Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. [ 126.282422][ T27] audit: type=1400 audit(1582287322.931:42): avc: denied { map } for pid=11071 comm="syz-executor678" path="/root/syz-executor678447256" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 126.307243][T11072] IPVS: ftp: loaded support on port[0] = 21 [ 126.362588][T11072] chnl_net:caif_netlink_parms(): no params data found [ 126.401992][T11072] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.409758][T11072] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.417714][T11072] device bridge_slave_0 entered promiscuous mode [ 126.427208][T11072] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.434481][T11072] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.442257][T11072] device bridge_slave_1 entered promiscuous mode [ 126.460979][T11072] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.472493][T11072] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.493840][T11072] team0: Port device team_slave_0 added [ 126.502104][T11072] team0: Port device team_slave_1 added [ 126.518959][T11072] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 126.526181][T11072] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.552455][T11072] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 126.565410][T11072] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 126.572462][T11072] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.598433][T11072] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 126.689702][T11072] device hsr_slave_0 entered promiscuous mode [ 126.748477][T11072] device hsr_slave_1 entered promiscuous mode [ 126.868416][ T27] audit: type=1400 audit(1582287323.521:43): avc: denied { create } for pid=11072 comm="syz-executor678" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 126.881038][T11072] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 126.893483][ T27] audit: type=1400 audit(1582287323.521:44): avc: denied { write } for pid=11072 comm="syz-executor678" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 126.893511][ T27] audit: type=1400 audit(1582287323.521:45): avc: denied { read } for pid=11072 comm="syz-executor678" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 127.012020][T11072] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 127.090764][T11072] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 127.160107][T11072] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 127.216933][T11072] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.224423][T11072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.232551][T11072] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.239716][T11072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.295860][T11072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.313110][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.323814][ T2769] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.332265][ T2769] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.340759][ T2769] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 127.355646][T11072] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.368019][ T3237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.377002][ T3237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.385810][ T3237] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.392976][ T3237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.405468][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.414489][ T2742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.423923][ T2742] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.431327][ T2742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.443006][ T3237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 127.475967][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 127.484827][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 127.493856][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 127.503511][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 127.512466][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.521288][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.529860][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.538313][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.546962][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.557549][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 127.568786][T11072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 127.591697][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 