forked to background, child pid 3173
no interfaces have a carrier
[ 17.768113][ T3174] 8021q: adding VLAN 0 to HW filter on device bond0
[ 17.779464][ T3174] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK
syzkaller
Warning: Permanently added '10.128.0.207' (ECDSA) to the list of known hosts.
syzkaller login: [ 33.680664][ T3593] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 33.688365][ T3593] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 33.695844][ T3593] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 33.703505][ T3593] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 33.711414][ T3593] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3
[ 33.718780][ T3593] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 33.761217][ T3588] chnl_net:caif_netlink_parms(): no params data found
[ 33.788034][ T3588] bridge0: port 1(bridge_slave_0) entered blocking state
[ 33.795416][ T3588] bridge0: port 1(bridge_slave_0) entered disabled state
[ 33.803564][ T3588] device bridge_slave_0 entered promiscuous mode
[ 33.811221][ T3588] bridge0: port 2(bridge_slave_1) entered blocking state
[ 33.818703][ T3588] bridge0: port 2(bridge_slave_1) entered disabled state
[ 33.826659][ T3588] device bridge_slave_1 entered promiscuous mode
[ 33.841362][ T3588] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 33.852020][ T3588] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 33.868348][ T3588] team0: Port device team_slave_0 added
[ 33.875100][ T3588] team0: Port device team_slave_1 added
[ 33.887700][ T3588] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 33.894697][ T3588] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 33.920774][ T3588] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 33.932313][ T3588] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 33.939316][ T3588] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 33.965262][ T3588] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 33.984671][ T3588] device hsr_slave_0 entered promiscuous mode
[ 33.991251][ T3588] device hsr_slave_1 entered promiscuous mode
[ 34.035152][ T3588] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 34.043748][ T3588] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 34.052463][ T3588] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 34.060631][ T3588] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 34.074211][ T3588] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.081311][ T3588] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 34.088706][ T3588] bridge0: port 1(bridge_slave_0) entered blocking state
[ 34.095790][ T3588] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 34.122463][ T3588] 8021q: adding VLAN 0 to HW filter on device bond0
[ 34.133399][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 34.142189][ T139] bridge0: port 1(bridge_slave_0) entered disabled state
[ 34.150259][ T139] bridge0: port 2(bridge_slave_1) entered disabled state
[ 34.157969][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[ 34.167618][ T3588] 8021q: adding VLAN 0 to HW filter on device team0
[ 34.176897][ T1774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 34.185421][ T1774] bridge0: port 1(bridge_slave_0) entered blocking state
[ 34.192536][ T1774] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 34.209743][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 34.218315][ T139] bridge0: port 2(bridge_slave_1) entered blocking state
[ 34.225543][ T139] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 34.233542][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[ 34.242292][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[ 34.251089][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 34.259432][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 34.268591][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[ 34.276910][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[ 34.290019][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[ 34.297484][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[ 34.307971][ T3588] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 34.371323][ T3588] device veth0_vlan entered promiscuous mode
