Warning: Permanently added '10.128.0.90' (ECDSA) to the list of known hosts. [ 53.951147][ T3599] chnl_net:caif_netlink_parms(): no params data found [ 53.980101][ T3599] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.987420][ T3599] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.995279][ T3599] device bridge_slave_0 entered promiscuous mode [ 54.003545][ T3599] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.010640][ T3599] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.018458][ T3599] device bridge_slave_1 entered promiscuous mode [ 54.034066][ T3599] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.044466][ T3599] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.061527][ T3599] team0: Port device team_slave_0 added [ 54.068379][ T3599] team0: Port device team_slave_1 added [ 54.082419][ T3599] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 54.089670][ T3599] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 54.116176][ T3599] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 54.128024][ T3599] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 54.135194][ T3599] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 54.161268][ T3599] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 54.182392][ T3599] device hsr_slave_0 entered promiscuous mode [ 54.188923][ T3599] device hsr_slave_1 entered promiscuous mode [ 54.241703][ T3599] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 54.250275][ T3599] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 54.258589][ T3599] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 54.266892][ T3599] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 54.281497][ T3599] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.288570][ T3599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.295842][ T3599] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.302947][ T3599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.332000][ T3599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.343666][ T1130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.351645][ T1130] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.359447][ T1130] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.367488][ T1130] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 54.377730][ T3599] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.387367][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.395734][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.402791][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.424008][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.432232][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.439308][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.447187][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.455655][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.463893][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.471932][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.481061][ T3599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.489123][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.504654][ T3599] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.513984][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 54.521421][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 54.582549][ T3599] device veth0_vlan entered promiscuous mode [ 54.589375][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.598370][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.607126][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.614798][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.625624][ T3599] device veth1_vlan entered promiscuous mode [ 54.639399][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 54.647577][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 54.655657][ T3334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.665020][ T3599] device veth0_macvtap entered promiscuous mode [ 54.674165][ T3599] device veth1_macvtap entered promiscuous mode [ 54.686803][ T3599] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 