[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 124.293446][ T33] kauditd_printk_skb: 4 callbacks suppressed [ 124.293494][ T33] audit: type=1800 audit(1582750782.345:39): pid=11751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 124.338851][ T33] audit: type=1800 audit(1582750782.375:40): pid=11751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 125.221636][ T33] audit: type=1400 audit(1582750783.265:41): avc: denied { map } for pid=11926 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.219' (ECDSA) to the list of known hosts. syzkaller login: [ 133.571807][ T33] audit: type=1400 audit(1582750791.615:42): avc: denied { map } for pid=11938 comm="syz-executor024" path="/root/syz-executor024544585" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 133.620900][T11939] IPVS: ftp: loaded support on port[0] = 21 [ 133.713734][T11939] chnl_net:caif_netlink_parms(): no params data found [ 133.795542][T11939] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.802850][T11939] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.811147][T11939] device bridge_slave_0 entered promiscuous mode [ 133.822792][T11939] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.829974][T11939] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.838871][T11939] device bridge_slave_1 entered promiscuous mode [ 133.868324][T11939] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.883052][T11939] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 133.913014][T11939] team0: Port device team_slave_0 added [ 133.923983][T11939] team0: Port device team_slave_1 added [ 133.949727][T11939] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 133.957082][T11939] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 133.983339][T11939] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 133.997388][T11939] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 134.004572][T11939] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 134.030794][T11939] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 134.106306][T11939] device hsr_slave_0 entered promiscuous mode [ 134.152754][T11939] device hsr_slave_1 entered promiscuous mode [ 134.318722][ T33] audit: type=1400 audit(1582750792.365:43): avc: denied { create } for pid=11939 comm="syz-executor024" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 134.345304][ T33] audit: type=1400 audit(1582750792.395:44): avc: denied { write } for pid=11939 comm="syz-executor024" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 134.348981][T11939] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 134.370441][ T33] audit: type=1400 audit(1582750792.395:45): avc: denied { read } for pid=11939 comm="syz-executor024" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 134.437568][T11939] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 134.497916][T11939] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 134.557672][T11939] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 134.651145][T11939] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.658432][T11939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.666397][T11939] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.673693][T11939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.734265][ T32] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.744237][ T32] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.794904][T11939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.817690][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.826179][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.842062][T11939] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.858994][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.868827][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.878245][ T32] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.885522][ T32] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.901588][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.911200][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.920487][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.927705][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.953796][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.964520][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.982683][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.992018][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 