Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. syzkaller login: [ 37.119965][ T3598] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 37.127117][ T3598] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 37.134498][ T3600] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 37.141989][ T3600] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 37.149624][ T3600] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 37.156798][ T3600] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 37.210580][ T3597] chnl_net:caif_netlink_parms(): no params data found [ 37.239384][ T3597] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.246469][ T3597] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.254311][ T3597] device bridge_slave_0 entered promiscuous mode [ 37.262877][ T3597] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.269981][ T3597] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.277520][ T3597] device bridge_slave_1 entered promiscuous mode [ 37.292539][ T3597] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.302917][ T3597] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.319797][ T3597] team0: Port device team_slave_0 added [ 37.326506][ T3597] team0: Port device team_slave_1 added [ 37.340394][ T3597] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.347334][ T3597] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.373499][ T3597] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.385016][ T3597] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.392068][ T3597] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.417983][ T3597] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.438768][ T3597] device hsr_slave_0 entered promiscuous mode [ 37.445316][ T3597] device hsr_slave_1 entered promiscuous mode [ 37.495663][ T3597] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.504449][ T3597] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.512828][ T3597] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.521153][ T3597] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.536042][ T3597] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.543183][ T3597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.550467][ T3597] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.557495][ T3597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.586514][ T3597] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.597512][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.606202][ T14] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.614891][ T14] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.622777][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 37.632759][ T3597] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.642219][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.650627][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.657709][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.677463][ T3597] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.688123][ T3597] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.700966][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.710429][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.717490][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.725524][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 37.734062][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 37.742400][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.750661][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.758995][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 37.766498][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 37.782179][ T3597] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.790091][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.797480][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.868236][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.881317][ T3597] device veth0_vlan entered promiscuous mode [ 37.887824][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.896497][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.904589][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.914570][ T3597] device veth1_vlan entered promiscuous mode [ 37.928885][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.937005][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 37.945346][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.954958][ T3597] device veth0_macvtap entered promiscuous mode [ 37.963694][ T3597] device veth1_macvtap entered promiscuous mode [ 37.975587][ T3597] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.983277][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.992556][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 38.003007][ T3597] batman_adv: batadv0: Interface activated: batadv_slave_1 executing program [ 38.011101][ T3608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.021419][ T3597] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.030357][ T3597] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.039589][ T3597] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.048474][ T3597] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.069817][ T3597] ================================================================== [ 38.077879][ T3597] BUG: KASAN: slab-out-of-bounds in vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 38.086275][ T3597] Read of size 4 at addr ffff88801e950e70 by task syz-executor262/3597 [ 38.094506][ T3597] [ 38.096810][ T3597] CPU: 0 PID: 3597 Comm: syz-executor262 Tainted: G W 5.17.0-syzkaller-10107-gd717e4cae0fe #0 [ 38.108324][ T3597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.118356][ T3597] Call Trace: [ 38.121617][ T3597] [ 38.124545][ T3597] dump_stack_lvl+0xcd/0x134 [ 38.129154][ T3597] print_address_description.constprop.0.cold+0xeb/0x495 [ 38.136167][ T3597] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 38.141872][ T3597] kasan_report.cold+0xf4/0x1c6 [ 38.146718][ T3597] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 38.152436][ T3597] vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 38.157972][ T3597] ? rcu_read_lock_sched_held+0xd/0x70 [ 38.163428][ T3597] vxlan_vnifilter_dump+0x3ff/0x650 [ 38.168817][ T3597] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 38.175061][ T3597] netlink_dump+0x4b5/0xb70 [ 38.179559][ T3597] ? netlink_deliver_tap+0xc40/0xc40 [ 38.184857][ T3597] ? lock_downgrade+0x6e0/0x6e0 [ 38.189710][ T3597] __netlink_dump_start+0x647/0x900 [ 38.195028][ T3597] rtnetlink_rcv_msg+0x70c/0xb80 [ 38.199983][ T3597] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 38.205617][ T3597] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 38.210392][ T3597] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 38.215670][ T3597] ? __sys_sendmsg+0xe5/0x1b0 [ 38.220360][ T3597] ? do_syscall_64+0x35/0x80 [ 38.224937][ T3597] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 38.230554][ T3597] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 38.235932][ T3597] ? lock_acquire+0x442/0x510 [ 38.240592][ T3597] netlink_rcv_skb+0x153/0x420 [ 38.245340][ T3597] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 38.250413][ T3597] ? netlink_ack+0xa80/0xa80 [ 38.254983][ T3597] ? netlink_deliver_tap+0x1a2/0xc40 [ 38.260248][ T3597] ? netlink_deliver_tap+0x1b1/0xc40 [ 38.265522][ T3597] netlink_unicast+0x543/0x7f0 [ 38.270269][ T3597] ? netlink_attachskb+0x880/0x880 [ 38.275358][ T3597] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 38.281590][ T3597] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 38.287822][ T3597] ? __phys_addr_symbol+0x2c/0x70 [ 38.292837][ T3597] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 38.298553][ T3597] ? __check_object_size+0x16c/0x4f0 [ 