54.694317][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 54.704081][ T3605] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 54.714313][ T3599] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 54.723075][ T3599] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 54.731774][ T3599] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.740768][ T3599] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.749669][ T3599] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.760318][ T1130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 54.781958][ T3615] ================================================================== [ 54.790032][ T3615] BUG: KASAN: use-after-free in vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 54.798121][ T3615] Read of size 4 at addr ffff888077a78e70 by task syz-executor244/3615 [ 54.806355][ T3615] [ 54.808664][ T3615] CPU: 1 PID: 3615 Comm: syz-executor244 Tainted: G W 5.17.0-syzkaller-13034-gd888c83fcec7 #0 [ 54.820277][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.830324][ T3615] Call Trace: [ 54.833595][ T3615] [ 54.836537][ T3615] dump_stack_lvl+0xcd/0x134 [ 54.841123][ T3615] print_address_description.constprop.0.cold+0xeb/0x495 [ 54.848138][ T3615] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 54.853844][ T3615] kasan_report.cold+0xf4/0x1c6 [ 54.858682][ T3615] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 54.864384][ T3615] vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 54.869913][ T3615] ? rcu_read_lock_sched_held+0xd/0x70 [ 54.875360][ T3615] vxlan_vnifilter_dump+0x3ff/0x650 [ 54.880549][ T3615] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 54.886795][ T3615] netlink_dump+0x4b5/0xb70 [ 54.891292][ T3615] ? netlink_deliver_tap+0xc40/0xc40 [ 54.896564][ T3615] ? lock_downgrade+0x6e0/0x6e0 [ 54.901416][ T3615] __netlink_dump_start+0x647/0x900 [ 54.906599][ T3615] rtnetlink_rcv_msg+0x70c/0xb80 [ 54.911527][ T3615] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 54.917145][ T3615] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 54.921892][ T3615] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 54.927159][ T3615] ? __sys_sendmsg+0xe5/0x1b0 [ 54.931836][ T3615] ? do_syscall_64+0x35/0x80 [ 54.936425][ T3615] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 54.942042][ T3615] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 54.947396][ T3615] ? lock_acquire+0x442/0x510 [ 54.952055][ T3615] netlink_rcv_skb+0x153/0x420 [ 54.956804][ T3615] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 54.961549][ T3615] ? netlink_ack+0xa80/0xa80 [ 54.966120][ T3615] ? netlink_deliver_tap+0x1a2/0xc40 [ 54.971389][ T3615] ? netlink_deliver_tap+0x1b1/0xc40 [ 54.976660][ T3615] netlink_unicast+0x543/0x7f0 [ 54.981408][ T3615] ? netlink_attachskb+0x880/0x880 [ 54.986523][ T3615] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 54.992754][ T3615] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 54.998981][ T3615] ? __phys_addr_symbol+0x2c/0x70 [ 55.003992][ T3615] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 55.009694][ T3615] ? __check_object_size+0x16c/0x4f0 [ 55.014961][ T3615] netlink_sendmsg+0x904/0xe00 [ 55.019731][ T3615] ? netlink_unicast+0x7f0/0x7f0 [ 55.024658][ T3615] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 55.030885][ T3615] ? netlink_unicast+0x7f0/0x7f0 [ 55.035892][ T3615] sock_sendmsg+0xcf/0x120 [ 55.040312][ T3615] ____sys_sendmsg+0x6e2/0x800 [ 55.045061][ T3615] ? kernel_sendmsg+0x50/0x50 [ 55.049721][ T3615] ? do_recvmmsg+0x6d0/0x6d0 [ 55.054297][ T3615] ? rcu_read_lock_sched_held+0xd/0x70 [ 55.059741][ T3615] ? kmem_cache_alloc+0x46/0x3b0 [ 55.064666][ T3615] ? lock_downgrade+0x6e0/0x6e0 [ 55.069502][ T3615] ? lock_release+0x522/0x720 [ 55.074162][ T3615] ? kmem_cache_alloc+0x46/0x3b0 [ 55.079082][ T3615] ? lock_downgrade+0x6e0/0x6e0 [ 55.083921][ T3615] ___sys_sendmsg+0xf3/0x170 [ 55.088503][ T3615] ? sendmsg_copy_msghdr+0x160/0x160 [ 55.093774][ T3615] ? lockdep_init_map_type+0x21a/0x7f0 [ 55.099219][ T3615] ? __raw_spin_lock_init+0x36/0x110 [ 55.104494][ T3615] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 