[ 34.378788][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 34.387360][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 34.395854][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 34.404375][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 34.413515][ T3588] device veth1_vlan entered promiscuous mode
[ 34.421624][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[ 34.435903][ T3588] device veth0_macvtap entered promiscuous mode
[ 34.443240][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[ 34.451850][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 34.460705][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[ 34.470354][ T3588] device veth1_macvtap entered promiscuous mode
[ 34.483279][ T3588] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 34.490837][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 34.502473][ T3588] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 34.510765][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 34.520825][ T3588] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 34.530119][ T3588] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 34.538968][ T3588] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 34.547716][ T3588] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 34.576435][ T55] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 34.589355][ T55] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 34.594461][ T45] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 34.596776][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[ 34.612149][ T45] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
executing program
[ 34.620510][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
[ 34.630181][ T3588] ==================================================================
[ 34.638460][ T3588] BUG: KASAN: use-after-free in vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 34.646524][ T3588] Read of size 4 at addr ffff88801deb0e70 by task syz-executor953/3588
[ 34.654743][ T3588]
[ 34.657046][ T3588] CPU: 1 PID: 3588 Comm: syz-executor953 Tainted: G W 5.17.0-syzkaller-13034-gd888c83fcec7 #0
[ 34.668565][ T3588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 34.678604][ T3588] Call Trace:
[ 34.681861][ T3588]
[ 34.684772][ T3588] dump_stack_lvl+0xcd/0x134
[ 34.689351][ T3588] print_address_description.constprop.0.cold+0xeb/0x495
[ 34.696413][ T3588] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 34.702225][ T3588] kasan_report.cold+0xf4/0x1c6
[ 34.707072][ T3588] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 34.712884][ T3588] vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 34.718509][ T3588] ? rcu_read_lock_sched_held+0xd/0x70
[ 34.723965][ T3588] vxlan_vnifilter_dump+0x3ff/0x650
[ 34.729267][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 34.735624][ T3588] netlink_dump+0x4b5/0xb70
[ 34.740112][ T3588] ? netlink_deliver_tap+0xc40/0xc40
[ 34.745381][ T3588] ? lock_downgrade+0x6e0/0x6e0
[ 34.750214][ T3588] __netlink_dump_start+0x647/0x900
[ 34.755391][ T3588] rtnetlink_rcv_msg+0x70c/0xb80
[ 34.760308][ T3588] ? vxlan_vnifilter_process+0x5b0/0x5b0
[ 34.765923][ T3588] ? rtnl_fdb_dump+0x9a0/0x9a0
[ 34.770666][ T3588] ? netdev_core_pick_tx+0x2e0/0x2e0
[ 34.776019][ T3588] ? __sys_sendmsg+0xe5/0x1b0
[ 34.780672][ T3588] ? do_syscall_64+0x35/0x80
[ 34.785501][ T3588] ? vxlan_vnifilter_process+0x5b0/0x5b0
[ 34.791138][ T3588] ? ref_tracker_dir_exit+0x3e0/0x3e0
[ 34.796522][ T3588] ? lock_acquire+0x442/0x510
[ 34.801194][ T3588] netlink_rcv_skb+0x153/0x420
[ 34.805949][ T3588] ? rtnl_fdb_dump+0x9a0/0x9a0
[ 34.810702][ T3588] ? netlink_ack+0xa80/0xa80
[ 34.815278][ T3588] ? netlink_deliver_tap+0x1a2/0xc40
