[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 82.723390][ T30] audit: type=1800 audit(1572212332.777:25): pid=11845 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 82.746089][ T30] audit: type=1800 audit(1572212332.797:26): pid=11845 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 82.782055][ T30] audit: type=1800 audit(1572212332.817:27): pid=11845 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.199' (ECDSA) to the list of known hosts. 2019/10/27 21:39:07 fuzzer started 2019/10/27 21:39:12 dialing manager at 10.128.0.26:34985 2019/10/27 21:39:12 syscalls: 2424 2019/10/27 21:39:12 code coverage: enabled 2019/10/27 21:39:12 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/10/27 21:39:12 extra coverage: enabled 2019/10/27 21:39:12 setuid sandbox: enabled 2019/10/27 21:39:12 namespace sandbox: enabled 2019/10/27 21:39:12 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/27 21:39:12 fault injection: enabled 2019/10/27 21:39:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/27 21:39:12 net packet injection: enabled 2019/10/27 21:39:12 net device setup: enabled 2019/10/27 21:39:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 21:43:34 executing program 0: syzkaller login: [ 365.012993][T12010] IPVS: ftp: loaded support on port[0] = 21 [ 365.161671][T12010] chnl_net:caif_netlink_parms(): no params data found [ 365.217387][T12010] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.224708][T12010] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.233665][T12010] device bridge_slave_0 entered promiscuous mode [ 365.244014][T12010] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.251195][T12010] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.260056][T12010] device bridge_slave_1 entered promiscuous mode [ 365.293039][T12010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 365.306316][T12010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 365.340538][T12010] team0: Port device team_slave_0 added [ 365.349830][T12010] team0: Port device team_slave_1 added [ 365.507358][T12010] device hsr_slave_0 entered promiscuous mode [ 365.763257][T12010] device hsr_slave_1 entered promiscuous mode [ 366.114727][T12010] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.122056][T12010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.129825][T12010] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.137099][T12010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.192163][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.214528][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.418938][T12010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 366.467755][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 366.476468][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 366.497076][T12010] 8021q: adding VLAN 0 to HW filter on device team0 [ 366.554851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 366.565342][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 366.574486][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.581675][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.675682][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 366.685271][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 366.694383][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.701549][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.711095][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 366.721244][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 366.731160][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 366.741178][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 366.750773][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 366.760900][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 366.770449][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 366.779706][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 366.797649][T12010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 366.810404][T12010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 366.928800][T12010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 367.029024][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 367.038654][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 367.047973][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 21:43:37 executing program 0: 21:43:37 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 21:43:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5c9, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) write(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) ptrace$setsig(0x4203, 0x0, 0xf69, &(0x7f0000000340)={0x1e, 0x2, 0x6}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000640)='/dev/urandom\x00', 0xc800, 0x0) fgetxattr(r5, &(0x7f0000000680)=ANY=[@ANYBLOB="747275737465642e62429f9047cafeb84d6576637067062ff73a6d696d"], &(0x7f00000006c0)=""/4096, 