[....] Starting periodic command scheduler: cron[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c.
Starting mcstransd:
[ 94.585070][ T27] audit: type=1400 audit(1582100392.577:37): avc: denied { watch } for pid=11340 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c.
[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c.
Debian GNU/Linux 7 syzkaller ttyS0
syzkaller login: [ 98.343815][ T27] kauditd_printk_skb: 3 callbacks suppressed
[ 98.343830][ T27] audit: type=1400 audit(1582100396.347:41): avc: denied { map } for pid=11430 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.0.182' (ECDSA) to the list of known hosts.
[ 105.289686][ T27] audit: type=1400 audit(1582100403.297:42): avc: denied { map } for pid=11442 comm="syz-executor237" path="/root/syz-executor237195180" dev="sda1" ino=2339 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
[ 105.316623][T11443] IPVS: ftp: loaded support on port[0] = 21
[ 105.372687][T11443] chnl_net:caif_netlink_parms(): no params data found
[ 105.413529][T11443] bridge0: port 1(bridge_slave_0) entered blocking state
[ 105.421245][T11443] bridge0: port 1(bridge_slave_0) entered disabled state
[ 105.429678][T11443] device bridge_slave_0 entered promiscuous mode
[ 105.438998][T11443] bridge0: port 2(bridge_slave_1) entered blocking state
[ 105.446281][T11443] bridge0: port 2(bridge_slave_1) entered disabled state
[ 105.454248][T11443] device bridge_slave_1 entered promiscuous mode
[ 105.474435][T11443] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 105.486548][T11443] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 105.507222][T11443] team0: Port device team_slave_0 added
[ 105.515789][T11443] team0: Port device team_slave_1 added
[ 105.532624][T11443] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 105.539706][T11443] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 105.565943][T11443] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 105.580023][T11443] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 105.586989][T11443] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 105.613582][T11443] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 105.680265][T11443] device hsr_slave_0 entered promiscuous mode
[ 105.718423][T11443] device hsr_slave_1 entered promiscuous mode
[ 105.847474][ T27] audit: type=1400 audit(1582100403.847:43): avc: denied { create } for pid=11443 comm="syz-executor237" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[ 105.850869][T11443] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 105.880100][ T27] audit: type=1400 audit(1582100403.857:44): avc: denied { write } for pid=11443 comm="syz-executor237" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[ 105.906412][ T27] audit: type=1400 audit(1582100403.857:45): avc: denied { read } for pid=11443 comm="syz-executor237" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[ 105.942147][T11443] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 106.001182][T11443] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 106.061129][T11443] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 106.117891][T11443] bridge0: port 2(bridge_slave_1) entered blocking state
[ 106.125229][T11443] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 106.133457][T11443] bridge0: port 1(bridge_slave_0) entered blocking state
[ 106.140715][T11443] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 106.198984][T11443] 8021q: adding VLAN 0 to HW filter on device bond0
[ 106.215126][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 106.226597][ T3140] bridge0: port 1(bridge_slave_0) entered disabled state
[ 106.235151][ T3140] bridge0: port 2(bridge_slave_1) entered disabled state
[ 106.244216][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 106.259996][T11443] 8021q: adding VLAN 0 to HW filter on device team0
[ 106.272894][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 106.281987][ T2703] bridge0: port 1(bridge_slave_0) entered blocking state
