[ 89.676884][ T27] audit: type=1800 audit(1582289062.396:36): pid=10755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[ 90.561501][ T27] audit: type=1400 audit(1582289063.416:37): avc: denied { watch } for pid=10851 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.214' (ECDSA) to the list of known hosts. syzkaller login: [ 99.730500][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 99.730516][ T27] audit: type=1400 audit(1582289072.586:42): avc: denied { map } for pid=10943 comm="syz-executor005" path="/root/syz-executor005745552" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 99.754197][T10944] IPVS: ftp: loaded support on port[0] = 21 [ 99.812713][T10944] chnl_net:caif_netlink_parms(): no params data found [ 99.850064][T10944] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.857701][T10944] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.865578][T10944] device bridge_slave_0 entered promiscuous mode [ 99.875458][T10944] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.882826][T10944] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.890894][T10944] device bridge_slave_1 entered promiscuous mode [ 99.908630][T10944] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.920240][T10944] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.939608][T10944] team0: Port device team_slave_0 added [ 99.947396][T10944] team0: Port device team_slave_1 added [ 99.962336][T10944] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 99.969289][T10944] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.996303][T10944] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 100.010204][T10944] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 100.017166][T10944] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.043281][T10944] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 100.102668][T10944] device hsr_slave_0 entered promiscuous mode [ 100.170453][T10944] device hsr_slave_1 entered promiscuous mode [ 100.314654][ T27] audit: type=1400 audit(1582289073.166:43): avc: denied { create } for pid=10944 comm="syz-executor005" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 100.317529][T10944] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 100.347993][ T27] audit: type=1400 audit(1582289073.166:44): avc: denied { write } for pid=10944 comm="syz-executor005" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 100.373081][ T27] audit: type=1400 audit(1582289073.166:45): avc: denied { read } for pid=10944 comm="syz-executor005" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 100.483598][T10944] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 100.522550][T10944] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 100.592906][T10944] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 100.686991][T10944] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.694280][T10944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.702144][T10944] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.711501][T10944] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.763886][T10944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.778445][ T2985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.788695][ T2985] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.797088][ T2985] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.805032][ T2985] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 100.819478][T10944] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.830892][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.839489][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.849155][ T2792] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.856299][ T2792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.880228][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.888801][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.897401][ T2800] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.904464][ T2800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.912121][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.921486][ T2800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.931958][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 100.942627][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.951227][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.970426][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.979145][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.988612][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.997328][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.006236][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.014656][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.026261][T10944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.048114][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 