DUID 00:04:b5:83:26:17:e0:27:12:d6:a5:87:80:2d:51:b0:dc:e4
forked to background, child pid 3174
[ 21.094202][ T3175] 8021q: adding VLAN 0 to HW filter on device bond0
[ 21.105606][ T3175] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK
syzkaller
Warning: Permanently added '10.128.0.54' (ECDSA) to the list of known hosts.
syzkaller login: [ 35.101936][ T3589] chnl_net:caif_netlink_parms(): no params data found
[ 35.130503][ T3589] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.137577][ T3589] bridge0: port 1(bridge_slave_0) entered disabled state
[ 35.145206][ T3589] device bridge_slave_0 entered promiscuous mode
[ 35.153012][ T3589] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.160125][ T3589] bridge0: port 2(bridge_slave_1) entered disabled state
[ 35.167542][ T3589] device bridge_slave_1 entered promiscuous mode
[ 35.182687][ T3589] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 35.193245][ T3589] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 35.210224][ T3589] team0: Port device team_slave_0 added
[ 35.216815][ T3589] team0: Port device team_slave_1 added
[ 35.230320][ T3589] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 35.237246][ T3589] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 35.263250][ T3589] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 35.274905][ T3589] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 35.281857][ T3589] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 35.307749][ T3589] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 35.328249][ T3589] device hsr_slave_0 entered promiscuous mode
[ 35.334785][ T3589] device hsr_slave_1 entered promiscuous mode
[ 35.385409][ T3589] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 35.393941][ T3589] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 35.402120][ T3589] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 35.410341][ T3589] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 35.424758][ T3589] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.431820][ T3589] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 35.439121][ T3589] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.446177][ T3589] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 35.474420][ T3589] 8021q: adding VLAN 0 to HW filter on device bond0
[ 35.486807][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 35.495680][ T6] bridge0: port 1(bridge_slave_0) entered disabled state
[ 35.504190][ T6] bridge0: port 2(bridge_slave_1) entered disabled state
[ 35.512206][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 35.522367][ T3589] 8021q: adding VLAN 0 to HW filter on device team0
[ 35.531625][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 35.540094][ T22] bridge0: port 1(bridge_slave_0) entered blocking state
[ 35.547121][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 35.567346][ T3589] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[ 35.577893][ T3589] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[ 35.590444][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 35.598734][ T22] bridge0: port 2(bridge_slave_1) entered blocking state
[ 35.605815][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 35.613977][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 35.623507][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 35.631816][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 35.640080][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 35.648153][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 35.655696][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 35.669542][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 35.676910][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 35.686769][ T3589] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 35.755234][ T3589] device veth0_vlan entered promiscuous mode
[ 35.761893][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 35.770513][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 35.778649][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 35.787619][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 35.798293][ T3589] device veth1_vlan entered promiscuous mode