[ 106.289122][ T2703] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 106.302929][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 106.312239][ T3140] bridge0: port 2(bridge_slave_1) entered blocking state
[ 106.319493][ T3140] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 106.341581][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 106.351611][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 106.364195][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[ 106.374614][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 106.394021][T11443] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 106.405041][T11443] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 106.418458][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[ 106.426897][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 106.436237][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[ 106.445016][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 106.454072][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 106.480345][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 106.487980][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 106.503465][T11443] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 106.526993][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[ 106.536074][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 106.560233][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[ 106.570669][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 106.581892][T11443] device veth0_vlan entered promiscuous mode
[ 106.590076][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 106.597923][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 106.614162][T11443] device veth1_vlan entered promiscuous mode
[ 106.643864][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 106.652196][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 106.661769][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[ 106.671126][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 106.683149][T11443] device veth0_macvtap entered promiscuous mode
[ 106.694454][T11443] device veth1_macvtap entered promiscuous mode
[ 106.717004][T11443] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 106.724818][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 106.734501][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[ 106.743284][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[ 106.752007][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 106.765558][T11443] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 106.773584][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[ 106.782763][ T3140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[ 106.948824][ C1] ==================================================================
[ 106.963256][ C1] BUG: KASAN: use-after-free in find_match+0xb39/0xc90
[ 106.970419][ C1] Read of size 8 at addr ffff8880943b6320 by task kworker/1:10/3140
[ 106.978817][ C1]
[ 106.981147][ C1] CPU: 1 PID: 3140 Comm: kworker/1:10 Not tainted 5.6.0-rc2-syzkaller #0
[ 106.989542][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 106.999711][ C1] Workqueue: ipv6_addrconf addrconf_dad_work
[ 107.005791][ C1] Call Trace:
[ 107.009170][ C1]
[ 107.012033][ C1] dump_stack+0x197/0x210
[ 107.016506][ C1] ? find_match+0xb39/0xc90
[ 107.021558][ C1] print_address_description.constprop.0.cold+0xd4/0x30b
[ 107.029102][ C1] ? find_match+0xb39/0xc90
[ 107.033768][ C1] ? find_match+0xb39/0xc90
[ 107.038279][ C1] __kasan_report.cold+0x1b/0x32
[ 107.043219][ C1] ? find_match+0xb39/0xc90
[ 107.047798][ C1] kasan_report+0x12/0x20
[ 107.052247][ C1] __asan_report_load8_noabort+0x14/0x20
[ 107.057890][ C1] find_match+0xb39/0xc90
[ 107.062213][ C1] ? rcu_read_lock_held+0x9c/0xb0
[ 107.067246][ C1] ? rcu_read_lock_held_common+0x130/0x130
[ 107.073158][ C1] __find_rr_leaf+0x14e/0x750
