[ 30.339955][ T3176] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.351667][ T3176] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: OK syzkaller syzkaller login: [ 43.350327][ T26] kauditd_printk_skb: 37 callbacks suppressed [ 43.350344][ T26] audit: type=1400 audit(1645881899.143:73): avc: denied { transition } for pid=3564 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 43.393525][ T26] audit: type=1400 audit(1645881899.153:74): avc: denied { write } for pid=3564 comm="sh" path="pipe:[27198]" dev="pipefs" ino=27198 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.10.16' (ECDSA) to the list of known hosts. [ 52.069516][ T26] audit: type=1400 audit(1645881907.863:75): avc: denied { execmem } for pid=3590 comm="syz-executor116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 52.093657][ T26] audit: type=1400 audit(1645881907.893:76): avc: denied { mounton } for pid=3591 comm="syz-executor116" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 52.117686][ T26] audit: type=1400 audit(1645881907.893:77): avc: denied { mount } for pid=3591 comm="syz-executor116" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 52.140442][ T26] audit: type=1400 audit(1645881907.893:78): avc: denied { create } for pid=3591 comm="syz-executor116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 52.160814][ T26] audit: type=1400 audit(1645881907.893:79): avc: denied { read write } for pid=3591 comm="syz-executor116" name="vhci" dev="devtmpfs" ino=1072 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 52.185034][ T26] audit: type=1400 audit(1645881907.893:80): avc: denied { open } for pid=3591 comm="syz-executor116" path="/dev/vhci" dev="devtmpfs" ino=1072 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 53.130270][ T26] audit: type=1400 audit(1645881908.923:81): avc: denied { ioctl } for pid=3591 comm="syz-executor116" path="socket:[28024]" dev="sockfs" ino=28024 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 53.145005][ T3592] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 53.163836][ T3592] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 53.171326][ T3592] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 53.179551][ T3595] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 53.187306][ T3595] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 53.195080][ T3595] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 53.210349][ T26] audit: type=1400 audit(1645881909.003:82): avc: denied { mounton } for pid=3591 comm="syz-executor116" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 53.283523][ T3591] chnl_net:caif_netlink_parms(): no params data found [ 53.327482][ T3591] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.335766][ T3591] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.343843][ T3591] device bridge_slave_0 entered promiscuous mode [ 53.353681][ T3591] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.361010][ T3591] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.369104][ T3591] device bridge_slave_1 entered promiscuous mode [ 53.390855][ T3591] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.401849][ T3591] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.425918][ T3591] team0: Port device team_slave_0 added [ 53.434067][ T3591] team0: Port device team_slave_1 added [ 53.451866][ T3591] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 53.459078][ T3591] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.485442][ T3591] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 53.498893][ T3591] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 53.506120][ T3591] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 53.532156][ T3591] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 53.559802][ T3591] device hsr_slave_0 entered promiscuous mode [ 53.567321][ T3591] device hsr_slave_1 entered promiscuous mode [ 53.653549][ T26] audit: type=1400 audit(1645881909.453:83): avc: denied { create } for pid=3591 comm="syz-executor116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.655743][ T3591] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 53.677605][ T26] audit: type=1400 audit(1645881909.453:84): avc: denied { write } for pid=3591 comm="syz-executor116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.706963][ T3591] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 53.717017][ T3591] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 53.725857][ T3591] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 53.750321][ T3591] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.757520][ T3591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.765500][ T3591] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.772596][ T3591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.820083][ T3591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.833189][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.845679][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.855256][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.865366][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 