[ 94.286828][ T27] audit: type=1800 audit(1582338497.701:27): pid=9934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 94.331980][ T27] audit: type=1800 audit(1582338497.731:28): pid=9934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 95.184440][ T27] audit: type=1800 audit(1582338498.651:29): pid=9934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 95.204914][ T27] audit: type=1800 audit(1582338498.651:30): pid=9934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.44' (ECDSA) to the list of known hosts. syzkaller login: [ 103.914807][T10089] IPVS: ftp: loaded support on port[0] = 21 [ 103.980912][T10089] chnl_net:caif_netlink_parms(): no params data found [ 104.024335][T10089] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.032783][T10089] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.041262][T10089] device bridge_slave_0 entered promiscuous mode [ 104.050498][T10089] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.058202][T10089] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.066103][T10089] device bridge_slave_1 entered promiscuous mode [ 104.085378][T10089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.098454][T10089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.120728][T10089] team0: Port device team_slave_0 added [ 104.128334][T10089] team0: Port device team_slave_1 added [ 104.145725][T10089] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 104.152908][T10089] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.179592][T10089] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 104.192531][T10089] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 104.199999][T10089] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.226701][T10089] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 104.318747][T10089] device hsr_slave_0 entered promiscuous mode [ 104.387301][T10089] device hsr_slave_1 entered promiscuous mode [ 104.529318][T10089] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 104.589837][T10089] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 104.650025][T10089] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 104.709522][T10089] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 104.795433][T10089] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.803988][T10089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.812307][T10089] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.819475][T10089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.890230][T10089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.909647][ T2798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.921874][ T2798] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.930834][ T2798] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.939247][ T2798] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 104.960088][T10089] 8021q: adding VLAN 0 to HW filter on device team0 [ 104.974396][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.984301][ T2902] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.991548][ T2902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.009561][ T2798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.019673][ T2798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.028730][ T2798] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.035879][ T2798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.043788][ T2798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 105.068991][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.078736][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 105.087947][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.098549][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.108019][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.117858][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.126484][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.134965][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.144349][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.153640][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 105.164384][T10089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 105.183630][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 105.191414][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 105.204976][T10089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.225783][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 105.234994][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.254783][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 