101.056950][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 101.071752][T10944] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 101.094685][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 101.103960][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.124785][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 101.133038][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.145388][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.153357][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.162077][T10944] device veth0_vlan entered promiscuous mode [ 101.175465][T10944] device veth1_vlan entered promiscuous mode [ 101.199882][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 101.209043][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 101.217230][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 101.225848][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 101.237561][T10944] device veth0_macvtap entered promiscuous mode [ 101.248812][T10944] device veth1_macvtap entered promiscuous mode [ 101.267828][T10944] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 101.276124][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 101.284369][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 101.292338][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 101.301175][ T2790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 101.314922][T10944] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 101.322413][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 101.332520][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 101.530678][ C1] ================================================================== [ 101.538936][ C1] BUG: KASAN: use-after-free in find_match+0xb39/0xc90 [ 101.545897][ C1] Read of size 8 at addr ffff88809127c320 by task ksoftirqd/1/16 [ 101.553666][ C1] [ 101.555987][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.6.0-rc2-syzkaller #0 [ 101.564121][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.574281][ C1] Call Trace: [ 101.577619][ C1] dump_stack+0x197/0x210 [ 101.582129][ C1] ? find_match+0xb39/0xc90 [ 101.586671][ C1] print_address_description.constprop.0.cold+0xd4/0x30b [ 101.593686][ C1] ? find_match+0xb39/0xc90 [ 101.598191][ C1] ? find_match+0xb39/0xc90 [ 101.602693][ C1] __kasan_report.cold+0x1b/0x32 [ 101.607945][ C1] ? find_match+0xb39/0xc90 [ 101.612645][ C1] kasan_report+0x12/0x20 [ 101.617101][ C1] __asan_report_load8_noabort+0x14/0x20 [ 101.622732][ C1] find_match+0xb39/0xc90 [ 101.627144][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 101.632210][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 101.638014][ C1] __find_rr_leaf+0x14e/0x750 [ 101.643211][ C1] ? nexthop_is_blackhole+0x690/0x690 [ 101.648581][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 101.654726][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 101.659755][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 101.665570][ C1] fib6_table_lookup+0x697/0xdb0 [ 101.670514][ C1] ? rt6_age_exceptions+0x130/0x130 [ 101.675732][ C1] ? __kasan_check_read+0x11/0x20 [ 101.680757][ C1] ip6_pol_route+0x1f6/0xa70 [ 101.685338][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 101.690869][ C1] ? csum_partial_ext+0x26/0x30 [ 101.695750][ C1] ? __skb_checksum+0x546/0x830 [ 101.700612][ C1] ip6_pol_route_input+0x65/0x80 [ 101.705670][ C1] fib6_rule_lookup+0x133/0x7d0 [ 101.710514][ C1] ? __skb_checksum_complete_head+0x2f0/0x2f0 [ 101.716836][ C1] ? skb_send_sock_locked+0x7e0/0x7e0 [ 101.722194][ C1] ? ip6_pol_route+0xa70/0xa70 [ 101.726948][ C1] ? fib6_lookup+0x340/0x340 [ 101.731537][ C1] ? nf_ip6_checksum+0x107/0x340 [ 101.736458][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 101.742687][ C1] ? ipvlan_ht_addr_lookup+0x2df/0x450 [ 101.748131][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 101.754019][ C1] ip6_route_input_lookup+0xb7/0xd0 [ 101.759200][ C1] ip6_route_input+0x5f0/0xa40 [ 101.763949][ C1] ? ip6_route_check_nh+0x670/0x670 [ 101.769146][ C1] ? ipvlan_link_new.cold+0x45/0x45 [ 101.774333][ C1] ? cpuup_canceled+0x100/0x1d0 [ 101.779390][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 101.784416][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 101.790217][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 101.796160][ C1] ? ipvlan_nf_input+0x190/0x190 [ 101.801135][ C1] ip6_rcv_finish+0x17a/0x310 [ 101.805800][ C1] ipv6_rcv+0x10e/0x420 [ 