38.303830][ T3597] netlink_sendmsg+0x904/0xe00 [ 38.308591][ T3597] ? netlink_unicast+0x7f0/0x7f0 [ 38.313526][ T3597] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 38.319771][ T3597] ? netlink_unicast+0x7f0/0x7f0 [ 38.324704][ T3597] sock_sendmsg+0xcf/0x120 [ 38.329110][ T3597] ____sys_sendmsg+0x6e2/0x800 [ 38.333859][ T3597] ? kernel_sendmsg+0x50/0x50 [ 38.338516][ T3597] ? do_recvmmsg+0x6d0/0x6d0 [ 38.343086][ T3597] ? rcu_read_lock_sched_held+0xd/0x70 [ 38.348528][ T3597] ? kmem_cache_alloc+0x46/0x3b0 [ 38.353711][ T3597] ? lock_downgrade+0x6e0/0x6e0 [ 38.358546][ T3597] ? lock_downgrade+0x6e0/0x6e0 [ 38.363378][ T3597] ___sys_sendmsg+0xf3/0x170 [ 38.367949][ T3597] ? sendmsg_copy_msghdr+0x160/0x160 [ 38.373219][ T3597] ? lockdep_init_map_type+0x21a/0x7f0 [ 38.378663][ T3597] ? __raw_spin_lock_init+0x36/0x110 [ 38.383948][ T3597] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 38.390171][ T3597] ? percpu_counter_add_batch+0xbd/0x180 [ 38.395788][ T3597] ? alloc_empty_file+0xd7/0x170 [ 38.400708][ T3597] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 38.406935][ T3597] ? errseq_sample+0x56/0x70 [ 38.411509][ T3597] ? rcu_read_lock_sched_held+0xd/0x70 [ 38.416948][ T3597] ? lock_acquire+0x442/0x510 [ 38.421608][ T3597] ? rcu_read_lock_sched_held+0xd/0x70 [ 38.427047][ T3597] ? lock_release+0x522/0x720 [ 38.431709][ T3597] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 38.437960][ T3597] ? fd_install+0x1c7/0x640 [ 38.442449][ T3597] ? lock_downgrade+0x6e0/0x6e0 [ 38.447305][ T3597] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 38.453527][ T3597] ? __fget_light+0x20f/0x270 [ 38.458198][ T3597] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 38.464421][ T3597] __sys_sendmsg+0xe5/0x1b0 [ 38.468909][ T3597] ? __sys_sendmsg_sock+0x30/0x30 [ 38.473916][ T3597] ? syscall_enter_from_user_mode+0x21/0x70 [ 38.479799][ T3597] ? trace_hardirqs_on+0x5b/0x1c0 [ 38.484814][ T3597] do_syscall_64+0x35/0x80 [ 38.489229][ T3597] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 38.495105][ T3597] RIP: 0033:0x7ff73ad7fbe9 [ 38.499509][ T3597] Code: 5c 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 38.519095][ T3597] RSP: 002b:00007ffee02a27e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 38.527484][ T3597] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007ff73ad7fbe9 [ 38.535437][ T3597] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004 [ 38.543386][ T3597] RBP: 0000000000000003 R08: 000000000000000a R09: 000000000000000a [ 38.551341][ T3597] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffee02a2820 [ 38.559303][ T3597] R13: 00007ffee02a2840 R14: 00007ffee02a2818 R15: 0000000000000000 [ 38.567267][ T3597] [ 38.570270][ T3597] [ 38.572575][ T3597] Allocated by task 0: [ 38.576614][ T3597] (stack is not available) [ 38.581005][ T3597] [ 38.583310][ T3597] The buggy address belongs to the object at ffff88801e950000 [ 38.583310][ T3597] which belongs to the cache kmalloc-2k of size 2048 [ 38.597339][ T3597] The buggy address is located 1648 bytes to the right of [ 38.597339][ T3597] 2048-byte region [ffff88801e950000, ffff88801e950800) [ 38.611281][ T3597] [ 38.613583][ T3597] The buggy address belongs to the physical page: [ 38.619980][ T3597] page:ffffea00007a5400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1e950 [ 38.630223][ T3597] head:ffffea00007a5400 order:3 compound_mapcount:0 compound_pincount:0 [ 38.638533][ T3597] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 38.646511][ T3597] raw: 00fff00000010200 0000000000000000 dead000000000122 ffff888010c42000 [ 38.655085][ T3597] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 38.663682][ T3597] page dumped because: kasan: bad access detected [ 38.670068][ T3597] page_owner tracks the page as allocated [ 38.675757][ T3597] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 3597, tgid 