DUID 00:04:b5:83:26:17:e0:27:12:d6:a5:87:80:2d:51:b0:dc:e4 forked to background, child pid 3174 [ 21.094202][ T3175] 8021q: adding VLAN 0 to HW filter on device bond0 [ 21.105606][ T3175] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.54' (ECDSA) to the list of known hosts. syzkaller login: [ 35.101936][ T3589] chnl_net:caif_netlink_parms(): no params data found [ 35.130503][ T3589] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.137577][ T3589] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.145206][ T3589] device bridge_slave_0 entered promiscuous mode [ 35.153012][ T3589] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.160125][ T3589] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.167542][ T3589] device bridge_slave_1 entered promiscuous mode [ 35.182687][ T3589] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.193245][ T3589] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.210224][ T3589] team0: Port device team_slave_0 added [ 35.216815][ T3589] team0: Port device team_slave_1 added [ 35.230320][ T3589] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.237246][ T3589] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.263250][ T3589] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.274905][ T3589] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.281857][ T3589] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.307749][ T3589] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.328249][ T3589] device hsr_slave_0 entered promiscuous mode [ 35.334785][ T3589] device hsr_slave_1 entered promiscuous mode [ 35.385409][ T3589] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 35.393941][ T3589] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 35.402120][ T3589] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 35.410341][ T3589] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 35.424758][ T3589] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.431820][ T3589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.439121][ T3589] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.446177][ T3589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.474420][ T3589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.486807][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.495680][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.504190][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.512206][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 35.522367][ T3589] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.531625][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.540094][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.547121][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.567346][ T3589] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 35.577893][ T3589] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.590444][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.598734][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.605815][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.613977][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 35.623507][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 35.631816][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.640080][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.648153][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.655696][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.669542][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.676910][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.686769][ T3589] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.755234][ T3589] device veth0_vlan entered promiscuous mode [ 35.761893][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.770513][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.778649][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.787619][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.798293][ T3589] device veth1_vlan entered promiscuous mode [ 35.812159][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 