[ 107.078080][ C1] ? nexthop_is_blackhole+0x690/0x690
[ 107.083603][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130
[ 107.090622][ C1] ? rcu_read_lock_held+0x9c/0xb0
[ 107.095704][ C1] ? rcu_read_lock_held_common+0x130/0x130
[ 107.101670][ C1] fib6_table_lookup+0x697/0xdb0
[ 107.106631][ C1] ? rt6_age_exceptions+0x130/0x130
[ 107.113838][ C1] ? __kasan_check_read+0x11/0x20
[ 107.118907][ C1] ip6_pol_route+0x1f6/0xa70
[ 107.123671][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0
[ 107.129228][ C1] ? flow_hash_from_keys+0x2c4/0x8c0
[ 107.134729][ C1] ip6_pol_route_input+0x65/0x80
[ 107.139735][ C1] fib6_rule_lookup+0x133/0x7d0
[ 107.144804][ C1] ? ip6_pol_route+0xa70/0xa70
[ 107.149582][ C1] ? fib6_lookup+0x340/0x340
[ 107.154184][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[ 107.161037][ C1] ? nf_conntrack_icmpv6_error+0x3c1/0x560
[ 107.166851][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80
[ 107.173025][ C1] ip6_route_input_lookup+0xb7/0xd0
[ 107.178236][ C1] ip6_route_input+0x5f0/0xa40
[ 107.183007][ C1] ? ip6_route_check_nh+0x670/0x670
[ 107.189299][ C1] ? cpuup_canceled+0xf8/0x1d0
[ 107.194082][ C1] ? rcu_read_lock_held+0x9c/0xb0
[ 107.199446][ C1] ? rcu_read_lock_held_common+0x130/0x130
[ 107.205306][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590
[ 107.211166][ C1] ip6_rcv_finish+0x17a/0x310
[ 107.215854][ C1] ipv6_rcv+0x10e/0x420
[ 107.220036][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30
[ 107.225517][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590
[ 107.231443][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30
[ 107.236997][ C1] __netif_receive_skb_one_core+0x113/0x1a0
[ 107.242895][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0
[ 107.248952][ C1] ? lock_acquire+0x190/0x410
[ 107.253661][ C1] ? process_backlog+0x1b5/0x780
[ 107.258690][ C1] __netif_receive_skb+0x2c/0x1d0
[ 107.263875][ C1] process_backlog+0x226/0x780
[ 107.268741][ C1] ? net_rx_action+0x27b/0x1120
[ 107.273725][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0
[ 107.279020][ C1] net_rx_action+0x508/0x1120
[ 107.283698][ C1] ? napi_busy_loop+0x970/0x970
[ 107.288716][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0
[ 107.294262][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50
[ 107.300610][ C1] ? ip6_finish_output2+0x10d3/0x25c0
[ 107.305992][ C1] ? trace_hardirqs_on+0x67/0x240
[ 107.311026][ C1] __do_softirq+0x262/0x98c
[ 107.315807][ C1] ? ip6_finish_output2+0x10d3/0x25c0
[ 107.321297][ C1] do_softirq_own_stack+0x2a/0x40
[ 107.326324][ C1]
[ 107.329336][ C1] do_softirq.part.0+0x11a/0x170
[ 107.334359][ C1] __local_bh_enable_ip+0x211/0x270
[ 107.339565][ C1] ip6_finish_output2+0x1101/0x25c0
[ 107.344798][ C1] ? ip6_frag_next+0xb20/0xb20
[ 107.349558][ C1] ? lock_downgrade+0x920/0x920
[ 107.354527][ C1] ? __kasan_check_read+0x11/0x20
[ 107.359561][ C1] __ip6_finish_output+0x444/0xaa0
[ 107.364681][ C1] ? __ip6_finish_output+0x444/0xaa0
[ 107.370131][ C1] ip6_finish_output+0x38/0x1f0
[ 107.374988][ C1] ip6_output+0x25e/0x880
[ 107.379427][ C1] ? ip6_finish_output+0x1f0/0x1f0
[ 107.385264][ C1] ? __ip6_finish_output+0xaa0/0xaa0
[ 107.390664][ C1] ndisc_send_skb+0xf1f/0x1490
[ 107.395972][ C1] ? nf_hook.constprop.0+0x560/0x560
[ 107.401414][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 107.407675][ C1] ? skb_set_owner_w+0x265/0x410
[ 107.412883][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20
[ 107.418606][ C1] ndisc_send_ns+0x3a9/0x850
[ 107.423254][ C1] ? mark_held_locks+0xa4/0xf0
[ 107.428135][ C1] ? ndisc_netdev_event+0x5e0/0x5e0
[ 107.433322][ C1] ? lockdep_hardirqs_on+0x421/0x5e0
[ 107.438925][ C1] ? addrconf_dad_work+0xb2c/0x11d0
[ 107.444237][ C1] ? trace_hardirqs_on+0x67/0x240
[ 107.449334][ C1] ? addrconf_dad_work+0xb2c/0x11d0
[ 107.455190][ C1] addrconf_dad_work+0xbf3/0x11d0
[ 107.460283][ C1] ? addrconf_dad_completed+0xbb0/0xbb0
[ 107.465939][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50