[ 34.820556][ T3588] ? netlink_deliver_tap+0x1b1/0xc40
[ 34.830639][ T3588] netlink_unicast+0x543/0x7f0
[ 34.835391][ T3588] ? netlink_attachskb+0x880/0x880
[ 34.840484][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 34.846729][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 34.853339][ T3588] ? __phys_addr_symbol+0x2c/0x70
[ 34.858361][ T3588] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 34.864234][ T3588] ? __check_object_size+0x16c/0x4f0
[ 34.869533][ T3588] netlink_sendmsg+0x904/0xe00
[ 34.874285][ T3588] ? netlink_unicast+0x7f0/0x7f0
[ 34.879213][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 34.885550][ T3588] ? netlink_unicast+0x7f0/0x7f0
[ 34.890588][ T3588] sock_sendmsg+0xcf/0x120
[ 34.895170][ T3588] ____sys_sendmsg+0x6e2/0x800
[ 34.900038][ T3588] ? kernel_sendmsg+0x50/0x50
[ 34.904704][ T3588] ? do_recvmmsg+0x6d0/0x6d0
[ 34.909308][ T3588] ? rcu_read_lock_sched_held+0xd/0x70
[ 34.914770][ T3588] ? kmem_cache_alloc+0x46/0x3b0
[ 34.919914][ T3588] ? lock_downgrade+0x6e0/0x6e0
[ 34.925049][ T3588] ? lock_release+0x522/0x720
[ 34.930118][ T3588] ? kmem_cache_alloc+0x46/0x3b0
[ 34.935355][ T3588] ? lock_downgrade+0x6e0/0x6e0
[ 34.940214][ T3588] ___sys_sendmsg+0xf3/0x170
[ 34.944822][ T3588] ? sendmsg_copy_msghdr+0x160/0x160
[ 34.950184][ T3588] ? lockdep_init_map_type+0x21a/0x7f0
[ 34.955645][ T3588] ? __raw_spin_lock_init+0x36/0x110
[ 34.960914][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 34.967419][ T3588] ? percpu_counter_add_batch+0xbd/0x180
[ 34.973060][ T3588] ? alloc_empty_file+0xd7/0x170
[ 34.977993][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 34.984228][ T3588] ? errseq_sample+0x56/0x70
[ 34.988820][ T3588] ? rcu_read_lock_sched_held+0xd/0x70
[ 34.994326][ T3588] ? lock_acquire+0x442/0x510
[ 34.999014][ T3588] ? rcu_read_lock_sched_held+0xd/0x70
[ 35.004484][ T3588] ? lock_release+0x522/0x720
[ 35.009168][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 35.015397][ T3588] ? fd_install+0x1c7/0x640
[ 35.019904][ T3588] ? lock_downgrade+0x6e0/0x6e0
[ 35.024756][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 35.031082][ T3588] ? __fget_light+0x20f/0x270
[ 35.035767][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 35.042133][ T3588] __sys_sendmsg+0xe5/0x1b0
[ 35.046653][ T3588] ? __sys_sendmsg_sock+0x30/0x30
[ 35.051961][ T3588] ? syscall_enter_from_user_mode+0x21/0x70
[ 35.057839][ T3588] ? trace_hardirqs_on+0x5b/0x1c0
[ 35.063038][ T3588] do_syscall_64+0x35/0x80
[ 35.067440][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 35.073327][ T3588] RIP: 0033:0x7f8990717599
[ 35.077734][ T3588] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 35.097326][ T3588] RSP: 002b:00007ffd52fd1128 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 35.105723][ T3588] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8990717599
[ 35.113676][ T3588] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004
[ 35.121639][ T3588] RBP: 0000000000000046 R08: 000000000000000a R09: 000000000000000a
[ 35.129588][ T3588] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffd52fd1182
[ 35.137563][ T3588] R13: 00007ffd52fd11c0 R14: 00007ffd52fd11e0 R15: 00007f899079a4e0
[ 35.145609][ T3588]
[ 35.148628][ T3588]
[ 35.150925][ T3588] Allocated by task 3573:
[ 35.155224][ T3588] kasan_save_stack+0x1e/0x40
[ 35.159883][ T3588] __kasan_kmalloc+0xa9/0xd0
[ 35.164537][ T3588] tomoyo_realpath_from_path+0xc3/0x620
[ 35.170148][ T3588] tomoyo_path_perm+0x21b/0x400
[ 35.175255][ T3588] security_inode_getattr+0xcf/0x140
[ 35.180605][ T3588] vfs_statx+0x16a/0x390
[ 35.184826][ T3588] vfs_fstatat+0x8c/0xb0
[ 35.189148][ T3588] __do_sys_newfstatat+0x91/0x110
[ 35.194150][ T3588] do_syscall_64+0x35/0x80
[ 35.198548][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 35.204438][ T3588]
[ 35.206754][ T3588] Freed by task 3573:
[ 35.210703][ T3588] kasan_save_stack+0x1e/0x40
[ 35.215415][ T3588] kasan_set_track+0x21/0x30