105.264649][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.277610][T10089] device veth0_vlan entered promiscuous mode [ 105.286937][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.294969][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.307461][T10089] device veth1_vlan entered promiscuous mode [ 105.333057][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 105.342599][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 105.351121][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 105.360140][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.372155][T10089] device veth0_macvtap entered promiscuous mode [ 105.383246][T10089] device veth1_macvtap entered promiscuous mode [ 105.402372][T10089] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 105.410910][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 105.420199][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.428684][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.438216][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.451017][T10089] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 105.460376][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.469361][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 105.657011][ C0] ================================================================== [ 105.665380][ C0] BUG: KASAN: use-after-free in find_match+0xb39/0xc90 [ 105.672416][ C0] Read of size 8 at addr ffff8880a2f88320 by task ksoftirqd/0/9 [ 105.680119][ C0] [ 105.682454][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.6.0-rc1-syzkaller #0 [ 105.690674][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.700942][ C0] Call Trace: [ 105.704263][ C0] dump_stack+0x197/0x210 [ 105.708765][ C0] ? find_match+0xb39/0xc90 [ 105.713413][ C0] print_address_description.constprop.0.cold+0xd4/0x30b [ 105.720457][ C0] ? find_match+0xb39/0xc90 [ 105.725016][ C0] ? find_match+0xb39/0xc90 [ 105.729552][ C0] __kasan_report.cold+0x1b/0x32 [ 105.734497][ C0] ? find_match+0xb39/0xc90 [ 105.739003][ C0] kasan_report+0x12/0x20 [ 105.743450][ C0] __asan_report_load8_noabort+0x14/0x20 [ 105.749100][ C0] find_match+0xb39/0xc90 [ 105.753416][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 105.758453][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 105.764440][ C0] __find_rr_leaf+0x14e/0x750 [ 105.769152][ C0] ? nexthop_is_blackhole+0x690/0x690 [ 105.774734][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 105.780900][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 105.785963][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 105.791911][ C0] fib6_table_lookup+0x697/0xdb0 [ 105.796866][ C0] ? rt6_age_exceptions+0x130/0x130 [ 105.802070][ C0] ? __kasan_check_read+0x11/0x20 [ 105.807580][ C0] ip6_pol_route+0x1f6/0xa70 [ 105.812229][ C0] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 105.817877][ C0] ? csum_partial_ext+0x26/0x30 [ 105.822782][ C0] ? __skb_checksum+0x546/0x830 [ 105.827662][ C0] ip6_pol_route_input+0x65/0x80 [ 105.832621][ C0] fib6_rule_lookup+0x133/0x7d0 [ 105.837652][ C0] ? __skb_checksum_complete_head+0x2f0/0x2f0 [ 105.843739][ C0] ? skb_send_sock_locked+0x7e0/0x7e0 [ 105.849133][ C0] ? ip6_pol_route+0xa70/0xa70 [ 105.853954][ C0] ? fib6_lookup+0x340/0x340 [ 105.858611][ C0] ? nf_ip6_checksum+0x107/0x340 [ 105.863597][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 105.869841][ C0] ? ipvlan_ht_addr_lookup+0x2df/0x450 [ 105.875315][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 105.881235][ C0] ip6_route_input_lookup+0xb7/0xd0 [ 105.886460][ C0] ip6_route_input+0x5f0/0xa40 [ 105.891358][ C0] ? ip6_route_check_nh+0x670/0x670 [ 105.896562][ C0] ? ipvlan_link_new.cold+0x45/0x45 [ 105.901775][ C0] ? kmem_cache_free_bulk+0x140/0x290 [ 105.907175][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 105.912211][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 105.918044][ C0] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 105.923776][ C0] ? ipvlan_nf_input+0x190/0x190 [ 105.928743][ C0] ip6_rcv_finish+0x17a/0x310 [ 105.933411][ C0] ipv6_rcv+0x10e/0x420 [ 105.937569][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 105.943188][ C0] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 105.949314][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 105.954998][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 105.961024][ C0] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 105.966980][ C0] ? lock_acquire+0x190/0x410 [ 