3597 (syz-executor262), ts 37180776908, free_ts 33516642825 [ 38.697359][ T3597] get_page_from_freelist+0xba2/0x3df0 [ 38.702811][ T3597] __alloc_pages+0x1b2/0x500 [ 38.707380][ T3597] alloc_pages+0x1aa/0x310 [ 38.711779][ T3597] allocate_slab+0x26c/0x3c0 [ 38.716349][ T3597] ___slab_alloc+0x8df/0xf20 [ 38.720919][ T3597] __slab_alloc.constprop.0+0x4d/0xa0 [ 38.726271][ T3597] __kmalloc_track_caller+0x2e7/0x320 [ 38.731631][ T3597] kmemdup+0x23/0x50 [ 38.735519][ T3597] neigh_sysctl_register+0x9a/0x5e0 [ 38.740713][ T3597] addrconf_sysctl_register+0xb6/0x1d0 [ 38.746159][ T3597] ipv6_add_dev+0xa16/0x12a0 [ 38.750741][ T3597] addrconf_notify+0x614/0x1ba0 [ 38.755587][ T3597] notifier_call_chain+0xb5/0x200 [ 38.760607][ T3597] call_netdevice_notifiers_info+0xb5/0x130 [ 38.766501][ T3597] register_netdevice+0x109e/0x15b0 [ 38.771684][ T3597] __ip_tunnel_create+0x398/0x5c0 [ 38.776713][ T3597] page last free stack trace: [ 38.781359][ T3597] free_pcp_prepare+0x549/0xd20 [ 38.786194][ T3597] free_unref_page+0x19/0x690 [ 38.790849][ T3597] __unfreeze_partials+0x17c/0x1a0 [ 38.795963][ T3597] qlist_free_all+0x6a/0x170 [ 38.800531][ T3597] kasan_quarantine_reduce+0x180/0x200 [ 38.805977][ T3597] __kasan_slab_alloc+0xa2/0xc0 [ 38.810814][ T3597] __kmalloc+0x200/0x350 [ 38.815046][ T3597] load_elf_phdrs+0x103/0x210 [ 38.819714][ T3597] load_elf_binary+0x1dc/0x4df0 [ 38.824554][ T3597] bprm_execve+0x7ef/0x19b0 [ 38.829045][ T3597] do_execveat_common+0x727/0x890 [ 38.834057][ T3597] __x64_sys_execve+0x8f/0xc0 [ 38.838718][ T3597] do_syscall_64+0x35/0x80 [ 38.843119][ T3597] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 38.848998][ T3597] [ 38.851301][ T3597] Memory state around the buggy address: [ 38.856995][ T3597] ffff88801e950d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.865034][ T3597] ffff88801e950d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.873075][ T3597] >ffff88801e950e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.881113][ T3597] ^ [ 38.888804][ T3597] ffff88801e950e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.896843][ T3597] ffff88801e950f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.904880][ T3597] ================================================================== [ 38.916551][ T3597] Kernel panic - not syncing: panic_on_warn set ... [ 38.923145][ T3597] CPU: 0 PID: 3597 Comm: syz-executor262 Tainted: G W 5.17.0-syzkaller-10107-gd717e4cae0fe #0 [ 38.934696][ T3597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.944739][ T3597] Call Trace: [ 38.948005][ T3597] [ 38.950932][ T3597] dump_stack_lvl+0xcd/0x134 [ 38.955519][ T3597] panic+0x2d7/0x636 [ 38.959406][ T3597] ? panic_print_sys_info.part.0+0x10b/0x10b [ 38.965380][ T3597] ? preempt_schedule_common+0x59/0xc0 [ 38.970837][ T3597] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 38.976547][ T3597] ? preempt_schedule_thunk+0x16/0x18 [ 38.981911][ T3597] ? trace_hardirqs_on+0x38/0x1c0 [ 38.986940][ T3597] ? trace_hardirqs_on+0x51/0x1c0 [ 38.991957][ T3597] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 38.997666][ T3597] end_report.part.0+0x3f/0x7c [ 39.002427][ T3597] kasan_report.cold+0x93/0x1c6 [ 39.007270][ T3597] ? vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 39.012980][ T3597] vxlan_vnifilter_dump_dev+0x9a0/0xb40 [ 39.018513][ T3597] ? rcu_read_lock_sched_held+0xd/0x70 [ 39.023972][ T3597] vxlan_vnifilter_dump+0x3ff/0x650 [ 39.029158][ T3597] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 39.035396][ T3597] netlink_dump+0x4b5/0xb70 [ 39.039891][ T3597] ? netlink_deliver_tap+0xc40/0xc40 [ 39.045169][ T3597] ? lock_downgrade+0x6e0/0x6e0 [ 39.050013][ T3597] __netlink_dump_start+0x647/0x900 [ 39.055207][ T3597] rtnetlink_rcv_msg+0x70c/0xb80 [ 39.060140][ T3597] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 39.065763][ T3597] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 