[ 90.694088][ T27] audit: type=1400 audit(1582206850.592:37): avc: denied { watch } for pid=10909 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 90.729726][ T27] audit: type=1400 audit(1582206850.622:38): avc: denied { watch } for pid=10909 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 91.044120][ T27] audit: type=1800 audit(1582206850.942:39): pid=10822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 91.066061][ T27] audit: type=1800 audit(1582206850.942:40): pid=10822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 95.656527][ T27] audit: type=1400 audit(1582206855.552:41): avc: denied { map } for pid=11000 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.216' (ECDSA) to the list of known hosts. [ 102.486480][ T27] audit: type=1400 audit(1582206862.382:42): avc: denied { map } for pid=11012 comm="syz-executor296" path="/root/syz-executor296669923" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 102.511490][T11013] IPVS: ftp: loaded support on port[0] = 21 [ 102.568187][T11013] chnl_net:caif_netlink_parms(): no params data found [ 102.609921][T11013] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.617524][T11013] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.625631][T11013] device bridge_slave_0 entered promiscuous mode [ 102.634956][T11013] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.642440][T11013] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.650207][T11013] device bridge_slave_1 entered promiscuous mode [ 102.671691][T11013] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 102.684224][T11013] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 102.704706][T11013] team0: Port device team_slave_0 added [ 102.713643][T11013] team0: Port device team_slave_1 added [ 102.729589][T11013] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 102.736648][T11013] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.762630][T11013] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 102.775724][T11013] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 102.782801][T11013] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.810280][T11013] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 102.893361][T11013] device hsr_slave_0 entered promiscuous mode [ 102.931513][T11013] device hsr_slave_1 entered promiscuous mode [ 103.059055][ T27] audit: type=1400 audit(1582206862.952:43): avc: denied { create } for pid=11013 comm="syz-executor296" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 103.084062][ T27] audit: type=1400 audit(1582206862.982:44): avc: denied { write } for pid=11013 comm="syz-executor296" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 103.086654][T11013] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 103.109337][ T27] audit: type=1400 audit(1582206862.982:45): avc: denied { read } for pid=11013 comm="syz-executor296" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 103.184595][T11013] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 103.244743][T11013] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 103.304294][T11013] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 103.390188][T11013] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.397581][T11013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.405453][T11013] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.412615][T11013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.467627][T11013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 103.483726][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.494608][ T3138] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.503104][ T3138] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.513236][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 103.526935][T11013] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.539415][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.548215][ T2802] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.555316][ T2802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.567913][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.577591][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.586306][ T3138] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.593513][ T3138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.615229][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 103.624543][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 103.643365][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 103.652709][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.661080][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 103.670013][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.678733][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 