[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 82.266163][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 82.266175][ T27] audit: type=1800 audit(1582027179.133:29): pid=10321 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 82.293480][ T27] audit: type=1800 audit(1582027179.133:30): pid=10321 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. syzkaller login: [ 91.874664][T10475] IPVS: ftp: loaded support on port[0] = 21 [ 91.927960][T10475] chnl_net:caif_netlink_parms(): no params data found [ 91.980869][T10475] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.988159][T10475] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.997234][T10475] device bridge_slave_0 entered promiscuous mode [ 92.006264][T10475] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.013627][T10475] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.021810][T10475] device bridge_slave_1 entered promiscuous mode [ 92.040657][T10475] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.052072][T10475] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 92.073256][T10475] team0: Port device team_slave_0 added [ 92.080749][T10475] team0: Port device team_slave_1 added [ 92.096919][T10475] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 92.104141][T10475] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.130545][T10475] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 92.143197][T10475] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 92.150376][T10475] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.176495][T10475] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 92.237994][T10475] device hsr_slave_0 entered promiscuous mode [ 92.275887][T10475] device hsr_slave_1 entered promiscuous mode [ 92.382080][T10475] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 92.439225][T10475] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 92.508521][T10475] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 92.588832][T10475] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 92.672439][T10475] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.679853][T10475] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.688147][T10475] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.695245][T10475] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.743273][T10475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.758724][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.770438][ T2699] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.778599][ T2699] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.787188][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 92.801410][T10475] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.813250][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.822623][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.829760][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.843837][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.853326][ T2699] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.860624][ T2699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.886057][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.894890][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.908921][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.917085][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.928585][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.937577][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.949720][T10475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.971563][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 92.979177][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 92.992772][T10475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.013048][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 93.023688][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.044750][T10475] device veth0_vlan entered promiscuous mode [ 93.057491][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 93.066387][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.076957][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.084899][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.098082][T10475] device