[ 35.812159][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 35.820052][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 35.827869][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 35.837973][ T3589] device veth0_macvtap entered promiscuous mode
[ 35.846298][ T3589] device veth1_macvtap entered promiscuous mode
[ 35.857878][ T3589] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 35.865592][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 35.874810][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 35.884953][ T3589] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 35.893194][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 35.903183][ T3589] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
executing program
[ 35.912397][ T3589] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 35.921497][ T3589] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 35.930486][ T3589] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 35.950980][ T3589] ==================================================================
[ 35.959133][ T3589] BUG: KASAN: use-after-free in vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 35.967183][ T3589] Read of size 4 at addr ffff888075038e70 by task syz-executor393/3589
[ 35.975397][ T3589]
[ 35.977702][ T3589] CPU: 0 PID: 3589 Comm: syz-executor393 Tainted: G W 5.17.0-syzkaller-12888-g77c9387c0c5b #0
[ 35.989220][ T3589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 35.999273][ T3589] Call Trace:
[ 36.002542][ T3589]
[ 36.005453][ T3589] dump_stack_lvl+0xcd/0x134
[ 36.010029][ T3589] print_address_description.constprop.0.cold+0xeb/0x495
[ 36.017036][ T3589] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 36.022756][ T3589] kasan_report.cold+0xf4/0x1c6
[ 36.027590][ T3589] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 36.033293][ T3589] vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 36.038819][ T3589] ? rcu_read_lock_sched_held+0xd/0x70
[ 36.044283][ T3589] vxlan_vnifilter_dump+0x3ff/0x650
[ 36.049464][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 36.055705][ T3589] netlink_dump+0x4b5/0xb70
[ 36.060193][ T3589] ? netlink_deliver_tap+0xc40/0xc40
[ 36.065475][ T3589] ? lock_downgrade+0x6e0/0x6e0
[ 36.070317][ T3589] __netlink_dump_start+0x647/0x900
[ 36.075508][ T3589] rtnetlink_rcv_msg+0x70c/0xb80
[ 36.080447][ T3589] ? vxlan_vnifilter_process+0x5b0/0x5b0
[ 36.086067][ T3589] ? rtnl_fdb_dump+0x9a0/0x9a0
[ 36.090825][ T3589] ? netdev_core_pick_tx+0x2e0/0x2e0
[ 36.096187][ T3589] ? __sys_sendmsg+0xe5/0x1b0
[ 36.100862][ T3589] ? do_syscall_64+0x35/0x80
[ 36.105444][ T3589] ? vxlan_vnifilter_process+0x5b0/0x5b0
[ 36.111074][ T3589] ? ref_tracker_dir_exit+0x3e0/0x3e0
[ 36.116441][ T3589] ? lock_acquire+0x442/0x510
[ 36.121108][ T3589] netlink_rcv_skb+0x153/0x420
[ 36.125864][ T3589] ? rtnl_fdb_dump+0x9a0/0x9a0
[ 36.130628][ T3589] ? netlink_ack+0xa80/0xa80
[ 36.135206][ T3589] ? netlink_deliver_tap+0x1a2/0xc40
[ 36.140486][ T3589] ? netlink_deliver_tap+0x1b1/0xc40
[ 36.145765][ T3589] netlink_unicast+0x543/0x7f0
[ 36.150518][ T3589] ? netlink_attachskb+0x880/0x880
[ 36.155615][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 36.161845][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 36.168074][ T3589] ? __phys_addr_symbol+0x2c/0x70
[ 36.173088][ T3589] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 36.178796][ T3589] ? __check_object_size+0x16c/0x4f0
[ 36.184072][ T3589] netlink_sendmsg+0x904/0xe00
[ 36.188827][ T3589] ? netlink_unicast+0x7f0/0x7f0
[ 36.193757][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 36.199991][ T3589] ? netlink_unicast+0x7f0/0x7f0
[ 36.204915][ T3589] sock_sendmsg+0xcf/0x120
[ 36.209323][ T3589] ____sys_sendmsg+0x6e2/0x800
[ 36.214074][ T3589] ? kernel_sendmsg+0x50/0x50
[ 36.218739][ T3589] ? do_recvmmsg+0x6d0/0x6d0
[ 36.223316][ T3589] ? rcu_read_lock_sched_held+0xd/0x70
[ 36.228763][ T3589] ? kmem_cache_alloc+0x46/0x3b0