0x1000) ioctl$VHOST_GET_FEATURES(r4, 0x80304d65, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f00000002c0)={0x60, 0xfffffffffffffffe, 0x2, {{0x390000000, 0x4, 0x100000001, 0x7, 0x2b82, 0x0, 0x1, 0x2}}}, 0x60) sendfile(r1, r2, 0x0, 0x102000002) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) [ 367.536591][ C0] hrtimer: interrupt took 32214 ns 21:43:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5c9, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) write(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) ptrace$setsig(0x4203, 0x0, 0xf69, &(0x7f0000000340)={0x1e, 0x2, 0x6}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000640)='/dev/urandom\x00', 0xc800, 0x0) fgetxattr(r5, &(0x7f0000000680)=ANY=[@ANYBLOB="747275737465642e62429f9047cafeb84d6576637067062ff73a6d696d"], &(0x7f00000006c0)=""/4096, 0x1000) ioctl$VHOST_GET_FEATURES(r4, 0x80304d65, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f00000002c0)={0x60, 0xfffffffffffffffe, 0x2, {{0x390000000, 0x4, 0x100000001, 0x7, 0x2b82, 0x0, 0x1, 0x2}}}, 0x60) sendfile(r1, r2, 0x0, 0x102000002) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) 21:43:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 369.384481][T12072] ===================================================== [ 369.391498][T12072] BUG: KMSAN: use-after-free in kmem_cache_alloc_node+0x5d0/0xe70 [ 369.399319][T12072] CPU: 1 PID: 12072 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 369.407197][T12072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.417245][T12072] Call Trace: [ 369.420544][T12072] dump_stack+0x191/0x1f0 [ 369.424904][T12072] kmsan_report+0x128/0x220 [ 369.429434][T12072] __msan_warning+0x73/0xe0 [ 369.433956][T12072] kmem_cache_alloc_node+0x5d0/0xe70 [ 369.439259][T12072] ? __alloc_skb+0x215/0xa10 [ 369.443881][T12072] __alloc_skb+0x215/0xa10 [ 369.448321][T12072] __ip6_append_data+0x469e/0x6020 [ 369.453502][T12072] ip6_append_data+0x3c2/0x650 [ 369.458412][T12072] ? do_rawv6_getsockopt+0x4a0/0x4a0 [ 369.463717][T12072] ? do_rawv6_getsockopt+0x4a0/0x4a0 [ 369.469041][T12072] rawv6_sendmsg+0x3145/0x5a20 [ 369.473816][T12072] ? aa_label_sk_perm+0x6d6/0x940 [ 369.478922][T12072] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 369.484838][T12072] ? udp_cmsg_send+0x5d0/0x5d0 [ 369.489619][T12072] ? compat_rawv6_ioctl+0x100/0x100 [ 369.494829][T12072] inet_sendmsg+0x2d8/0x2e0 [ 369.499356][T12072] ? inet_send_prepare+0x600/0x600 [ 369.504470][T12072] ___sys_sendmsg+0x12c4/0x1590 [ 369.509358][T12072] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 369.515256][T12072] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 369.521325][T12072] ? balance_callback+0x48/0x260 [ 369.526263][T12072] ? kmsan_get_metadata+0x39/0x350 21:43:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0"], 0x1) [ 369.531376][T12072] ? kmsan_internal_check_memory+0x99/0x4a0 [ 369.537275][T12072] ? __msan_get_context_state+0x9/0x20 [ 369.542729][T12072] ? rcu_all_qs+0x23/0x240 [ 369.547159][T12072] __sys_sendmmsg+0x53a/0xae0 [ 369.551870][T12072] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 369.557781][T12072] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 369.563865][T12072] ? prepare_exit_to_usermode+0x19a/0x4d0 [ 369.569586][T12072] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 369.575519][T12072] __se_sys_sendmmsg+0xbd/0xe0 [ 369.580296][T12072] __x64_sys_sendmmsg+0x56/0x70 [ 369.585155][T12072] do_syscall_64+0xb6/0x160 [ 369.589665][T12072] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 369.595558][T12072] RIP: 0033:0x459f39 [ 369.599637][T12072] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.619251][T12072] RSP: 002b:00007ff161043c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 369.627663][T12072] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459f39 [ 369.635734][T12072] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000003 [ 369.643698][T12072] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 369.651656][T12072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1610446d4 [ 369.659624][T12072] R13: 00000000004c7b70 R14: 00000000004ddaa8 R15: 00000000ffffffff [ 369.667592][T12072] [ 369.669902][T12072] Uninit was stored to memory at: [ 369.674933][T12072] kmsan_internal_chain_origin+0xbd/0x180 [ 369.680640][T12072] __msan_chain_origin+0x6b/0xd0 [ 369.685562][T12072] ___slab_alloc+0x1dbc/0x1fb0 [ 369.690306][T12072] kmem_cache_alloc+0xade/0xd10 [ 369.695143][T12072] skb_clone+0x326/0x5d0 [ 369.699376][T12072] raw6_local_deliver+0xaf2/0x1040 [ 369.704471][T12072] ip6_protocol_deliver_rcu+0x607/0x22a0 [ 369.710088][T12072] ip6_input+0x2af/0x340 [ 369.714314][T12072] ipv6_rcv+0x683/0x710 [ 369.718472][T12072] process_backlog+0x721/0x1410 [ 369.723309][T12072] net_rx_action+0x7a6/0x1aa0 [ 369.727972][T12072] __do_softirq+0x4a1/0x83a [ 369.732456][T12072] do_softirq_own_stack+0x49/0x80 [ 369.737473][T12072] __local_bh_enable_ip+0x184/0x1d0 [ 369.742654][T12072] local_bh_enable+0x36/0x40 [ 369.747225][T12072] ip6_finish_output2+0x213f/0x2670 [ 369.752410][T12072] __ip6_finish_output+0x83d/0x8f0 [ 369.757504][T12072] ip6_finish_output+0x2db/0x420 [ 369.762423][T12072] ip6_output+0x5d3/0x720 [ 369.766749][T12072] ip6_local_out+0x164/0x1d0 [ 369.771321][T12072] ip6_push_pending_frames+0x215/0x4f0 [ 369.776769][T12072] rawv6_sendmsg+0x4125/0x5a20 [ 369.781516][T12072] inet_sendmsg+0x2d8/0x2e0 [ 369.786002][T12072] ___sys_sendmsg+0x12c4/0x1590 [ 369.790836][T12072] __sys_sendmmsg+0x53a/0xae0 [ 369.795500][T12072] __se_sys_sendmmsg+0xbd/0xe0 [ 369.800247][T12072] __x64_sys_sendmmsg+0x56/0x70 [ 369.805084][T12072] do_syscall_64+0xb6/0x160 [ 369.809568][T12072] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 369.815437][T12072] [ 369.817750][T12072] Uninit was created at: [ 369.821979][T12072] kmsan_internal_poison_shadow+0x60/0x120 [ 369.827767][T12072] kmsan_slab_free+0x8d/0xf0 [ 369.832340][T12072] kmem_cache_free_bulk+0x3ad9/0x3f10 [ 369.837783][T12072] __kfree_skb_flush+0xb0/0x100 [ 369.842622][T12072] net_rx_action+0x1a5e/0x1aa0 [ 369.847369][T12072] __do_softirq+0x4a1/0x83a [ 369.851860][T12072] irq_exit+0x230/0x280 [ 369.856006][T12072] do_IRQ+0x123/0x360 [ 369.859983][T12072] ret_from_intr+0x0/0x33 [ 369.864383][T12072] default_idle+0x53/0x90 [ 369.868695][T12072] arch_cpu_idle+0x25/0x30 [ 369.873093][T12072] do_idle+0x1d5/0x780 [ 369.877145][T12072] cpu_startup_entry+0x45/0x50 [ 369.881901][T12072] start_secondary+0x389/0x480 [ 369.886646][T12072] secondary_startup_64+0xa4/0xb0 [ 369.891736][T12072] ===================================================== [ 369.898742][T12072] Disabling lock debugging due to kernel taint [ 369.904875][T12072] Kernel panic - not syncing: panic_on_warn set ... [ 369.911454][T12072] CPU: 1 PID: 12072 Comm: syz-executor.0 Tainted: G B 5.4.0-rc3+ #0 [ 369.920710][T12072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.930755][T12072] Call Trace: [ 369.934041][T12072] dump_stack+0x191/0x1f0 [ 369.938786][T12072] panic+0x3c9/0xc1e [ 369.942703][T12072] kmsan_report+0x215/0x220 [ 369.947208][T12072] __msan_warning+0x73/0xe0 [ 369.951701][T12072] kmem_cache_alloc_node+0x5d0/0xe70 [ 369.956979][T12072] ? __alloc_skb+0x215/0xa10 [ 369.961568][T12072] __alloc_skb+0x215/0xa10 [ 369.965985][T12072] __ip6_append_data+0x469e/0x6020 [ 369.971133][T12072] ip6_append_data+0x3c2/0x650 [ 369.975888][T12072] ? do_rawv6_getsockopt+0x4a0/0x4a0 [ 369.981160][T12072] ? do_rawv6_getsockopt+0x4a0/0x4a0 [ 369.986448][T12072] rawv6_sendmsg+0x3145/0x5a20 [ 369.991200][T12072] ? aa_label_sk_perm+0x6d6/0x940 [ 369.996249][T12072] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 370.002138][T12072] ? udp_cmsg_send+0x5d0/0x5d0 [ 370.006907][T12072] ? compat_rawv6_ioctl+0x100/0x100 [ 370.012089][T12072] inet_sendmsg+0x2d8/0x2e0 [ 370.016583][T12072] ? inet_send_prepare+0x600/0x600 [ 370.021680][T12072] ___sys_sendmsg+0x12c4/0x1590 [ 370.026533][T12072] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 370.032417][T12072] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 370.038486][T12072] ? balance_callback+0x48/0x260 [ 370.043409][T12072] ? kmsan_get_metadata+0x39/0x350 [ 370.048510][T12072] ? kmsan_internal_check_memory+0x99/0x4a0 [ 370.054403][T12072] ? __msan_get_context_state+0x9/0x20 [ 370.059850][T12072] ? rcu_all_qs+0x23/0x240 [ 370.064267][T12072] __sys_sendmmsg+0x53a/0xae0 [ 370.069039][T12072] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 370.074923][T12072] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 370.080986][T12072] ? prepare_exit_to_usermode+0x19a/0x4d0 [ 370.086691][T12072] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 370.092572][T12072] __se_sys_sendmmsg+0xbd/0xe0 [ 370.097326][T12072] __x64_sys_sendmmsg+0x56/0x70 [ 370.102178][T12072] do_syscall_64+0xb6/0x160 [ 370.106668][T12072] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 370.112546][T12072] RIP: 0033:0x459f39 [ 370.116428][T12072] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.136017][T12072] RSP: 002b:00007ff161043c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 370.144414][T12072] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459f39 [ 370.152376][T12072] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000003 [ 370.160341][T12072] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 370.168299][T12072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1610446d4 [ 370.176254][T12072] R13: 00000000004c7b70 R14: 00000000004ddaa8 R15: 00000000ffffffff [ 370.185445][T12072] Kernel Offset: disabled [ 370.189768][T12072] Rebooting in 86400 seconds..