127.600911][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 127.616567][T11072] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 127.640487][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 127.650689][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 127.671520][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 127.681384][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.692353][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.701195][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.711075][T11072] device veth0_vlan entered promiscuous mode [ 127.725673][T11072] device veth1_vlan entered promiscuous mode [ 127.752019][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 127.760612][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 127.768843][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 127.777429][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 127.789994][T11072] device veth0_macvtap entered promiscuous mode [ 127.802007][T11072] device veth1_macvtap entered promiscuous mode [ 127.823290][T11072] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 127.831393][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 127.840725][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 127.849798][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 127.858371][ T2884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 127.872760][T11072] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 127.880397][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 127.890510][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 128.078041][ C1] ================================================================== [ 128.086423][ C1] BUG: KASAN: use-after-free in find_match+0xb39/0xc90 [ 128.093447][ C1] Read of size 8 at addr ffff8880a46f8320 by task ksoftirqd/1/16 [ 128.101288][ C1] [ 128.103627][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.6.0-rc2-syzkaller #0 [ 128.111838][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.121981][ C1] Call Trace: [ 128.125273][ C1] dump_stack+0x197/0x210 [ 128.129722][ C1] ? find_match+0xb39/0xc90 [ 128.134245][ C1] print_address_description.constprop.0.cold+0xd4/0x30b [ 128.141309][ C1] ? find_match+0xb39/0xc90 [ 128.145838][ C1] ? find_match+0xb39/0xc90 [ 128.150387][ C1] __kasan_report.cold+0x1b/0x32 [ 128.155422][ C1] ? find_match+0xb39/0xc90 [ 128.159932][ C1] kasan_report+0x12/0x20 [ 128.164271][ C1] __asan_report_load8_noabort+0x14/0x20 [ 128.170080][ C1] find_match+0xb39/0xc90 [ 128.174414][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 128.179439][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 128.185357][ C1] __find_rr_leaf+0x14e/0x750 [ 128.190048][ C1] ? nexthop_is_blackhole+0x690/0x690 [ 128.195538][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 128.201740][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 128.206777][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 128.212609][ C1] fib6_table_lookup+0x697/0xdb0 [ 128.217558][ C1] ? rt6_age_exceptions+0x130/0x130 [ 128.222911][ C1] ? __kasan_check_read+0x11/0x20 [ 128.227945][ C1] ip6_pol_route+0x1f6/0xa70 [ 128.232617][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 128.238169][ C1] ? csum_partial_ext+0x26/0x30 [ 128.243119][ C1] ? __skb_checksum+0x546/0x830 [ 128.248015][ C1] ip6_pol_route_input+0x65/0x80 [ 128.253170][ C1] fib6_rule_lookup+0x133/0x7d0 [ 128.258036][ C1] ? __skb_checksum_complete_head+0x2f0/0x2f0 [ 128.264125][ C1] ? skb_send_sock_locked+0x7e0/0x7e0 [ 128.269502][ C1] ? ip6_pol_route+0xa70/0xa70 [ 128.274283][ C1] ? fib6_lookup+0x340/0x340 [ 128.278888][ C1] ? nf_ip6_checksum+0x107/0x340 [ 128.283844][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 128.290097][ C1] ? ipvlan_ht_addr_lookup+0x2df/0x450 [ 128.295618][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 128.301811][ C1] ip6_route_input_lookup+0xb7/0xd0 [ 128.307046][ C1] ip6_route_input+0x5f0/0xa40 [ 128.311891][ C1] ? ip6_route_check_nh+0x670/0x670 [ 128.317093][ C1] ? ipvlan_link_new.cold+0x45/0x45 [ 128.322347][ C1] ? cpuup_canceled+0x100/0x1d0 [ 128.327316][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 128.332356][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 128.338162][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 128.344057][ C1] ? ipvlan_nf_input+0x190/0x190 [ 128.349083][ C1] ip6_rcv_finish+0x17a/0x310 [ 128.353895][ C1] ipv6_rcv+0x10e/0x420 [ 128.358113][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 128.363693][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 