[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.150' (ECDSA) to the list of known hosts. 2021/04/24 14:45:34 fuzzer started 2021/04/24 14:45:35 dialing manager at 10.128.0.169:43581 2021/04/24 14:45:35 syscalls: 3560 2021/04/24 14:45:35 code coverage: enabled 2021/04/24 14:45:35 comparison tracing: enabled 2021/04/24 14:45:35 extra coverage: enabled 2021/04/24 14:45:35 setuid sandbox: enabled 2021/04/24 14:45:35 namespace sandbox: enabled 2021/04/24 14:45:35 Android sandbox: /sys/fs/selinux/policy does not exist 2021/04/24 14:45:35 fault injection: enabled 2021/04/24 14:45:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/04/24 14:45:35 net packet injection: enabled 2021/04/24 14:45:35 net device setup: enabled 2021/04/24 14:45:35 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/04/24 14:45:35 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/04/24 14:45:35 USB emulation: enabled 2021/04/24 14:45:35 hci packet injection: enabled 2021/04/24 14:45:35 wifi device emulation: enabled 2021/04/24 14:45:35 802.15.4 emulation: enabled 2021/04/24 14:45:35 fetching corpus: 0, signal 0/2000 (executing program) 2021/04/24 14:45:35 fetching corpus: 50, signal 45980/49743 (executing program) syzkaller login: [ 69.555020][ T8438] __swap_info_get: Bad swap file entry 3fff9e780000a [ 69.563380][ T8438] BUG: Bad page map in process systemd-udevd pte:c30ffffea00 pmd:15cc0067 [ 69.572596][ T8438] addr:00007f1458e00000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff888026695f18 index:eb [ 69.583684][ T8438] file:libnss_files-2.24.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage [ 69.594225][ T8438] CPU: 0 PID: 8438 Comm: systemd-udevd Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 69.604051][ T8438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.614129][ T8438] Call Trace: [ 69.617423][ T8438] dump_stack+0x141/0x1d7 [ 69.621802][ T8438] ? ext4_inode_csum+0x8d0/0x8d0 [ 69.626758][ T8438] print_bad_pte.cold+0x2bc/0x2e5 [ 69.631818][ T8438] ? fault_around_bytes_get+0x40/0x40 [ 69.637228][ T8438] unmap_page_range+0x1bcf/0x2650 [ 69.642300][ T8438] ? vm_normal_page_pmd+0x510/0x510 [ 69.647526][ T8438] ? lock_downgrade+0x6e0/0x6e0 [ 69.652399][ T8438] ? uprobe_munmap+0x1c/0x560 [ 69.657111][ T8438] unmap_single_vma+0x198/0x300 [ 69.661992][ T8438] unmap_vmas+0x16d/0x2f0 [ 69.666347][ T8438] ? zap_vma_ptes+0x100/0x100 [ 69.671051][ T8438] ? lockdep_hardirqs_on+0x79/0x100 [ 69.676289][ T8438] exit_mmap+0x2a8/0x590 [ 69.680555][ T8438] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 69.686579][ T8438] __mmput+0x122/0x470 [ 69.690667][ T8438] mmput+0x58/0x60 [ 69.694408][ T8438] do_exit+0xb0a/0x2a70 [ 69.698591][ T8438] ? mm_update_next_owner+0x7a0/0x7a0 [ 69.704001][ T8438] do_group_exit+0x125/0x310 [ 69.708612][ T8438] __x64_sys_exit_group+0x3a/0x50 [ 69.713654][ T8438] do_syscall_64+0x3a/0xb0 [ 69.718119][ T8438] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.724033][ T8438] RIP: 