135.024417][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.034095][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.044078][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.054226][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.063835][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.073045][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.081874][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.098171][T11939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.135847][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 135.143655][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 135.166745][T11939] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 135.205304][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.215035][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.249851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 135.258763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.270860][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.279625][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.295144][T11939] device veth0_vlan entered promiscuous mode [ 135.317300][T11939] device veth1_vlan entered promiscuous mode [ 135.364909][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 135.373838][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 135.382735][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.391995][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.409855][T11939] device veth0_macvtap entered promiscuous mode [ 135.426152][T11939] device veth1_macvtap entered promiscuous mode [ 135.460955][T11939] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 135.469080][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 135.478158][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.486716][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.496423][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.515911][T11939] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 135.523934][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.533709][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 135.773376][ C1] ===================================================== [ 135.780351][ C1] BUG: KMSAN: use-after-free in find_match+0x317/0x1480 [ 135.787279][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.6.0-rc2-syzkaller #0 [ 135.795418][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.805472][ C1] Call Trace: [ 135.808761][ C1] dump_stack+0x1c9/0x220 [ 135.813113][ C1] kmsan_report+0xf7/0x1e0 [ 135.817561][ C1] __msan_warning+0x58/0xa0 [ 135.822061][ C1] find_match+0x317/0x1480 [ 135.826492][ C1] ? veth_xmit+0x6e1/0xb70 [ 135.830913][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 135.836244][ C1] __find_rr_leaf+0x3f9/0x1160 [ 135.841020][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 135.846141][ C1] fib6_table_lookup+0x586/0x1420 [ 135.851202][ C1] ip6_pol_route+0x203/0x2960 [ 135.855884][ C1] ? br_nf_dev_queue_xmit+0x693/0x1910 [ 135.861474][ C1] ip6_pol_route_input+0x123/0x140 [ 135.866599][ C1] fib6_rule_lookup+0x38f/0xa10 [ 135.871460][ C1] ? ip6_route_input_lookup+0x1f0/0x1f0 [ 135.877017][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 135.882222][ C1] ip6_route_input+0xb9d/0xcf0 [ 135.887011][ C1] ip6_rcv_finish_core+0x1f9/0x470 [ 135.892114][ C1] ip6_rcv_finish+0x2e8/0x3b0 [ 135.896803][ C1] ip_sabotage_in+0x2f6/0x350 [ 135.901479][ C1] ? local_bh_enable+0x40/0x40 [ 135.906242][ C1] ? br_nf_post_routing+0x17e0/0x17e0 [ 135.911605][ C1] nf_hook_slow+0x16e/0x400 [ 135.916228][ C1] ipv6_rcv+0x273/0x710 [ 135.920403][ C1] ? local_bh_enable+0x40/0x40 [ 135.925164][ C1] netif_receive_skb+0x66b/0xf20 [ 135.930116][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 135.936190][ C1] ? nf_hook_slow+0x385/0x400 [ 135.940877][ C1] br_pass_frame_up+0x964/0x9c0 [ 135.945806][ C1] ? br_handle_local_finish+0x3f0/0x3f0 [ 135.951353][ C1] br_handle_frame_finish+0x1a37/0x1bb0 [ 135.956914][ C1] ? brport_get_ownership+0xf0/0xf0 [ 135.962109][ C1] ? brport_get_ownership+0xf0/0xf0 [ 135.967299][ C1] br_nf_hook_thresh+0x4f7/0x680 [ 135.972257][ C1] ? brport_get_ownership+0xf0/0xf0 [ 135.977456][ C1] br_nf_pre_routing_finish_ipv6+0xe72/0x1000 [ 135.983519][ C1] ? brport_get_ownership+0xf0/0xf0 [ 135.988727][ C1] br_nf_pre_routing_ipv6+0x6ad/0x7f0 [ 135.994112][ C1] ? br_nf_pre_routing_ipv6+0x7f0/0x7f0 [ 135.999656][ C1] br_nf_pre_routing+0xd0e/0x1fd0 [ 136.004698][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 136.009902][ C1] ? brnf_device_event+0x3c0/0x3c0 [ 136.015011][ C1] br_handle_frame+0xcd2/0x2050 [ 136.019879][ C1] ? brport_get_ownership+0xf0/0xf0 [ 136.025066][ C1] ? br_pass_frame_up+0x9c0/0x9c0 [ 136.030099][ C1] __netif_receive_skb_core+0x21de/0x5840 [ 136.035822][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 136.041023][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 136.046850][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 136.052139][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 136.057263][ C1] process_backlog+0x936/0x1410 [ 136.062109][ C1] ? __list_add_valid+0xb8/0x420 [ 136.067055][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 136.072172][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 136.077373][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 136.082659][ C1] net_rx_action+0x786/0x1aa0 [ 136.087359][ C1] ? net_tx_action+0xc30/0xc30 [ 136.092119][ C1] __do_softirq+0x311/0x83d [ 136.096647][ C1] ? ksoftirqd_should_run+0x30/0x30 [ 136.101843][ C1] ? takeover_tasklets+0x8f0/0x8f0 [ 136.106947][ C1] run_ksoftirqd+0x25/0x40 [ 136.111362][ C1] smpboot_thread_fn+0x493/0x980 [ 136.116314][ C1] kthread+0x4b5/0x4f0 [ 136.120373][ C1] ? cpu_report_death+0x180/0x180 [ 136.125404][ C1] ? kthread_blkcg+0xf0/0xf0 [ 136.129995][ C1] ret_from_fork+0x35/0x40 [ 136.134412][ C1] [ 136.136725][ C1] Uninit was created at: [ 136.140963][ C1] kmsan_internal_poison_shadow+0x66/0xd0 [ 136.146795][ C1] kmsan_slab_free+0x6e/0xb0 [ 136.151383][ C1] kfree+0x565/0x30a0 [ 136.155365][ C1] netdev_name_node_alt_destroy+0x587/0x690 [ 136.161246][ C1] rtnl_linkprop+0x939/0xc00 [ 136.165828][ C1] rtnl_dellinkprop+0x9d/0xb0 [ 136.170497][ C1] rtnetlink_rcv_msg+0x1153/0x1570 [ 136.175598][ C1] netlink_rcv_skb+0x451/0x650 [ 136.180365][ C1] rtnetlink_rcv+0x50/0x60 [ 136.184777][ C1] netlink_unicast+0xf9e/0x1100 [ 136.189617][ C1] netlink_sendmsg+0x1246/0x14d0 [ 136.194536][ C1] ____sys_sendmsg+0x12b6/0x1350 [ 136.199459][ C1] __sys_sendmsg+0x451/0x5f0 [ 136.204041][ C1] __ia32_compat_sys_sendmsg+0xed/0x130 [ 136.209581][ C1] do_fast_syscall_32+0x3c7/0x6e0 [ 136.214592][ C1] entry_SYSENTER_compat+0x68/0x77 [ 136.219690][ C1] ===================================================== [ 136.226620][ C1] Disabling lock debugging due to kernel taint [ 136.232762][ C0] ===================================================== [ 136.232766][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 136.232789][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 136.239722][ C0] BUG: KMSAN: use-after-free in find_match+0x317/0x1480 [ 136.246277][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.272757][ C1] Call Trace: [ 136.276053][ C1] dump_stack+0x1c9/0x220 [ 136.280378][ C1] panic+0x3d5/0xc3e [ 136.284308][ C1] kmsan_report+0x1df/0x1e0 [ 136.288818][ C1] __msan_warning+0x58/0xa0 [ 136.293318][ C1] find_match+0x317/0x1480 [ 136.297749][ C1] ? veth_xmit+0x6e1/0xb70 [ 136.302189][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 136.307497][ C1] __find_rr_leaf+0x3f9/0x1160 [ 136.312274][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 136.317376][ C1] fib6_table_lookup+0x586/0x1420 [ 136.322437][ C1] ip6_pol_route+0x203/0x2960 [ 136.327113][ C1] ? br_nf_dev_queue_xmit+0x693/0x1910 [ 136.332599][ C1] ip6_pol_route_input+0x123/0x140 [ 136.337712][ C1] fib6_rule_lookup+0x38f/0xa10 [ 136.342568][ C1] ? ip6_route_input_lookup+0x1f0/0x1f0 [ 136.348127][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 136.353336][ C1] ip6_route_input+0xb9d/0xcf0 [ 136.358131][ C1] ip6_rcv_finish_core+0x1f9/0x470 [ 136.363240][ C1] ip6_rcv_finish+0x2e8/0x3b0 [ 136.367926][ C1] ip_sabotage_in+0x2f6/0x350 [ 136.372602][ C1] ? local_bh_enable+0x40/0x40 [ 136.377365][ C1] ? br_nf_post_routing+0x17e0/0x17e0 [ 136.382731][ C1] nf_hook_slow+0x16e/0x400 [ 136.387241][ C1] ipv6_rcv+0x273/0x710 [ 136.391396][ C1] ? local_bh_enable+0x40/0x40 [ 136.396156][ C1] netif_receive_skb+0x66b/0xf20 [ 136.401088][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 136.407146][ C1] ? nf_hook_slow+0x385/0x400 [ 136.411826][ C1] br_pass_frame_up+0x964/0x9c0 [ 136.416679][ C1] ? br_handle_local_finish+0x3f0/0x3f0 [ 136.422239][ C1] br_handle_frame_finish+0x1a37/0x1bb0 [ 136.427794][ C1] ? brport_get_ownership+0xf0/0xf0 [ 136.432988][ C1] ? brport_get_ownership+0xf0/0xf0 [ 136.438182][ C1] br_nf_hook_thresh+0x4f7/0x680 [ 136.443143][ C1] ? brport_get_ownership+0xf0/0xf0 [ 136.448338][ C1] br_nf_pre_routing_finish_ipv6+0xe72/0x1000 [ 136.454403][ C1] ? brport_get_ownership+0xf0/0xf0 [ 136.459609][ C1] br_nf_pre_routing_ipv6+0x6ad/0x7f0 [ 136.464982][ C1] ? br_nf_pre_routing_ipv6+0x7f0/0x7f0 [ 136.470531][ C1] br_nf_pre_routing+0xd0e/0x1fd0 [ 136.475570][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 