[ 36.233693][ T3589] ? lock_downgrade+0x6e0/0x6e0
[ 36.238532][ T3589] ? lock_release+0x522/0x720
[ 36.243195][ T3589] ? __d_alloc+0x32/0x960
[ 36.247518][ T3589] ? kmem_cache_alloc+0x46/0x3b0
[ 36.252444][ T3589] ? lock_downgrade+0x6e0/0x6e0
[ 36.257286][ T3589] ___sys_sendmsg+0xf3/0x170
[ 36.261865][ T3589] ? sendmsg_copy_msghdr+0x160/0x160
[ 36.267139][ T3589] ? lockdep_init_map_type+0x21a/0x7f0
[ 36.272587][ T3589] ? __raw_spin_lock_init+0x36/0x110
[ 36.277861][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 36.284091][ T3589] ? percpu_counter_add_batch+0xbd/0x180
[ 36.289711][ T3589] ? alloc_empty_file+0xd7/0x170
[ 36.294638][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 36.300868][ T3589] ? errseq_sample+0x56/0x70
[ 36.305446][ T3589] ? rcu_read_lock_sched_held+0xd/0x70
[ 36.310891][ T3589] ? lock_acquire+0x442/0x510
[ 36.315557][ T3589] ? rcu_read_lock_sched_held+0xd/0x70
[ 36.321002][ T3589] ? lock_release+0x522/0x720
[ 36.325683][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 36.331915][ T3589] ? fd_install+0x1c7/0x640
[ 36.336407][ T3589] ? lock_downgrade+0x6e0/0x6e0
[ 36.341252][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 36.347483][ T3589] ? __fget_light+0x20f/0x270
[ 36.352150][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 36.358392][ T3589] __sys_sendmsg+0xe5/0x1b0
[ 36.362889][ T3589] ? __sys_sendmsg_sock+0x30/0x30
[ 36.367907][ T3589] ? syscall_enter_from_user_mode+0x21/0x70
[ 36.373789][ T3589] ? trace_hardirqs_on+0x5b/0x1c0
[ 36.378816][ T3589] do_syscall_64+0x35/0x80
[ 36.383227][ T3589] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 36.389112][ T3589] RIP: 0033:0x7f08846d0e99
[ 36.393518][ T3589] Code: 9c 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 36.413123][ T3589] RSP: 002b:00007fff38728a28 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 36.421521][ T3589] RAX: ffffffffffffffda RBX: 00007fff38728a58 RCX: 00007f08846d0e99
[ 36.429477][ T3589] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004
[ 36.437434][ T3589] RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000001
[ 36.445389][ T3589] R10: 0000000000000001 R11: 0000000000000246 R12: 00007fff38728a80
[ 36.453342][ T3589] R13: 0000000000000003 R14: 00007fff38728a60 R15: 0000000000000001
[ 36.461302][ T3589]
[ 36.464307][ T3589]
[ 36.466611][ T3589] Allocated by task 3589:
[ 36.470919][ T3589] kasan_save_stack+0x1e/0x40
[ 36.475587][ T3589] __kasan_kmalloc+0xa9/0xd0
[ 36.480164][ T3589] tomoyo_realpath_from_path+0xc3/0x620
[ 36.485700][ T3589] tomoyo_path_number_perm+0x1d5/0x590
[ 36.491143][ T3589] security_file_ioctl+0x50/0xb0
[ 36.496069][ T3589] __x64_sys_ioctl+0xb3/0x200
[ 36.500731][ T3589] do_syscall_64+0x35/0x80
[ 36.505134][ T3589] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 36.511018][ T3589]
[ 36.513320][ T3589] Freed by task 3589:
[ 36.517278][ T3589] kasan_save_stack+0x1e/0x40
[ 36.521943][ T3589] kasan_set_track+0x21/0x30
[ 36.526520][ T3589] kasan_set_free_info+0x20/0x30
[ 36.531442][ T3589] ____kasan_slab_free+0x166/0x1a0
[ 36.536540][ T3589] slab_free_freelist_hook+0x8b/0x1c0
[ 36.541911][ T3589] kfree+0xd6/0x4d0
[ 36.545708][ T3589] tomoyo_realpath_from_path+0x191/0x620
[ 36.551324][ T3589] tomoyo_path_number_perm+0x1d5/0x590
[ 36.556768][ T3589] security_file_ioctl+0x50/0xb0
[ 36.561691][ T3589] __x64_sys_ioctl+0xb3/0x200
[ 36.566355][ T3589] do_syscall_64+0x35/0x80
[ 36.570764][ T3589] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 36.576644][ T3589]
[ 36.578949][ T3589] The buggy address belongs to the object at ffff888075038000
[ 36.578949][ T3589] which belongs to the cache kmalloc-4k of size 4096
[ 36.593094][ T3589] The buggy address is located 3696 bytes inside of
[ 36.593094][ T3589] 4096-byte region [ffff888075038000, ffff888075039000)
[ 36.606553][ T3589]
[ 36.608871][ T3589] The buggy address belongs to the physical page:
[ 36.615261][ T3589] page:ffffea0001d40e00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x75038
[ 36.625403][ T3589] head:ffffea0001d40e00 order:3 compound_mapcount:0 compound_pincount:0