[ 35.219996][ T3588] kasan_set_free_info+0x20/0x30
[ 35.224923][ T3588] ____kasan_slab_free+0x166/0x1a0
[ 35.230033][ T3588] slab_free_freelist_hook+0x8b/0x1c0
[ 35.235405][ T3588] kfree+0xd6/0x4d0
[ 35.239205][ T3588] tomoyo_realpath_from_path+0x191/0x620
[ 35.245554][ T3588] tomoyo_path_perm+0x21b/0x400
[ 35.250414][ T3588] security_inode_getattr+0xcf/0x140
[ 35.255748][ T3588] vfs_statx+0x16a/0x390
[ 35.260143][ T3588] vfs_fstatat+0x8c/0xb0
[ 35.264374][ T3588] __do_sys_newfstatat+0x91/0x110
[ 35.269373][ T3588] do_syscall_64+0x35/0x80
[ 35.273781][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 35.279654][ T3588]
[ 35.281952][ T3588] The buggy address belongs to the object at ffff88801deb0000
[ 35.281952][ T3588] which belongs to the cache kmalloc-4k of size 4096
[ 35.296240][ T3588] The buggy address is located 3696 bytes inside of
[ 35.296240][ T3588] 4096-byte region [ffff88801deb0000, ffff88801deb1000)
[ 35.309663][ T3588]
[ 35.311961][ T3588] The buggy address belongs to the physical page:
[ 35.318444][ T3588] page:ffffea000077ac00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1deb0
[ 35.328844][ T3588] head:ffffea000077ac00 order:3 compound_mapcount:0 compound_pincount:0
[ 35.337157][ T3588] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
[ 35.345119][ T3588] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff888010c42140
[ 35.353942][ T3588] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000
[ 35.362495][ T3588] page dumped because: kasan: bad access detected
[ 35.368894][ T3588] page_owner tracks the page as allocated
[ 35.374855][ T3588] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3573, tgid 3573 (dhcpcd-run-hook), ts 30613196443, free_ts 30597303696
[ 35.395671][ T3588] get_page_from_freelist+0xba2/0x3df0
[ 35.401227][ T3588] __alloc_pages+0x1b2/0x500
[ 35.405965][ T3588] alloc_pages+0x1aa/0x310
[ 35.410370][ T3588] allocate_slab+0x26c/0x3c0
[ 35.414939][ T3588] ___slab_alloc+0x8df/0xf20
[ 35.419510][ T3588] __slab_alloc.constprop.0+0x4d/0xa0
[ 35.424862][ T3588] __kmalloc+0x318/0x350
[ 35.429132][ T3588] tomoyo_realpath_from_path+0xc3/0x620
[ 35.434858][ T3588] tomoyo_path_perm+0x21b/0x400
[ 35.439688][ T3588] security_inode_getattr+0xcf/0x140
[ 35.444971][ T3588] vfs_statx+0x16a/0x390
[ 35.449194][ T3588] vfs_fstatat+0x8c/0xb0
[ 35.453429][ T3588] __do_sys_newfstatat+0x91/0x110
[ 35.458428][ T3588] do_syscall_64+0x35/0x80
[ 35.462908][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 35.468780][ T3588] page last free stack trace:
[ 35.473612][ T3588] free_pcp_prepare+0x549/0xd20
[ 35.478437][ T3588] free_unref_page+0x19/0x690
[ 35.483089][ T3588] __unfreeze_partials+0x17c/0x1a0
[ 35.488180][ T3588] qlist_free_all+0x6a/0x170
[ 35.492749][ T3588] kasan_quarantine_reduce+0x180/0x200
[ 35.498203][ T3588] __kasan_slab_alloc+0xa2/0xc0
[ 35.503028][ T3588] kmem_cache_alloc+0x204/0x3b0
[ 35.507872][ T3588] vm_area_alloc+0x1c/0x110
[ 35.512362][ T3588] mmap_region+0x96e/0x14a0
[ 35.516840][ T3588] do_mmap+0x863/0xfa0
[ 35.520892][ T3588] vm_mmap_pgoff+0x1b7/0x290
[ 35.525906][ T3588] ksys_mmap_pgoff+0x40d/0x5a0
[ 35.530840][ T3588] do_syscall_64+0x35/0x80
[ 35.535332][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 35.541311][ T3588]
[ 35.543717][ T3588] Memory state around the buggy address:
[ 35.549521][ T3588] ffff88801deb0d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 35.557575][ T3588] ffff88801deb0d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 35.565718][ T3588] >ffff88801deb0e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 35.573774][ T3588] ^
[ 35.581469][ T3588] ffff88801deb0e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 35.589598][ T3588] ffff88801deb0f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 35.597635][ T3588] ==================================================================
[ 35.609015][ T3588] Kernel panic - not syncing: panic_on_warn set ...
