[ 83.389805][ T27] audit: type=1400 audit(1582213489.343:37): avc: denied { watch } for pid=10538 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [ 83.431728][ T27] audit: type=1400 audit(1582213489.383:38): avc: denied { watch } for pid=10538 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 83.645075][ T27] audit: type=1800 audit(1582213489.603:39): pid=10445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 83.666911][ T27] audit: type=1800 audit(1582213489.603:40): pid=10445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 85.372432][ T27] audit: type=1400 audit(1582213491.333:41): avc: denied { map } for pid=10621 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.113' (ECDSA) to the list of known hosts. [ 124.947291][ T27] audit: type=1400 audit(1582213530.903:42): avc: denied { map } for pid=10633 comm="syz-executor472" path="/root/syz-executor472591850" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 124.975441][T10634] IPVS: ftp: loaded support on port[0] = 21 [ 125.028025][T10634] chnl_net:caif_netlink_parms(): no params data found [ 125.067831][T10634] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.075454][T10634] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.083643][T10634] device bridge_slave_0 entered promiscuous mode [ 125.093236][T10634] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.100851][T10634] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.108616][T10634] device bridge_slave_1 entered promiscuous mode [ 125.127014][T10634] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 125.138776][T10634] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 125.160475][T10634] team0: Port device team_slave_0 added [ 125.168343][T10634] team0: Port device team_slave_1 added [ 125.185956][T10634] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 125.193327][T10634] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.219615][T10634] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 125.232643][T10634] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 125.239734][T10634] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.265883][T10634] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 125.342244][T10634] device hsr_slave_0 entered promiscuous mode [ 125.381146][T10634] device hsr_slave_1 entered promiscuous mode [ 125.488773][ T27] audit: type=1400 audit(1582213531.443:43): avc: denied { create } for pid=10634 comm="syz-executor472" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 125.491953][T10634] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 125.523143][ T27] audit: type=1400 audit(1582213531.443:44): avc: denied { write } for pid=10634 comm="syz-executor472" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 125.549859][ T27] audit: type=1400 audit(1582213531.443:45): avc: denied { read } for pid=10634 comm="syz-executor472" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 125.593007][T10634] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 125.633041][T10634] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 125.693388][T10634] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 125.789486][T10634] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.796998][T10634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.804968][T10634] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.812127][T10634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.868745][T10634] 8021q: adding VLAN 0 to HW filter on device bond0 [ 125.884714][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.895466][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.915090][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.923871][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 125.937552][T10634] 8021q: adding VLAN 0 to HW filter on device team0 [ 125.949673][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.959960][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.967109][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.992241][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.001432][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.008575][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.016872][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 126.026526][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 126.040318][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 126.049228][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 126.058174][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 