ 84.431586][ C1] rtnetlink_rcv_msg+0x45e/0xaf0 [ 84.436516][ C1] netlink_rcv_skb+0x177/0x450 [ 84.441263][ C1] rtnetlink_rcv+0x1d/0x30 [ 84.445658][ C1] netlink_unicast+0x59e/0x7e0 [ 84.450408][ C1] netlink_sendmsg+0x91c/0xea0 [ 84.455152][ C1] sock_sendmsg+0xd7/0x130 [ 84.459560][ C1] ____sys_sendmsg+0x753/0x880 [ 84.464302][ C1] ___sys_sendmsg+0x100/0x170 [ 84.468980][ C1] __sys_sendmsg+0x105/0x1d0 [ 84.473553][ C1] __x64_sys_sendmsg+0x78/0xb0 [ 84.478298][ C1] do_syscall_64+0xfa/0x790 [ 84.482779][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 84.488641][ C1] [ 84.490947][ C1] The buggy address belongs to the object at ffff88809fa18000 [ 84.490947][ C1] which belongs to the cache kmalloc-4k of size 4096 [ 84.504974][ C1] The buggy address is located 800 bytes inside of [ 84.504974][ C1] 4096-byte region [ffff88809fa18000, ffff88809fa19000) [ 84.518389][ C1] The buggy address belongs to the page: [ 84.524013][ C1] page:ffffea00027e8600 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0 [ 84.534915][ C1] flags: 0xfffe0000010200(slab|head) [ 84.540281][ C1] raw: 00fffe0000010200 ffffea000235f408 ffffea00025ec688 ffff8880aa402000 [ 84.548844][ C1] raw: 0000000000000000 ffff88809fa18000 0000000100000001 0000000000000000 [ 84.557399][ C1] page dumped because: kasan: bad access detected [ 84.563902][ C1] [ 84.566210][ C1] Memory state around the buggy address: [ 84.571841][ C1] ffff88809fa18200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 84.579890][ C1] ffff88809fa18280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 84.587939][ C1] >ffff88809fa18300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 84.595974][ C1] ^ [ 84.601062][ C1] ffff88809fa18380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 84.609186][ C1] ffff88809fa18400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 84.617225][ C1] ================================================================== [ 84.625277][ C1] Disabling lock debugging due to kernel taint [ 84.631534][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 84.638124][ C1] CPU: 1 PID: 2721 Comm: kworker/1:19 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 84.647918][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.657965][ C1] Workqueue: ipv6_addrconf addrconf_dad_work [ 84.663974][ C1] Call Trace: [ 84.667236][ C1] [ 84.670069][ C1] dump_stack+0x197/0x210 [ 84.674417][ C1] panic+0x2e3/0x75c [ 84.678292][ C1] ? add_taint.cold+0x16/0x16 [ 84.683038][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 84.688035][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 84.693052][ C1] ? find_match+0xb39/0xc90 [ 84.697544][ C1] end_report+0x47/0x4f [ 84.701679][ C1] ? find_match+0xb39/0xc90 [ 84.706339][ C1] __kasan_report.cold+0xe/0x32 [ 84.711177][ C1] ? find_match+0xb39/0xc90 [ 84.715659][ C1] kasan_report+0x12/0x20 [ 84.719967][ C1] __asan_report_load8_noabort+0x14/0x20 [ 84.725571][ C1] find_match+0xb39/0xc90 [ 84.729882][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 84.734886][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 84.740673][ C1] __find_rr_leaf+0x14e/0x750 [ 84.745331][ C1] ? nexthop_is_blackhole+0x690/0x690 [ 84.750682][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 84.756813][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 84.761831][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 84.767617][ C1] ? unwind_dump+0x100/0x100 [ 84.772197][ C1] fib6_table_lookup+0x697/0xdb0 [ 84.777129][ C1] ? rt6_age_exceptions+0x130/0x130 [ 84.782349][ C1] ? __kasan_check_read+0x11/0x20 [ 84.787370][ C1] ip6_pol_route+0x1f6/0xa70 [ 84.791946][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 84.797505][ C1] ? flow_hash_from_keys+0x2c4/0x8c0 [ 84.802768][ C1] ? mark_lock+0xc2/0x1220 [ 84.807192][ C1] ip6_pol_route_input+0x65/0x80 [ 84.812122][ C1] fib6_rule_lookup+0x133/0x7d0 [ 84.816958][ C1] ? ip6_pol_route+0xa70/0xa70 [ 84.821708][ C1] ? fib6_lookup+0x340/0x340 [ 84.826292][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 84.832518][ C1] ? nf_conntrack_icmpv6_error+0x3c1/0x560 [ 84.838309][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 84.844183][ C1] ip6_route_input_lookup+0xb7/0xd0 [ 84.849381][ C1] ip6_route_input+0x5f0/0xa40 [ 84.854134][ C1] ? ip6_route_check_nh+0x670/0x670 [ 84.859318][ C1] ? cpuup_canceled+0xf8/0x1d0 [ 84.864173][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 84.869176][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 84.874973][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 84.880673][ C1] ip6_rcv_finish+0x17a/0x310 [ 84.885329][ C1] ipv6_rcv+0x10e/0x420 [ 84.889465][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 84.894904][ C1] ? __lock_acquire+0x16f2/0x4a00 [ 84.899914][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 84.905805][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 84.911289][ C1] __netif_receive_skb_one_core+0x113/0x1a0 [ 84.917206][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 84.923077][ C1] ? lock_acquire+0x190/0x410 [ 84.927794][ C1] ? process_backlog+0x1b5/0x780 [ 84.932712][ C1] __netif_receive_skb+0x2c/0x1d0 [ 84.937726][ C1] process_backlog+0x226/0x780 [ 84.942502][ C1] ? net_rx_action+0x27b/0x1120 [ 84.947388][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 84.952652][ C1] net_rx_action+0x508/0x1120 [ 84.957309][ C1] ? napi_busy_loop+0x970/0x970 [ 84.962174][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 84.967744][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 84.973965][ C1] ? ip6_finish_output2+0x10d3/0x25c0 [ 84.979321][ C1] ? trace_hardirqs_on+0x67/0x240 [ 84.984402][ C1] __do_softirq+0x262/0x98c [ 84.988892][ C1] ? ip6_finish_output2+0x10d3/0x25c0 [ 84.994765][ C1] do_softirq_own_stack+0x2a/0x40 [ 84.999773][ C1] [ 85.002695][ C1] do_softirq.part.0+0x11a/0x170 [ 85.007658][ C1] __local_bh_enable_ip+0x211/0x270 [ 85.012859][ C1] ip6_finish_output2+0x1101/0x25c0 [ 85.018054][ C1] ? ip6_mtu+0x2e6/0x450 [ 85.022291][ C1] ? ip6_frag_next+0xb20/0xb20 [ 85.027043][ C1] ? lock_downgrade+0x920/0x920 [ 85.031994][ C1] ? __kasan_check_read+0x11/0x20 [ 85.037004][ C1] __ip6_finish_output+0x444/0xaa0 [ 85.042098][ C1] ? __ip6_finish_output+0x444/0xaa0 [ 85.047365][ C1] ip6_finish_output+0x38/0x1f0 [ 85.052195][ C1] ip6_output+0x25e/0x880 [ 85.056516][ C1] ? ip6_finish_output+0x1f0/0x1f0 [ 85.061617][ C1] ? __ip6_finish_output+0xaa0/0xaa0 [ 85.066887][ C1] ndisc_send_skb+0xf1f/0x1490 [ 85.071635][ C1] ? nf_hook.constprop.0+0x560/0x560 [ 85.076938][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 85.084150][ C1] ? skb_set_owner_w+0x265/0x410 [ 85.089066][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 85.094762][ C1] ndisc_send_ns+0x3a9/0x850 [ 85.099345][ C1] ? mark_held_locks+0xa4/0xf0 [ 85.104143][ C1] ? ndisc_netdev_event+0x5e0/0x5e0 [ 85.109314][ C1] ? lockdep_hardirqs_on+0x421/0x5e0 [ 85.114575][ C1] ? addrconf_dad_work+0xb2c/0x11d0 [ 85.119790][ C1] ? trace_hardirqs_on+0x67/0x240 [ 85.124803][ C1] ? addrconf_dad_work+0xb2c/0x11d0 [ 85.129987][ C1] addrconf_dad_work+0xbf3/0x11d0 [ 85.135010][ C1] ? addrconf_dad_completed+0xbb0/0xbb0 [ 85.140537][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 85.146504][ C1] ? trace_hardirqs_on+0x67/0x240 [ 85.151517][ C1] process_one_work+0xa05/0x17a0 [ 85.156439][ C1] ? mark_held_locks+0xf0/0xf0 [ 85.161194][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 85.166721][ C1] ? lock_acquire+0x190/0x410 [ 85.171390][ C1] worker_thread+0x98/0xe40 [ 85.175875][ C1] kthread+0x361/0x430 [ 85.179922][ C1] ? process_one_work+0x17a0/0x17a0 [ 85.185098][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 85.190795][ C1] ret_from_fork+0x24/0x30 [ 85.196382][ C1] Kernel Offset: disabled [ 85.200708][ C1] Rebooting in 86400 seconds..