128.369705][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 128.375168][ C1] __netif_receive_skb_one_core+0x113/0x1a0 [ 128.381110][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 128.387048][ C1] ? lock_acquire+0x190/0x410 [ 128.391740][ C1] ? process_backlog+0x1b5/0x780 [ 128.398083][ C1] __netif_receive_skb+0x2c/0x1d0 [ 128.403170][ C1] process_backlog+0x226/0x780 [ 128.408108][ C1] ? net_rx_action+0x27b/0x1120 [ 128.412994][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 128.418387][ C1] net_rx_action+0x508/0x1120 [ 128.423322][ C1] ? napi_busy_loop+0x970/0x970 [ 128.428178][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 128.433752][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 128.439808][ C1] ? trace_hardirqs_on+0x67/0x240 [ 128.444923][ C1] __do_softirq+0x262/0x98c [ 128.449548][ C1] ? takeover_tasklets+0x820/0x820 [ 128.454663][ C1] run_ksoftirqd+0x8e/0x110 [ 128.459172][ C1] smpboot_thread_fn+0x6a3/0xa40 [ 128.464852][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 128.471219][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 128.477528][ C1] ? __kthread_parkme+0x108/0x1c0 [ 128.482730][ C1] ? __kasan_check_read+0x11/0x20 [ 128.488114][ C1] kthread+0x361/0x430 [ 128.492210][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 128.498731][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 128.504484][ C1] ret_from_fork+0x24/0x30 [ 128.509032][ C1] [ 128.511357][ C1] Allocated by task 11072: [ 128.515764][ C1] save_stack+0x23/0x90 [ 128.519915][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 128.525548][ C1] kasan_kmalloc+0x9/0x10 [ 128.529958][ C1] __kmalloc_node+0x4e/0x70 [ 128.534453][ C1] kvmalloc_node+0x68/0x100 [ 128.539039][ C1] alloc_netdev_mqs+0x98/0xe40 [ 128.543807][ C1] vti6_init_net+0x244/0x810 [ 128.548389][ C1] ops_init+0xb3/0x420 [ 128.552474][ C1] setup_net+0x2d5/0x8b0 [ 128.556811][ C1] copy_net_ns+0x29e/0x5a0 [ 128.561228][ C1] create_new_namespaces+0x403/0xb50 [ 128.566585][ C1] unshare_nsproxy_namespaces+0xc2/0x200 [ 128.572369][ C1] ksys_unshare+0x444/0x980 [ 128.576931][ C1] __x64_sys_unshare+0x31/0x40 [ 128.581850][ C1] do_syscall_64+0xfa/0x790 [ 128.586343][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.592227][ C1] [ 128.596999][ C1] Freed by task 11072: [ 128.601072][ C1] save_stack+0x23/0x90 [ 128.605228][ C1] __kasan_slab_free+0x102/0x150 [ 128.610196][ C1] kasan_slab_free+0xe/0x10 [ 128.614738][ C1] kfree+0x10a/0x2c0 [ 128.618628][ C1] __netdev_name_node_alt_destroy+0x1ff/0x2a0 [ 128.626501][ C1] netdev_name_node_alt_destroy+0x57/0x80 [ 128.632347][ C1] rtnl_linkprop.isra.0+0x575/0x6f0 [ 128.639869][ C1] rtnl_dellinkprop+0x46/0x60 [ 128.644643][ C1] rtnetlink_rcv_msg+0x45e/0xaf0 [ 128.649578][ C1] netlink_rcv_skb+0x177/0x450 [ 128.654394][ C1] rtnetlink_rcv+0x1d/0x30 [ 128.659407][ C1] netlink_unicast+0x59e/0x7e0 [ 128.664406][ C1] netlink_sendmsg+0x91c/0xea0 [ 128.669254][ C1] sock_sendmsg+0xd7/0x130 [ 128.673739][ C1] ____sys_sendmsg+0x753/0x880 [ 128.678741][ C1] ___sys_sendmsg+0x100/0x170 [ 128.683696][ C1] __sys_sendmsg+0x105/0x1d0 [ 128.688288][ C1] __x64_sys_sendmsg+0x78/0xb0 [ 128.693158][ C1] do_syscall_64+0xfa/0x790 [ 128.697780][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 128.704039][ C1] [ 128.706360][ C1] The buggy address belongs to the object at ffff8880a46f8000 [ 128.706360][ C1] which belongs to the cache kmalloc-4k of size 4096 [ 128.720875][ C1] The buggy address is located 800 bytes inside of [ 128.720875][ C1] 4096-byte region [ffff8880a46f8000, ffff8880a46f9000) [ 128.735031][ C1] The buggy address belongs to the page: [ 128.740879][ C1] page:ffffea000291be00 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0 [ 128.753066][ C1] flags: 0xfffe0000010200(slab|head) [ 128.758449][ C1] raw: 00fffe0000010200 ffffea000245f908 ffffea0002900188 ffff8880aa402000 [ 128.767250][ C1] raw: 0000000000000000 ffff8880a46f8000 0000000100000001 0000000000000000 [ 128.777821][ C1] page dumped because: kasan: bad access detected [ 128.785728][ C1] [ 128.788983][ C1] Memory state around the buggy address: [ 128.794729][ C1] ffff8880a46f8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 128.804966][ C1] ffff8880a46f8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 128.813420][ C1] >ffff8880a46f8300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 128.821625][ C1] ^ [ 128.827500][ C1] ffff8880a46f8380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 128.836152][ C1] ffff8880a46f8400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 