forked to background, child pid 3173 no interfaces have a carrier [ 17.768113][ T3174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 17.779464][ T3174] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.207' (ECDSA) to the list of known hosts. syzkaller login: [ 33.680664][ T3593] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 33.688365][ T3593] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 33.695844][ T3593] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 33.703505][ T3593] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 33.711414][ T3593] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 33.718780][ T3593] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 33.761217][ T3588] chnl_net:caif_netlink_parms(): no params data found [ 33.788034][ T3588] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.795416][ T3588] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.803564][ T3588] device bridge_slave_0 entered promiscuous mode [ 33.811221][ T3588] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.818703][ T3588] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.826659][ T3588] device bridge_slave_1 entered promiscuous mode [ 33.841362][ T3588] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.852020][ T3588] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.868348][ T3588] team0: Port device team_slave_0 added [ 33.875100][ T3588] team0: Port device team_slave_1 added [ 33.887700][ T3588] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.894697][ T3588] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.920774][ T3588] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.932313][ T3588] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.939316][ T3588] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.965262][ T3588] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.984671][ T3588] device hsr_slave_0 entered promiscuous mode [ 33.991251][ T3588] device hsr_slave_1 entered promiscuous mode [ 34.035152][ T3588] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 34.043748][ T3588] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 34.052463][ T3588] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 34.060631][ T3588] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 34.074211][ T3588] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.081311][ T3588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.088706][ T3588] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.095790][ T3588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.122463][ T3588] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.133399][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.142189][ T139] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.150259][ T139] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.157969][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 34.167618][ T3588] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.176897][ T1774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.185421][ T1774] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.192536][ T1774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.209743][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.218315][ T139] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.225543][ T139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.233542][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 34.242292][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 34.251089][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.259432][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.268591][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 34.276910][ T3588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 34.290019][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 34.297484][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 34.307971][ T3588] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.371323][ T3588] device veth0_vlan entered promiscuous mode [ 34.378788][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.387360][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.395854][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.404375][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.413515][ T3588] device veth1_vlan entered promiscuous mode [ 34.421624][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 34.435903][ T3588] device veth0_macvtap entered promiscuous mode [ 34.443240][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 34.451850][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.460705][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 34.470354][ T3588] device veth1_macvtap entered promiscuous mode [ 34.483279][ T3588] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.490837][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.502473][ T3588] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.510765][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.520825][ T3588] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.530119][ T3588] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.538968][ T3588] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.547716][ T3588] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.576435][ T55] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 34.589355][ T55] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 34.594461][ T45] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 34.596776][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 34.612149][ T45] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 executing program [ 34.620510][ T139] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 34.630181][ T3588] ================================================================== [ 34.638460][ T3588] BUG: KASAN: use-after-free in vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 34.646524][ T3588] Read of size 4 at addr ffff88801deb0e70 by task syz-executor953/3588 [ 34.654743][ T3588] [ 34.657046][ T3588] CPU: 1 PID: 3588 Comm: syz-executor953 Tainted: G W 5.17.0-syzkaller-13034-gd888c83fcec7 #0 [ 34.668565][ T3588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.678604][ T3588] Call Trace: [ 34.681861][ T3588] [ 34.684772][ T3588] dump_stack_lvl+0xcd/0x134 [ 34.689351][ T3588] print_address_description.constprop.0.cold+0xeb/0x495 [ 34.696413][ T3588] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 34.702225][ T3588] kasan_report.cold+0xf4/0x1c6 [ 34.707072][ T3588] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 34.712884][ T3588] vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 34.718509][ T3588] ? rcu_read_lock_sched_held+0xd/0x70 [ 34.723965][ T3588] vxlan_vnifilter_dump+0x3ff/0x650 [ 34.729267][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 34.735624][ T3588] netlink_dump+0x4b5/0xb70 [ 34.740112][ T3588] ? netlink_deliver_tap+0xc40/0xc40 [ 34.745381][ T3588] ? lock_downgrade+0x6e0/0x6e0 [ 34.750214][ T3588] __netlink_dump_start+0x647/0x900 [ 34.755391][ T3588] rtnetlink_rcv_msg+0x70c/0xb80 [ 34.760308][ T3588] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 34.765923][ T3588] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 34.770666][ T3588] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 34.776019][ T3588] ? __sys_sendmsg+0xe5/0x1b0 [ 34.780672][ T3588] ? do_syscall_64+0x35/0x80 [ 34.785501][ T3588] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 34.791138][ T3588] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 34.796522][ T3588] ? lock_acquire+0x442/0x510 [ 34.801194][ T3588] netlink_rcv_skb+0x153/0x420 [ 34.805949][ T3588] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 34.810702][ T3588] ? netlink_ack+0xa80/0xa80 [ 34.815278][ T3588] ? netlink_deliver_tap+0x1a2/0xc40 [ 34.820556][ T3588] ? netlink_deliver_tap+0x1b1/0xc40 [ 34.830639][ T3588] netlink_unicast+0x543/0x7f0 [ 34.835391][ T3588] ? netlink_attachskb+0x880/0x880 [ 34.840484][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 34.846729][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 34.853339][ T3588] ? __phys_addr_symbol+0x2c/0x70 [ 34.858361][ T3588] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 34.864234][ T3588] ? __check_object_size+0x16c/0x4f0 [ 34.869533][ T3588] netlink_sendmsg+0x904/0xe00 [ 34.874285][ T3588] ? netlink_unicast+0x7f0/0x7f0 [ 34.879213][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 34.885550][ T3588] ? netlink_unicast+0x7f0/0x7f0 [ 34.890588][ T3588] sock_sendmsg+0xcf/0x120 [ 34.895170][ T3588] ____sys_sendmsg+0x6e2/0x800 [ 34.900038][ T3588] ? kernel_sendmsg+0x50/0x50 [ 34.904704][ T3588] ? do_recvmmsg+0x6d0/0x6d0 [ 34.909308][ T3588] ? rcu_read_lock_sched_held+0xd/0x70 [ 34.914770][ T3588] ? kmem_cache_alloc+0x46/0x3b0 [ 34.919914][ T3588] ? lock_downgrade+0x6e0/0x6e0 [ 34.925049][ T3588] ? lock_release+0x522/0x720 [ 34.930118][ T3588] ? kmem_cache_alloc+0x46/0x3b0 [ 34.935355][ T3588] ? lock_downgrade+0x6e0/0x6e0 [ 34.940214][ T3588] ___sys_sendmsg+0xf3/0x170 [ 34.944822][ T3588] ? sendmsg_copy_msghdr+0x160/0x160 [ 34.950184][ T3588] ? lockdep_init_map_type+0x21a/0x7f0 [ 34.955645][ T3588] ? __raw_spin_lock_init+0x36/0x110 [ 34.960914][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 34.967419][ T3588] ? percpu_counter_add_batch+0xbd/0x180 [ 34.973060][ T3588] ? alloc_empty_file+0xd7/0x170 [ 34.977993][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 34.984228][ T3588] ? errseq_sample+0x56/0x70 [ 34.988820][ T3588] ? rcu_read_lock_sched_held+0xd/0x70 [ 34.994326][ T3588] ? lock_acquire+0x442/0x510 [ 34.999014][ T3588] ? rcu_read_lock_sched_held+0xd/0x70 [ 35.004484][ T3588] ? lock_release+0x522/0x720 [ 35.009168][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 35.015397][ T3588] ? fd_install+0x1c7/0x640 [ 35.019904][ T3588] ? lock_downgrade+0x6e0/0x6e0 [ 35.024756][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 35.031082][ T3588] ? __fget_light+0x20f/0x270 [ 35.035767][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 35.042133][ T3588] __sys_sendmsg+0xe5/0x1b0 [ 35.046653][ T3588] ? __sys_sendmsg_sock+0x30/0x30 [ 35.051961][ T3588] ? syscall_enter_from_user_mode+0x21/0x70 [ 35.057839][ T3588] ? trace_hardirqs_on+0x5b/0x1c0 [ 35.063038][ T3588] do_syscall_64+0x35/0x80 [ 35.067440][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 35.073327][ T3588] RIP: 0033:0x7f8990717599 [ 35.077734][ T3588] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 35.097326][ T3588] RSP: 002b:00007ffd52fd1128 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 35.105723][ T3588] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8990717599 [ 35.113676][ T3588] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004 [ 35.121639][ T3588] RBP: 0000000000000046 R08: 000000000000000a R09: 000000000000000a [ 35.129588][ T3588] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffd52fd1182 [ 35.137563][ T3588] R13: 00007ffd52fd11c0 R14: 00007ffd52fd11e0 R15: 00007f899079a4e0 [ 35.145609][ T3588] [ 35.148628][ T3588] [ 35.150925][ T3588] Allocated by task 3573: [ 35.155224][ T3588] kasan_save_stack+0x1e/0x40 [ 35.159883][ T3588] __kasan_kmalloc+0xa9/0xd0 [ 35.164537][ T3588] tomoyo_realpath_from_path+0xc3/0x620 [ 35.170148][ T3588] tomoyo_path_perm+0x21b/0x400 [ 35.175255][ T3588] security_inode_getattr+0xcf/0x140 [ 35.180605][ T3588] vfs_statx+0x16a/0x390 [ 35.184826][ T3588] vfs_fstatat+0x8c/0xb0 [ 35.189148][ T3588] __do_sys_newfstatat+0x91/0x110 [ 35.194150][ T3588] do_syscall_64+0x35/0x80 [ 35.198548][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 35.204438][ T3588] [ 35.206754][ T3588] Freed by task 3573: [ 35.210703][ T3588] kasan_save_stack+0x1e/0x40 [ 35.215415][ T3588] kasan_set_track+0x21/0x30 [ 35.219996][ T3588] kasan_set_free_info+0x20/0x30 [ 35.224923][ T3588] ____kasan_slab_free+0x166/0x1a0 [ 35.230033][ T3588] slab_free_freelist_hook+0x8b/0x1c0 [ 35.235405][ T3588] kfree+0xd6/0x4d0 [ 35.239205][ T3588] tomoyo_realpath_from_path+0x191/0x620 [ 35.245554][ T3588] tomoyo_path_perm+0x21b/0x400 [ 35.250414][ T3588] security_inode_getattr+0xcf/0x140 [ 35.255748][ T3588] vfs_statx+0x16a/0x390 [ 35.260143][ T3588] vfs_fstatat+0x8c/0xb0 [ 35.264374][ T3588] __do_sys_newfstatat+0x91/0x110 [ 35.269373][ T3588] do_syscall_64+0x35/0x80 [ 35.273781][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 35.279654][ T3588] [ 35.281952][ T3588] The buggy address belongs to the object at ffff88801deb0000 [ 35.281952][ T3588] which belongs to the cache kmalloc-4k of size 4096 [ 35.296240][ T3588] The buggy address is located 3696 bytes inside of [ 35.296240][ T3588] 4096-byte region [ffff88801deb0000, ffff88801deb1000) [ 35.309663][ T3588] [ 35.311961][ T3588] The buggy address belongs to the physical page: [ 35.318444][ T3588] page:ffffea000077ac00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1deb0 [ 35.328844][ T3588] head:ffffea000077ac00 order:3 compound_mapcount:0 compound_pincount:0 [ 35.337157][ T3588] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 35.345119][ T3588] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff888010c42140 [ 35.353942][ T3588] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 35.362495][ T3588] page dumped because: kasan: bad access detected [ 35.368894][ T3588] page_owner tracks the page as allocated [ 35.374855][ T3588] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3573, tgid 3573 (dhcpcd-run-hook), ts 30613196443, free_ts 30597303696 [ 35.395671][ T3588] get_page_from_freelist+0xba2/0x3df0 [ 35.401227][ T3588] __alloc_pages+0x1b2/0x500 [ 35.405965][ T3588] alloc_pages+0x1aa/0x310 [ 35.410370][ T3588] allocate_slab+0x26c/0x3c0 [ 35.414939][ T3588] ___slab_alloc+0x8df/0xf20 [ 35.419510][ T3588] __slab_alloc.constprop.0+0x4d/0xa0 [ 35.424862][ T3588] __kmalloc+0x318/0x350 [ 35.429132][ T3588] tomoyo_realpath_from_path+0xc3/0x620 [ 35.434858][ T3588] tomoyo_path_perm+0x21b/0x400 [ 35.439688][ T3588] security_inode_getattr+0xcf/0x140 [ 35.444971][ T3588] vfs_statx+0x16a/0x390 [ 35.449194][ T3588] vfs_fstatat+0x8c/0xb0 [ 35.453429][ T3588] __do_sys_newfstatat+0x91/0x110 [ 35.458428][ T3588] do_syscall_64+0x35/0x80 [ 35.462908][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 35.468780][ T3588] page last free stack trace: [ 35.473612][ T3588] free_pcp_prepare+0x549/0xd20 [ 35.478437][ T3588] free_unref_page+0x19/0x690 [ 35.483089][ T3588] __unfreeze_partials+0x17c/0x1a0 [ 35.488180][ T3588] qlist_free_all+0x6a/0x170 [ 35.492749][ T3588] kasan_quarantine_reduce+0x180/0x200 [ 35.498203][ T3588] __kasan_slab_alloc+0xa2/0xc0 [ 35.503028][ T3588] kmem_cache_alloc+0x204/0x3b0 [ 35.507872][ T3588] vm_area_alloc+0x1c/0x110 [ 35.512362][ T3588] mmap_region+0x96e/0x14a0 [ 35.516840][ T3588] do_mmap+0x863/0xfa0 [ 35.520892][ T3588] vm_mmap_pgoff+0x1b7/0x290 [ 35.525906][ T3588] ksys_mmap_pgoff+0x40d/0x5a0 [ 35.530840][ T3588] do_syscall_64+0x35/0x80 [ 35.535332][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 35.541311][ T3588] [ 35.543717][ T3588] Memory state around the buggy address: [ 35.549521][ T3588] ffff88801deb0d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.557575][ T3588] ffff88801deb0d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.565718][ T3588] >ffff88801deb0e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.573774][ T3588] ^ [ 35.581469][ T3588] ffff88801deb0e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.589598][ T3588] ffff88801deb0f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.597635][ T3588] ================================================================== [ 35.609015][ T3588] Kernel panic - not syncing: panic_on_warn set ... [ 35.615777][ T3588] CPU: 1 PID: 3588 Comm: syz-executor953 Tainted: G W 5.17.0-syzkaller-13034-gd888c83fcec7 #0 [ 35.627318][ T3588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.637469][ T3588] Call Trace: [ 35.640755][ T3588] [ 35.643685][ T3588] dump_stack_lvl+0xcd/0x134 [ 35.648271][ T3588] panic+0x2d7/0x636 [ 35.652148][ T3588] ? panic_print_sys_info.part.0+0x10b/0x10b [ 35.658112][ T3588] ? preempt_schedule_common+0x59/0xc0 [ 35.663560][ T3588] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 35.669349][ T3588] ? preempt_schedule_thunk+0x16/0x18 [ 35.674719][ T3588] ? trace_hardirqs_on+0x38/0x1c0 [ 35.679723][ T3588] ? trace_hardirqs_on+0x51/0x1c0 [ 35.684812][ T3588] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 35.690793][ T3588] end_report.part.0+0x3f/0x7c [ 35.695549][ T3588] kasan_report.cold+0x93/0x1c6 [ 35.700464][ T3588] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 35.706271][ T3588] vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 35.711801][ T3588] ? rcu_read_lock_sched_held+0xd/0x70 [ 35.717761][ T3588] vxlan_vnifilter_dump+0x3ff/0x650 [ 35.723193][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 35.729523][ T3588] netlink_dump+0x4b5/0xb70 [ 35.734112][ T3588] ? netlink_deliver_tap+0xc40/0xc40 [ 35.739743][ T3588] ? lock_downgrade+0x6e0/0x6e0 [ 35.744582][ T3588] __netlink_dump_start+0x647/0x900 [ 35.749859][ T3588] rtnetlink_rcv_msg+0x70c/0xb80 [ 35.754788][ T3588] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 35.760414][ T3588] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 35.765166][ T3588] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 35.770523][ T3588] ? __sys_sendmsg+0xe5/0x1b0 [ 35.775186][ T3588] ? do_syscall_64+0x35/0x80 [ 35.779791][ T3588] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 35.785437][ T3588] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 35.790881][ T3588] ? lock_acquire+0x442/0x510 [ 35.795634][ T3588] netlink_rcv_skb+0x153/0x420 [ 35.800414][ T3588] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 35.805731][ T3588] ? netlink_ack+0xa80/0xa80 [ 35.810348][ T3588] ? netlink_deliver_tap+0x1a2/0xc40 [ 35.815635][ T3588] ? netlink_deliver_tap+0x1b1/0xc40 [ 35.820921][ T3588] netlink_unicast+0x543/0x7f0 [ 35.825689][ T3588] ? netlink_attachskb+0x880/0x880 [ 35.830818][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 35.837079][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 35.843430][ T3588] ? __phys_addr_symbol+0x2c/0x70 [ 35.848508][ T3588] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 35.854225][ T3588] ? __check_object_size+0x16c/0x4f0 [ 35.859535][ T3588] netlink_sendmsg+0x904/0xe00 [ 35.864305][ T3588] ? netlink_unicast+0x7f0/0x7f0 [ 35.869258][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 35.875517][ T3588] ? netlink_unicast+0x7f0/0x7f0 [ 35.880451][ T3588] sock_sendmsg+0xcf/0x120 [ 35.884861][ T3588] ____sys_sendmsg+0x6e2/0x800 [ 35.889616][ T3588] ? kernel_sendmsg+0x50/0x50 [ 35.894282][ T3588] ? do_recvmmsg+0x6d0/0x6d0 [ 35.899148][ T3588] ? rcu_read_lock_sched_held+0xd/0x70 [ 35.904598][ T3588] ? kmem_cache_alloc+0x46/0x3b0 [ 35.909530][ T3588] ? lock_downgrade+0x6e0/0x6e0 [ 35.914371][ T3588] ? lock_release+0x522/0x720 [ 35.919036][ T3588] ? kmem_cache_alloc+0x46/0x3b0 [ 35.923962][ T3588] ? lock_downgrade+0x6e0/0x6e0 [ 35.928804][ T3588] ___sys_sendmsg+0xf3/0x170 [ 35.933396][ T3588] ? sendmsg_copy_msghdr+0x160/0x160 [ 35.938692][ T3588] ? lockdep_init_map_type+0x21a/0x7f0 [ 35.944167][ T3588] ? __raw_spin_lock_init+0x36/0x110 [ 35.949447][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 35.955680][ T3588] ? percpu_counter_add_batch+0xbd/0x180 [ 35.961313][ T3588] ? alloc_empty_file+0xd7/0x170 [ 35.966241][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 35.972468][ T3588] ? errseq_sample+0x56/0x70 [ 35.977044][ T3588] ? rcu_read_lock_sched_held+0xd/0x70 [ 35.982489][ T3588] ? lock_acquire+0x442/0x510 [ 35.987326][ T3588] ? rcu_read_lock_sched_held+0xd/0x70 [ 35.992821][ T3588] ? lock_release+0x522/0x720 [ 35.997480][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 36.003884][ T3588] ? fd_install+0x1c7/0x640 [ 36.008376][ T3588] ? lock_downgrade+0x6e0/0x6e0 [ 36.013493][ T3588] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 36.019721][ T3588] ? __fget_light+0x20f/0x270 [ 36.024383][ T3588] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 36.030635][ T3588] __sys_sendmsg+0xe5/0x1b0 [ 36.035139][ T3588] ? __sys_sendmsg_sock+0x30/0x30 [ 36.040159][ T3588] ? syscall_enter_from_user_mode+0x21/0x70 [ 36.046043][ T3588] ? trace_hardirqs_on+0x5b/0x1c0 [ 36.051062][ T3588] do_syscall_64+0x35/0x80 [ 36.055489][ T3588] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 36.061372][ T3588] RIP: 0033:0x7f8990717599 [ 36.065777][ T3588] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 36.085378][ T3588] RSP: 002b:00007ffd52fd1128 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 36.093957][ T3588] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8990717599 [ 36.102365][ T3588] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004 [ 36.110320][ T3588] RBP: 0000000000000046 R08: 000000000000000a R09: 000000000000000a [ 36.118278][ T3588] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffd52fd1182 [ 36.126493][ T3588] R13: 00007ffd52fd11c0 R14: 00007ffd52fd11e0 R15: 00007f899079a4e0 [ 36.134626][ T3588] [ 36.138101][ T3588] Kernel Offset: disabled [ 36.142411][ T3588] Rebooting in 86400 seconds..