[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.209' (ECDSA) to the list of known hosts. syzkaller login: [ 59.903210][ T6840] IPVS: ftp: loaded support on port[0] = 21 [ 59.980886][ T6840] chnl_net:caif_netlink_parms(): no params data found [ 60.034502][ T6840] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.042215][ T6840] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.050966][ T6840] device bridge_slave_0 entered promiscuous mode [ 60.060370][ T6840] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.068487][ T6840] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.076158][ T6840] device bridge_slave_1 entered promiscuous mode [ 60.096655][ T6840] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.109459][ T6840] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.132623][ T6840] team0: Port device team_slave_0 added [ 60.140035][ T6840] team0: Port device team_slave_1 added [ 60.157701][ T6840] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.164723][ T6840] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.191098][ T6840] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.203705][ T6840] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.210837][ T6840] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.236931][ T6840] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 60.309540][ T6840] device hsr_slave_0 entered promiscuous mode [ 60.357416][ T6840] device hsr_slave_1 entered promiscuous mode [ 60.506645][ T6840] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 60.550298][ T6840] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 60.609873][ T6840] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 60.669039][ T6840] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 60.816496][ T6840] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.823704][ T6840] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.831753][ T6840] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.838929][ T6840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.952785][ T6840] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.966216][ T2565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.977748][ T2565] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.986155][ T2565] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.995579][ T2565] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 61.010454][ T6840] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.022684][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.032304][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.041460][ T2796] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.048618][ T2796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.061750][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.071583][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.080716][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.087862][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.100357][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.117622][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.126445][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.137175][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.145687][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.155529][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.165114][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.179366][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.187907][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.201439][ T6840] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.213067][ T6840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.221795][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.231526][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.251267][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.258964][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.274517][ T6840] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.294174][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 61.303003][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 61.322574][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 61.332477][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.343722][ T6840] device veth0_vlan entered promiscuous mode [ 61.350901][ T2565] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.359735][ T2565] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.374309][ T6840] device veth1_vlan entered promiscuous mode [ 61.396465][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 61.405968][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 61.414908][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 61.423786][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.436333][ T6840] device veth0_macvtap entered promiscuous mode [ 61.449945][ T6840] device veth1_macvtap entered promiscuous mode [ 61.469372][ T6840] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 61.478581][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 61.487762][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.495695][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 61.505858][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 61.518702][ T6840] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 61.528028][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 61.537497][ T2796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 61.548697][ T6840] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.558254][ T6840] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.569018][ T6840] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.578784][ T6840] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 61.804471][ C1] ================================================================== [ 61.812668][ C1] BUG: KASAN: slab-out-of-bounds in __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 61.821236][ C1] Read of size 8 at addr ffff88809a0d6b80 by task syz-executor016/7061 [ 61.829463][ C1] CPU: 1 PID: 7061 Comm: syz-executor016 Not tainted 5.8.0-rc4-next-20200713-syzkaller #0 [ 61.839414][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.849454][ C1] Call Trace: [ 61.852766][ C1] [ 61.855609][ C1] dump_stack+0x18f/0x20d [ 61.859927][ C1] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 61.865746][ C1] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 61.871765][ C1] print_address_description.constprop.0.cold+0xae/0x497 [ 61.878789][ C1] ? __xfrm6_tunnel_spi_lookup+0x142/0x3b0 [ 61.884637][ C1] ? lockdep_hardirqs_off+0x66/0xa0 [ 61.889824][ C1] ? vprintk_func+0x97/0x1a6 [ 61.894447][ C1] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 61.900264][ C1] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 61.906067][ C1] kasan_report.cold+0x1f/0x37 [ 61.910867][ C1] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 61.916698][ C1] __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 61.922321][ C1] xfrm6_tunnel_spi_lookup+0x8a/0x1d0 [ 61.927680][ C1] xfrmi6_rcv_tunnel+0xb9/0x100 [ 61.932570][ C1] tunnel46_rcv+0xef/0x2b0 [ 61.936978][ C1] ip6_protocol_deliver_rcu+0x2e8/0x1670 [ 61.942937][ C1] ip6_input_finish+0x7f/0x160 [ 61.947697][ C1] ip6_input+0x9c/0xd0 [ 61.951792][ C1] ip6_mc_input+0x411/0xea0 [ 61.956283][ C1] ? ip6_input+0xd0/0xd0 [ 61.960532][ C1] ? ip6_rcv_finish_core.constprop.0.isra.0+0x570/0x570 [ 61.967507][ C1] ? ip6_rcv_core+0xf6c/0x1bb0 [ 61.972272][ C1] ipv6_rcv+0x28e/0x3c0 [ 61.976411][ C1] ? ip6_rcv_core+0x1bb0/0x1bb0 [ 61.981251][ C1] __netif_receive_skb_one_core+0x114/0x180 [ 61.987133][ C1] ? __netif_receive_skb_core+0x3690/0x3690 [ 61.993132][ C1] ? mark_held_locks+0x9f/0xe0 [ 61.998098][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 62.011492][ C1] __netif_receive_skb+0x27/0x1c0 [ 62.016508][ C1] process_backlog+0x28d/0x7f0 [ 62.021316][ C1] net_rx_action+0x4a1/0xe80 [ 62.025893][ C1] ? napi_complete_done+0x860/0x860 [ 62.031078][ C1] ? mark_held_locks+0x9f/0xe0 [ 62.035823][ C1] ? sched_clock_cpu+0x18/0x1b0 [ 62.040765][ C1] ? lock_is_held_type+0xb0/0xe0 [ 62.045741][ C1] __do_softirq+0x34c/0xa60 [ 62.050289][ C1] asm_call_on_stack+0xf/0x20 [ 62.054981][ C1] [ 62.057908][ C1] do_softirq_own_stack+0x111/0x170 [ 62.063107][ C1] do_softirq+0x16b/0x1e0 [ 62.067431][ C1] netif_rx_ni+0x3c5/0x650 [ 62.071847][ C1] dev_loopback_xmit+0x204/0x590 [ 62.076798][ C1] ip6_finish_output2+0x108f/0x17b0 [ 62.082595][ C1] ip6_fragment+0xbdb/0x2490 [ 62.087294][ C1] ? ip6_forward_finish+0x560/0x560 [ 62.092489][ C1] ? ip6_mtu+0x17a/0x470 [ 62.096716][ C1] ? ip6_forward+0x35a0/0x35a0 [ 62.101461][ C1] ? ip6_mtu+0x2e7/0x470 [ 62.105708][ C1] ? lock_downgrade+0x820/0x820 [ 62.110550][ C1] __ip6_finish_output+0x578/0xab0 [ 62.115647][ C1] ip6_finish_output+0x34/0x1f0 [ 62.120484][ C1] ip6_output+0x1db/0x520 [ 62.124814][ C1] ip6_local_out+0xaf/0x1a0 [ 62.129300][ C1] ip6_send_skb+0xb7/0x340 [ 62.133716][ C1] ip6_push_pending_frames+0xbd/0xe0 [ 62.138992][ C1] rawv6_sendmsg+0x2add/0x38f0 [ 62.143757][ C1] ? rawv6_bind+0x9a0/0x9a0 [ 62.148244][ C1] ? aa_profile_af_perm+0x2e0/0x2e0 [ 62.153441][ C1] ? lock_is_held_type+0xb0/0xe0 [ 62.158380][ C1] inet_sendmsg+0x99/0xe0 [ 62.162695][ C1] ? inet_send_prepare+0x4d0/0x4d0 [ 62.167875][ C1] sock_sendmsg+0xcf/0x120 [ 62.172277][ C1] sock_no_sendpage+0xee/0x130 [ 62.177033][ C1] ? sk_page_frag_refill+0x1d0/0x1d0 [ 62.182308][ C1] ? lock_is_held_type+0xb0/0xe0 [ 62.187233][ C1] ? sk_page_frag_refill+0x1d0/0x1d0 [ 62.192518][ C1] sock_sendpage+0xe5/0x140 [ 62.197006][ C1] ? __sock_recv_ts_and_drops+0x430/0x430 [ 62.202703][ C1] pipe_to_sendpage+0x2ad/0x380 [ 62.207538][ C1] ? propagate_umount+0x1c20/0x1c20 [ 62.212719][ C1] ? mutex_lock_io_nested+0xf60/0xf60 [ 62.218076][ C1] ? splice_from_pipe_next.part.0+0x2fe/0x3c0 [ 62.224249][ C1] __splice_from_pipe+0x3dc/0x830 [ 62.229269][ C1] ? propagate_umount+0x1c20/0x1c20 [ 62.234460][ C1] generic_splice_sendpage+0xd4/0x140 [ 62.239817][ C1] ? __splice_from_pipe+0x830/0x830 [ 62.244997][ C1] ? apparmor_file_permission+0x26e/0x4e0 [ 62.250714][ C1] ? find_held_lock+0x2d/0x110 [ 62.255461][ C1] ? __splice_from_pipe+0x830/0x830 [ 62.260662][ C1] do_splice+0xbb8/0x17a0 [ 62.264984][ C1] ? splice_from_pipe+0x140/0x140 [ 62.270000][ C1] __x64_sys_splice+0x198/0x250 [ 62.274841][ C1] do_syscall_64+0x60/0xe0 [ 62.279256][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 62.285131][ C1] RIP: 0033:0x448bc9 [ 62.289015][ C1] Code: Bad RIP value. [ 62.293072][ C1] RSP: 002b:00007f17b19a4da8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 62.301470][ C1] RAX: ffffffffffffffda RBX: 00000000006dec58 RCX: 0000000000448bc9 [ 62.309427][ C1] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 62.317382][ C1] RBP: 00000000006dec50 R08: 000000000804ffe2 R09: 0000000000000000 [ 62.325335][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dec5c [ 62.333310][ C1] R13: 00007ffe929ff2df R14: 00007f17b19a59c0 R15: 00000000006dec5c [ 62.341308][ C1] Allocated by task 6840: [ 62.345619][ C1] kasan_save_stack+0x1b/0x40 [ 62.350301][ C1] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 62.355912][ C1] __kmalloc+0x1a8/0x320 [ 62.360154][ C1] ops_init+0xfb/0x470 [ 62.364203][ C1] setup_net+0x2d8/0x850 [ 62.368444][ C1] copy_net_ns+0x2cf/0x5e0 [ 62.372859][ C1] create_new_namespaces+0x3f6/0xb10 [ 62.378142][ C1] unshare_nsproxy_namespaces+0xbd/0x1f0 [ 62.383773][ C1] ksys_unshare+0x445/0x8e0 [ 62.388254][ C1] __x64_sys_unshare+0x2d/0x40 [ 62.392998][ C1] do_syscall_64+0x60/0xe0 [ 62.397394][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 62.403383][ C1] The buggy address belongs to the object at ffff88809a0d6800 [ 62.403383][ C1] which belongs to the cache kmalloc-512 of size 512 [ 62.417416][ C1] The buggy address is located 384 bytes to the right of [ 62.417416][ C1] 512-byte region [ffff88809a0d6800, ffff88809a0d6a00) [ 62.431196][ C1] The buggy address belongs to the page: [ 62.436813][ C1] page:000000008c78ee7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9a0d6 [ 62.446956][ C1] flags: 0xfffe0000000200(slab) [ 62.451793][ C1] raw: 00fffe0000000200 ffffea0002783b08 ffffea00026054c8 ffff8880aa000600 [ 62.460358][ C1] raw: 0000000000000000 ffff88809a0d6000 0000000100000004 0000000000000000 [ 62.468939][ C1] page dumped because: kasan: bad access detected [ 62.475349][ C1] Memory state around the buggy address: [ 62.480958][ C1] ffff88809a0d6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.489002][ C1] ffff88809a0d6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.497048][ C1] >ffff88809a0d6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.505090][ C1] ^ [ 62.509151][ C1] ffff88809a0d6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.517202][ C1] ffff88809a0d6c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.525257][ C1] ================================================================== [ 62.533299][ C1] Disabling lock debugging due to kernel taint [ 62.549147][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 62.555747][ C1] CPU: 1 PID: 7061 Comm: syz-executor016 Tainted: G B 5.8.0-rc4-next-20200713-syzkaller #0 [ 62.567047][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.577109][ C1] Call Trace: [ 62.580397][ C1] [ 62.583262][ C1] dump_stack+0x18f/0x20d [ 62.587616][ C1] ? __xfrm6_tunnel_spi_lookup+0x2e0/0x3b0 [ 62.593444][ C1] panic+0x2e3/0x75c [ 62.597349][ C1] ? __warn_printk+0xf3/0xf3 [ 62.601937][ C1] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 62.607740][ C1] ? trace_hardirqs_on+0x55/0x220 [ 62.612766][ C1] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 62.618552][ C1] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 62.624430][ C1] end_report+0x4d/0x53 [ 62.628572][ C1] kasan_report.cold+0xd/0x37 [ 62.633232][ C1] ? __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 62.639024][ C1] __xfrm6_tunnel_spi_lookup+0x3a9/0x3b0 [ 62.644640][ C1] xfrm6_tunnel_spi_lookup+0x8a/0x1d0 [ 62.649996][ C1] xfrmi6_rcv_tunnel+0xb9/0x100 [ 62.654826][ C1] tunnel46_rcv+0xef/0x2b0 [ 62.659229][ C1] ip6_protocol_deliver_rcu+0x2e8/0x1670 [ 62.664929][ C1] ip6_input_finish+0x7f/0x160 [ 62.669685][ C1] ip6_input+0x9c/0xd0 [ 62.673734][ C1] ip6_mc_input+0x411/0xea0 [ 62.678232][ C1] ? ip6_input+0xd0/0xd0 [ 62.682561][ C1] ? ip6_rcv_finish_core.constprop.0.isra.0+0x570/0x570 [ 62.689487][ C1] ? ip6_rcv_core+0xf6c/0x1bb0 [ 62.694242][ C1] ipv6_rcv+0x28e/0x3c0 [ 62.698378][ C1] ? ip6_rcv_core+0x1bb0/0x1bb0 [ 62.703220][ C1] __netif_receive_skb_one_core+0x114/0x180 [ 62.709089][ C1] ? __netif_receive_skb_core+0x3690/0x3690 [ 62.714980][ C1] ? mark_held_locks+0x9f/0xe0 [ 62.719721][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 62.724659][ C1] __netif_receive_skb+0x27/0x1c0 [ 62.729663][ C1] process_backlog+0x28d/0x7f0 [ 62.734431][ C1] net_rx_action+0x4a1/0xe80 [ 62.739002][ C1] ? napi_complete_done+0x860/0x860 [ 62.744178][ C1] ? mark_held_locks+0x9f/0xe0 [ 62.748921][ C1] ? sched_clock_cpu+0x18/0x1b0 [ 62.753751][ C1] ? lock_is_held_type+0xb0/0xe0 [ 62.758666][ C1] __do_softirq+0x34c/0xa60 [ 62.763147][ C1] asm_call_on_stack+0xf/0x20 [ 62.767809][ C1] [ 62.770744][ C1] do_softirq_own_stack+0x111/0x170 [ 62.775942][ C1] do_softirq+0x16b/0x1e0 [ 62.780276][ C1] netif_rx_ni+0x3c5/0x650 [ 62.784673][ C1] dev_loopback_xmit+0x204/0x590 [ 62.789652][ C1] ip6_finish_output2+0x108f/0x17b0 [ 62.794835][ C1] ip6_fragment+0xbdb/0x2490 [ 62.799407][ C1] ? ip6_forward_finish+0x560/0x560 [ 62.804593][ C1] ? ip6_mtu+0x17a/0x470 [ 62.808823][ C1] ? ip6_forward+0x35a0/0x35a0 [ 62.813570][ C1] ? ip6_mtu+0x2e7/0x470 [ 62.817800][ C1] ? lock_downgrade+0x820/0x820 [ 62.822637][ C1] __ip6_finish_output+0x578/0xab0 [ 62.827740][ C1] ip6_finish_output+0x34/0x1f0 [ 62.832601][ C1] ip6_output+0x1db/0x520 [ 62.836958][ C1] ip6_local_out+0xaf/0x1a0 [ 62.841482][ C1] ip6_send_skb+0xb7/0x340 [ 62.845886][ C1] ip6_push_pending_frames+0xbd/0xe0 [ 62.851157][ C1] rawv6_sendmsg+0x2add/0x38f0 [ 62.855902][ C1] ? rawv6_bind+0x9a0/0x9a0 [ 62.860387][ C1] ? aa_profile_af_perm+0x2e0/0x2e0 [ 62.865613][ C1] ? lock_is_held_type+0xb0/0xe0 [ 62.870544][ C1] inet_sendmsg+0x99/0xe0 [ 62.874944][ C1] ? inet_send_prepare+0x4d0/0x4d0 [ 62.880096][ C1] sock_sendmsg+0xcf/0x120 [ 62.884497][ C1] sock_no_sendpage+0xee/0x130 [ 62.889292][ C1] ? sk_page_frag_refill+0x1d0/0x1d0 [ 62.894557][ C1] ? lock_is_held_type+0xb0/0xe0 [ 62.899513][ C1] ? sk_page_frag_refill+0x1d0/0x1d0 [ 62.904776][ C1] sock_sendpage+0xe5/0x140 [ 62.909261][ C1] ? __sock_recv_ts_and_drops+0x430/0x430 [ 62.914998][ C1] pipe_to_sendpage+0x2ad/0x380 [ 62.919830][ C1] ? propagate_umount+0x1c20/0x1c20 [ 62.925073][ C1] ? mutex_lock_io_nested+0xf60/0xf60 [ 62.930470][ C1] ? splice_from_pipe_next.part.0+0x2fe/0x3c0 [ 62.936526][ C1] __splice_from_pipe+0x3dc/0x830 [ 62.941534][ C1] ? propagate_umount+0x1c20/0x1c20 [ 62.946799][ C1] generic_splice_sendpage+0xd4/0x140 [ 62.952150][ C1] ? __splice_from_pipe+0x830/0x830 [ 62.957349][ C1] ? apparmor_file_permission+0x26e/0x4e0 [ 62.963052][ C1] ? find_held_lock+0x2d/0x110 [ 62.967797][ C1] ? __splice_from_pipe+0x830/0x830 [ 62.972991][ C1] do_splice+0xbb8/0x17a0 [ 62.977321][ C1] ? splice_from_pipe+0x140/0x140 [ 62.982375][ C1] __x64_sys_splice+0x198/0x250 [ 62.987222][ C1] do_syscall_64+0x60/0xe0 [ 62.991619][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 62.997495][ C1] RIP: 0033:0x448bc9 [ 63.001413][ C1] Code: Bad RIP value. [ 63.005465][ C1] RSP: 002b:00007f17b19a4da8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 63.013861][ C1] RAX: ffffffffffffffda RBX: 00000000006dec58 RCX: 0000000000448bc9 [ 63.021835][ C1] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 63.029798][ C1] RBP: 00000000006dec50 R08: 000000000804ffe2 R09: 0000000000000000 [ 63.037749][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dec5c [ 63.045786][ C1] R13: 00007ffe929ff2df R14: 00007f17b19a59c0 R15: 00000000006dec5c [ 63.055032][ C1] Kernel Offset: disabled [ 63.059378][ C1] Rebooting in 86400 seconds..