[ 107.471918][ C1] ? trace_hardirqs_on+0x67/0x240
[ 107.476972][ C1] process_one_work+0xa05/0x17a0
[ 107.481923][ C1] ? mark_held_locks+0xf0/0xf0
[ 107.486751][ C1] ? pwq_dec_nr_in_flight+0x320/0x320
[ 107.492231][ C1] ? lock_acquire+0x190/0x410
[ 107.496949][ C1] worker_thread+0x98/0xe40
[ 107.501466][ C1] ? trace_hardirqs_on+0x67/0x240
[ 107.506495][ C1] kthread+0x361/0x430
[ 107.510609][ C1] ? process_one_work+0x17a0/0x17a0
[ 107.515893][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0
[ 107.521813][ C1] ret_from_fork+0x24/0x30
[ 107.526278][ C1]
[ 107.528619][ C1] Allocated by task 11443:
[ 107.533036][ C1] save_stack+0x23/0x90
[ 107.537410][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0
[ 107.543052][ C1] kasan_kmalloc+0x9/0x10
[ 107.547523][ C1] __kmalloc_node+0x4e/0x70
[ 107.552026][ C1] kvmalloc_node+0x68/0x100
[ 107.556869][ C1] alloc_netdev_mqs+0x98/0xe40
[ 107.561752][ C1] vti6_init_net+0x244/0x810
[ 107.566425][ C1] ops_init+0xb3/0x420
[ 107.570672][ C1] setup_net+0x2d5/0x8b0
[ 107.575039][ C1] copy_net_ns+0x29e/0x5a0
[ 107.579589][ C1] create_new_namespaces+0x403/0xb50
[ 107.584972][ C1] unshare_nsproxy_namespaces+0xc2/0x200
[ 107.590608][ C1] ksys_unshare+0x444/0x980
[ 107.595114][ C1] __x64_sys_unshare+0x31/0x40
[ 107.599870][ C1] do_syscall_64+0xfa/0x790
[ 107.604367][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 107.610249][ C1]
[ 107.612603][ C1] Freed by task 11443:
[ 107.616686][ C1] save_stack+0x23/0x90
[ 107.620843][ C1] __kasan_slab_free+0x102/0x150
[ 107.625770][ C1] kasan_slab_free+0xe/0x10
[ 107.630307][ C1] kfree+0x10a/0x2c0
[ 107.634219][ C1] __netdev_name_node_alt_destroy+0x1ff/0x2a0
[ 107.640286][ C1] netdev_name_node_alt_destroy+0x57/0x80
[ 107.646144][ C1] rtnl_linkprop.isra.0+0x575/0x6f0
[ 107.651360][ C1] rtnl_dellinkprop+0x46/0x60
[ 107.656031][ C1] rtnetlink_rcv_msg+0x45e/0xaf0
[ 107.661327][ C1] netlink_rcv_skb+0x177/0x450
[ 107.666082][ C1] rtnetlink_rcv+0x1d/0x30
[ 107.670493][ C1] netlink_unicast+0x59e/0x7e0
[ 107.675250][ C1] netlink_sendmsg+0x91c/0xea0
[ 107.680143][ C1] sock_sendmsg+0xd7/0x130
[ 107.684760][ C1] ____sys_sendmsg+0x753/0x880
[ 107.689525][ C1] ___sys_sendmsg+0x100/0x170
[ 107.694206][ C1] __sys_sendmsg+0x105/0x1d0
[ 107.698805][ C1] __x64_sys_sendmsg+0x78/0xb0
[ 107.703584][ C1] do_syscall_64+0xfa/0x790
[ 107.708085][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 107.713984][ C1]
[ 107.716301][ C1] The buggy address belongs to the object at ffff8880943b6000
[ 107.716301][ C1] which belongs to the cache kmalloc-4k of size 4096
[ 107.730343][ C1] The buggy address is located 800 bytes inside of
[ 107.730343][ C1] 4096-byte region [ffff8880943b6000, ffff8880943b7000)
[ 107.743863][ C1] The buggy address belongs to the page:
[ 107.749503][ C1] page:ffffea000250ed80 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0
[ 107.760548][ C1] flags: 0xfffe0000010200(slab|head)
[ 107.765835][ C1] raw: 00fffe0000010200 ffffea0002a04988 ffffea00024fb288 ffff8880aa402000
[ 107.774429][ C1] raw: 0000000000000000 ffff8880943b6000 0000000100000001 0000000000000000
[ 107.783209][ C1] page dumped because: kasan: bad access detected
[ 107.789699][ C1]
[ 107.792160][ C1] Memory state around the buggy address:
[ 107.797878][ C1] ffff8880943b6200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 107.806447][ C1] ffff8880943b6280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 107.814528][ C1] >ffff8880943b6300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 107.822997][ C1] ^
[ 107.828519][ C1] ffff8880943b6380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 107.836717][ C1] ffff8880943b6400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 107.844777][ C1] ==================================================================
[ 107.852834][ C1] Disabling lock debugging due to kernel taint
[ 107.859116][ C1] Kernel panic - not syncing: panic_on_warn set ...