126.067057][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.079451][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.088230][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.105157][T10634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 126.125421][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 126.133090][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 126.147196][T10634] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 126.168580][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 126.177251][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.199601][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 126.208612][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.217544][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.226066][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.236906][T10634] device veth0_vlan entered promiscuous mode [ 126.252786][T10634] device veth1_vlan entered promiscuous mode [ 126.279271][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 126.287510][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 126.295733][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 126.304203][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.316588][T10634] device veth0_macvtap entered promiscuous mode [ 126.327156][T10634] device veth1_macvtap entered promiscuous mode [ 126.348548][T10634] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 126.356968][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 126.365308][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 126.374302][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 126.384119][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.396895][T10634] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 126.404340][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.413210][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 126.570812][ C0] ================================================================== [ 126.579252][ C0] BUG: KASAN: use-after-free in find_match+0xb39/0xc90 [ 126.586184][ C0] Read of size 8 at addr ffff888094ede320 by task ksoftirqd/0/9 [ 126.593886][ C0] [ 126.596256][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.6.0-rc2-syzkaller #0 [ 126.604349][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.614536][ C0] Call Trace: [ 126.617850][ C0] dump_stack+0x197/0x210 [ 126.622175][ C0] ? find_match+0xb39/0xc90 [ 126.626806][ C0] print_address_description.constprop.0.cold+0xd4/0x30b [ 126.633998][ C0] ? find_match+0xb39/0xc90 [ 126.638634][ C0] ? find_match+0xb39/0xc90 [ 126.643133][ C0] __kasan_report.cold+0x1b/0x32 [ 126.648182][ C0] ? find_match+0xb39/0xc90 [ 126.652755][ C0] kasan_report+0x12/0x20 [ 126.657230][ C0] __asan_report_load8_noabort+0x14/0x20 [ 126.662857][ C0] find_match+0xb39/0xc90 [ 126.667243][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 126.672259][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 126.678127][ C0] __find_rr_leaf+0x14e/0x750 [ 126.682836][ C0] ? nexthop_is_blackhole+0x690/0x690 [ 126.688246][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 126.694403][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 126.699429][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 126.705394][ C0] fib6_table_lookup+0x697/0xdb0 [ 126.710359][ C0] ? rt6_age_exceptions+0x130/0x130 [ 126.715558][ C0] ? __kasan_check_read+0x11/0x20 [ 126.720580][ C0] ip6_pol_route+0x1f6/0xa70 [ 126.725265][ C0] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 126.730826][ C0] ? flow_hash_from_keys+0x2c4/0x8c0 [ 126.736239][ C0] ip6_pol_route_input+0x65/0x80 [ 126.741171][ C0] fib6_rule_lookup+0x133/0x7d0 [ 126.746193][ C0] ? ip6_pol_route+0xa70/0xa70 [ 126.750980][ C0] ? fib6_lookup+0x340/0x340 [ 126.755586][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 126.761821][ C0] ? ipvlan_ht_addr_lookup+0x2df/0x450 [ 126.767338][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 126.773228][ C0] ip6_route_input_lookup+0xb7/0xd0 [ 126.778428][ C0] ip6_route_input+0x5f0/0xa40 [ 126.783187][ C0] ? ip6_route_check_nh+0x670/0x670 [ 126.788588][ C0] ? ipvlan_link_new.cold+0x45/0x45 [ 126.793942][ C0] ? cpuup_canceled+0xf8/0x1d0 [ 126.798819][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 126.803862][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 126.809662][ C0] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 126.815423][ C0] ? ipvlan_nf_input+0x190/0x190 [ 126.820448][ C0] ip6_rcv_finish+0x17a/0x310 [ 126.825174][ C0] ipv6_rcv+0x10e/0x420 [ 