0033:0x7f145a699618 [ 69.728465][ T8438] Code: Unable to access opcode bytes at RIP 0x7f145a6995ee. [ 69.735834][ T8438] RSP: 002b:00007ffe53aebea8 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7 [ 69.744267][ T8438] RAX: ffffffffffffffda RBX: 00007ffe53aebf70 RCX: 00007f145a699618 2021/04/24 14:45:35 fetching corpus: 100, signal 83341/88688 (executing program) [ 69.752255][ T8438] RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 [ 69.760411][ T8438] RBP: 00007ffe53aec020 R08: 00000000000000e7 R09: fffffffffffffe50 [ 69.768394][ T8438] R10: 00000000ffffffff R11: 0000000000000206 R12: 0000000000000000 [ 69.776376][ T8438] R13: 0000000000000000 R14: 0000000000000003 R15: 000000000000000e [ 69.784639][ T8438] Disabling lock debugging due to kernel taint [ 69.798421][ T8438] __swap_info_get: Bad swap file entry 3ffffffffffff [ 69.805201][ T8438] BUG: Bad page map in process systemd-udevd pte:0000004e pmd:15cc0067 [ 69.813732][ T8438] addr:00007f1458e01000 vm_flags:08000070 anon_vma:0000000000000000 mapping:ffff888026695f18 index:ec [ 69.824719][ T8438] file:libnss_files-2.24.so fault:ext4_filemap_fault mmap:ext4_file_mmap readpage:ext4_readpage [ 69.835209][ T8438] CPU: 1 PID: 8438 Comm: systemd-udevd Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 69.846405][ T8438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 69.856452][ T8438] Call Trace: [ 69.859720][ T8438] dump_stack+0x141/0x1d7 [ 69.864039][ T8438] ? ext4_inode_csum+0x8d0/0x8d0 [ 69.868959][ T8438] print_bad_pte.cold+0x2bc/0x2e5 [ 69.873970][ T8438] ? fault_around_bytes_get+0x40/0x40 [ 69.879328][ T8438] unmap_page_range+0x1bcf/0x2650 [ 69.884340][ T8438] ? vm_normal_page_pmd+0x510/0x510 [ 69.889522][ T8438] ? lock_downgrade+0x6e0/0x6e0 [ 69.894357][ T8438] ? uprobe_munmap+0x1c/0x560 [ 69.899016][ T8438] unmap_single_vma+0x198/0x300 [ 69.903866][ T8438] unmap_vmas+0x16d/0x2f0 [ 69.908194][ T8438] ? zap_vma_ptes+0x100/0x100 [ 69.912857][ T8438] ? lockdep_hardirqs_on+0x79/0x100 [ 69.918038][ T8438] exit_mmap+0x2a8/0x590 [ 69.922278][ T8438] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 69.928259][ T8438] __mmput+0x122/0x470 [ 69.932326][ T8438] mmput+0x58/0x60 [ 69.936029][ T8438] do_exit+0xb0a/0x2a70 [ 69.940168][ T8438] ? mm_update_next_owner+0x7a0/0x7a0 [ 69.945537][ T8438] do_group_exit+0x125/0x310 [ 69.950123][ T8438] __x64_sys_exit_group+0x3a/0x50 [ 69.955127][ T8438] do_syscall_64+0x3a/0xb0 [ 69.959528][ T8438] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.965404][ T8438] RIP: 0033:0x7f145a699618 [ 69.969799][ T8438] Code: Unable to access opcode bytes at RIP 0x7f145a6995ee. [ 69.977140][ T8438] RSP: 002b:00007ffe53aebea8 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7 [ 69.985531][ T8438] RAX: ffffffffffffffda RBX: 00007ffe53aebf70 RCX: 00007f145a699618 [ 69.993495][ T8438] RDX: 0000000000000000 RSI: 000000000000003c RDI: 0000000000000000 [ 70.001447][ T8438] RBP: 00007ffe53aec020 R08: 00000000000000e7 R09: fffffffffffffe50 [ 70.009399][ T8438] R10: 00000000ffffffff R11: 0000000000000206 R12: 0000000000000000 [ 70.017352][ T8438] R13: 0000000000000000 R14: 0000000000000003 R15: 000000000000000e [ 70.028540][ C1] ================================================================== [ 70.036627][ C1] BUG: KASAN: use-after-free in skb_try_coalesce+0x1335/0x1440 [ 70.040311][ T8438] BUG: Bad rss-counter state mm:ffff888028192300 type:MM_SWAPENTS val:-2 [ 70.044214][ C1] Write of size 4 at addr ffff888033460008 by task ksoftirqd/1/19 [ 70.060395][ C1] [ 70.062701][ C1] CPU: 1 PID: 19 Comm: ksoftirqd/1 Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 70.073562][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.083609][ C1] Call Trace: [ 70.086885][ C1] dump_stack+0x141/0x1d7 [ 70.091203][ C1] ? skb_try_coalesce+0x1335/0x1440 [ 70.096383][ C1] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 70.103389][ C1] ? skb_try_coalesce+0x1335/0x1440 [ 70.108571][ C1] ? skb_try_coalesce+0x1335/0x1440 [ 70.113752][ C1] kasan_report.cold+0x7c/0xd8 [ 70.118500][ C1] ? __sanitizer_cov_trace_cmp8+0x51/0x70 [ 70.124221][ C1] ? skb_try_coalesce+0x1335/0x1440 [ 70.129415][ C1] skb_try_coalesce+0x1335/0x1440 [ 70.134425][ C1] tcp_try_coalesce+0x393/0x920 [ 70.139274][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 70.145500][ C1] ? tcp_urg.part.0+0x2d0/0x2d0 [ 70.150337][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 70.156567][ C1] ? tcp_try_rmem_schedule+0x98b/0x16d0 [ 70.162111][ C1] tcp_queue_rcv+0x8a/0x6e0 [ 70.166620][ C1] tcp_data_queue+0x150a/0x4b10 [ 70.171811][ C1] ? lock_acquire+0x58a/0x740 [ 70.176471][ C1] ? rcu_read_lock_sched_held+0xd/0x70 [ 70.181911][ C1] ? tcp_data_ready+0x540/0x540 [ 70.186753][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 70.192455][ C1] ? ktime_get+0x30b/0x470 [ 70.196867][ C1] tcp_rcv_established+0x841/0x1eb0 [ 70.202046][ C1] ? tcp_data_queue+0x4b10/0x4b10 [ 70.207047][ C1] ? do_raw_spin_lock+0x120/0x2b0 [ 70.212057][ C1] tcp_v4_do_rcv+0x5d1/0x870 [ 70.216630][ C1] tcp_v4_rcv+0x3298/0x3950 [ 70.221131][ C1] ? tcp_v4_early_demux+0x8f0/0x8f0 [ 70.226309][ C1] ? lock_release+0x720/0x720 [ 70.230986][ C1] ? nf_hook.constprop.0+0x3e8/0x650 [ 70.236267][ C1] ? ip_protocol_deliver_rcu+0xa20/0xa20 [ 70.241882][ C1] ip_protocol_deliver_rcu+0xa7/0xa20 [ 70.247260][ C1] ip_local_deliver_finish+0x20a/0x370 [ 70.252736][ C1] ip_local_deliver+0x1b3/0x200 [ 70.257570][ C1] ip_sublist_rcv_finish+0x9a/0x2c0 [ 70.262752][ C1] ip_list_rcv_finish.constprop.0+0x51e/0x6e0 [ 70.268817][ C1] ? ip_rcv_finish_core.constprop.0+0x1e80/0x1e80 [ 70.275214][ C1] ? ip_list_rcv_finish.constprop.0+0x6e0/0x6e0 [ 70.281440][ C1] ? ip_rcv_core+0x867/0xcb0 [ 70.286017][ C1] ip_list_rcv+0x34e/0x490 [ 70.290425][ C1] ? kasan_save_stack+0x32/0x40 [ 70.295274][ C1] ? ip_rcv+0xd0/0xd0 [ 70.299238][ C1] ? __build_skb+0x21/0x60 [ 70.303651][ C1] ? receive_buf+0x2bc0/0x6250 [ 70.308396][ C1] ? virtnet_poll+0x58a/0x1180 [ 70.313138][ C1] ? __napi_poll+0xaf/0x440 [ 70.317623][ C1] ? net_rx_action+0x801/0xb40 [ 70.322386][ C1] ? ip_rcv+0xd0/0xd0 [ 70.326362][ C1] __netif_receive_skb_list_core+0x549/0x8e0 [ 70.332336][ C1] ? lock_acquire+0x58a/0x740 [ 70.336997][ C1] ? process_backlog+0x6c0/0x6c0 [ 70.341925][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 70.348166][ C1] ? ktime_get_with_offset+0x3f2/0x500 [ 70.353624][ C1] netif_receive_skb_list_internal+0x75e/0xd80 [ 70.359762][ C1] ? __netif_receive_skb_list_core+0x8e0/0x8e0 [ 70.365898][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 70.372122][ C1] ? dev_gro_receive+0x250/0x22b0 [ 70.377141][ C1] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 70.383373][ C1] ? memcpy+0x39/0x60 [ 70.387340][ C1] gro_normal_one+0x17f/0x260 [ 70.392019][ C1] napi_gro_receive+0x2aa/0x990 [ 70.396862][ C1] receive_buf+0xc23/0x6250 [ 70.401351][ C1] ? tcp_wfree+0x3af/0x4e0 [ 70.405758][ C1] ? xdp_linearize_page+0x840/0x840 [ 70.410938][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 70.416641][ C1] ? skb_gso_validate_mac_len+0x250/0x290 [ 70.422355][ C1] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 70.428057][ C1] ? virtqueue_get_buf_ctx_split+0x423/0x5f0 [ 70.434019][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 70.440241][ C1] ? detach_buf_split+0x599/0x7b0 [ 70.445249][ C1] ? virtqueue_get_buf_ctx_split+0x423/0x5f0 [ 70.451211][ C1] ? rcu_read_lock_sched_held+0xd/0x70 [ 70.456656][ C1] virtnet_poll+0x58a/0x1180 [ 70.461264][ C1] ? receive_buf+0x6250/0x6250 [ 70.466029][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 70.470874][ C1] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 70.476678][ C1] ? __next_timer_interrupt+0x1c6/0x220 [ 70.482204][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 70.487389][ C1] __napi_poll+0xaf/0x440 [ 70.491720][ C1] net_rx_action+0x801/0xb40 [ 70.496306][ C1] ? napi_threaded_poll+0x5b0/0x5b0 [ 70.501488][ C1] ? sched_clock_cpu+0x18/0x1f0 [ 70.506334][ C1] __do_softirq+0x29b/0x9fe [ 70.510828][ C1] ? __irq_exit_rcu+0x200/0x200 [ 70.515664][ C1] run_ksoftirqd+0x2d/0x60 [ 70.520077][ C1] smpboot_thread_fn+0x655/0x9e0 [ 70.524996][ C1] ? __smpboot_create_thread.part.0+0x370/0x370 [ 70.531216][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 70.543912][ C1] ? __kthread_parkme+0x13f/0x1e0 [ 70.548918][ C1] ? __smpboot_create_thread.part.0+0x370/0x370 [ 70.555153][ C1] kthread+0x3b1/0x4a0 [ 70.559200][ C1] ? __kthread_bind_mask+0xc0/0xc0 [ 70.564308][ C1] ret_from_fork+0x1f/0x30 [ 70.568709][ C1] [ 70.571011][ C1] The buggy address belongs to the page: [ 70.576613][ C1] page:ffffea0000cd1800 refcount:0 mapcount:-128 mapping:0000000000000000 index:0xffff888033466000 pfn:0x33460 [ 70.588313][ C1] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 70.595416][ C1] raw: 00fff00000000000 ffffea0000c6fc08 ffffea0000d33c08 0000000000000000 [ 70.603979][ C1] raw: ffff888033466000 0000000000000003 00000000ffffff7f 