[ 36.633716][ T3589] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 36.641692][ T3589] raw: 00fff00000010200 ffffea00007d0000 dead000000000002 ffff888010c42140
[ 36.650264][ T3589] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000
[ 36.658829][ T3589] page dumped because: kasan: bad access detected
[ 36.665223][ T3589] page_owner tracks the page as allocated
[ 36.670914][ T3589] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3227, tgid 3227 (dhcpcd-run-hook), ts 20805662936, free_ts 20782604543
[ 36.691739][ T3589] get_page_from_freelist+0xba2/0x3df0
[ 36.697189][ T3589] __alloc_pages+0x1b2/0x500
[ 36.701768][ T3589] alloc_pages+0x1aa/0x310
[ 36.706171][ T3589] allocate_slab+0x26c/0x3c0
[ 36.710771][ T3589] ___slab_alloc+0x8df/0xf20
[ 36.715350][ T3589] __slab_alloc.constprop.0+0x4d/0xa0
[ 36.720711][ T3589] kmem_cache_alloc_trace+0x310/0x3f0
[ 36.726073][ T3589] tomoyo_init_log+0x18a/0x1ed0
[ 36.730934][ T3589] tomoyo_supervisor+0x34d/0xf00
[ 36.735868][ T3589] tomoyo_env_perm+0x17f/0x1f0
[ 36.740619][ T3589] tomoyo_find_next_domain+0x13ce/0x1f80
[ 36.746242][ T3589] tomoyo_bprm_check_security+0x121/0x1a0
[ 36.751949][ T3589] security_bprm_check+0x45/0xa0
[ 36.756873][ T3589] bprm_execve+0x732/0x19b0
[ 36.761372][ T3589] do_execveat_common+0x727/0x890
[ 36.766406][ T3589] __x64_sys_execve+0x8f/0xc0
[ 36.771071][ T3589] page last free stack trace:
[ 36.775726][ T3589] free_pcp_prepare+0x549/0xd20
[ 36.780560][ T3589] free_unref_page+0x19/0x690
[ 36.785344][ T3589] qlist_free_all+0x6a/0x170
[ 36.789932][ T3589] kasan_quarantine_reduce+0x180/0x200
[ 36.795388][ T3589] __kasan_slab_alloc+0xa2/0xc0
[ 36.800225][ T3589] kmem_cache_alloc+0x204/0x3b0
[ 36.805077][ T3589] getname_flags.part.0+0x50/0x4f0
[ 36.810184][ T3589] getname_flags+0x9a/0xe0
[ 36.814595][ T3589] vfs_fstatat+0x73/0xb0
[ 36.818827][ T3589] __do_sys_newfstatat+0x91/0x110
[ 36.823842][ T3589] do_syscall_64+0x35/0x80
[ 36.828255][ T3589] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 36.834146][ T3589]
[ 36.836456][ T3589] Memory state around the buggy address:
[ 36.842072][ T3589] ffff888075038d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.850220][ T3589] ffff888075038d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.858273][ T3589] >ffff888075038e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.866324][ T3589] ^
[ 36.874028][ T3589] ffff888075038e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.882095][ T3589] ffff888075038f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 36.890137][ T3589] ==================================================================
[ 36.908076][ T3589] Kernel panic - not syncing: panic_on_warn set ...
[ 36.914681][ T3589] CPU: 1 PID: 3589 Comm: syz-executor393 Tainted: G W 5.17.0-syzkaller-12888-g77c9387c0c5b #0
[ 36.926208][ T3589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 36.936248][ T3589] Call Trace:
[ 36.939514][ T3589]
[ 36.942430][ T3589] dump_stack_lvl+0xcd/0x134
[ 36.947016][ T3589] panic+0x2d7/0x636
[ 36.950899][ T3589] ? panic_print_sys_info.part.0+0x10b/0x10b
[ 36.956869][ T3589] ? preempt_schedule_common+0x59/0xc0
[ 36.962325][ T3589] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 36.968033][ T3589] ? preempt_schedule_thunk+0x16/0x18
[ 36.973486][ T3589] ? trace_hardirqs_on+0x38/0x1c0
[ 36.978507][ T3589] ? trace_hardirqs_on+0x51/0x1c0
[ 36.983522][ T3589] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 36.989234][ T3589] end_report.part.0+0x3f/0x7c
[ 36.993989][ T3589] kasan_report.cold+0x93/0x1c6
[ 36.998830][ T3589] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 37.004535][ T3589] vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 37.010070][ T3589] ? rcu_read_lock_sched_held+0xd/0x70
[ 37.015523][ T3589] vxlan_vnifilter_dump+0x3ff/0x650
[ 37.020710][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 37.026944][ T3589] netlink_dump+0x4b5/0xb70
[ 37.031449][ T3589] ? netlink_deliver_tap+0xc40/0xc40
[ 37.036725][ T3589] ? lock_downgrade+0x6e0/0x6e0
[ 37.041572][ T3589] __netlink_dump_start+0x647/0x900