[ 35.615777][ T3588] CPU: 1 PID: 3588 Comm: syz-executor953 Tainted: G W 5.17.0-syzkaller-13034-gd888c83fcec7 #0
[ 35.627318][ T3588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 35.637469][ T3588] Call Trace:
[ 35.640755][ T3588]
[ 35.643685][ T3588] dump_stack_lvl+0xcd/0x134
[ 35.648271][ T3588] panic+0x2d7/0x636
[ 35.652148][ T3588] ? panic_print_sys_info.part.0+0x10b/0x10b
[ 35.658112][ T3588] ? preempt_schedule_common+0x59/0xc0
[ 35.663560][ T3588] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 35.669349][ T3588] ? preempt_schedule_thunk+0x16/0x18
[ 35.674719][ T3588] ? trace_hardirqs_on+0x38/0x1c0
[ 35.679723][ T3588] ? trace_hardirqs_on+0x51/0x1c0
[ 35.684812][ T3588] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 35.690793][ T3588] end_report.part.0+0x3f/0x7c
[ 35.695549][ T3588] kasan_report.cold+0x93/0x1c6
[ 35.700464][ T3588] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 35.706271][ T3588] vxlan_vnifilter_dump_dev+0x9a0/0xb40
[ 35.711801][ T3588] ? rcu_read_lock_sched_held+0xd/0x70
[ 35.717761][ T3588] vxlan_vnifilter_dump+0x3ff/0x650
[ 35.723193][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 35.729523][ T3588] netlink_dump+0x4b5/0xb70
[ 35.734112][ T3588] ? netlink_deliver_tap+0xc40/0xc40
[ 35.739743][ T3588] ? lock_downgrade+0x6e0/0x6e0
[ 35.744582][ T3588] __netlink_dump_start+0x647/0x900
[ 35.749859][ T3588] rtnetlink_rcv_msg+0x70c/0xb80
[ 35.754788][ T3588] ? vxlan_vnifilter_process+0x5b0/0x5b0
[ 35.760414][ T3588] ? rtnl_fdb_dump+0x9a0/0x9a0
[ 35.765166][ T3588] ? netdev_core_pick_tx+0x2e0/0x2e0
[ 35.770523][ T3588] ? __sys_sendmsg+0xe5/0x1b0
[ 35.775186][ T3588] ? do_syscall_64+0x35/0x80
[ 35.779791][ T3588] ? vxlan_vnifilter_process+0x5b0/0x5b0
[ 35.785437][ T3588] ? ref_tracker_dir_exit+0x3e0/0x3e0
[ 35.790881][ T3588] ? lock_acquire+0x442/0x510
[ 35.795634][ T3588] netlink_rcv_skb+0x153/0x420
[ 35.800414][ T3588] ? rtnl_fdb_dump+0x9a0/0x9a0
[ 35.805731][ T3588] ? netlink_ack+0xa80/0xa80
[ 35.810348][ T3588] ? netlink_deliver_tap+0x1a2/0xc40
[ 35.815635][ T3588] ? netlink_deliver_tap+0x1b1/0xc40
[ 35.820921][ T3588] netlink_unicast+0x543/0x7f0
[ 35.825689][ T3588] ? netlink_attachskb+0x880/0x880
[ 35.830818][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 35.837079][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 35.843430][ T3588] ? __phys_addr_symbol+0x2c/0x70
[ 35.848508][ T3588] ? __sanitizer_cov_trace_cmp8+0x1d/0x70
[ 35.854225][ T3588] ? __check_object_size+0x16c/0x4f0
[ 35.859535][ T3588] netlink_sendmsg+0x904/0xe00
[ 35.864305][ T3588] ? netlink_unicast+0x7f0/0x7f0
[ 35.869258][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 35.875517][ T3588] ? netlink_unicast+0x7f0/0x7f0