veth1_vlan entered promiscuous mode [ 93.121617][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 93.131126][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 93.139743][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.149011][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.160546][T10475] device veth0_macvtap entered promiscuous mode [ 93.171345][T10475] device veth1_macvtap entered promiscuous mode [ 93.190315][T10475] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 93.199697][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 93.208726][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 93.217417][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 93.226390][ T2699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 93.239618][T10475] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 93.249079][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 93.258331][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 93.415720][ C1] ================================================================== [ 93.424430][ C1] BUG: KASAN: use-after-free in find_match+0xb39/0xc90 [ 93.431362][ C1] Read of size 8 at addr ffff8880993d2320 by task ksoftirqd/1/16 [ 93.439128][ C1] [ 93.441454][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.6.0-rc2-syzkaller #0 [ 93.449720][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.459883][ C1] Call Trace: [ 93.463216][ C1] dump_stack+0x197/0x210 [ 93.468126][ C1] ? find_match+0xb39/0xc90 [ 93.472643][ C1] print_address_description.constprop.0.cold+0xd4/0x30b [ 93.479803][ C1] ? find_match+0xb39/0xc90 [ 93.484397][ C1] ? find_match+0xb39/0xc90 [ 93.488913][ C1] __kasan_report.cold+0x1b/0x32 [ 93.493859][ C1] ? find_match+0xb39/0xc90 [ 93.498432][ C1] kasan_report+0x12/0x20 [ 93.502757][ C1] __asan_report_load8_noabort+0x14/0x20 [ 93.508415][ C1] find_match+0xb39/0xc90 [ 93.512856][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 93.517969][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 93.523793][ C1] __find_rr_leaf+0x14e/0x750 [ 93.528484][ C1] ? nexthop_is_blackhole+0x690/0x690 [ 93.533989][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 93.540281][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 93.545333][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 93.551158][ C1] fib6_table_lookup+0x697/0xdb0 [ 93.556281][ C1] ? rt6_age_exceptions+0x130/0x130 [ 93.561503][ C1] ? __kasan_check_read+0x11/0x20 [ 93.566535][ C1] ip6_pol_route+0x1f6/0xa70 [ 93.571132][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 93.576683][ C1] ? csum_partial_ext+0x26/0x30 [ 93.581551][ C1] ? __skb_checksum+0x546/0x830 [ 93.586770][ C1] ip6_pol_route_input+0x65/0x80 [ 93.592855][ C1] fib6_rule_lookup+0x133/0x7d0 [ 93.597726][ C1] ? __skb_checksum_complete_head+0x2f0/0x2f0 [ 93.603896][ C1] ? skb_send_sock_locked+0x7e0/0x7e0 [ 93.609382][ C1] ? ip6_pol_route+0xa70/0xa70 [ 93.614330][ C1] ? fib6_lookup+0x340/0x340 [ 93.619176][ C1] ? nf_ip6_checksum+0x107/0x340 [ 93.624134][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 93.630532][ C1] ? nf_conntrack_icmpv6_error+0x3c1/0x560 [ 93.636352][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 93.642500][ C1] ip6_route_input_lookup+0xb7/0xd0 [ 93.647720][ C1] ip6_route_input+0x5f0/0xa40 [ 93.652500][ C1] ? ip6_route_check_nh+0x670/0x670 [ 93.657714][ C1] ? slab_prepare_cpu+0x90/0xa0 [ 93.662748][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 93.667791][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 93.673799][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 93.679640][ C1] ip6_rcv_finish+0x17a/0x310 [ 93.684618][ C1] ipv6_rcv+0x10e/0x420 [ 93.688777][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 93.694415][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 93.700342][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 93.705809][ C1] __netif_receive_skb_one_core+0x113/0x1a0 [ 93.712047][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 93.718044][ C1] ? lock_acquire+0x190/0x410 [ 93.722836][ C1] ? process_backlog+0x1b5/0x780 [ 93.727935][ C1] __netif_receive_skb+0x2c/0x1d0 [ 93.733299][ C1] process_backlog+0x226/0x780 [ 93.738188][ C1] ? net_rx_action+0x27b/0x1120 [ 93.743227][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 93.748567][ C1] net_rx_action+0x508/0x1120 [ 93.753437][ C1] ? napi_busy_loop+0x970/0x970 [ 93.758298][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 93.764036][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 93.770052][ C1] ? trace_hardirqs_on+0x67/0x240 [ 93.775137][ C1] __do_softirq+0x262/0x98c [ 93.779672][ C1] ? takeover_tasklets+0x820/0x820 [ 93.784802][ C1] run_ksoftirqd+0x8e/0x110 [ 93.789403][ C1] smpboot_thread_fn+0x6a3/0xa40 [ 93.794518][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 93.800758][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 93.807013][ C1] ? __kthread_parkme+0x108/0x1c0 [ 93.812045][ C1] ? __kasan_check_read+0x11/0x20 [ 93.817230][ C1] kthread+0x361/0x430 [ 93.821406][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 93.827763][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 93.833509][ C1] ret_from_fork+0x24/0x30 [ 93.837975][ C1] [ 93.840332][ C1] Allocated by task 10475: [ 93.844783][ C1] save_stack+0x23/0x90 [ 93.848950][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 93.854653][ C1] kasan_kmalloc+0x9/0x10 [ 93.859003][ C1] __kmalloc_node+0x4e/0x70 [ 93.863515][ C1] kvmalloc_node+0x68/0x100 [ 93.868554][ C1] alloc_netdev_mqs+0x98/0xe40 [ 93.873346][ C1] vti6_init_net+0x244/0x810 [ 93.877957][ C1] ops_init+0xb3/0x420 [ 93.882050][ C1] setup_net+0x2d5/0x8b0 [ 93.886297][ C1] copy_net_ns+0x29e/0x5a0 [ 93.891048][ C1] create_new_namespaces+0x403/0xb50 [ 93.896460][ C1] unshare_nsproxy_namespaces+0xc2/0x200 [ 93.902239][ C1] ksys_unshare+0x444/0x980 [ 93.909014][ C1] __x64_sys_unshare+0x31/0x40 [ 93.913933][ C1] do_syscall_64+0xfa/0x790 [ 93.918456][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 93.924349][ C1] [ 93.926686][ C1] Freed by task 10475: [ 93.930876][ C1] save_stack+0x23/0x90 [ 93.935045][ C1] __kasan_slab_free+0x102/0x150 [ 93.940018][ C1] kasan_slab_free+0xe/0x10 [ 93.944528][ C1] kfree+0x10a/0x2c0 [ 93.948445][ C1] __netdev_name_node_alt_destroy+0x1ff/0x2a0 [ 93.954545][ C1] netdev_name_node_alt_destroy+0x57/0x80 [ 93.960386][ C1] rtnl_linkprop.isra.0+0x575/0x6f0 [ 93.965677][ C1] rtnl_dellinkprop+0x46/0x60 [ 93.970357][ C1] rtnetlink_rcv_msg+0x45e/0xaf0 [ 93.975307][ C1] netlink_rcv_skb+0x177/0x450 [ 93.980120][ C1] rtnetlink_rcv+0x1d/0x30 [ 93.984525][ C1] netlink_unicast+0x59e/0x7e0 [ 93.989299][ C1] netlink_sendmsg+0x91c/0xea0 [ 93.994611][ C1] sock_sendmsg+0xd7/0x130 [ 93.999866][ C1] ____sys_sendmsg+0x753/0x880 [ 94.004622][ C1] ___sys_sendmsg+0x100/0x170 [ 94.009305][ C1] __sys_sendmsg+0x105/0x1d0 [ 94.013899][ C1] __x64_sys_sendmsg+0x78/0xb0 [ 94.018822][ C1] do_syscall_64+0xfa/0x790 [ 94.023358][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 94.029368][ C1] [ 94.031719][ C1] The buggy address belongs to the object at ffff8880993d2000 [ 94.031719][ C1] which belongs to the cache kmalloc-4k of size 4096 [ 94.045887][ C1] The buggy address is located 800 bytes inside of [ 94.045887][ C1] 4096-byte region [ffff8880993d2000, ffff8880993d3000) [ 94.059313][ C1] The buggy address belongs to the page: [ 94.064963][ C1] page:ffffea000264f480 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0 [ 94.076104][ C1] flags: 0xfffe0000010200(slab|head) [ 94.081640][ C1] raw: 00fffe0000010200 ffffea00026cb908 ffffea0002631608 ffff8880aa402000 [ 94.090477][ C1] raw: 0000000000000000 ffff8880993d2000 0000000100000001 0000000000000000 [ 94.099114][ C1] page dumped because: kasan: bad access detected [ 94.106134][ C1] [ 94.110225][ C1] Memory state around the buggy address: [ 94.115907][ C1] ffff8880993d2200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.124555][ C1] ffff8880993d2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.132809][ C1] >ffff8880993d2300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.141057][ C1] ^ [ 94.146196][ C1] ffff8880993d2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.154275][ C1] ffff8880993d2400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.162435][ C1] ================================================================== [ 94.170614][ C1] Disabling lock debugging due to kernel taint [ 