105.971692][ C0] ? process_backlog+0x1b5/0x780 [ 105.976648][ C0] __netif_receive_skb+0x2c/0x1d0 [ 105.981678][ C0] process_backlog+0x226/0x780 [ 105.986426][ C0] ? net_rx_action+0x27b/0x1120 [ 105.991286][ C0] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 105.996582][ C0] net_rx_action+0x508/0x1120 [ 106.001281][ C0] ? napi_busy_loop+0x970/0x970 [ 106.006279][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 106.011906][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 106.017908][ C0] ? trace_hardirqs_on+0x67/0x240 [ 106.022996][ C0] __do_softirq+0x262/0x98c [ 106.027527][ C0] ? takeover_tasklets+0x820/0x820 [ 106.032653][ C0] run_ksoftirqd+0x8e/0x110 [ 106.037158][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 106.042116][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 106.049751][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 106.056354][ C0] ? __kthread_parkme+0x108/0x1c0 [ 106.061478][ C0] ? __kasan_check_read+0x11/0x20 [ 106.066501][ C0] kthread+0x361/0x430 [ 106.070593][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 106.076958][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 106.082705][ C0] ret_from_fork+0x24/0x30 [ 106.087184][ C0] [ 106.089497][ C0] Allocated by task 10089: [ 106.093920][ C0] save_stack+0x23/0x90 [ 106.098076][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 106.103845][ C0] kasan_kmalloc+0x9/0x10 [ 106.108182][ C0] __kmalloc_node+0x4e/0x70 [ 106.112689][ C0] kvmalloc_node+0x68/0x100 [ 106.117182][ C0] alloc_netdev_mqs+0x98/0xe40 [ 106.121952][ C0] rtnl_create_link+0x22d/0xaf0 [ 106.126869][ C0] __rtnl_newlink+0xf9f/0x1790 [ 106.131663][ C0] rtnl_newlink+0x69/0xa0 [ 106.136010][ C0] rtnetlink_rcv_msg+0x45e/0xaf0 [ 106.141418][ C0] netlink_rcv_skb+0x177/0x450 [ 106.146317][ C0] rtnetlink_rcv+0x1d/0x30 [ 106.150862][ C0] netlink_unicast+0x59e/0x7e0 [ 106.155639][ C0] netlink_sendmsg+0x91c/0xea0 [ 106.160459][ C0] sock_sendmsg+0xd7/0x130 [ 106.164869][ C0] __sys_sendto+0x262/0x380 [ 106.169373][ C0] __x64_sys_sendto+0xe1/0x1a0 [ 106.174155][ C0] do_syscall_64+0xfa/0x790 [ 106.178796][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 106.184676][ C0] [ 106.187057][ C0] Freed by task 10089: [ 106.191390][ C0] save_stack+0x23/0x90 [ 106.195542][ C0] __kasan_slab_free+0x102/0x150 [ 106.200692][ C0] kasan_slab_free+0xe/0x10 [ 106.205248][ C0] kfree+0x10a/0x2c0 [ 106.209306][ C0] __netdev_name_node_alt_destroy+0x1ff/0x2a0 [ 106.215857][ C0] netdev_name_node_alt_destroy+0x57/0x80 [ 106.221668][ C0] rtnl_linkprop.isra.0+0x575/0x6f0 [ 106.226891][ C0] rtnl_dellinkprop+0x46/0x60 [ 106.231585][ C0] rtnetlink_rcv_msg+0x45e/0xaf0 [ 106.236533][ C0] netlink_rcv_skb+0x177/0x450 [ 106.241448][ C0] rtnetlink_rcv+0x1d/0x30 [ 106.246001][ C0] netlink_unicast+0x59e/0x7e0 [ 106.250957][ C0] netlink_sendmsg+0x91c/0xea0 [ 106.255712][ C0] sock_sendmsg+0xd7/0x130 [ 106.260245][ C0] ____sys_sendmsg+0x753/0x880 [ 106.265034][ C0] ___sys_sendmsg+0x100/0x170 [ 106.269712][ C0] __sys_sendmsg+0x105/0x1d0 [ 106.274310][ C0] __x64_sys_sendmsg+0x78/0xb0 [ 106.279084][ C0] do_syscall_64+0xfa/0x790 [ 106.283662][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 106.289551][ C0] [ 106.291879][ C0] The buggy address belongs to the object at ffff8880a2f88000 [ 106.291879][ C0] which belongs to the cache kmalloc-4k of size 4096 [ 106.306053][ C0] The buggy address is located 800 bytes inside of [ 106.306053][ C0] 4096-byte region [ffff8880a2f88000, ffff8880a2f89000) [ 106.319407][ C0] The buggy address belongs to the page: [ 106.325055][ C0] page:ffffea00028be200 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0 [ 106.336130][ C0] flags: 0xfffe0000010200(slab|head) [ 106.341431][ C0] raw: 00fffe0000010200 ffffea0002944908 ffffea00029d5d88 ffff8880aa402000 [ 106.350010][ C0] raw: 0000000000000000 ffff8880a2f88000 0000000100000001 0000000000000000 [ 106.358703][ C0] page dumped because: kasan: bad access detected [ 106.365119][ C0] [ 106.367444][ C0] Memory state around the buggy address: [ 106.373092][ C0] ffff8880a2f88200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 106.381216][ C0] ffff8880a2f88280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 106.389500][ C0] >ffff8880a2f88300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 106.397784][ C0] ^ [ 106.402913][ C0] ffff8880a2f88380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 106.410960][ C0] ffff8880a2f88400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 106.419002][ C0] ================================================================== [ 106.427045][ C0] Disabling lock debugging due to kernel taint [ 106.433310][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 106.439919][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Tainted: G B 5.6.0-rc1-syzkaller #0 [ 106.449552][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.459646][ C0] Call Trace: [ 106.463093][ C0] dump_stack+0x197/0x210 [ 106.467744][ C0] panic+0x2e3/0x75c [ 106.471663][ C0] ? add_taint.cold+0x16/0x16 [ 106.476939][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 106.481996][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 106.487159][ C0] ? find_match+0xb39/0xc90 [ 106.491745][ C0] end_report+0x47/0x4f [ 106.495914][ C0] ? find_match+0xb39/0xc90 [ 106.500404][ C0] __kasan_report.cold+0xe/0x32 [ 106.505240][ C0] ? find_match+0xb39/0xc90 [ 106.509742][ C0] kasan_report+0x12/0x20 [ 106.514077][ C0] __asan_report_load8_noabort+0x14/0x20 [ 106.520051][ C0] find_match+0xb39/0xc90 [ 106.524536][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 106.529593][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 106.535408][ C0] __find_rr_leaf+0x14e/0x750 [ 106.540092][ C0] ? nexthop_is_blackhole+0x690/0x690 [ 106.545470][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 106.551627][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 106.556635][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 106.562864][ C0] fib6_table_lookup+0x697/0xdb0 [ 106.567793][ C0] ? rt6_age_exceptions+0x130/0x130 [ 106.572994][ C0] ? __kasan_check_read+0x11/0x20 [ 106.578137][ C0] ip6_pol_route+0x1f6/0xa70 [ 106.582752][ C0] ? ip6_pol_route_lookup+0x12e0/0x12e0 [ 106.588312][ C0] ? csum_partial_ext+0x26/0x30 [ 106.593275][ C0] ? __skb_checksum+0x546/0x830 [ 106.598217][ C0] ip6_pol_route_input+0x65/0x80 [ 106.603180][ C0] fib6_rule_lookup+0x133/0x7d0 [ 106.608056][ C0] ? __skb_checksum_complete_head+0x2f0/0x2f0 [ 106.614270][ C0] ? skb_send_sock_locked+0x7e0/0x7e0 [ 106.619665][ C0] ? ip6_pol_route+0xa70/0xa70 [ 106.625119][ C0] ? fib6_lookup+0x340/0x340 [ 106.629815][ C0] ? nf_ip6_checksum+0x107/0x340 [ 106.634836][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 106.641202][ C0] ? ipvlan_ht_addr_lookup+0x2df/0x450 [ 106.646679][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 106.652717][ C0] ip6_route_input_lookup+0xb7/0xd0 [ 106.657960][ C0] ip6_route_input+0x5f0/0xa40 [ 106.662859][ C0] ? ip6_route_check_nh+0x670/0x670 [ 106.668062][ C0] ? ipvlan_link_new.cold+0x45/0x45 [ 106.673280][ C0] ? kmem_cache_free_bulk+0x140/0x290 [ 106.678732][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 106.684170][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 106.689997][ C0] ip6_rcv_finish_core.isra.0+0x174/0x590 [ 106.695743][ C0] ? ipvlan_nf_input+0x190/0x190 [ 106.700889][ C0] ip6_rcv_finish+0x17a/0x310 [ 106.705768][ C0] ipv6_rcv+0x10e/0x420 [ 106.710044][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 106.715635][ C0] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 106.721597][ C0] ? ip6_rcv_core.isra.0+0x1c30/0x1c30 [ 106.727069][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 106.732983][ C0] ? __netif_receive_skb_core+0x30b0/0x30b0 [ 106.738907][ C0] ? lock_acquire+0x190/0x410 [ 106.743581][ C0] ? process_backlog+0x1b5/0x780 [ 106.748536][ C0] __netif_receive_skb+0x2c/0x1d0 [ 106.753824][ C0] process_backlog+0x226/0x780 [ 106.758600][ C0] ? net_rx_action+0x27b/0x1120 [ 106.763507][ C0] ? lockdep_hardirqs_on+0x19e/0x5e0 [ 106.768801][ C0] net_rx_action+0x508/0x1120 [ 106.773499][ C0] ? napi_busy_loop+0x970/0x970 [ 106.778400][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 106.783975][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 106.789990][ C0] ? trace_hardirqs_on+0x67/0x240 [ 106.795396][ C0] __do_softirq+0x262/0x98c [ 106.800174][ C0] ? takeover_tasklets+0x820/0x820 [ 106.805468][ C0] run_ksoftirqd+0x8e/0x110 [ 106.810088][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 106.815141][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 106.821459][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 106.827696][ C0] ? __kthread_parkme+0x108/0x1c0 [ 106.832722][ C0] ? __kasan_check_read+0x11/0x20 [ 106.837766][ C0] kthread+0x361/0x430 [ 106.841849][ C0] ? __smpboot_create_thread.part.0+0x340/0x340 [ 106.848295][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 106.854085][ C0] ret_from_fork+0x24/0x30 [ 106.860263][ C0] Kernel Offset: disabled [ 106.864618][ C0] Rebooting in 86400 seconds..