[ 35.880451][ T3588] sock_sendmsg+0xcf/0x120
[ 35.884861][ T3588] ____sys_sendmsg+0x6e2/0x800
[ 35.889616][ T3588] ? kernel_sendmsg+0x50/0x50
[ 35.894282][ T3588] ? do_recvmmsg+0x6d0/0x6d0
[ 35.899148][ T3588] ? rcu_read_lock_sched_held+0xd/0x70
[ 35.904598][ T3588] ? kmem_cache_alloc+0x46/0x3b0
[ 35.909530][ T3588] ? lock_downgrade+0x6e0/0x6e0
[ 35.914371][ T3588] ? lock_release+0x522/0x720
[ 35.919036][ T3588] ? kmem_cache_alloc+0x46/0x3b0
[ 35.923962][ T3588] ? lock_downgrade+0x6e0/0x6e0
[ 35.928804][ T3588] ___sys_sendmsg+0xf3/0x170
[ 35.933396][ T3588] ? sendmsg_copy_msghdr+0x160/0x160
[ 35.938692][ T3588] ? lockdep_init_map_type+0x21a/0x7f0
[ 35.944167][ T3588] ? __raw_spin_lock_init+0x36/0x110
[ 35.949447][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 35.955680][ T3588] ? percpu_counter_add_batch+0xbd/0x180
[ 35.961313][ T3588] ? alloc_empty_file+0xd7/0x170
[ 35.966241][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 35.972468][ T3588] ? errseq_sample+0x56/0x70
[ 35.977044][ T3588] ? rcu_read_lock_sched_held+0xd/0x70
[ 35.982489][ T3588] ? lock_acquire+0x442/0x510
[ 35.987326][ T3588] ? rcu_read_lock_sched_held+0xd/0x70
[ 35.992821][ T3588] ? lock_release+0x522/0x720
[ 35.997480][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 36.003884][ T3588] ? fd_install+0x1c7/0x640
[ 36.008376][ T3588] ? lock_downgrade+0x6e0/0x6e0
[ 36.013493][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70
[ 36.019721][ T3588] ? __fget_light+0x20f/0x270
[ 36.024383][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70
[ 36.030635][ T3588] __sys_sendmsg+0xe5/0x1b0
[ 36.035139][ T3588] ? __sys_sendmsg_sock+0x30/0x30
[ 36.040159][ T3588] ? syscall_enter_from_user_mode+0x21/0x70
[ 36.046043][ T3588] ? trace_hardirqs_on+0x5b/0x1c0
[ 36.051062][ T3588] do_syscall_64+0x35/0x80
[ 36.055489][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 36.061372][ T3588] RIP: 0033:0x7f8990717599
[ 36.065777][ T3588] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 36.085378][ T3588] RSP: 002b:00007ffd52fd1128 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 36.093957][ T3588] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8990717599
[ 36.102365][ T3588] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004
[ 36.110320][ T3588] RBP: 0000000000000046 R08: 000000000000000a R09: 000000000000000a
[ 36.118278][ T3588] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffd52fd1182
[ 36.126493][ T3588] R13: 00007ffd52fd11c0 R14: 00007ffd52fd11e0 R15: 00007f899079a4e0
[ 36.134626][ T3588]
[ 36.138101][ T3588] Kernel Offset: disabled
[ 36.142411][ T3588] Rebooting in 86400 seconds..