Warning: Permanently added '10.128.0.236' (ECDSA) to the list of known hosts. 2020/07/19 21:40:53 fuzzer started 2020/07/19 21:40:54 dialing manager at 10.128.0.26:41463 2020/07/19 21:40:54 syscalls: 2944 2020/07/19 21:40:54 code coverage: enabled 2020/07/19 21:40:54 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/07/19 21:40:54 extra coverage: enabled 2020/07/19 21:40:54 setuid sandbox: enabled 2020/07/19 21:40:54 namespace sandbox: enabled 2020/07/19 21:40:54 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/19 21:40:54 fault injection: enabled 2020/07/19 21:40:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/19 21:40:54 net packet injection: enabled 2020/07/19 21:40:54 net device setup: enabled 2020/07/19 21:40:54 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/19 21:40:54 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/19 21:40:54 USB emulation: /dev/raw-gadget does not exist 21:44:43 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) syzkaller login: [ 349.661853][ T8459] IPVS: ftp: loaded support on port[0] = 21 [ 349.858932][ T8459] chnl_net:caif_netlink_parms(): no params data found [ 350.070204][ T8459] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.077597][ T8459] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.087257][ T8459] device bridge_slave_0 entered promiscuous mode [ 350.102130][ T8459] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.109566][ T8459] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.119953][ T8459] device bridge_slave_1 entered promiscuous mode [ 350.167495][ T8459] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 350.181572][ T8459] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 350.225415][ T8459] team0: Port device team_slave_0 added [ 350.236555][ T8459] team0: Port device team_slave_1 added [ 350.276110][ T8459] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 350.283594][ T8459] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 350.309936][ T8459] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 350.355295][ T8459] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 350.362376][ T8459] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 350.390178][ T8459] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 350.549937][ T8459] device hsr_slave_0 entered promiscuous mode [ 350.684234][ T8459] device hsr_slave_1 entered promiscuous mode [ 351.075386][ T8459] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 351.129333][ T8459] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 351.172827][ T8459] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 351.232167][ T8459] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 351.421237][ T8459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 351.458537][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 351.467598][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 351.505627][ T8459] 8021q: adding VLAN 0 to HW filter on device team0 [ 351.520155][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 351.529390][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 351.538871][ T3669] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.546143][ T3669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.625589][ T8459] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 351.636212][ T8459] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 351.663705][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 351.673263][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 351.683335][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 351.692725][ T3669] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.700022][ T3669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.709037][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 351.719828][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 351.730673][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 351.740992][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 351.751498][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 351.761821][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 351.772239][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 