101.809940][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 101.815391][ C1] ? find_held_lock+0x35/0x130 [ 101.820162][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 101.826075][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 101.831529][ C1] __netif_receive_skb_one_core+0x113/0x1a0 [ 101.837431][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 101.843325][ C1] ? lock_acquire+0x190/0x410 [ 101.847997][ C1] ? process_backlog+0x1b5/0x780 [ 101.852955][ C1] __netif_receive_skb+0x2c/0x1d0 [ 101.857968][ C1] process_backlog+0x226/0x780 [ 101.862785][ C1] ? net_rx_action+0x27b/0x1120 [ 101.867674][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 101.873072][ C1] net_rx_action+0x508/0x1120 [ 101.877745][ C1] ? napi_busy_loop+0x970/0x970 [ 101.882584][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 101.888111][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 101.894073][ C1] ? trace_hardirqs_on+0x67/0x240 [ 101.899136][ C1] __do_softirq+0x262/0x98c [ 101.903655][ C1] ? takeover_tasklets+0x820/0x820 [ 101.908771][ C1] run_ksoftirqd+0x8e/0x110 [ 101.913273][ C1] smpboot_thread_fn+0x6a3/0xa40 [ 101.918203][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 101.924421][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 101.930661][ C1] ? __kthread_parkme+0x108/0x1c0 [ 101.935677][ C1] ? __kasan_check_read+0x11/0x20 [ 101.940698][ C1] kthread+0x361/0x430 [ 101.944758][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 101.950976][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 101.956688][ C1] ret_from_fork+0x24/0x30 [ 101.961113][ C1] [ 101.963420][ C1] Allocated by task 10944: [ 101.967822][ C1] save_stack+0x23/0x90 [ 101.971974][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 101.977595][ C1] kasan_kmalloc+0x9/0x10 [ 101.981912][ C1] __kmalloc_node+0x4e/0x70 [ 101.986407][ C1] kvmalloc_node+0x68/0x100 [ 101.990904][ C1] alloc_netdev_mqs+0x98/0xe40 [ 101.995670][ C1] vti6_init_net+0x244/0x810 [ 102.000291][ C1] ops_init+0xb3/0x420 [ 102.004446][ C1] setup_net+0x2d5/0x8b0 [ 102.008684][ C1] copy_net_ns+0x29e/0x5a0 [ 102.013168][ C1] create_new_namespaces+0x403/0xb50 [ 102.018454][ C1] unshare_nsproxy_namespaces+0xc2/0x200 [ 102.024101][ C1] ksys_unshare+0x444/0x980 [ 102.028587][ C1] __x64_sys_unshare+0x31/0x40 [ 102.033517][ C1] do_syscall_64+0xfa/0x790 [ 102.038123][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.044001][ C1] [ 102.046312][ C1] Freed by task 10944: [ 102.050474][ C1] save_stack+0x23/0x90 [ 102.054659][ C1] __kasan_slab_free+0x102/0x150 [ 102.059580][ C1] kasan_slab_free+0xe/0x10 [ 102.064079][ C1] kfree+0x10a/0x2c0 [ 102.067977][ C1] __netdev_name_node_alt_destroy+0x1ff/0x2a0 [ 102.074026][ C1] netdev_name_node_alt_destroy+0x57/0x80 [ 102.079743][ C1] rtnl_linkprop.isra.0+0x575/0x6f0 [ 102.084927][ C1] rtnl_dellinkprop+0x46/0x60 [ 102.089583][ C1] rtnetlink_rcv_msg+0x45e/0xaf0 [ 102.094512][ C1] netlink_rcv_skb+0x177/0x450 [ 102.099254][ C1] rtnetlink_rcv+0x1d/0x30 [ 102.103652][ C1] netlink_unicast+0x59e/0x7e0 [ 102.108403][ C1] netlink_sendmsg+0x91c/0xea0 [ 102.113159][ C1] sock_sendmsg+0xd7/0x130 [ 102.117552][ C1] ____sys_sendmsg+0x753/0x880 [ 102.122387][ C1] ___sys_sendmsg+0x100/0x170 [ 102.127181][ C1] __sys_sendmsg+0x105/0x1d0 [ 102.131845][ C1] __x64_sys_sendmsg+0x78/0xb0 [ 102.136598][ C1] do_syscall_64+0xfa/0x790 [ 102.141108][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.146993][ C1] [ 102.149305][ C1] The buggy address belongs to the object at ffff88809127c000 [ 102.149305][ C1] which belongs to the cache kmalloc-4k of size 4096 [ 102.163388][ C1] The buggy address is located 800 bytes inside of [ 102.163388][ C1] 4096-byte region [ffff88809127c000, ffff88809127d000) [ 102.176736][ C1] The buggy address belongs to the page: [ 102.183678][ C1] page:ffffea0002449f00 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0 [ 102.194589][ C1] flags: 0xfffe0000010200(slab|head) [ 102.199854][ C1] raw: 00fffe0000010200 ffffea00027fce08 ffffea00029a3908 ffff8880aa402000 [ 102.208419][ C1] raw: 0000000000000000 ffff88809127c000 0000000100000001 0000000000000000 [ 102.217082][ C1] page dumped because: kasan: bad access detected [ 102.223474][ C1] [ 102.225793][ C1] Memory state around the buggy address: [ 102.231466][ C1] ffff88809127c200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.239569][ C1] ffff88809127c280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.247633][ C1] >ffff88809127c300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.255678][ C1] ^ [ 102.260768][ C1] ffff88809127c380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.268825][ C1] ffff88809127c400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 102.276969][ C1] ================================================================== [ 102.285111][ C1] Disabling lock debugging due to kernel taint [ 102.291464][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 102.298134][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 102.307654][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.317744][ C1] Call Trace: [ 102.321023][ C1] dump_stack+0x197/0x210 [ 102.325334][ C1] panic+0x2e3/0x75c [ 102.329334][ C1] ? add_taint.cold+0x16/0x16 [ 102.334003][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 102.339011][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 102.344020][ C1] ? find_match+0xb39/0xc90 [ 102.348528][ C1] end_report+0x47/0x4f [ 102.352668][ C1] ? find_match+0xb39/0xc90 [ 102.357254][ C1] __kasan_report.cold+0xe/0x32 [ 102.362083][ C1] ? find_match+0xb39/0xc90 [ 102.366567][ C1] kasan_report+0x12/0x20 [ 102.370876][ C1] __asan_report_load8_noabort+0x14/0x20 [ 102.376501][ C1] find_match+0xb39/0xc90 [ 102.380820][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 102.385840][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 102.391650][ C1] __find_rr_leaf+0x14e/0x750 [ 102.396325][ C1] ? nexthop_is_blackhole+0x690/0x690 [ 102.401689][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 102.407896][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 102.412950][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 102.418737][ C1] fib6_table_lookup+0x697/0xdb0 [ 102.423660][ C1] ? rt6_age_exceptions+0x130/0x130 [ 102.428864][ C1] ? __kasan_check_read+0x11/0x20 [ 102.433876][ C1] ip6_pol_route+0x1f6/0xa70 [ 102.438446][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 102.443966][ C1] ? csum_partial_ext+0x26/0x30 [ 102.448808][ C1] ? __skb_checksum+0x546/0x830 [ 102.453637][ C1] ip6_pol_route_input+0x65/0x80 [ 102.458557][ C1] fib6_rule_lookup+0x133/0x7d0 [ 102.463398][ C1] ? __skb_checksum_complete_head+0x2f0/0x2f0 [ 102.469443][ C1] ? skb_send_sock_locked+0x7e0/0x7e0 [ 102.474805][ C1] ? ip6_pol_route+0xa70/0xa70 [ 102.479548][ C1] ? fib6_lookup+0x340/0x340 [ 102.484141][ C1] ? nf_ip6_checksum+0x107/0x340 [ 102.489115][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.495606][ C1] ? ipvlan_ht_addr_lookup+0x2df/0x450 [ 102.501047][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 102.506922][ C1] ip6_route_input_lookup+0xb7/0xd0 [ 102.512187][ C1] ip6_route_input+0x5f0/0xa40 [ 102.516940][ C1] ? ip6_route_check_nh+0x670/0x670 [ 102.522120][ C1] ? ipvlan_link_new.cold+0x45/0x45 [ 102.527329][ C1] ? cpuup_canceled+0x100/0x1d0 [ 102.532170][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 102.537276][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 102.543081][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 102.548792][ C1] ? ipvlan_nf_input+0x190/0x190 [ 102.553715][ C1] ip6_rcv_finish+0x17a/0x310 [ 102.558394][ C1] ipv6_rcv+0x10e/0x420 [ 102.562603][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 102.568059][ C1] ? find_held_lock+0x35/0x130 [ 102.572815][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 102.578703][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 102.584151][ C1] __netif_receive_skb_one_core+0x113/0x1a0 [ 102.590035][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 102.595920][ C1] ? lock_acquire+0x190/0x410 [ 102.600590][ C1] ? process_backlog+0x1b5/0x780 [ 102.605669][ C1] __netif_receive_skb+0x2c/0x1d0 [ 102.610699][ C1] process_backlog+0x226/0x780 [ 102.615710][ C1] ? net_rx_action+0x27b/0x1120 [ 102.620669][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 102.626132][ C1] net_rx_action+0x508/0x1120 [ 102.630845][ C1] ? napi_busy_loop+0x970/0x970 [ 102.635682][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 102.641394][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 102.647381][ C1] ? trace_hardirqs_on+0x67/0x240 [ 102.652529][ C1] __do_softirq+0x262/0x98c [ 102.657207][ C1] ? takeover_tasklets+0x820/0x820 [ 102.662544][ C1] run_ksoftirqd+0x8e/0x110 [ 102.667043][ C1] smpboot_thread_fn+0x6a3/0xa40 [ 102.672143][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 102.678482][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 102.684718][ C1] ? __kthread_parkme+0x108/0x1c0 [ 102.689877][ C1] ? __kasan_check_read+0x11/0x20 [ 102.694960][ C1] kthread+0x361/0x430 [ 102.699020][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 102.705315][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 102.711102][ C1] ret_from_fork+0x24/0x30 [ 102.717158][ C1] Kernel Offset: disabled [ 102.721492][ C1] Rebooting in 86400 seconds..