126.829315][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 126.834805][ C0] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 126.840877][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 126.846348][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 126.852728][ C0] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 126.858740][ C0] ? lock_acquire+0x190/0x410 [ 126.868454][ C0] ? process_backlog+0x1b5/0x780 [ 126.873474][ C0] __netif_receive_skb+0x2c/0x1d0 [ 126.878615][ C0] process_backlog+0x226/0x780 [ 126.883496][ C0] ? net_rx_action+0x27b/0x1120 [ 126.888340][ C0] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 126.893677][ C0] net_rx_action+0x508/0x1120 [ 126.898554][ C0] ? napi_busy_loop+0x970/0x970 [ 126.903421][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 126.909258][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 126.915336][ C0] ? trace_hardirqs_on+0x67/0x240 [ 126.920370][ C0] __do_softirq+0x262/0x98c [ 126.924884][ C0] ? takeover_tasklets+0x820/0x820 [ 126.930216][ C0] run_ksoftirqd+0x8e/0x110 [ 126.935095][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 126.940042][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 126.946659][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 126.952945][ C0] ? __kthread_parkme+0x108/0x1c0 [ 126.957968][ C0] ? __kasan_check_read+0x11/0x20 [ 126.962996][ C0] kthread+0x361/0x430 [ 126.967133][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 126.973365][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 126.979089][ C0] ret_from_fork+0x24/0x30 [ 126.983608][ C0] [ 126.985931][ C0] Allocated by task 10634: [ 126.990347][ C0] save_stack+0x23/0x90 [ 126.994603][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 127.000240][ C0] kasan_kmalloc+0x9/0x10 [ 127.004574][ C0] __kmalloc_node+0x4e/0x70 [ 127.009163][ C0] kvmalloc_node+0x68/0x100 [ 127.013709][ C0] alloc_netdev_mqs+0x98/0xe40 [ 127.018559][ C0] vti6_init_net+0x244/0x810 [ 127.023158][ C0] ops_init+0xb3/0x420 [ 127.027230][ C0] setup_net+0x2d5/0x8b0 [ 127.031474][ C0] copy_net_ns+0x29e/0x5a0 [ 127.036182][ C0] create_new_namespaces+0x403/0xb50 [ 127.041501][ C0] unshare_nsproxy_namespaces+0xc2/0x200 [ 127.047406][ C0] ksys_unshare+0x444/0x980 [ 127.052029][ C0] __x64_sys_unshare+0x31/0x40 [ 127.057067][ C0] do_syscall_64+0xfa/0x790 [ 127.061663][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 127.067547][ C0] [ 127.069883][ C0] Freed by task 10634: [ 127.074100][ C0] save_stack+0x23/0x90 [ 127.078357][ C0] __kasan_slab_free+0x102/0x150 [ 127.083306][ C0] kasan_slab_free+0xe/0x10 [ 127.087796][ C0] kfree+0x10a/0x2c0 [ 127.091688][ C0] __netdev_name_node_alt_destroy+0x1ff/0x2a0 [ 127.097756][ C0] netdev_name_node_alt_destroy+0x57/0x80 [ 127.103477][ C0] rtnl_linkprop.isra.0+0x575/0x6f0 [ 127.108722][ C0] rtnl_dellinkprop+0x46/0x60 [ 127.113508][ C0] rtnetlink_rcv_msg+0x45e/0xaf0 [ 127.118443][ C0] netlink_rcv_skb+0x177/0x450 [ 127.123259][ C0] rtnetlink_rcv+0x1d/0x30 [ 127.127690][ C0] netlink_unicast+0x59e/0x7e0 [ 127.132453][ C0] netlink_sendmsg+0x91c/0xea0 [ 127.137218][ C0] sock_sendmsg+0xd7/0x130 [ 127.141778][ C0] ____sys_sendmsg+0x753/0x880 [ 127.146542][ C0] ___sys_sendmsg+0x100/0x170 [ 127.151252][ C0] __sys_sendmsg+0x105/0x1d0 [ 127.155866][ C0] __x64_sys_sendmsg+0x78/0xb0 [ 127.160635][ C0] do_syscall_64+0xfa/0x790 [ 127.165161][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 127.171141][ C0] [ 127.173455][ C0] The buggy address belongs to the object at ffff888094ede000 [ 127.173455][ C0] which belongs to the cache kmalloc-4k of size 4096 [ 127.187807][ C0] The buggy address is located 800 bytes inside of [ 127.187807][ C0] 4096-byte region [ffff888094ede000, ffff888094edf000) [ 127.202148][ C0] The buggy address belongs to the page: [ 127.207783][ C0] page:ffffea000253b780 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0 [ 127.218716][ C0] flags: 0xfffe0000010200(slab|head) [ 127.224171][ C0] raw: 00fffe0000010200 ffffea00027afc08 ffffea00021c3788 ffff8880aa402000 [ 127.232792][ C0] raw: 0000000000000000 ffff888094ede000 0000000100000001 0000000000000000 [ 127.241413][ C0] page dumped because: kasan: bad access detected [ 127.247807][ C0] [ 127.250214][ C0] Memory state around the buggy address: [ 127.256003][ C0] ffff888094ede200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 127.264090][ C0] ffff888094ede280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 127.272176][ C0] >ffff888094ede300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 127.280215][ C0] ^ [ 127.285318][ C0] ffff888094ede380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 127.293806][ C0] ffff888094ede400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 127.301977][ C0] ================================================================== [ 127.310037][ C0] Disabling lock debugging due to kernel taint [ 127.316250][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 127.322873][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 127.332436][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.342482][ C0] Call Trace: [ 127.345770][ C0] dump_stack+0x197/0x210 [ 127.350220][ C0] panic+0x2e3/0x75c [ 127.354183][ C0] ? add_taint.cold+0x16/0x16 [ 127.358901][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 127.363924][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 127.369004][ C0] ? find_match+0xb39/0xc90 [ 127.373562][ C0] end_report+0x47/0x4f [ 127.377848][ C0] ? find_match+0xb39/0xc90 [ 127.382340][ C0] __kasan_report.cold+0xe/0x32 [ 127.387186][ C0] ? find_match+0xb39/0xc90 [ 127.391673][ C0] kasan_report+0x12/0x20 [ 127.395998][ C0] __asan_report_load8_noabort+0x14/0x20 [ 127.401622][ C0] find_match+0xb39/0xc90 [ 127.405947][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 127.411018][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 127.416866][ C0] __find_rr_leaf+0x14e/0x750 [ 127.421709][ C0] ? nexthop_is_blackhole+0x690/0x690 [ 127.427301][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 127.433579][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 127.438601][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 127.444403][ C0] fib6_table_lookup+0x697/0xdb0 [ 127.449332][ C0] ? rt6_age_exceptions+0x130/0x130 [ 127.454630][ C0] ? __kasan_check_read+0x11/0x20 [ 127.459822][ C0] ip6_pol_route+0x1f6/0xa70 [ 127.464399][ C0] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 127.469985][ C0] ? flow_hash_from_keys+0x2c4/0x8c0 [ 127.475279][ C0] ip6_pol_route_input+0x65/0x80 [ 127.480217][ C0] fib6_rule_lookup+0x133/0x7d0 [ 127.485057][ C0] ? ip6_pol_route+0xa70/0xa70 [ 127.489814][ C0] ? fib6_lookup+0x340/0x340 [ 127.494515][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 127.500844][ C0] ? ipvlan_ht_addr_lookup+0x2df/0x450 [ 127.506321][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 127.512203][ C0] ip6_route_input_lookup+0xb7/0xd0 [ 127.517454][ C0] ip6_route_input+0x5f0/0xa40 [ 127.523099][ C0] ? ip6_route_check_nh+0x670/0x670 [ 127.528409][ C0] ? ipvlan_link_new.cold+0x45/0x45 [ 127.533620][ C0] ? cpuup_canceled+0xf8/0x1d0 [ 127.538382][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 127.543402][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 127.549209][ C0] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 127.554931][ C0] ? ipvlan_nf_input+0x190/0x190 [ 127.559929][ C0] ip6_rcv_finish+0x17a/0x310 [ 127.564605][ C0] ipv6_rcv+0x10e/0x420 [ 127.568740][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 127.574268][ C0] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 127.580438][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 127.586100][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 127.592037][ C0] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 127.597941][ C0] ? lock_acquire+0x190/0x410 [ 127.602647][ C0] ? process_backlog+0x1b5/0x780 [ 127.607570][ C0] __netif_receive_skb+0x2c/0x1d0 [ 127.612606][ C0] process_backlog+0x226/0x780 [ 127.617423][ C0] ? net_rx_action+0x27b/0x1120 [ 127.622287][ C0] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 127.627571][ C0] net_rx_action+0x508/0x1120 [ 127.632241][ C0] ? napi_busy_loop+0x970/0x970 [ 127.637087][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 127.642733][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 127.648821][ C0] ? trace_hardirqs_on+0x67/0x240 [ 127.653839][ C0] __do_softirq+0x262/0x98c [ 127.658356][ C0] ? takeover_tasklets+0x820/0x820 [ 127.663583][ C0] run_ksoftirqd+0x8e/0x110 [ 127.668133][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 127.673096][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 127.679439][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 127.685672][ C0] ? __kthread_parkme+0x108/0x1c0 [ 127.690684][ C0] ? __kasan_check_read+0x11/0x20 [ 127.695714][ C0] kthread+0x361/0x430 [ 127.699919][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 127.706179][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 127.711893][ C0] ret_from_fork+0x24/0x30 [ 127.718014][ C0] Kernel Offset: disabled [ 127.722393][ C0] Rebooting in 86400 seconds..