351.781904][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.793017][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 351.802678][ T3669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 351.820908][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 351.830679][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 351.863657][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 351.871379][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 351.903172][ T8459] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 352.000842][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 352.011156][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 352.065373][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 352.075309][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 352.103813][ T8459] device veth0_vlan entered promiscuous mode [ 352.111382][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 352.121227][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 352.142435][ T8459] device veth1_vlan entered promiscuous mode [ 352.211009][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 352.220902][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 352.230556][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 352.240554][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 352.278167][ T8459] device veth0_macvtap entered promiscuous mode [ 352.307338][ T8459] device veth1_macvtap entered promiscuous mode [ 352.341861][ T8459] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 352.350333][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 352.359961][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 352.369626][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 352.379492][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 352.399444][ T8459] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 352.430817][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 352.440924][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:44:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) 21:44:47 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x187d) 21:44:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x5, &(0x7f00000000c0)={0x0, 0x0}, 0x10) 21:44:47 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, &(0x7f0000000280)=""/4096, 0x1000) 21:44:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) [ 353.799510][ T8692] ===================================================== [ 353.806864][ T8692] BUG: KMSAN: uninit-value in nf_conntrack_udplite_packet+0x4e8/0x1110 [ 353.815111][ T8692] CPU: 1 PID: 8692 Comm: syz-executor.0 Not tainted 5.8.0-rc5-syzkaller #0 [ 353.823687][ T8692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.833749][ T8692] Call Trace: [ 353.837049][ T8692] dump_stack+0x1df/0x240 [ 353.841388][ T8692] kmsan_report+0xf7/0x1e0 [ 353.845901][ T8692] __msan_warning+0x58/0xa0 [ 353.850415][ T8692] nf_conntrack_udplite_packet+0x4e8/0x1110 [ 353.856329][ T8692] nf_conntrack_in+0x93d/0x26b1 [ 353.861303][ T8692] ipv6_conntrack_local+0x68/0x80 [ 353.866358][ T8692] ? ipv6_conntrack_in+0x80/0x80 [ 353.871300][ T8692] nf_hook_slow+0x16e/0x400 [ 353.875818][ T8692] __ip6_local_out+0x56d/0x750 [ 353.880593][ T8692] ? __ip6_local_out+0x750/0x750 [ 353.885643][ T8692] ip6_local_out+0xa4/0x1d0 [ 353.890243][ T8692] ip6_send_skb+0xfa/0x390 [ 353.896671][ T8692] udp_v6_send_skb+0x1834/0x1e80 [ 353.901638][ T8692] udpv6_sendmsg+0x4570/0x4940 [ 353.906406][ T8692] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 353.912475][ T8692] ? aa_label_sk_perm+0x767/0x930 [ 353.917591][ T8692] ? udpv6_sendmsg+0x4940/0x4940 [ 353.922549][ T8692] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 353.928618][ T8692] ? aa_sk_perm+0x83c/0xcd0 [ 353.933151][ T8692] ? udpv6_rcv+0x70/0x70 [ 353.937409][ T8692] ? udpv6_rcv+0x70/0x70 [ 353.941655][ T8692] inet6_sendmsg+0x276/0x2e0 [ 353.946257][ T8692] kernel_sendmsg+0x24a/0x440 [ 353.950947][ T8692] sock_no_sendpage+0x235/0x300 [ 353.955814][ T8692] ? sock_no_mmap+0x30/0x30 [ 353.960322][ T8692] sock_sendpage+0x1e1/0x2c0 [ 353.964934][ T8692] pipe_to_sendpage+0x38c/0x4c0 [ 353.969792][ T8692] ? sock_fasync+0x250/0x250 [ 353.974400][ T8692] __splice_from_pipe+0x565/0xf00 [ 353.979427][ T8692] ? generic_splice_sendpage+0x2d0/0x2d0 [ 353.985080][ T8692] generic_splice_sendpage+0x1d5/0x2d0 [ 353.990555][ T8692] ? iter_file_splice_write+0x1800/0x1800 [ 353.996288][ T8692] direct_splice_actor+0x1fd/0x580 [ 354.001418][ T8692] ? kmsan_get_metadata+0x4f/0x180 [ 354.006545][ T8692] splice_direct_to_actor+0x6b2/0xf50 [ 354.011931][ T8692] ? do_splice_direct+0x580/0x580 [ 354.016989][ T8692] do_splice_direct+0x342/0x580 [ 354.022292][ T8692] do_sendfile+0x101b/0x1d40 [ 354.026908][ T8692] __se_sys_sendfile64+0x2bb/0x360 [ 354.032166][ T8692] ? kmsan_get_metadata+0x4f/0x180 [ 354.037291][ T8692] __x64_sys_sendfile64+0x56/0x70 [ 354.042330][ T8692] do_syscall_64+0xb0/0x150 [ 354.046845][ T8692] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 354.052741][ T8692] RIP: 0033:0x45c1d9 [ 354.056629][ T8692] Code: Bad RIP value. [ 354.060687][ T8692] RSP: 002b:00007fe366df7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 354.069113][ T8692] RAX: ffffffffffffffda RBX: 0000000000025a00 RCX: 000000000045c1d9 [ 354.077084][ T8692] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 354.085068][ T8692] RBP: 000000000078bf48 R08: 0000000000000000 R09: 0000000000000000 [ 354.093049][ T8692] R10: 000000000000a808 R11: 0000000000000246 R12: 000000000078bf0c [ 354.101020][ T8692] R13: 0000000000c9fb6f R14: 00007fe366df89c0 R15: 000000000078bf0c [ 354.109004][ T8692] [ 354.111427][ T8692] Uninit was stored to memory at: [ 354.116459][ T8692] kmsan_internal_chain_origin+0xad/0x130 [ 354.122192][ T8692] __msan_chain_origin+0x50/0x90 [ 354.127131][ T8692] udp_v6_send_skb+0x19f5/0x1e80 [ 354.132072][ T8692] udpv6_sendmsg+0x4570/0x4940 [ 354.136833][ T8692] inet6_sendmsg+0x276/0x2e0 [ 354.141510][ T8692] kernel_sendmsg+0x24a/0x440 [ 354.146183][ T8692] sock_no_sendpage+0x235/0x300 [ 354.151035][ T8692] sock_sendpage+0x1e1/0x2c0 [ 354.155629][ T8692] pipe_to_sendpage+0x38c/0x4c0 [ 354.160583][ T8692] __splice_from_pipe+0x565/0xf00 [ 354.165779][ T8692] generic_splice_sendpage+0x1d5/0x2d0 [ 354.172209][ T8692] direct_splice_actor+0x1fd/0x580 [ 354.177425][ T8692] splice_direct_to_actor+0x6b2/0xf50 [ 354.182892][ T8692] do_splice_direct+0x342/0x580 [ 354.187756][ T8692] do_sendfile+0x101b/0x1d40 [ 354.192356][ T8692] __se_sys_sendfile64+0x2bb/0x360 [ 354.197559][ T8692] __x64_sys_sendfile64+0x56/0x70 [ 354.202758][ T8692] do_syscall_64+0xb0/0x150 [ 354.207266][ T8692] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 354.213143][ T8692] [ 354.215460][ T8692] Uninit was stored to memory at: [ 354.220480][ T8692] kmsan_internal_chain_origin+0xad/0x130 [ 354.226204][ T8692] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 354.232188][ T8692] kmsan_memcpy_metadata+0xb/0x10 [ 354.237217][ T8692] __msan_memcpy+0x43/0x50 [ 354.241640][ T8692] _copy_from_iter_full+0xbfe/0x13b0 [ 354.247061][ T8692] udplite_getfrag+0xb1/0x130 [ 354.251757][ T8692] __ip6_append_data+0x507b/0x6320 [ 354.256867][ T8692] ip6_make_skb+0x6ce/0xcf0 [ 354.261379][ T8692] udpv6_sendmsg+0x42f4/0x4940 [ 354.266142][ T8692] inet6_sendmsg+0x276/0x2e0 [ 354.270729][ T8692] kernel_sendmsg+0x24a/0x440 [ 354.275403][ T8692] sock_no_sendpage+0x235/0x300 [ 354.280309][ T8692] sock_sendpage+0x1e1/0x2c0 [ 354.285178][ T8692] pipe_to_sendpage+0x38c/0x4c0 [ 354.290382][ T8692] __splice_from_pipe+0x565/0xf00 [ 354.299242][ T8692] generic_splice_sendpage+0x1d5/0x2d0 [ 354.305408][ T8692] direct_splice_actor+0x1fd/0x580 [ 354.311395][ T8692] splice_direct_to_actor+0x6b2/0xf50 [ 354.316768][ T8692] do_splice_direct+0x342/0x580 [ 354.321615][ T8692] do_sendfile+0x101b/0x1d40 [ 354.326202][ T8692] __se_sys_sendfile64+0x2bb/0x360 [ 354.331308][ T8692] __x64_sys_sendfile64+0x56/0x70 [ 354.336353][ T8692] do_syscall_64+0xb0/0x150 [ 354.340869][ T8692] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 354.346756][ T8692] [ 354.349079][ T8692] Uninit was created at: [ 354.353328][ T8692] kmsan_save_stack_with_flags+0x3c/0x90 [ 354.358960][ T8692] kmsan_alloc_page+0xb9/0x180 [ 354.363727][ T8692] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 354.369279][ T8692] alloc_pages_current+0x672/0x990 [ 354.374409][ T8692] push_pipe+0x605/0xb70 [ 354.380312][ T8692] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 354.386035][ T8692] do_splice_to+0x4fc/0x14f0 [ 354.390626][ T8692] splice_direct_to_actor+0x45c/0xf50 [ 354.396000][ T8692] do_splice_direct+0x342/0x580 [ 354.400935][ T8692] do_sendfile+0x101b/0x1d40 [ 354.405541][ T8692] __se_sys_sendfile64+0x2bb/0x360 [ 354.410669][ T8692] __x64_sys_sendfile64+0x56/0x70 [ 354.415709][ T8692] do_syscall_64+0xb0/0x150 [ 354.420221][ T8692] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 354.426107][ T8692] ===================================================== [ 354.433034][ T8692] Disabling lock debugging due to kernel taint [ 354.439181][ T8692] Kernel panic - not syncing: panic_on_warn set ... [ 354.445779][ T8692] CPU: 1 PID: 8692 Comm: syz-executor.0 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 354.455755][ T8692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.465809][ T8692] Call Trace: [ 354.469107][ T8692] dump_stack+0x1df/0x240 [ 354.473472][ T8692] panic+0x3d5/0xc3e [ 354.477392][ T8692] kmsan_report+0x1df/0x1e0 [ 354.481909][ T8692] __msan_warning+0x58/0xa0 [ 354.486438][ T8692] nf_conntrack_udplite_packet+0x4e8/0x1110 [ 354.492344][ T8692] nf_conntrack_in+0x93d/0x26b1 [ 354.497250][ T8692] ipv6_conntrack_local+0x68/0x80 [ 354.502391][ T8692] ? ipv6_conntrack_in+0x80/0x80 [ 354.507329][ T8692] nf_hook_slow+0x16e/0x400 [ 354.511854][ T8692] __ip6_local_out+0x56d/0x750 [ 354.516644][ T8692] ? __ip6_local_out+0x750/0x750 [ 354.521586][ T8692] ip6_local_out+0xa4/0x1d0 [ 354.526279][ T8692] ip6_send_skb+0xfa/0x390 [ 354.530705][ T8692] udp_v6_send_skb+0x1834/0x1e80 [ 354.535661][ T8692] udpv6_sendmsg+0x4570/0x4940 [ 354.540456][ T8692] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 354.546525][ T8692] ? aa_label_sk_perm+0x767/0x930 [ 354.551559][ T8692] ? udpv6_sendmsg+0x4940/0x4940 [ 354.556520][ T8692] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 354.562586][ T8692] ? aa_sk_perm+0x83c/0xcd0 [ 354.567109][ T8692] ? udpv6_rcv+0x70/0x70 [ 354.571360][ T8692] ? udpv6_rcv+0x70/0x70 [ 354.575599][ T8692] inet6_sendmsg+0x276/0x2e0 [ 354.580194][ T8692] kernel_sendmsg+0x24a/0x440 [ 354.584867][ T8692] sock_no_sendpage+0x235/0x300 [ 354.589713][ T8692] ? sock_no_mmap+0x30/0x30 [ 354.594235][ T8692] sock_sendpage+0x1e1/0x2c0 [ 354.598858][ T8692] pipe_to_sendpage+0x38c/0x4c0 [ 354.603706][ T8692] ? sock_fasync+0x250/0x250 [ 354.608389][ T8692] __splice_from_pipe+0x565/0xf00 [ 354.613505][ T8692] ? generic_splice_sendpage+0x2d0/0x2d0 [ 354.619158][ T8692] generic_splice_sendpage+0x1d5/0x2d0 [ 354.624965][ T8692] ? iter_file_splice_write+0x1800/0x1800 [ 354.631109][ T8692] direct_splice_actor+0x1fd/0x580 [ 354.636215][ T8692] ? kmsan_get_metadata+0x4f/0x180 [ 354.641322][ T8692] splice_direct_to_actor+0x6b2/0xf50 [ 354.646767][ T8692] ? do_splice_direct+0x580/0x580 [ 354.651996][ T8692] do_splice_direct+0x342/0x580 [ 354.656855][ T8692] do_sendfile+0x101b/0x1d40 [ 354.661536][ T8692] __se_sys_sendfile64+0x2bb/0x360 [ 354.666638][ T8692] ? kmsan_get_metadata+0x4f/0x180 [ 354.671742][ T8692] __x64_sys_sendfile64+0x56/0x70 [ 354.676757][ T8692] do_syscall_64+0xb0/0x150 [ 354.681364][ T8692] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 354.687286][ T8692] RIP: 0033:0x45c1d9 [ 354.691258][ T8692] Code: Bad RIP value. [ 354.695313][ T8692] RSP: 002b:00007fe366df7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 354.703710][ T8692] RAX: ffffffffffffffda RBX: 0000000000025a00 RCX: 000000000045c1d9 [ 354.711665][ T8692] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 354.719623][ T8692] RBP: 000000000078bf48 R08: 0000000000000000 R09: 0000000000000000 [ 354.727580][ T8692] R10: 000000000000a808 R11: 0000000000000246 R12: 000000000078bf0c [ 354.735539][ T8692] R13: 0000000000c9fb6f R14: 00007fe366df89c0 R15: 000000000078bf0c [ 354.745053][ T8692] Kernel Offset: 0xc000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 354.756673][ T8692] Rebooting in 86400 seconds..