[ 107.865907][ C1] CPU: 1 PID: 3140 Comm: kworker/1:10 Tainted: G B 5.6.0-rc2-syzkaller #0
[ 107.875700][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 107.885787][ C1] Workqueue: ipv6_addrconf addrconf_dad_work
[ 107.891926][ C1] Call Trace:
[ 107.895208][ C1]
[ 107.898050][ C1] dump_stack+0x197/0x210
[ 107.902620][ C1] panic+0x2e3/0x75c
[ 107.906507][ C1] ? add_taint.cold+0x16/0x16
[ 107.911406][ C1] ? trace_hardirqs_on+0x5e/0x240
[ 107.916439][ C1] ? trace_hardirqs_on+0x5e/0x240
[ 107.921469][ C1] ? find_match+0xb39/0xc90
[ 107.925992][ C1] end_report+0x47/0x4f
[ 107.930137][ C1] ? find_match+0xb39/0xc90
[ 107.934971][ C1] __kasan_report.cold+0xe/0x32
[ 107.939843][ C1] ? find_match+0xb39/0xc90
[ 107.944486][ C1] kasan_report+0x12/0x20
[ 107.948991][ C1] __asan_report_load8_noabort+0x14/0x20
[ 107.955693][ C1] find_match+0xb39/0xc90
[ 107.960816][ C1] ? rcu_read_lock_held+0x9c/0xb0
[ 107.966275][ C1] ? rcu_read_lock_held_common+0x130/0x130
[ 107.972265][ C1] __find_rr_leaf+0x14e/0x750
[ 107.977062][ C1] ? nexthop_is_blackhole+0x690/0x690
[ 107.982491][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130
[ 107.989291][ C1] ? rcu_read_lock_held+0x9c/0xb0
[ 107.994492][ C1] ? rcu_read_lock_held_common+0x130/0x130
[ 108.000509][ C1] fib6_table_lookup+0x697/0xdb0
[ 108.005620][ C1] ? rt6_age_exceptions+0x130/0x130
[ 108.010938][ C1] ? __kasan_check_read+0x11/0x20
[ 108.016219][ C1] ip6_pol_route+0x1f6/0xa70
[ 108.020917][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0
[ 108.026654][ C1] ? flow_hash_from_keys+0x2c4/0x8c0
[ 108.032294][ C1] ip6_pol_route_input+0x65/0x80
[ 108.037320][ C1] fib6_rule_lookup+0x133/0x7d0
[ 108.042275][ C1] ? ip6_pol_route+0xa70/0xa70
[ 108.047292][ C1] ? fib6_lookup+0x340/0x340
[ 108.051896][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[ 108.058826][ C1] ? nf_conntrack_icmpv6_error+0x3c1/0x560
[ 108.064927][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80
[ 108.071419][ C1] ip6_route_input_lookup+0xb7/0xd0
[ 108.077157][ C1] ip6_route_input+0x5f0/0xa40
[ 108.082710][ C1] ? ip6_route_check_nh+0x670/0x670
[ 108.088083][ C1] ? cpuup_canceled+0xf8/0x1d0
[ 108.092876][ C1] ? rcu_read_lock_held+0x9c/0xb0
[ 108.099230][ C1] ? rcu_read_lock_held_common+0x130/0x130
[ 108.105417][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590
[ 108.111233][ C1] ip6_rcv_finish+0x17a/0x310
[ 108.115922][ C1] ipv6_rcv+0x10e/0x420
[ 108.120522][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30
[ 108.126146][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590
[ 108.132390][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30
[ 108.137949][ C1] __netif_receive_skb_one_core+0x113/0x1a0
[ 108.143850][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0
[ 108.150007][ C1] ? lock_acquire+0x190/0x410