0000000000000000 [ 70.612543][ C1] page dumped because: kasan: bad access detected [ 70.618929][ C1] [ 70.621230][ C1] Memory state around the buggy address: [ 70.626834][ C1] ffff88803345ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 70.634927][ C1] ffff88803345ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 70.642969][ C1] >ffff888033460000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.651006][ C1] ^ [ 70.655310][ C1] ffff888033460080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.663348][ C1] ffff888033460100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.671383][ C1] ================================================================== [ 70.679464][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 70.686044][ C1] CPU: 1 PID: 19 Comm: ksoftirqd/1 Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 70.696972][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.707021][ C1] Call Trace: [ 70.710284][ C1] dump_stack+0x141/0x1d7 [ 70.714601][ C1] panic+0x306/0x73d [ 70.718477][ C1] ? __warn_printk+0xf3/0xf3 [ 70.723048][ C1] ? asm_common_interrupt+0x1e/0x40 [ 70.728241][ C1] ? trace_hardirqs_on+0x38/0x1c0 [ 70.733290][ C1] ? trace_hardirqs_on+0x51/0x1c0 [ 70.738294][ C1] ? skb_try_coalesce+0x1335/0x1440 [ 70.743488][ C1] ? skb_try_coalesce+0x1335/0x1440 [ 70.748669][ C1] end_report.cold+0x5a/0x5a [ 70.753245][ C1] kasan_report.cold+0x6a/0xd8 [ 70.757988][ C1] ? __sanitizer_cov_trace_cmp8+0x51/0x70 [ 70.765112][ C1] ? skb_try_coalesce+0x1335/0x1440 [ 70.770320][ C1] skb_try_coalesce+0x1335/0x1440 [ 70.775346][ C1] tcp_try_coalesce+0x393/0x920 [ 70.780193][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 70.786417][ C1] ? tcp_urg.part.0+0x2d0/0x2d0 [ 70.791250][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 70.797474][ C1] ? tcp_try_rmem_schedule+0x98b/0x16d0 [ 70.803016][ C1] tcp_queue_rcv+0x8a/0x6e0 [ 70.807517][ C1] tcp_data_queue+0x150a/0x4b10 [ 70.812356][ C1] ? lock_acquire+0x58a/0x740 [ 70.817029][ C1] ? rcu_read_lock_sched_held+0xd/0x70 [ 70.822489][ C1] ? tcp_data_ready+0x540/0x540 [ 70.827324][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 70.833044][ C1] ? ktime_get+0x30b/0x470 [ 70.837448][ C1] tcp_rcv_established+0x841/0x1eb0 [ 70.842655][ C1] ? tcp_data_queue+0x4b10/0x4b10 [ 70.847657][ C1] ? do_raw_spin_lock+0x120/0x2b0 [ 70.852676][ C1] tcp_v4_do_rcv+0x5d1/0x870 [ 70.857251][ C1] tcp_v4_rcv+0x3298/0x3950 [ 70.861756][ C1] ? tcp_v4_early_demux+0x8f0/0x8f0 [ 70.866933][ C1] ? lock_release+0x720/0x720 [ 70.871592][ C1] ? nf_hook.constprop.0+0x3e8/0x650 [ 70.876874][ C1] ? ip_protocol_deliver_rcu+0xa20/0xa20 [ 70.882503][ C1] ip_protocol_deliver_rcu+0xa7/0xa20 [ 70.887874][ C1] ip_local_deliver_finish+0x20a/0x370 [ 70.893317][ C1] ip_local_deliver+0x1b3/0x200 [ 70.898149][ C1] ip_sublist_rcv_finish+0x9a/0x2c0 [ 70.903329][ C1] ip_list_rcv_finish.constprop.0+0x51e/0x6e0 [ 70.909378][ C1] ? ip_rcv_finish_core.constprop.0+0x1e80/0x1e80 [ 70.915786][ C1] ? ip_list_rcv_finish.constprop.0+0x6e0/0x6e0 [ 70.922023][ C1] ? ip_rcv_core+0x867/0xcb0 [ 70.926597][ C1] ip_list_rcv+0x34e/0x490 [ 70.931010][ C1] ? kasan_save_stack+0x32/0x40 [ 70.935857][ C1] ? ip_rcv+0xd0/0xd0 [ 70.939817][ C1] ? __build_skb+0x21/0x60 [ 70.944213][ C1] ? receive_buf+0x2bc0/0x6250 [ 70.948970][ C1] ? virtnet_poll+0x58a/0x1180 [ 70.953727][ C1] ? __napi_poll+0xaf/0x440 [ 70.958224][ C1] ? net_rx_action+0x801/0xb40 [ 70.962966][ C1] ? ip_rcv+0xd0/0xd0 [ 70.966929][ C1] __netif_receive_skb_list_core+0x549/0x8e0 [ 70.972917][ C1] ? lock_acquire+0x58a/0x740 [ 70.977619][ C1] ? process_backlog+0x6c0/0x6c0 [ 70.982539][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 70.988766][ C1] ? ktime_get_with_offset+0x3f2/0x500 [ 70.994228][ C1] netif_receive_skb_list_internal+0x75e/0xd80 [ 71.000384][ C1] ? __netif_receive_skb_list_core+0x8e0/0x8e0 [ 71.006542][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 71.012765][ C1] ? dev_gro_receive+0x250/0x22b0 [ 71.017769][ C1] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 71.024007][ C1] ? memcpy+0x39/0x60 [ 71.027971][ C1] gro_normal_one+0x17f/0x260 [ 71.032650][ C1] napi_gro_receive+0x2aa/0x990 [ 71.037482][ C1] receive_buf+0xc23/0x6250 [ 71.041972][ C1] ? tcp_wfree+0x3af/0x4e0 [ 71.046380][ C1] ? xdp_linearize_page+0x840/0x840 [ 71.051562][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 71.057268][ C1] ? skb_gso_validate_mac_len+0x250/0x290 [ 71.063000][ C1] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 71.068701][ C1] ? virtqueue_get_buf_ctx_split+0x423/0x5f0 [ 71.074664][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 71.080900][ C1] ? detach_buf_split+0x599/0x7b0 [ 71.085904][ C1] ? virtqueue_get_buf_ctx_split+0x423/0x5f0 [ 71.091898][ C1] ? rcu_read_lock_sched_held+0xd/0x70 [ 71.097364][ C1] virtnet_poll+0x58a/0x1180 [ 71.101961][ C1] ? receive_buf+0x6250/0x6250 [ 71.106708][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 71.111563][ C1] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 71.117272][ C1] ? __next_timer_interrupt+0x1c6/0x220 [ 71.122820][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 71.128019][ C1] __napi_poll+0xaf/0x440 [ 71.132332][ C1] net_rx_action+0x801/0xb40 [ 71.136918][ C1] ? napi_threaded_poll+0x5b0/0x5b0 [ 71.142098][ C1] ? sched_clock_cpu+0x18/0x1f0 [ 71.146947][ C1] __do_softirq+0x29b/0x9fe [ 71.151448][ C1] ? __irq_exit_rcu+0x200/0x200 [ 71.156367][ C1] run_ksoftirqd+0x2d/0x60 [ 71.160760][ C1] smpboot_thread_fn+0x655/0x9e0 [ 71.165678][ C1] ? __smpboot_create_thread.part.0+0x370/0x370 [ 71.171919][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 71.178158][ C1] ? __kthread_parkme+0x13f/0x1e0 [ 71.183173][ C1] ? __smpboot_create_thread.part.0+0x370/0x370 [ 71.189407][ C1] kthread+0x3b1/0x4a0 [ 71.193468][ C1] ? __kthread_bind_mask+0xc0/0xc0 [ 71.198571][ C1] ret_from_fork+0x1f/0x30 [ 71.203388][ C1] Kernel Offset: disabled [ 71.207713][ C1] Rebooting in 86400 seconds..