39.070516][ T3597] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 39.075793][ T3597] ? __sys_sendmsg+0xe5/0x1b0 [ 39.080461][ T3597] ? do_syscall_64+0x35/0x80 [ 39.085043][ T3597] ? vxlan_vnifilter_process+0x5b0/0x5b0 [ 39.090667][ T3597] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 39.096030][ T3597] ? lock_acquire+0x442/0x510 [ 39.100703][ T3597] netlink_rcv_skb+0x153/0x420 [ 39.105463][ T3597] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 39.110218][ T3597] ? netlink_ack+0xa80/0xa80 [ 39.114804][ T3597] ? netlink_deliver_tap+0x1a2/0xc40 [ 39.120082][ T3597] ? netlink_deliver_tap+0x1b1/0xc40 [ 39.125357][ T3597] netlink_unicast+0x543/0x7f0 [ 39.130110][ T3597] ? netlink_attachskb+0x880/0x880 [ 39.135210][ T3597] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 39.141444][ T3597] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 39.147763][ T3597] ? __phys_addr_symbol+0x2c/0x70 [ 39.152780][ T3597] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 39.158487][ T3597] ? __check_object_size+0x16c/0x4f0 [ 39.163760][ T3597] netlink_sendmsg+0x904/0xe00 [ 39.168515][ T3597] ? netlink_unicast+0x7f0/0x7f0 [ 39.173445][ T3597] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 39.179678][ T3597] ? netlink_unicast+0x7f0/0x7f0 [ 39.184610][ T3597] sock_sendmsg+0xcf/0x120 [ 39.189017][ T3597] ____sys_sendmsg+0x6e2/0x800 [ 39.193772][ T3597] ? kernel_sendmsg+0x50/0x50 [ 39.198695][ T3597] ? do_recvmmsg+0x6d0/0x6d0 [ 39.203280][ T3597] ? rcu_read_lock_sched_held+0xd/0x70 [ 39.208729][ T3597] ? kmem_cache_alloc+0x46/0x3b0 [ 39.213655][ T3597] ? lock_downgrade+0x6e0/0x6e0 [ 39.218493][ T3597] ? lock_downgrade+0x6e0/0x6e0 [ 39.223334][ T3597] ___sys_sendmsg+0xf3/0x170 [ 39.227913][ T3597] ? sendmsg_copy_msghdr+0x160/0x160 [ 39.233190][ T3597] ? lockdep_init_map_type+0x21a/0x7f0 [ 39.238640][ T3597] ? __raw_spin_lock_init+0x36/0x110 [ 39.243913][ T3597] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 39.250141][ T3597] ? percpu_counter_add_batch+0xbd/0x180 [ 39.255761][ T3597] ? alloc_empty_file+0xd7/0x170 [ 39.260690][ T3597] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 39.266923][ T3597] ? errseq_sample+0x56/0x70 [ 39.271499][ T3597] ? rcu_read_lock_sched_held+0xd/0x70 [ 39.276947][ T3597] ? lock_acquire+0x442/0x510 [ 39.281610][ T3597] ? rcu_read_lock_sched_held+0xd/0x70 [ 39.287057][ T3597] ? lock_release+0x522/0x720 [ 39.291722][ T3597] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 39.297951][ T3597] ? fd_install+0x1c7/0x640 [ 39.302441][ T3597] ? lock_downgrade+0x6e0/0x6e0 [ 39.307277][ T3597] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 39.313506][ T3597] ? __fget_light+0x20f/0x270 [ 39.318172][ T3597] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 39.324403][ T3597] __sys_sendmsg+0xe5/0x1b0 [ 39.328897][ T3597] ? __sys_sendmsg_sock+0x30/0x30 [ 39.333913][ T3597] ? syscall_enter_from_user_mode+0x21/0x70 [ 39.339796][ T3597] ? trace_hardirqs_on+0x5b/0x1c0 [ 39.344823][ T3597] do_syscall_64+0x35/0x80 [ 39.349230][ T3597] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 39.355115][ T3597] RIP: 0033:0x7ff73ad7fbe9 [ 39.359515][ T3597] Code: 5c 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 39.379106][ T3597] RSP: 002b:00007ffee02a27e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 39.387507][ T3597] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007ff73ad7fbe9 [ 39.395466][ T3597] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000004 [ 39.403431][ T3597] RBP: 0000000000000003 R08: 000000000000000a R09: 000000000000000a [ 39.411392][ T3597] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffee02a2820 [ 39.419345][ T3597] R13: 00007ffee02a2840 R14: 00007ffee02a2818 R15: 0000000000000000 [ 39.427307][ T3597] [ 39.430379][ T3597] Kernel Offset: disabled [ 39.434689][ T3597] Rebooting in 86400 seconds..