[ 108.154816][ C1] ? process_backlog+0x1b5/0x780
[ 108.159762][ C1] __netif_receive_skb+0x2c/0x1d0
[ 108.164795][ C1] process_backlog+0x226/0x780
[ 108.169548][ C1] ? net_rx_action+0x27b/0x1120
[ 108.174422][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0
[ 108.179839][ C1] net_rx_action+0x508/0x1120
[ 108.184527][ C1] ? napi_busy_loop+0x970/0x970
[ 108.189437][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0
[ 108.195076][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50
[ 108.201395][ C1] ? ip6_finish_output2+0x10d3/0x25c0
[ 108.206775][ C1] ? trace_hardirqs_on+0x67/0x240
[ 108.211816][ C1] __do_softirq+0x262/0x98c
[ 108.216373][ C1] ? ip6_finish_output2+0x10d3/0x25c0
[ 108.221753][ C1] do_softirq_own_stack+0x2a/0x40
[ 108.227250][ C1]
[ 108.230251][ C1] do_softirq.part.0+0x11a/0x170
[ 108.235326][ C1] __local_bh_enable_ip+0x211/0x270
[ 108.240665][ C1] ip6_finish_output2+0x1101/0x25c0
[ 108.245909][ C1] ? ip6_frag_next+0xb20/0xb20
[ 108.250838][ C1] ? lock_downgrade+0x920/0x920
[ 108.255739][ C1] ? __kasan_check_read+0x11/0x20
[ 108.260895][ C1] __ip6_finish_output+0x444/0xaa0
[ 108.266021][ C1] ? __ip6_finish_output+0x444/0xaa0
[ 108.271471][ C1] ip6_finish_output+0x38/0x1f0
[ 108.276311][ C1] ip6_output+0x25e/0x880
[ 108.280639][ C1] ? ip6_finish_output+0x1f0/0x1f0
[ 108.285894][ C1] ? __ip6_finish_output+0xaa0/0xaa0
[ 108.291475][ C1] ndisc_send_skb+0xf1f/0x1490
[ 108.296254][ C1] ? nf_hook.constprop.0+0x560/0x560
[ 108.301543][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 108.307904][ C1] ? skb_set_owner_w+0x265/0x410
[ 108.313047][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20
[ 108.318817][ C1] ndisc_send_ns+0x3a9/0x850
[ 108.323412][ C1] ? mark_held_locks+0xa4/0xf0
[ 108.328321][ C1] ? ndisc_netdev_event+0x5e0/0x5e0
[ 108.333516][ C1] ? lockdep_hardirqs_on+0x421/0x5e0
[ 108.338918][ C1] ? addrconf_dad_work+0xb2c/0x11d0
[ 108.344813][ C1] ? trace_hardirqs_on+0x67/0x240
[ 108.349919][ C1] ? addrconf_dad_work+0xb2c/0x11d0
[ 108.355220][ C1] addrconf_dad_work+0xbf3/0x11d0
[ 108.360566][ C1] ? addrconf_dad_completed+0xbb0/0xbb0
[ 108.366118][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50
[ 108.372102][ C1] ? trace_hardirqs_on+0x67/0x240
[ 108.377144][ C1] process_one_work+0xa05/0x17a0
[ 108.382170][ C1] ? mark_held_locks+0xf0/0xf0
[ 108.386949][ C1] ? pwq_dec_nr_in_flight+0x320/0x320
[ 108.392613][ C1] ? lock_acquire+0x190/0x410
[ 108.397392][ C1] worker_thread+0x98/0xe40
[ 108.401943][ C1] ? trace_hardirqs_on+0x67/0x240
[ 108.407056][ C1] kthread+0x361/0x430
[ 108.411121][ C1] ? process_one_work+0x17a0/0x17a0
[ 108.416315][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0
[ 108.422083][ C1] ret_from_fork+0x24/0x30
[ 108.428116][ C1] Kernel Offset: disabled
[ 108.432568][ C1] Rebooting in 86400 seconds..