55.110734][ T3615] ? percpu_counter_add_batch+0xbd/0x180 [ 55.116377][ T3615] ? alloc_empty_file+0xd7/0x170 [ 55.121335][ T3615] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 55.127573][ T3615] ? errseq_sample+0x56/0x70 [ 55.132169][ T3615] ? rcu_read_lock_sched_held+0xd/0x70 [ 55.137659][ T3615] ? lock_acquire+0x442/0x510 [ 55.142331][ T3615] ? rcu_read_lock_sched_held+0xd/0x70 [ 55.147780][ T3615] ? lock_release+0x522/0x720 [ 55.152445][ T3615] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 55.158690][ T3615] ? fd_install+0x1c7/0x640 [ 55.163179][ T3615] ? lock_downgrade+0x6e0/0x6e0 [ 55.168016][ T3615] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 55.174352][ T3615] ? __fget_light+0x20f/0x270 [ 55.179045][ T3615] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 55.185300][ T3615] __sys_sendmsg+0xe5/0x1b0 [ 55.189810][ T3615] ? __sys_sendmsg_sock+0x30/0x30 [ 55.194828][ T3615] ? syscall_enter_from_user_mode+0x21/0x70 [ 55.200709][ T3615] ? trace_hardirqs_on+0x5b/0x1c0 [ 55.205720][ T3615] do_syscall_64+0x35/0x80 [ 55.210138][ T3615] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 55.216041][ T3615] RIP: 0033:0x7f9ffeb931c9 [ 55.220467][ T3615] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 55.240066][ T3615] RSP: 002b:00007ffcd1ff34c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 55.248464][ T3615] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f9ffeb931c9 [ 55.256422][ T3615] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004 [ 55.264391][ T3615] RBP: 0000000000000000 R08: 0000000000f0b5ff R09: 0000000000f0b5ff [ 55.272346][ T3615] R10: 0000000000f0b5ff R11: 0000000000000246 R12: 00007ffcd1ff3500 [ 55.280325][ T3615] R13: 00007ffcd1ff34f0 R14: 00007ffcd1ff34e0 R15: 0000000000000003 [ 55.288308][ T3615] [ 55.291314][ T3615] [ 55.293630][ T3615] Allocated by task 3500: [ 55.297936][ T3615] kasan_save_stack+0x1e/0x40 [ 55.302604][ T3615] __kasan_kmalloc+0xa9/0xd0 [ 55.307188][ T3615] tomoyo_realpath_from_path+0xc3/0x620 [ 55.312724][ T3615] tomoyo_check_open_permission+0x272/0x380 [ 55.318607][ T3615] tomoyo_file_open+0x9d/0xc0 [ 55.323276][ T3615] security_file_open+0x45/0xb0 [ 55.328130][ T3615] do_dentry_open+0x349/0x11e0 [ 55.332882][ T3615] path_openat+0x1c71/0x2910 [ 55.337465][ T3615] do_filp_open+0x1aa/0x400 [ 55.341952][ T3615] do_sys_openat2+0x16d/0x4c0 [ 55.346611][ T3615] __x64_sys_openat+0x13f/0x1f0 [ 55.351444][ T3615] do_syscall_64+0x35/0x80 [ 55.355842][ T3615] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 55.361733][ T3615] [ 55.364044][ T3615] Freed by task 3500: [ 55.368001][ T3615] kasan_save_stack+0x1e/0x40 [ 55.372669][ T3615] kasan_set_track+0x21/0x30 [ 55.377246][ T3615] kasan_set_free_info+0x20/0x30 [ 55.382165][ T3615] ____kasan_slab_free+0x166/0x1a0 [ 55.387262][ T3615] slab_free_freelist_hook+0x8b/0x1c0 [ 55.392620][ T3615] kfree+0xd6/0x4d0 [ 55.396412][ T3615] tomoyo_realpath_from_path+0x191/0x620 [ 55.402037][ T3615] tomoyo_check_open_permission+0x272/0x380 [ 55.407920][ T3615] tomoyo_file_open+0x9d/0xc0 [ 55.412578][ T3615] security_file_open+0x45/0xb0 [ 55.417416][ T3615] do_dentry_open+0x349/0x11e0 [ 55.422159][ T3615] path_openat+0x1c71/0x2910 [ 55.426860][ T3615] do_filp_open+0x1aa/0x400 [ 55.431347][ T3615] do_sys_openat2+0x16d/0x4c0 [ 55.436201][ T3615] __x64_sys_openat+0x13f/0x1f0 [ 55.441040][ T3615] do_syscall_64+0x35/0x80 [ 55.445438][ T3615] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 55.451316][ T3615] [ 55.453620][ T3615] The buggy address belongs to the object at ffff888077a78000 [ 55.453620][ T3615] which belongs to the cache kmalloc-4k of size 4096 [ 55.467694][ T3615] The buggy address is located 3696 bytes inside of [ 55.467694][ T3615] 4096-byte region [ffff888077a78000, ffff888077a79000) [ 55.481135][ T3615] [ 55.483445][ T3615] The buggy address belongs to the physical page: [ 55.489835][ T3615] page:ffffea0001de9e00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x77a78 [ 55.499967][ T3615] head:ffffea0001de9e00 order:3 compound_mapcount:0 compound_pincount:0 [ 55.508273][ T3615] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 55.516236][ T3615] raw: 00fff00000010200 ffffea0001d4d000 dead000000000002 ffff888010c42140 [ 55.524799][ T3615] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 55.533394][ T3615] page dumped because: kasan: bad access detected [ 55.539782][ T3615] page_owner tracks the page as allocated [ 55.545479][ T3615] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3176, tgid 3176 (dhcpcd), ts 20824314299, free_ts 20818483163 [ 55.565613][ T3615] get_page_from_freelist+0xba2/0x3df0 [ 55.571070][ T3615] __alloc_pages+0x1b2/0x500 [ 55.575653][ T3615] alloc_pages+0x1aa/0x310 [ 55.580059][ T3615] allocate_slab+0x26c/0x3c0 [ 55.584643][ T3615] ___slab_alloc+0x8df/0xf20 [ 55.589223][ T3615] __slab_alloc.constprop.0+0x4d/0xa0 [ 55.594594][ T3615] __kmalloc+0x318/0x350 [ 55.598839][ T3615] tomoyo_realpath_from_path+0xc3/0x620 [ 55.604520][ T3615] tomoyo_path_perm+0x21b/0x400 [ 55.609355][ T3615] security_inode_getattr+0xcf/0x140 [ 55.614626][ T3615] vfs_statx+0x16a/0x390 [ 55.618851][ T3615] vfs_fstatat+0x8c/0xb0 [ 55.623076][ T3615] __do_sys_newfstatat+0x91/0x110 [ 55.628089][ T3615] do_syscall_64+0x35/0x80 [ 55.632483][ T3615] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 55.638375][ T3615] page last free stack trace: [ 55.643046][ T3615] free_pcp_prepare+0x549/0xd20 [ 55.647903][ T3615] free_unref_page+0x19/0x690 [ 55.652560][ T3615] __unfreeze_partials+0x17c/0x1a0 [ 55.657678][ T3615] qlist_free_all+0x6a/0x170 [ 55.662358][ T3615] kasan_quarantine_reduce+0x180/0x200 [ 55.667811][ T3615] __kasan_slab_alloc+0xa2/0xc0 [ 55.672646][ T3615] kmem_cache_alloc+0x204/0x3b0 [ 55.677481][ T3615] getname_flags.part.0+0x50/0x4f0 [ 55.682590][ T3615] getname_flags+0x9a/0xe0 [ 55.686987][ T3615] user_path_at_empty+0x2b/0x60 [ 55.691826][ T3615] do_readlinkat+0xcd/0x2f0 [ 55.696309][ T3615] __x64_sys_readlink+0x74/0xb0 [ 55.701141][ T3615] do_syscall_64+0x35/0x80 [ 55.705538][ T3615] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 55.711453][ T3615] [ 55.713756][ T3615] Memory state around the buggy address: [ 55.719362][ T3615] ffff888077a78d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.727406][ T3615] ffff888077a78d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.735450][ T3615] >ffff888077a78e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.743489][ T3615] ^ [ 55.751181][ T3615] ffff888077a78e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.759219][ T3615] ffff888077a78f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.767253][ T3615] ================================================================== [ 55.779224][ T3615] Kernel panic - not syncing: panic_on_warn set ... [ 55.785909][ T3615] CPU: 0 PID: 3615 Comm: syz-executor244 Tainted: G W 5.17.0-syzkaller-13034-gd888c83fcec7 #0 [ 55.797454][ T3615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.807549][ T3615] Call Trace: [ 55.810816][ T3615] [ 55.813729][ T3615] dump_stack_lvl+0xcd/0x134 [ 55.818323][ T3615] panic+0x2d7/0x636 [ 55.822202][ T3615] ? panic_print_sys_info.part.0+0x10b/0x10b [ 55.828166][ T3615] ? preempt_schedule_common+0x59/0xc0 [ 55.833608][ T3615] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 55.839308][ T3615] ? preempt_schedule_thunk+0x16/0x18 [ 55.844664][ T3615] ? trace_hardirqs_on+0x38/0x1c0 [ 55.849675][ T3615] ? trace_hardirqs_on+0x51/0x1c0 [ 55.854687][ T3615] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 55.860391][ T3615] end_report.part.0+0x3f/0x7c [ 55.865138][ T3615] kasan_report.cold+0x93/0x1c6 [ 55.869989][ T3615] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 55.875693][ T3615] vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 55.881220][ T3615] ? rcu_read_lock_sched_held+0xd/0x70 [ 55.886666][ T3615] vxlan_vnifilter_dump+0x3ff/0x650 [ 55.891846][ T3615] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 55.898071][ T3615] netlink_dump+0x4b5/0xb70 [ 55.902672][ T3615] ? netlink_deliver_tap+0xc40/0xc40 [ 55.908014][ T3615] ? lock_downgrade+0x6e0/0x6e0 [ 55.912868][ T3615] __netlink_dump_start+0x647/0x900 [ 55.918071][ T3615] rtnetlink_rcv_msg+0x70c/0xb80 [ 55.923022][ T3615] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 55.928640][ T3615] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 55.933384][ T3615] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 55.938661][ T3615] ? __sys_sendmsg+0xe5/0x1b0 [ 55.943331][ T3615] ? do_syscall_64+0x35/0x80 [ 55.947913][ T3615] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 55.953578][ T3615] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 55.958941][ T3615] ? lock_acquire+0x442/0x510 [ 55.963613][ T3615] netlink_rcv_skb+0x153/0x420 [ 55.968474][ T3615] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 55.973225][ T3615] ? netlink_ack+0xa80/0xa80 [ 55.977807][ T3615] ? netlink_deliver_tap+0x1a2/0xc40 [ 55.983106][ T3615] ? netlink_deliver_tap+0x1b1/0xc40 [ 55.988389][ T3615] netlink_unicast+0x543/0x7f0 [ 55.993146][ T3615] ? netlink_attachskb+0x880/0x880 [ 55.998343][ T3615] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 56.004583][ T3615] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 56.010822][ T3615] ? __phys_addr_symbol+0x2c/0x70 [ 56.015833][ T3615] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 56.021535][ T3615] ? __check_object_size+0x16c/0x4f0 [ 56.026908][ T3615] netlink_sendmsg+0x904/0xe00 [ 56.031667][ T3615] ? netlink_unicast+0x7f0/0x7f0 [ 56.036589][ T3615] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 56.043027][ T3615] ? netlink_unicast+0x7f0/0x7f0 [ 56.048062][ T3615] sock_sendmsg+0xcf/0x120 [ 56.052464][ T3615] ____sys_sendmsg+0x6e2/0x800 [ 56.057213][ T3615] ? kernel_sendmsg+0x50/0x50 [ 56.061874][ T3615] ? do_recvmmsg+0x6d0/0x6d0 [ 56.066448][ T3615] ? rcu_read_lock_sched_held+0xd/0x70 [ 56.071889][ T3615] ? kmem_cache_alloc+0x46/0x3b0 [ 56.076814][ T3615] ? lock_downgrade+0x6e0/0x6e0 [ 56.081652][ T3615] ? lock_release+0x522/0x720 [ 56.086313][ T3615] ? kmem_cache_alloc+0x46/0x3b0 [ 56.091233][ T3615] ? lock_downgrade+0x6e0/0x6e0 [ 56.096064][ T3615] ___sys_sendmsg+0xf3/0x170 [ 56.100646][ T3615] ? sendmsg_copy_msghdr+0x160/0x160 [ 56.105915][ T3615] ? lockdep_init_map_type+0x21a/0x7f0 [ 56.111356][ T3615] ? __raw_spin_lock_init+0x36/0x110 [ 56.116626][ T3615] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 56.122854][ T3615] ? percpu_counter_add_batch+0xbd/0x180 [ 56.128603][ T3615] ? alloc_empty_file+0xd7/0x170 [ 56.133526][ T3615] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 56.139796][ T3615] ? errseq_sample+0x56/0x70 [ 56.144373][ T3615] ? rcu_read_lock_sched_held+0xd/0x70 [ 56.149816][ T3615] ? lock_acquire+0x442/0x510 [ 56.154475][ T3615] ? rcu_read_lock_sched_held+0xd/0x70 [ 56.159915][ T3615] ? lock_release+0x522/0x720 [ 56.164575][ T3615] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 56.170798][ T3615] ? fd_install+0x1c7/0x640 [ 56.175296][ T3615] ? lock_downgrade+0x6e0/0x6e0 [ 56.180130][ T3615] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 56.186353][ T3615] ? __fget_light+0x20f/0x270 [ 56.191017][ T3615] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 56.197262][ T3615] __sys_sendmsg+0xe5/0x1b0 [ 56.201752][ T3615] ? __sys_sendmsg_sock+0x30/0x30 [ 56.206762][ T3615] ? syscall_enter_from_user_mode+0x21/0x70 [ 56.212652][ T3615] ? trace_hardirqs_on+0x5b/0x1c0 [ 56.217661][ T3615] do_syscall_64+0x35/0x80 [ 56.222056][ T3615] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 56.227932][ T3615] RIP: 0033:0x7f9ffeb931c9 [ 56.232327][ T3615] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 56.251916][ T3615] RSP: 002b:00007ffcd1ff34c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 56.260315][ T3615] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f9ffeb931c9 [ 56.268272][ T3615] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004 [ 56.276238][ T3615] RBP: 0000000000000000 R08: 0000000000f0b5ff R09: 0000000000f0b5ff [ 56.284206][ T3615] R10: 0000000000f0b5ff R11: 0000000000000246 R12: 00007ffcd1ff3500 [ 56.292158][ T3615] R13: 00007ffcd1ff34f0 R14: 00007ffcd1ff34e0 R15: 0000000000000003 [ 56.300114][ T3615] [ 56.303280][ T3615] Kernel Offset: disabled [ 56.307605][ T3615] Rebooting in 86400 seconds..