128.844717][ C1] ================================================================== [ 128.853610][ C1] Disabling lock debugging due to kernel taint [ 128.859929][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 128.866686][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 128.880411][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.890544][ C1] Call Trace: [ 128.893989][ C1] dump_stack+0x197/0x210 [ 128.898350][ C1] panic+0x2e3/0x75c [ 128.902260][ C1] ? add_taint.cold+0x16/0x16 [ 128.906965][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 128.911984][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 128.917012][ C1] ? find_match+0xb39/0xc90 [ 128.921526][ C1] end_report+0x47/0x4f [ 128.925776][ C1] ? find_match+0xb39/0xc90 [ 128.930279][ C1] __kasan_report.cold+0xe/0x32 [ 128.935205][ C1] ? find_match+0xb39/0xc90 [ 128.939731][ C1] kasan_report+0x12/0x20 [ 128.944049][ C1] __asan_report_load8_noabort+0x14/0x20 [ 128.949699][ C1] find_match+0xb39/0xc90 [ 128.954296][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 128.959321][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 128.965142][ C1] __find_rr_leaf+0x14e/0x750 [ 128.969842][ C1] ? nexthop_is_blackhole+0x690/0x690 [ 128.975207][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 128.981432][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 128.986461][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 128.992291][ C1] fib6_table_lookup+0x697/0xdb0 [ 128.997332][ C1] ? rt6_age_exceptions+0x130/0x130 [ 129.002669][ C1] ? __kasan_check_read+0x11/0x20 [ 129.007952][ C1] ip6_pol_route+0x1f6/0xa70 [ 129.012643][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 129.018192][ C1] ? csum_partial_ext+0x26/0x30 [ 129.023055][ C1] ? __skb_checksum+0x546/0x830 [ 129.028011][ C1] ip6_pol_route_input+0x65/0x80 [ 129.033071][ C1] fib6_rule_lookup+0x133/0x7d0 [ 129.038037][ C1] ? __skb_checksum_complete_head+0x2f0/0x2f0 [ 129.044223][ C1] ? skb_send_sock_locked+0x7e0/0x7e0 [ 129.049664][ C1] ? ip6_pol_route+0xa70/0xa70 [ 129.054463][ C1] ? fib6_lookup+0x340/0x340 [ 129.059063][ C1] ? nf_ip6_checksum+0x107/0x340 [ 129.063989][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 129.070225][ C1] ? ipvlan_ht_addr_lookup+0x2df/0x450 [ 129.076025][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 129.082314][ C1] ip6_route_input_lookup+0xb7/0xd0 [ 129.088450][ C1] ip6_route_input+0x5f0/0xa40 [ 129.093514][ C1] ? ip6_route_check_nh+0x670/0x670 [ 129.098837][ C1] ? ipvlan_link_new.cold+0x45/0x45 [ 129.104907][ C1] ? cpuup_canceled+0x100/0x1d0 [ 129.110632][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 129.116655][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 129.123071][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 129.129386][ C1] ? ipvlan_nf_input+0x190/0x190 [ 129.135755][ C1] ip6_rcv_finish+0x17a/0x310 [ 129.141930][ C1] ipv6_rcv+0x10e/0x420 [ 129.147177][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 129.152663][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 129.160740][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 129.167514][ C1] __netif_receive_skb_one_core+0x113/0x1a0 [ 129.173496][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 129.179735][ C1] ? lock_acquire+0x190/0x410 [ 129.184605][ C1] ? process_backlog+0x1b5/0x780 [ 129.189726][ C1] __netif_receive_skb+0x2c/0x1d0 [ 129.194993][ C1] process_backlog+0x226/0x780 [ 129.199877][ C1] ? net_rx_action+0x27b/0x1120 [ 129.204719][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 129.210005][ C1] net_rx_action+0x508/0x1120 [ 129.214821][ C1] ? napi_busy_loop+0x970/0x970 [ 129.219816][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 129.225605][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 129.231698][ C1] ? trace_hardirqs_on+0x67/0x240 [ 129.236734][ C1] __do_softirq+0x262/0x98c [ 129.241699][ C1] ? takeover_tasklets+0x820/0x820 [ 129.246818][ C1] run_ksoftirqd+0x8e/0x110 [ 129.251350][ C1] smpboot_thread_fn+0x6a3/0xa40 [ 129.256558][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 129.262952][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 129.270005][ C1] ? __kthread_parkme+0x108/0x1c0 [ 129.275035][ C1] ? __kasan_check_read+0x11/0x20 [ 129.280402][ C1] kthread+0x361/0x430 [ 129.284648][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 129.291080][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 129.296818][ C1] ret_from_fork+0x24/0x30 [ 129.303072][ C1] Kernel Offset: disabled [ 129.307504][ C1] Rebooting in 86400 seconds..