94.176831][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 94.183448][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 94.193005][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.203484][ C1] Call Trace: [ 94.206894][ C1] dump_stack+0x197/0x210 [ 94.211422][ C1] panic+0x2e3/0x75c [ 94.215344][ C1] ? add_taint.cold+0x16/0x16 [ 94.220062][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 94.225086][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 94.230126][ C1] ? find_match+0xb39/0xc90 [ 94.234640][ C1] end_report+0x47/0x4f [ 94.239384][ C1] ? find_match+0xb39/0xc90 [ 94.244041][ C1] __kasan_report.cold+0xe/0x32 [ 94.248903][ C1] ? find_match+0xb39/0xc90 [ 94.253417][ C1] kasan_report+0x12/0x20 [ 94.258550][ C1] __asan_report_load8_noabort+0x14/0x20 [ 94.264321][ C1] find_match+0xb39/0xc90 [ 94.268661][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 94.273693][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 94.279504][ C1] __find_rr_leaf+0x14e/0x750 [ 94.284195][ C1] ? nexthop_is_blackhole+0x690/0x690 [ 94.289577][ C1] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 94.295737][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 94.300762][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 94.306749][ C1] fib6_table_lookup+0x697/0xdb0 [ 94.311765][ C1] ? rt6_age_exceptions+0x130/0x130 [ 94.316981][ C1] ? __kasan_check_read+0x11/0x20 [ 94.322103][ C1] ip6_pol_route+0x1f6/0xa70 [ 94.326744][ C1] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 94.332666][ C1] ? csum_partial_ext+0x26/0x30 [ 94.337539][ C1] ? __skb_checksum+0x546/0x830 [ 94.342452][ C1] ip6_pol_route_input+0x65/0x80 [ 94.347418][ C1] fib6_rule_lookup+0x133/0x7d0 [ 94.352405][ C1] ? __skb_checksum_complete_head+0x2f0/0x2f0 [ 94.358479][ C1] ? skb_send_sock_locked+0x7e0/0x7e0 [ 94.364004][ C1] ? ip6_pol_route+0xa70/0xa70 [ 94.368771][ C1] ? fib6_lookup+0x340/0x340 [ 94.374175][ C1] ? nf_ip6_checksum+0x107/0x340 [ 94.379301][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 94.385603][ C1] ? nf_conntrack_icmpv6_error+0x3c1/0x560 [ 94.391462][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 94.397384][ C1] ip6_route_input_lookup+0xb7/0xd0 [ 94.402605][ C1] ip6_route_input+0x5f0/0xa40 [ 94.407574][ C1] ? ip6_route_check_nh+0x670/0x670 [ 94.412782][ C1] ? slab_prepare_cpu+0x90/0xa0 [ 94.417775][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 94.422795][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 94.428741][ C1] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 94.434570][ C1] ip6_rcv_finish+0x17a/0x310 [ 94.439273][ C1] ipv6_rcv+0x10e/0x420 [ 94.443449][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 94.448938][ C1] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 94.455078][ C1] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 94.460839][ C1] __netif_receive_skb_one_core+0x113/0x1a0 [ 94.467076][ C1] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 94.473040][ C1] ? lock_acquire+0x190/0x410 [ 94.477840][ C1] ? process_backlog+0x1b5/0x780 [ 94.482920][ C1] __netif_receive_skb+0x2c/0x1d0 [ 94.487967][ C1] process_backlog+0x226/0x780 [ 94.492865][ C1] ? net_rx_action+0x27b/0x1120 [ 94.497842][ C1] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 94.503134][ C1] net_rx_action+0x508/0x1120 [ 94.507855][ C1] ? napi_busy_loop+0x970/0x970 [ 94.512903][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 94.518483][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 94.524592][ C1] ? trace_hardirqs_on+0x67/0x240 [ 94.529685][ C1] __do_softirq+0x262/0x98c [ 94.534356][ C1] ? takeover_tasklets+0x820/0x820 [ 94.539562][ C1] run_ksoftirqd+0x8e/0x110 [ 94.544088][ C1] smpboot_thread_fn+0x6a3/0xa40 [ 94.549034][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 94.556177][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 94.562617][ C1] ? __kthread_parkme+0x108/0x1c0 [ 94.567638][ C1] ? __kasan_check_read+0x11/0x20 [ 94.572822][ C1] kthread+0x361/0x430 [ 94.577109][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 94.584003][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 94.589724][ C1] ret_from_fork+0x24/0x30 [ 94.596166][ C1] Kernel Offset: disabled [ 94.600618][ C1] Rebooting in 86400 seconds..