136.480760][ C1] ? brnf_device_event+0x3c0/0x3c0 [ 136.485951][ C1] br_handle_frame+0xcd2/0x2050 [ 136.490825][ C1] ? brport_get_ownership+0xf0/0xf0 [ 136.496021][ C1] ? br_pass_frame_up+0x9c0/0x9c0 [ 136.501038][ C1] __netif_receive_skb_core+0x21de/0x5840 [ 136.506749][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 136.511955][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 136.517780][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 136.523058][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 136.528178][ C1] process_backlog+0x936/0x1410 [ 136.533027][ C1] ? __list_add_valid+0xb8/0x420 [ 136.537970][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 136.543090][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 136.548295][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 136.553578][ C1] net_rx_action+0x786/0x1aa0 [ 136.558274][ C1] ? net_tx_action+0xc30/0xc30 [ 136.563039][ C1] __do_softirq+0x311/0x83d [ 136.567554][ C1] ? ksoftirqd_should_run+0x30/0x30 [ 136.572756][ C1] ? takeover_tasklets+0x8f0/0x8f0 [ 136.577860][ C1] run_ksoftirqd+0x25/0x40 [ 136.582280][ C1] smpboot_thread_fn+0x493/0x980 [ 136.587225][ C1] kthread+0x4b5/0x4f0 [ 136.591359][ C1] ? cpu_report_death+0x180/0x180 [ 136.596389][ C1] ? kthread_blkcg+0xf0/0xf0 [ 136.600997][ C1] ret_from_fork+0x35/0x40 [ 136.605422][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 136.614870][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.624912][ C0] Call Trace: [ 136.628196][ C0] dump_stack+0x1c9/0x220 [ 136.632526][ C0] kmsan_report+0xf7/0x1e0 [ 136.636940][ C0] __msan_warning+0x58/0xa0 [ 136.641439][ C0] find_match+0x317/0x1480 [ 136.645858][ C0] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 136.652028][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 136.657261][ C0] __find_rr_leaf+0x3f9/0x1160 [ 136.662052][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 136.667174][ C0] fib6_table_lookup+0x586/0x1420 [ 136.672226][ C0] ip6_pol_route+0x203/0x2960 [ 136.676898][ C0] ? nf_ip6_checksum+0x501/0x610 [ 136.681828][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 136.687033][ C0] ip6_pol_route_input+0x123/0x140 [ 136.692145][ C0] fib6_rule_lookup+0x38f/0xa10 [ 136.696982][ C0] ? ip6_route_input_lookup+0x1f0/0x1f0 [ 136.702522][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 136.707729][ C0] ip6_route_input+0xb9d/0xcf0 [ 136.712494][ C0] ? ipvlan_l3_rcv+0x660/0xb70 [ 136.717255][ C0] ip6_rcv_finish_core+0x1f9/0x470 [ 136.722353][ C0] ? ipvlan_ns_exit+0x160/0x160 [ 136.727191][ C0] ipv6_rcv+0x628/0x710 [ 136.731342][ C0] ? local_bh_enable+0x40/0x40 [ 136.736123][ C0] process_backlog+0xa41/0x1410 [ 136.740964][ C0] ? __list_add_valid+0xb8/0x420 [ 136.745891][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 136.750996][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 136.756183][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 136.761453][ C0] net_rx_action+0x786/0x1aa0 [ 136.766135][ C0] ? net_tx_action+0xc30/0xc30 [ 136.770888][ C0] __do_softirq+0x311/0x83d [ 136.775389][ C0] ? ksoftirqd_should_run+0x30/0x30 [ 136.780579][ C0] ? takeover_tasklets+0x8f0/0x8f0 [ 136.785698][ C0] run_ksoftirqd+0x25/0x40 [ 136.790115][ C0] smpboot_thread_fn+0x493/0x980 [ 136.795077][ C0] kthread+0x4b5/0x4f0 [ 136.799139][ C0] ? cpu_report_death+0x180/0x180 [ 136.804170][ C0] ? kthread_blkcg+0xf0/0xf0 [ 136.808761][ C0] ret_from_fork+0x35/0x40 [ 136.813175][ C0] [ 136.815490][ C0] Uninit was created at: [ 136.819723][ C0] kmsan_internal_poison_shadow+0x66/0xd0 [ 136.825429][ C0] kmsan_slab_free+0x6e/0xb0 [ 136.830005][ C0] kfree+0x565/0x30a0 [ 136.833978][ C0] netdev_name_node_alt_destroy+0x587/0x690 [ 136.839867][ C0] rtnl_linkprop+0x939/0xc00 [ 136.844444][ C0] rtnl_dellinkprop+0x9d/0xb0 [ 136.849107][ C0] rtnetlink_rcv_msg+0x1153/0x1570 [ 136.854203][ C0] netlink_rcv_skb+0x451/0x650 [ 136.858949][ C0] rtnetlink_rcv+0x50/0x60 [ 136.863364][ C0] netlink_unicast+0xf9e/0x1100 [ 136.868205][ C0] netlink_sendmsg+0x1246/0x14d0 [ 136.873127][ C0] ____sys_sendmsg+0x12b6/0x1350 [ 136.878052][ C0] __sys_sendmsg+0x451/0x5f0 [ 136.882634][ C0] __ia32_compat_sys_sendmsg+0xed/0x130 [ 136.888169][ C0] do_fast_syscall_32+0x3c7/0x6e0 [ 136.893183][ C0] entry_SYSENTER_compat+0x68/0x77 [ 136.898276][ C0] ===================================================== [ 137.818002][ C1] Shutting down cpus with NMI [ 137.836085][ C1] Kernel Offset: 0x19c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 137.847714][ C1] Rebooting in 86400 seconds..