103.687080][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.696451][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 103.709780][T11013] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 103.721818][T11013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 103.729629][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 103.738241][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.760689][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 103.769613][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 103.784131][T11013] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 103.806874][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 103.816315][ T2731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 103.840678][T11013] device veth0_vlan entered promiscuous mode [ 103.848489][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 103.857072][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.866972][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.875574][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.888129][T11013] device veth1_vlan entered promiscuous mode [ 103.913169][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 103.921692][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 103.929540][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 103.938036][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 103.949473][T11013] device veth0_macvtap entered promiscuous mode [ 103.960546][T11013] device veth1_macvtap entered promiscuous mode [ 103.980500][T11013] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 103.988429][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 103.996664][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 104.004636][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 104.013342][ T3137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.026593][T11013] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 104.033994][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.043817][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 104.211707][ C0] ================================================================== [ 104.219969][ C0] BUG: KASAN: use-after-free in find_match+0xb39/0xc90 [ 104.226984][ C0] Read of size 8 at addr ffff88809ed7e320 by task ksoftirqd/0/9 [ 104.234677][ C0] [ 104.236993][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.6.0-rc2-syzkaller #0 [ 104.245097][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.255253][ C0] Call Trace: [ 104.258532][ C0] dump_stack+0x197/0x210 [ 104.262853][ C0] ? find_match+0xb39/0xc90 [ 104.267355][ C0] print_address_description.constprop.0.cold+0xd4/0x30b [ 104.274491][ C0] ? find_match+0xb39/0xc90 [ 104.278996][ C0] ? find_match+0xb39/0xc90 [ 104.283488][ C0] __kasan_report.cold+0x1b/0x32 [ 104.288477][ C0] ? find_match+0xb39/0xc90 [ 104.292970][ C0] kasan_report+0x12/0x20 [ 104.297324][ C0] __asan_report_load8_noabort+0x14/0x20 [ 104.302950][ C0] find_match+0xb39/0xc90 [ 104.307268][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 104.312282][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 104.318229][ C0] __find_rr_leaf+0x14e/0x750 [ 104.322906][ C0] ? nexthop_is_blackhole+0x690/0x690 [ 104.328282][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 104.334432][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 104.339441][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 104.345245][ C0] fib6_table_lookup+0x697/0xdb0 [ 104.350272][ C0] ? rt6_age_exceptions+0x130/0x130 [ 104.355467][ C0] ? __kasan_check_read+0x11/0x20 [ 104.360579][ C0] ip6_pol_route+0x1f6/0xa70 [ 104.365303][ C0] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 104.371023][ C0] ? csum_partial_ext+0x26/0x30 [ 104.375918][ C0] ? __skb_checksum+0x546/0x830 [ 104.381030][ C0] ip6_pol_route_input+0x65/0x80 [ 104.385965][ C0] fib6_rule_lookup+0x133/0x7d0 [ 104.390804][ C0] ? __skb_checksum_complete_head+0x2f0/0x2f0 [ 104.396879][ C0] ? skb_send_sock_locked+0x7e0/0x7e0 [ 104.402283][ C0] ? ip6_pol_route+0xa70/0xa70 [ 104.407042][ C0] ? fib6_lookup+0x340/0x340 [ 104.411625][ C0] ? nf_ip6_checksum+0x107/0x340 [ 104.416556][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 104.422837][ C0] ? ipvlan_ht_addr_lookup+0x2df/0x450 [ 104.428284][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 104.434194][ C0] ip6_route_input_lookup+0xb7/0xd0 [ 104.439390][ C0] ip6_route_input+0x5f0/0xa40 [ 104.444168][ C0] ? ip6_route_check_nh+0x670/0x670 [ 104.449447][ C0] ? ipvlan_link_new.cold+0x45/0x45 [ 104.454632][ C0] ? cpuup_canceled+0x100/0x1d0 [ 104.459492][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 104.464517][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 104.470371][ C0] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 104.476085][ C0] ? ipvlan_nf_input+0x190/0x190 [ 104.481067][ C0] ip6_rcv_finish+0x17a/0x310 [ 104.485743][ C0] ipv6_rcv+0x10e/0x420 [ 104.489954][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 104.495463][ C0] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 104.501376][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 104.506873][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 104.512759][ C0] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 104.518647][ C0] ? lock_acquire+0x190/0x410 [ 104.523308][ C0] ? process_backlog+0x1b5/0x780 [ 104.528240][ C0] __netif_receive_skb+0x2c/0x1d0 [ 104.533259][ C0] process_backlog+0x226/0x780 [ 104.538015][ C0] ? net_rx_action+0x27b/0x1120 [ 104.542879][ C0] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 104.548162][ C0] net_rx_action+0x508/0x1120 [ 104.552836][ C0] ? napi_busy_loop+0x970/0x970 [ 104.557690][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 104.563383][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 104.569363][ C0] ? trace_hardirqs_on+0x67/0x240 [ 104.574426][ C0] __do_softirq+0x262/0x98c [ 104.578953][ C0] ? takeover_tasklets+0x820/0x820 [ 104.584155][ C0] run_ksoftirqd+0x8e/0x110 [ 104.588707][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 104.593646][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 104.599877][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 104.606213][ C0] ? __kthread_parkme+0x108/0x1c0 [ 104.611249][ C0] ? __kasan_check_read+0x11/0x20 [ 104.616269][ C0] kthread+0x361/0x430 [ 104.620332][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 104.626557][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 104.632273][ C0] ret_from_fork+0x24/0x30 [ 104.636689][ C0] [ 104.639008][ C0] Allocated by task 11013: [ 104.643419][ C0] save_stack+0x23/0x90 [ 104.647574][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 104.653198][ C0] kasan_kmalloc+0x9/0x10 [ 104.657520][ C0] __kmalloc_node+0x4e/0x70 [ 104.662007][ C0] kvmalloc_node+0x68/0x100 [ 104.666503][ C0] alloc_netdev_mqs+0x98/0xe40 [ 104.671293][ C0] vti6_init_net+0x244/0x810 [ 104.675862][ C0] ops_init+0xb3/0x420 [ 104.679974][ C0] setup_net+0x2d5/0x8b0 [ 104.684343][ C0] copy_net_ns+0x29e/0x5a0 [ 104.688749][ C0] create_new_namespaces+0x403/0xb50 [ 104.694030][ C0] unshare_nsproxy_namespaces+0xc2/0x200 [ 104.699658][ C0] ksys_unshare+0x444/0x980 [ 104.704152][ C0] __x64_sys_unshare+0x31/0x40 [ 104.708909][ C0] do_syscall_64+0xfa/0x790 [ 104.713399][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.719398][ C0] [ 104.721728][ C0] Freed by task 11013: [ 104.725782][ C0] save_stack+0x23/0x90 [ 104.729928][ C0] __kasan_slab_free+0x102/0x150 [ 104.734851][ C0] kasan_slab_free+0xe/0x10 [ 104.739341][ C0] kfree+0x10a/0x2c0 [ 104.743227][ C0] __netdev_name_node_alt_destroy+0x1ff/0x2a0 [ 104.749341][ C0] netdev_name_node_alt_destroy+0x57/0x80 [ 104.755050][ C0] rtnl_linkprop.isra.0+0x575/0x6f0 [ 104.760363][ C0] rtnl_dellinkprop+0x46/0x60 [ 104.765023][ C0] rtnetlink_rcv_msg+0x45e/0xaf0 [ 104.770204][ C0] netlink_rcv_skb+0x177/0x450 [ 104.774962][ C0] rtnetlink_rcv+0x1d/0x30 [ 104.779422][ C0] netlink_unicast+0x59e/0x7e0 [ 104.784222][ C0] netlink_sendmsg+0x91c/0xea0 [ 104.788966][ C0] sock_sendmsg+0xd7/0x130 [ 104.793366][ C0] ____sys_sendmsg+0x753/0x880 [ 104.798120][ C0] ___sys_sendmsg+0x100/0x170 [ 104.802780][ C0] __sys_sendmsg+0x105/0x1d0 [ 104.807365][ C0] __x64_sys_sendmsg+0x78/0xb0 [ 104.812227][ C0] do_syscall_64+0xfa/0x790 [ 104.816743][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 104.822614][ C0] [ 104.824927][ C0] The buggy address belongs to the object at ffff88809ed7e000 [ 104.824927][ C0] which belongs to the cache kmalloc-4k of size 4096 [ 104.839339][ C0] The buggy address is located 800 bytes inside of [ 104.839339][ C0] 4096-byte region [ffff88809ed7e000, ffff88809ed7f000) [ 104.852796][ C0] The buggy address belongs to the page: [ 104.858512][ C0] page:ffffea00027b5f80 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0 [ 104.869455][ C0] flags: 0xfffe0000010200(slab|head) [ 104.874739][ C0] raw: 00fffe0000010200 ffffea0002434908 ffffea00027c6d88 ffff8880aa402000 [ 104.883354][ C0] raw: 0000000000000000 ffff88809ed7e000 0000000100000001 0000000000000000 [ 104.891984][ C0] page dumped because: kasan: bad access detected [ 104.898408][ C0] [ 104.900717][ C0] Memory state around the buggy address: [ 104.906341][ C0] ffff88809ed7e200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 104.914513][ C0] ffff88809ed7e280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 104.922703][ C0] >ffff88809ed7e300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 104.930848][ C0] ^ [ 104.936458][ C0] ffff88809ed7e380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 104.944533][ C0] ffff88809ed7e400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 104.952601][ C0] ================================================================== [ 104.960647][ C0] Disabling lock debugging due to kernel taint [ 104.966846][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 104.973437][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 104.983103][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.993184][ C0] Call Trace: [ 104.996556][ C0] dump_stack+0x197/0x210 [ 105.000895][ C0] panic+0x2e3/0x75c [ 105.004770][ C0] ? add_taint.cold+0x16/0x16 [ 105.009437][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 105.014601][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 105.019622][ C0] ? find_match+0xb39/0xc90 [ 105.024116][ C0] end_report+0x47/0x4f [ 105.028258][ C0] ? find_match+0xb39/0xc90 [ 105.032744][ C0] __kasan_report.cold+0xe/0x32 [ 105.037602][ C0] ? find_match+0xb39/0xc90 [ 105.042092][ C0] kasan_report+0x12/0x20 [ 105.046490][ C0] __asan_report_load8_noabort+0x14/0x20 [ 105.052111][ C0] find_match+0xb39/0xc90 [ 105.056427][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 105.061444][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 105.067234][ C0] __find_rr_leaf+0x14e/0x750 [ 105.071973][ C0] ? nexthop_is_blackhole+0x690/0x690 [ 105.077399][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 105.083544][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 105.088609][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 105.094405][ C0] fib6_table_lookup+0x697/0xdb0 [ 105.099336][ C0] ? rt6_age_exceptions+0x130/0x130 [ 105.104525][ C0] ? __kasan_check_read+0x11/0x20 [ 105.109536][ C0] ip6_pol_route+0x1f6/0xa70 [ 105.114651][ C0] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 105.120187][ C0] ? csum_partial_ext+0x26/0x30 [ 105.125021][ C0] ? __skb_checksum+0x546/0x830 [ 105.129860][ C0] ip6_pol_route_input+0x65/0x80 [ 105.134793][ C0] fib6_rule_lookup+0x133/0x7d0 [ 105.139629][ C0] ? __skb_checksum_complete_head+0x2f0/0x2f0 [ 105.145673][ C0] ? skb_send_sock_locked+0x7e0/0x7e0 [ 105.151083][ C0] ? ip6_pol_route+0xa70/0xa70 [ 105.155838][ C0] ? fib6_lookup+0x340/0x340 [ 105.160525][ C0] ? nf_ip6_checksum+0x107/0x340 [ 105.165446][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 105.171769][ C0] ? ipvlan_ht_addr_lookup+0x2df/0x450 [ 105.177327][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 105.183234][ C0] ip6_route_input_lookup+0xb7/0xd0 [ 105.188526][ C0] ip6_route_input+0x5f0/0xa40 [ 105.193280][ C0] ? ip6_route_check_nh+0x670/0x670 [ 105.198457][ C0] ? ipvlan_link_new.cold+0x45/0x45 [ 105.203641][ C0] ? cpuup_canceled+0x100/0x1d0 [ 105.208489][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 105.213493][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 105.219349][ C0] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 105.225058][ C0] ? ipvlan_nf_input+0x190/0x190 [ 105.230005][ C0] ip6_rcv_finish+0x17a/0x310 [ 105.234673][ C0] ipv6_rcv+0x10e/0x420 [ 105.238820][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 105.244330][ C0] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 105.250225][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 105.255772][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 105.261654][ C0] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 105.267595][ C0] ? lock_acquire+0x190/0x410 [ 105.272256][ C0] ? process_backlog+0x1b5/0x780 [ 105.277179][ C0] __netif_receive_skb+0x2c/0x1d0 [ 105.282247][ C0] process_backlog+0x226/0x780 [ 105.286994][ C0] ? net_rx_action+0x27b/0x1120 [ 105.291894][ C0] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 105.297167][ C0] net_rx_action+0x508/0x1120 [ 105.301855][ C0] ? napi_busy_loop+0x970/0x970 [ 105.306754][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 105.312292][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 105.318261][ C0] ? trace_hardirqs_on+0x67/0x240 [ 105.323267][ C0] __do_softirq+0x262/0x98c [ 105.327877][ C0] ? takeover_tasklets+0x820/0x820 [ 105.333148][ C0] run_ksoftirqd+0x8e/0x110 [ 105.337758][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 105.342686][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 105.349064][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 105.355432][ C0] ? __kthread_parkme+0x108/0x1c0 [ 105.360594][ C0] ? __kasan_check_read+0x11/0x20 [ 105.365604][ C0] kthread+0x361/0x430 [ 105.369681][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 105.375906][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 105.381612][ C0] ret_from_fork+0x24/0x30 [ 105.387719][ C0] Kernel Offset: disabled [ 105.392045][ C0] Rebooting in 86400 seconds..