35.820052][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 35.827869][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.837973][ T3589] device veth0_macvtap entered promiscuous mode [ 35.846298][ T3589] device veth1_macvtap entered promiscuous mode [ 35.857878][ T3589] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.865592][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.874810][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 35.884953][ T3589] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.893194][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 35.903183][ T3589] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 35.912397][ T3589] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.921497][ T3589] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.930486][ T3589] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.950980][ T3589] ================================================================== [ 35.959133][ T3589] BUG: KASAN: use-after-free in vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 35.967183][ T3589] Read of size 4 at addr ffff888075038e70 by task syz-executor393/3589 [ 35.975397][ T3589] [ 35.977702][ T3589] CPU: 0 PID: 3589 Comm: syz-executor393 Tainted: G W 5.17.0-syzkaller-12888-g77c9387c0c5b #0 [ 35.989220][ T3589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.999273][ T3589] Call Trace: [ 36.002542][ T3589] [ 36.005453][ T3589] dump_stack_lvl+0xcd/0x134 [ 36.010029][ T3589] print_address_description.constprop.0.cold+0xeb/0x495 [ 36.017036][ T3589] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 36.022756][ T3589] kasan_report.cold+0xf4/0x1c6 [ 36.027590][ T3589] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 36.033293][ T3589] vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 36.038819][ T3589] ? rcu_read_lock_sched_held+0xd/0x70 [ 36.044283][ T3589] vxlan_vnifilter_dump+0x3ff/0x650 [ 36.049464][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 36.055705][ T3589] netlink_dump+0x4b5/0xb70 [ 36.060193][ T3589] ? netlink_deliver_tap+0xc40/0xc40 [ 36.065475][ T3589] ? lock_downgrade+0x6e0/0x6e0 [ 36.070317][ T3589] __netlink_dump_start+0x647/0x900 [ 36.075508][ T3589] rtnetlink_rcv_msg+0x70c/0xb80 [ 36.080447][ T3589] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 36.086067][ T3589] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 36.090825][ T3589] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 36.096187][ T3589] ? __sys_sendmsg+0xe5/0x1b0 [ 36.100862][ T3589] ? do_syscall_64+0x35/0x80 [ 36.105444][ T3589] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 36.111074][ T3589] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 36.116441][ T3589] ? lock_acquire+0x442/0x510 [ 36.121108][ T3589] netlink_rcv_skb+0x153/0x420 [ 36.125864][ T3589] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 36.130628][ T3589] ? netlink_ack+0xa80/0xa80 [ 36.135206][ T3589] ? netlink_deliver_tap+0x1a2/0xc40 [ 36.140486][ T3589] ? netlink_deliver_tap+0x1b1/0xc40 [ 36.145765][ T3589] netlink_unicast+0x543/0x7f0 [ 36.150518][ T3589] ? netlink_attachskb+0x880/0x880 [ 36.155615][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 36.161845][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 36.168074][ T3589] ? __phys_addr_symbol+0x2c/0x70 [ 36.173088][ T3589] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 36.178796][ T3589] ? __check_object_size+0x16c/0x4f0 [ 36.184072][ T3589] netlink_sendmsg+0x904/0xe00 [ 36.188827][ T3589] ? netlink_unicast+0x7f0/0x7f0 [ 36.193757][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 36.199991][ T3589] ? netlink_unicast+0x7f0/0x7f0 [ 36.204915][ T3589] sock_sendmsg+0xcf/0x120 [ 36.209323][ T3589] ____sys_sendmsg+0x6e2/0x800 [ 36.214074][ T3589] ? kernel_sendmsg+0x50/0x50 [ 36.218739][ T3589] ? do_recvmmsg+0x6d0/0x6d0 [ 36.223316][ T3589] ? rcu_read_lock_sched_held+0xd/0x70 [ 36.228763][ T3589] ? kmem_cache_alloc+0x46/0x3b0 [ 36.233693][ T3589] ? lock_downgrade+0x6e0/0x6e0 [ 36.238532][ T3589] ? lock_release+0x522/0x720 [ 36.243195][ T3589] ? __d_alloc+0x32/0x960 [ 36.247518][ T3589] ? kmem_cache_alloc+0x46/0x3b0 [ 36.252444][ T3589] ? lock_downgrade+0x6e0/0x6e0 [ 36.257286][ T3589] ___sys_sendmsg+0xf3/0x170 [ 36.261865][ T3589] ? sendmsg_copy_msghdr+0x160/0x160 [ 36.267139][ T3589] ? lockdep_init_map_type+0x21a/0x7f0 [ 36.272587][ T3589] ? __raw_spin_lock_init+0x36/0x110 [ 36.277861][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 36.284091][ T3589] ? percpu_counter_add_batch+0xbd/0x180 [ 36.289711][ T3589] ? alloc_empty_file+0xd7/0x170 [ 36.294638][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 36.300868][ T3589] ? errseq_sample+0x56/0x70 [ 36.305446][ T3589] ? rcu_read_lock_sched_held+0xd/0x70 [ 36.310891][ T3589] ? lock_acquire+0x442/0x510 [ 36.315557][ T3589] ? rcu_read_lock_sched_held+0xd/0x70 [ 36.321002][ T3589] ? lock_release+0x522/0x720 [ 36.325683][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 36.331915][ T3589] ? fd_install+0x1c7/0x640 [ 36.336407][ T3589] ? lock_downgrade+0x6e0/0x6e0 [ 36.341252][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 36.347483][ T3589] ? __fget_light+0x20f/0x270 [ 36.352150][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 36.358392][ T3589] __sys_sendmsg+0xe5/0x1b0 [ 36.362889][ T3589] ? __sys_sendmsg_sock+0x30/0x30 [ 36.367907][ T3589] ? syscall_enter_from_user_mode+0x21/0x70 [ 36.373789][ T3589] ? trace_hardirqs_on+0x5b/0x1c0 [ 36.378816][ T3589] do_syscall_64+0x35/0x80 [ 36.383227][ T3589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 36.389112][ T3589] RIP: 0033:0x7f08846d0e99 [ 36.393518][ T3589] Code: 9c 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 36.413123][ T3589] RSP: 002b:00007fff38728a28 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 36.421521][ T3589] RAX: ffffffffffffffda RBX: 00007fff38728a58 RCX: 00007f08846d0e99 [ 36.429477][ T3589] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004 [ 36.437434][ T3589] RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000001 [ 36.445389][ T3589] R10: 0000000000000001 R11: 0000000000000246 R12: 00007fff38728a80 [ 36.453342][ T3589] R13: 0000000000000003 R14: 00007fff38728a60 R15: 0000000000000001 [ 36.461302][ T3589] [ 36.464307][ T3589] [ 36.466611][ T3589] Allocated by task 3589: [ 36.470919][ T3589] kasan_save_stack+0x1e/0x40 [ 36.475587][ T3589] __kasan_kmalloc+0xa9/0xd0 [ 36.480164][ T3589] tomoyo_realpath_from_path+0xc3/0x620 [ 36.485700][ T3589] tomoyo_path_number_perm+0x1d5/0x590 [ 36.491143][ T3589] security_file_ioctl+0x50/0xb0 [ 36.496069][ T3589] __x64_sys_ioctl+0xb3/0x200 [ 36.500731][ T3589] do_syscall_64+0x35/0x80 [ 36.505134][ T3589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 36.511018][ T3589] [ 36.513320][ T3589] Freed by task 3589: [ 36.517278][ T3589] kasan_save_stack+0x1e/0x40 [ 36.521943][ T3589] kasan_set_track+0x21/0x30 [ 36.526520][ T3589] kasan_set_free_info+0x20/0x30 [ 36.531442][ T3589] ____kasan_slab_free+0x166/0x1a0 [ 36.536540][ T3589] slab_free_freelist_hook+0x8b/0x1c0 [ 36.541911][ T3589] kfree+0xd6/0x4d0 [ 36.545708][ T3589] tomoyo_realpath_from_path+0x191/0x620 [ 36.551324][ T3589] tomoyo_path_number_perm+0x1d5/0x590 [ 36.556768][ T3589] security_file_ioctl+0x50/0xb0 [ 36.561691][ T3589] __x64_sys_ioctl+0xb3/0x200 [ 36.566355][ T3589] do_syscall_64+0x35/0x80 [ 36.570764][ T3589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 36.576644][ T3589] [ 36.578949][ T3589] The buggy address belongs to the object at ffff888075038000 [ 36.578949][ T3589] which belongs to the cache kmalloc-4k of size 4096 [ 36.593094][ T3589] The buggy address is located 3696 bytes inside of [ 36.593094][ T3589] 4096-byte region [ffff888075038000, ffff888075039000) [ 36.606553][ T3589] [ 36.608871][ T3589] The buggy address belongs to the physical page: [ 36.615261][ T3589] page:ffffea0001d40e00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x75038 [ 36.625403][ T3589] head:ffffea0001d40e00 order:3 compound_mapcount:0 compound_pincount:0 [ 36.633716][ T3589] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 36.641692][ T3589] raw: 00fff00000010200 ffffea00007d0000 dead000000000002 ffff888010c42140 [ 36.650264][ T3589] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 36.658829][ T3589] page dumped because: kasan: bad access detected [ 36.665223][ T3589] page_owner tracks the page as allocated [ 36.670914][ T3589] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3227, tgid 3227 (dhcpcd-run-hook), ts 20805662936, free_ts 20782604543 [ 36.691739][ T3589] get_page_from_freelist+0xba2/0x3df0 [ 36.697189][ T3589] __alloc_pages+0x1b2/0x500 [ 36.701768][ T3589] alloc_pages+0x1aa/0x310 [ 36.706171][ T3589] allocate_slab+0x26c/0x3c0 [ 36.710771][ T3589] ___slab_alloc+0x8df/0xf20 [ 36.715350][ T3589] __slab_alloc.constprop.0+0x4d/0xa0 [ 36.720711][ T3589] kmem_cache_alloc_trace+0x310/0x3f0 [ 36.726073][ T3589] tomoyo_init_log+0x18a/0x1ed0 [ 36.730934][ T3589] tomoyo_supervisor+0x34d/0xf00 [ 36.735868][ T3589] tomoyo_env_perm+0x17f/0x1f0 [ 36.740619][ T3589] tomoyo_find_next_domain+0x13ce/0x1f80 [ 36.746242][ T3589] tomoyo_bprm_check_security+0x121/0x1a0 [ 36.751949][ T3589] security_bprm_check+0x45/0xa0 [ 36.756873][ T3589] bprm_execve+0x732/0x19b0 [ 36.761372][ T3589] do_execveat_common+0x727/0x890 [ 36.766406][ T3589] __x64_sys_execve+0x8f/0xc0 [ 36.771071][ T3589] page last free stack trace: [ 36.775726][ T3589] free_pcp_prepare+0x549/0xd20 [ 36.780560][ T3589] free_unref_page+0x19/0x690 [ 36.785344][ T3589] qlist_free_all+0x6a/0x170 [ 36.789932][ T3589] kasan_quarantine_reduce+0x180/0x200 [ 36.795388][ T3589] __kasan_slab_alloc+0xa2/0xc0 [ 36.800225][ T3589] kmem_cache_alloc+0x204/0x3b0 [ 36.805077][ T3589] getname_flags.part.0+0x50/0x4f0 [ 36.810184][ T3589] getname_flags+0x9a/0xe0 [ 36.814595][ T3589] vfs_fstatat+0x73/0xb0 [ 36.818827][ T3589] __do_sys_newfstatat+0x91/0x110 [ 36.823842][ T3589] do_syscall_64+0x35/0x80 [ 36.828255][ T3589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 36.834146][ T3589] [ 36.836456][ T3589] Memory state around the buggy address: [ 36.842072][ T3589] ffff888075038d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.850220][ T3589] ffff888075038d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.858273][ T3589] >ffff888075038e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.866324][ T3589] ^ [ 36.874028][ T3589] ffff888075038e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.882095][ T3589] ffff888075038f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.890137][ T3589] ================================================================== [ 36.908076][ T3589] Kernel panic - not syncing: panic_on_warn set ... [ 36.914681][ T3589] CPU: 1 PID: 3589 Comm: syz-executor393 Tainted: G W 5.17.0-syzkaller-12888-g77c9387c0c5b #0 [ 36.926208][ T3589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.936248][ T3589] Call Trace: [ 36.939514][ T3589] [ 36.942430][ T3589] dump_stack_lvl+0xcd/0x134 [ 36.947016][ T3589] panic+0x2d7/0x636 [ 36.950899][ T3589] ? panic_print_sys_info.part.0+0x10b/0x10b [ 36.956869][ T3589] ? preempt_schedule_common+0x59/0xc0 [ 36.962325][ T3589] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 36.968033][ T3589] ? preempt_schedule_thunk+0x16/0x18 [ 36.973486][ T3589] ? trace_hardirqs_on+0x38/0x1c0 [ 36.978507][ T3589] ? trace_hardirqs_on+0x51/0x1c0 [ 36.983522][ T3589] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 36.989234][ T3589] end_report.part.0+0x3f/0x7c [ 36.993989][ T3589] kasan_report.cold+0x93/0x1c6 [ 36.998830][ T3589] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 37.004535][ T3589] vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 37.010070][ T3589] ? rcu_read_lock_sched_held+0xd/0x70 [ 37.015523][ T3589] vxlan_vnifilter_dump+0x3ff/0x650 [ 37.020710][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 37.026944][ T3589] netlink_dump+0x4b5/0xb70 [ 37.031449][ T3589] ? netlink_deliver_tap+0xc40/0xc40 [ 37.036725][ T3589] ? lock_downgrade+0x6e0/0x6e0 [ 37.041572][ T3589] __netlink_dump_start+0x647/0x900 [ 37.046761][ T3589] rtnetlink_rcv_msg+0x70c/0xb80 [ 37.051686][ T3589] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 37.057305][ T3589] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 37.062059][ T3589] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 37.067345][ T3589] ? __sys_sendmsg+0xe5/0x1b0 [ 37.072011][ T3589] ? do_syscall_64+0x35/0x80 [ 37.076591][ T3589] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 37.082211][ T3589] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 37.087578][ T3589] ? lock_acquire+0x442/0x510 [ 37.092247][ T3589] netlink_rcv_skb+0x153/0x420 [ 37.097100][ T3589] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 37.101853][ T3589] ? netlink_ack+0xa80/0xa80 [ 37.106431][ T3589] ? netlink_deliver_tap+0x1a2/0xc40 [ 37.111708][ T3589] ? netlink_deliver_tap+0x1b1/0xc40 [ 37.116984][ T3589] netlink_unicast+0x543/0x7f0 [ 37.121742][ T3589] ? netlink_attachskb+0x880/0x880 [ 37.126841][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 37.133071][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 37.139302][ T3589] ? __phys_addr_symbol+0x2c/0x70 [ 37.144320][ T3589] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 37.150027][ T3589] ? __check_object_size+0x16c/0x4f0 [ 37.155301][ T3589] netlink_sendmsg+0x904/0xe00 [ 37.160054][ T3589] ? netlink_unicast+0x7f0/0x7f0 [ 37.164981][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 37.171211][ T3589] ? netlink_unicast+0x7f0/0x7f0 [ 37.176135][ T3589] sock_sendmsg+0xcf/0x120 [ 37.180542][ T3589] ____sys_sendmsg+0x6e2/0x800 [ 37.185302][ T3589] ? kernel_sendmsg+0x50/0x50 [ 37.189966][ T3589] ? do_recvmmsg+0x6d0/0x6d0 [ 37.194556][ T3589] ? rcu_read_lock_sched_held+0xd/0x70 [ 37.200018][ T3589] ? kmem_cache_alloc+0x46/0x3b0 [ 37.205038][ T3589] ? lock_downgrade+0x6e0/0x6e0 [ 37.209881][ T3589] ? lock_release+0x522/0x720 [ 37.214556][ T3589] ? __d_alloc+0x32/0x960 [ 37.218881][ T3589] ? kmem_cache_alloc+0x46/0x3b0 [ 37.223811][ T3589] ? lock_downgrade+0x6e0/0x6e0 [ 37.228654][ T3589] ___sys_sendmsg+0xf3/0x170 [ 37.233237][ T3589] ? sendmsg_copy_msghdr+0x160/0x160 [ 37.238525][ T3589] ? lockdep_init_map_type+0x21a/0x7f0 [ 37.244061][ T3589] ? __raw_spin_lock_init+0x36/0x110 [ 37.249341][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 37.255574][ T3589] ? percpu_counter_add_batch+0xbd/0x180 [ 37.261198][ T3589] ? alloc_empty_file+0xd7/0x170 [ 37.266125][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 37.272356][ T3589] ? errseq_sample+0x56/0x70 [ 37.276934][ T3589] ? rcu_read_lock_sched_held+0xd/0x70 [ 37.282379][ T3589] ? lock_acquire+0x442/0x510 [ 37.287044][ T3589] ? rcu_read_lock_sched_held+0xd/0x70 [ 37.292490][ T3589] ? lock_release+0x522/0x720 [ 37.297153][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 37.303397][ T3589] ? fd_install+0x1c7/0x640 [ 37.307887][ T3589] ? lock_downgrade+0x6e0/0x6e0 [ 37.312727][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 37.318969][ T3589] ? __fget_light+0x20f/0x270 [ 37.323638][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 37.329867][ T3589] __sys_sendmsg+0xe5/0x1b0 [ 37.334365][ T3589] ? __sys_sendmsg_sock+0x30/0x30 [ 37.339384][ T3589] ? syscall_enter_from_user_mode+0x21/0x70 [ 37.345265][ T3589] ? trace_hardirqs_on+0x5b/0x1c0 [ 37.350281][ T3589] do_syscall_64+0x35/0x80 [ 37.354689][ T3589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 37.360660][ T3589] RIP: 0033:0x7f08846d0e99 [ 37.365059][ T3589] Code: 9c 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 37.384652][ T3589] RSP: 002b:00007fff38728a28 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 37.393050][ T3589] RAX: ffffffffffffffda RBX: 00007fff38728a58 RCX: 00007f08846d0e99 [ 37.401006][ T3589] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004 [ 37.408972][ T3589] RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000001 [ 37.416927][ T3589] R10: 0000000000000001 R11: 0000000000000246 R12: 00007fff38728a80 [ 37.424882][ T3589] R13: 0000000000000003 R14: 00007fff38728a60 R15: 0000000000000001 [ 37.432846][ T3589] [ 37.436005][ T3589] Kernel Offset: disabled [ 37.440313][ T3589] Rebooting in 86400 seconds..