[ 37.046761][ T3589] rtnetlink_rcv_msg+0x70c/0xb80
[ 37.051686][ T3589] ? vxlan_vnifilter_process+0x5b0/0x5b0
[ 37.057305][ T3589] ? rtnl_fdb_dump+0x9a0/0x9a0
[ 37.062059][ T3589] ? netdev_core_pick_tx+0x2e0/0x2e0
[ 37.067345][ T3589] ? __sys_sendmsg+0xe5/0x1b0
[ 37.072011][ T3589] ? do_syscall_64+0x35/0x80
[ 37.076591][ T3589] ? vxlan_vnifilter_process+0x5b0/0x5b0
[ 37.082211][ T3589] ? ref_tracker_dir_exit+0x3e0/0x3e0
[ 37.087578][ T3589] ? lock_acquire+0x442/0x510
[ 37.092247][ T3589] netlink_rcv_skb+0x153/0x420
[ 37.097100][ T3589] ? rtnl_fdb_dump+0x9a0/0x9a0
[ 37.101853][ T3589] ? netlink_ack+0xa80/0xa80
[ 37.106431][ T3589] ? netlink_deliver_tap+0x1a2/0xc40
[ 37.111708][ T3589] ? netlink_deliver_tap+0x1b1/0xc40
[ 37.116984][ T3589] netlink_unicast+0x543/0x7f0
[ 37.121742][ T3589] ? netlink_attachskb+0x880/0x880
[ 37.126841][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 37.133071][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 37.139302][ T3589] ? __phys_addr_symbol+0x2c/0x70
[ 37.144320][ T3589] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 37.150027][ T3589] ? __check_object_size+0x16c/0x4f0
[ 37.155301][ T3589] netlink_sendmsg+0x904/0xe00
[ 37.160054][ T3589] ? netlink_unicast+0x7f0/0x7f0
[ 37.164981][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 37.171211][ T3589] ? netlink_unicast+0x7f0/0x7f0
[ 37.176135][ T3589] sock_sendmsg+0xcf/0x120
[ 37.180542][ T3589] ____sys_sendmsg+0x6e2/0x800
[ 37.185302][ T3589] ? kernel_sendmsg+0x50/0x50
[ 37.189966][ T3589] ? do_recvmmsg+0x6d0/0x6d0
[ 37.194556][ T3589] ? rcu_read_lock_sched_held+0xd/0x70
[ 37.200018][ T3589] ? kmem_cache_alloc+0x46/0x3b0
[ 37.205038][ T3589] ? lock_downgrade+0x6e0/0x6e0
[ 37.209881][ T3589] ? lock_release+0x522/0x720
[ 37.214556][ T3589] ? __d_alloc+0x32/0x960
[ 37.218881][ T3589] ? kmem_cache_alloc+0x46/0x3b0
[ 37.223811][ T3589] ? lock_downgrade+0x6e0/0x6e0
[ 37.228654][ T3589] ___sys_sendmsg+0xf3/0x170
[ 37.233237][ T3589] ? sendmsg_copy_msghdr+0x160/0x160
[ 37.238525][ T3589] ? lockdep_init_map_type+0x21a/0x7f0
[ 37.244061][ T3589] ? __raw_spin_lock_init+0x36/0x110
[ 37.249341][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 37.255574][ T3589] ? percpu_counter_add_batch+0xbd/0x180
[ 37.261198][ T3589] ? alloc_empty_file+0xd7/0x170
[ 37.266125][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 37.272356][ T3589] ? errseq_sample+0x56/0x70
[ 37.276934][ T3589] ? rcu_read_lock_sched_held+0xd/0x70
[ 37.282379][ T3589] ? lock_acquire+0x442/0x510
[ 37.287044][ T3589] ? rcu_read_lock_sched_held+0xd/0x70
[ 37.292490][ T3589] ? lock_release+0x522/0x720
[ 37.297153][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 37.303397][ T3589] ? fd_install+0x1c7/0x640
[ 37.307887][ T3589] ? lock_downgrade+0x6e0/0x6e0
[ 37.312727][ T3589] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 37.318969][ T3589] ? __fget_light+0x20f/0x270
[ 37.323638][ T3589] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 37.329867][ T3589] __sys_sendmsg+0xe5/0x1b0
[ 37.334365][ T3589] ? __sys_sendmsg_sock+0x30/0x30
[ 37.339384][ T3589] ? syscall_enter_from_user_mode+0x21/0x70
[ 37.345265][ T3589] ? trace_hardirqs_on+0x5b/0x1c0
[ 37.350281][ T3589] do_syscall_64+0x35/0x80
[ 37.354689][ T3589] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 37.360660][ T3589] RIP: 0033:0x7f08846d0e99
[ 37.365059][ T3589] Code: 9c 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[ 37.384652][ T3589] RSP: 002b:00007fff38728a28 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 37.393050][ T3589] RAX: ffffffffffffffda RBX: 00007fff38728a58 RCX: 00007f08846d0e99
[ 37.401006][ T3589] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004
[ 37.408972][ T3589] RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000001
[ 37.416927][ T3589] R10: 0000000000000001 R11: 0000000000000246 R12: 00007fff38728a80
[ 37.424882][ T3589] R13: 0000000000000003 R14: 00007fff38728a60 R15: 0000000000000001
[ 37.432846][ T3589]
[ 37.436005][ T3589] Kernel Offset: disabled
[ 37.440313][ T3589] Rebooting in 86400 seconds..