53.878631][ T3591] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.890262][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.899951][ T3600] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.907069][ T3600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.920267][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.928933][ T3601] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.936065][ T3601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.954337][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.963937][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.984086][ T3591] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.995824][ T3591] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.009531][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.018147][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.027440][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.036157][ T3601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.053378][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 54.064459][ T3603] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 54.078405][ T3591] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.226270][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 54.239012][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 54.248063][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.256767][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.267053][ T3591] device veth0_vlan entered promiscuous mode [ 54.278195][ T3591] device veth1_vlan entered promiscuous mode [ 54.287032][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 54.307339][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 54.316491][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 54.330583][ T3591] device veth0_macvtap entered promiscuous mode [ 54.341245][ T3591] device veth1_macvtap entered promiscuous mode [ 54.357528][ T3591] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 54.365577][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 54.374278][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 54.383156][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 54.391788][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 54.404110][ T3591] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 54.412536][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 54.421109][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 54.431861][ T3591] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.441615][ T3591] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.450867][ T3591] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.460573][ T3591] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 54.505868][ T3591] ================================================================== [ 54.514033][ T3591] BUG: KASAN: slab-out-of-bounds in ipvlan_queue_xmit+0x173f/0x19e0 [ 54.522035][ T3591] Read of size 4 at addr ffff88806dfbabff by task syz-executor116/3591 [ 54.530298][ T3591] [ 54.532700][ T3591] CPU: 0 PID: 3591 Comm: syz-executor116 Not tainted 5.17.0-rc5-syzkaller-00272-g9137eda53752 #0 [ 54.543186][ T3591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.553231][ T3591] Call Trace: [ 54.556524][ T3591] [ 54.559445][ T3591] dump_stack_lvl+0xcd/0x134 [ 54.564046][ T3591] print_address_description.constprop.0.cold+0x8d/0x303 [ 54.571101][ T3591] ? ipvlan_queue_xmit+0x173f/0x19e0 [ 54.576404][ T3591] ? ipvlan_queue_xmit+0x173f/0x19e0 [ 54.581686][ T3591] kasan_report.cold+0x83/0xdf [ 54.586455][ T3591] ? ipvlan_queue_xmit+0x173f/0x19e0 [ 54.591731][ T3591] ipvlan_queue_xmit+0x173f/0x19e0 [ 54.596831][ T3591] ? ipvlan_handle_mode_l3+0x140/0x140 [ 54.602281][ T3591] ? skb_network_protocol+0x148/0x580 [ 54.607660][ T3591] ? skb_crc32c_csum_help+0x70/0x70 [ 54.612856][ T3591] ? copyin.part.0+0xeb/0x110 [ 54.617521][ T3591] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 54.623767][ T3591] ? validate_xmit_xfrm+0x498/0x1050 [ 54.629043][ T3591] ? netif_skb_features+0x38d/0xb90 [ 54.634228][ T3591] ipvlan_start_xmit+0x45/0x190 [ 54.639070][ T3591] __dev_direct_xmit+0x52f/0x740 [ 54.644005][ T3591] ? validate_xmit_skb_list+0x120/0x120 [ 54.649563][ T3591] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 54.655793][ T3591] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 54.662028][ T3591] ? netdev_pick_tx+0x14f/0xbe0 [ 54.666882][ T3591] packet_direct_xmit+0x1b8/0x2c0 [ 54.671894][ T3591] packet_sendmsg+0x2226/0x5270 [ 54.676818][ T3591] ? selinux_socket_sendmsg+0x203/0x2b0 [ 54.682350][ T3591] ? selinux_socket_getsockname+0x2b0/0x2b0 [ 54.688244][ T3591] ? tomoyo_socket_sendmsg_permission+0x130/0x3a0 [ 54.694646][ T3591] ? tomoyo_socket_bind_permission+0x330/0x330 [ 54.700787][ T3591] ? packet_lookup_frame.isra.0+0x1c0/0x1c0 [ 54.706671][ T3591] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 54.712915][ T3591] ? packet_lookup_frame.isra.0+0x1c0/0x1c0 [ 54.718802][ T3591] sock_sendmsg+0xcf/0x120 [ 54.723217][ T3591] __sys_sendto+0x21c/0x320 [ 54.727712][ T3591] ? __ia32_sys_getpeername+0xb0/0xb0 [ 54.733073][ T3591] ? __context_tracking_exit+0xb8/0xe0 [ 54.738529][ T3591] ? lock_downgrade+0x6e0/0x6e0 [ 54.743391][ T3591] __x64_sys_sendto+0xdd/0x1b0 [ 54.748145][ T3591] ? lockdep_hardirqs_on+0x79/0x100 [ 54.753334][ T3591] ? syscall_enter_from_user_mode+0x21/0x70 [ 54.759316][ T3591] do_syscall_64+0x35/0xb0 [ 54.763731][ T3591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 54.769639][ T3591] RIP: 0033:0x7f68b39ff799 [ 54.774043][ T3591] Code: 5c 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.793680][ T3591] RSP: 002b:00007fff588e8ce8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 54.802092][ T3591] RAX: ffffffffffffffda RBX: 00007f68b3a82e90 RCX: 00007f68b39ff799 [ 54.810067][ T3591] RDX: 000000000000000e RSI: 0000000020000080 RDI: 0000000000000005 [ 54.818037][ T3591] RBP: 0000000000000003 R08: 0000000020000040 R09: 0000000000000014 [ 54.825997][ T3591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff588e8d40 [ 54.833961][ T3591] R13: 00007fff588e8d30 R14: 00007fff588e8d60 R15: 00007fff588e8d24 [ 54.841927][ T3591] [ 54.844937][ T3591] [ 54.847245][ T3591] Allocated by task 3591: [ 54.851640][ T3591] kasan_save_stack+0x1e/0x40 [ 54.856312][ T3591] __kasan_slab_alloc+0x85/0xb0 [ 54.861156][ T3591] kmem_cache_alloc+0x265/0x560 [ 54.866171][ T3591] fib_table_insert+0x38e/0x1bd0 [ 54.871188][ T3591] fib_magic+0x455/0x540 [ 54.875421][ T3591] fib_add_ifaddr+0x395/0x500 [ 54.880089][ T3591] fib_netdev_event+0x462/0x680 [ 54.884937][ T3591] notifier_call_chain+0xb5/0x200 [ 54.890071][ T3591] call_netdevice_notifiers_info+0xb5/0x130 [ 54.895981][ T3591] __dev_notify_flags+0x110/0x2b0 [ 54.900997][ T3591] dev_change_flags+0x112/0x170 [ 54.905837][ T3591] do_setlink+0x96d/0x3a10 [ 54.910336][ T3591] __rtnl_newlink+0xdf5/0x1760 [ 54.915195][ T3591] rtnl_newlink+0x64/0xa0 [ 54.919521][ T3591] rtnetlink_rcv_msg+0x413/0xb80 [ 54.924550][ T3591] netlink_rcv_skb+0x153/0x420 [ 54.929300][ T3591] netlink_unicast+0x539/0x7e0 [ 54.934050][ T3591] netlink_sendmsg+0x904/0xe00 [ 54.938838][ T3591] sock_sendmsg+0xcf/0x120 [ 54.943245][ T3591] __sys_sendto+0x21c/0x320 [ 54.947836][ T3591] __x64_sys_sendto+0xdd/0x1b0 [ 54.952601][ T3591] do_syscall_64+0x35/0xb0 [ 54.957068][ T3591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 54.964201][ T3591] [ 54.966508][ T3591] The buggy address belongs to the object at ffff88806dfbabb0 [ 54.966508][ T3591] which belongs to the cache ip_fib_alias of size 56 [ 54.980759][ T3591] The buggy address is located 23 bytes to the right of [ 54.980759][ T3591] 56-byte region [ffff88806dfbabb0, ffff88806dfbabe8) [ 54.994460][ T3591] The buggy address belongs to the page: [ 55.000117][ T3591] page:ffffea0001b7ee80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x6dfba [ 55.010353][ T3591] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 55.017912][ T3591] raw: 00fff00000000200 ffffea0001b7de08 ffff8880175a6f50 ffff8881460ea100 [ 55.026748][ T3591] raw: 0000000000000000 ffff88806dfba000 000000010000002e 0000000000000000 [ 55.035315][ T3591] page dumped because: kasan: bad access detected [ 55.041709][ T3591] page_owner tracks the page as allocated [ 55.047538][ T3591] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2420c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_COMP|__GFP_THISNODE), pid 3591, ts 54401485435, free_ts 12904851914 [ 55.065339][ T3591] get_page_from_freelist+0xa72/0x2f50 [ 55.071018][ T3591] __alloc_pages+0x1b2/0x500 [ 55.075960][ T3591] cache_grow_begin+0x75/0x390 [ 55.080940][ T3591] cache_alloc_refill+0x27f/0x380 [ 55.085978][ T3591] kmem_cache_alloc+0x450/0x560 [ 55.090818][ T3591] fib_table_insert+0x38e/0x1bd0 [ 55.095744][ T3591] fib_magic+0x455/0x540 [ 55.099975][ T3591] fib_add_ifaddr+0x16c/0x500 [ 55.104648][ T3591] fib_inetaddr_event+0x162/0x2a0 [ 55.109662][ T3591] notifier_call_chain+0xb5/0x200 [ 55.114675][ T3591] blocking_notifier_call_chain+0x67/0x90 [ 55.120386][ T3591] __inet_insert_ifa+0x919/0xc20 [ 55.125319][ T3591] inet_rtm_newaddr+0xcb9/0x13c0 [ 55.130253][ T3591] rtnetlink_rcv_msg+0x413/0xb80 [ 55.135272][ T3591] netlink_rcv_skb+0x153/0x420 [ 55.140032][ T3591] netlink_unicast+0x539/0x7e0 [ 55.144803][ T3591] page last free stack trace: [ 55.149479][ T3591] free_pcp_prepare+0x374/0x870 [ 55.154326][ T3591] free_unref_page+0x19/0x690 [ 55.159034][ T3591] free_contig_range+0xa8/0xf0 [ 55.163782][ T3591] destroy_args+0xa8/0x646 [ 55.168202][ T3591] debug_vm_pgtable+0x298e/0x2a20 [ 55.173216][ T3591] do_one_initcall+0x103/0x650 [ 55.177993][ T3591] kernel_init_freeable+0x6b1/0x73a [ 55.183176][ T3591] kernel_init+0x1a/0x1d0 [ 55.187487][ T3591] ret_from_fork+0x1f/0x30 [ 55.191892][ T3591] [ 55.194892][ T3591] Memory state around the buggy address: [ 55.200511][ T3591] ffff88806dfbaa80: 00 fc fc fc fc 00 00 00 00 00 00 00 fc fc fc fc [ 55.208562][ T3591] ffff88806dfbab00: 00 00 00 00 00 00 00 fc fc fc fc 00 00 00 00 00 [ 55.216696][ T3591] >ffff88806dfbab80: 00 00 fc fc fc fc 00 00 00 00 00 00 00 fc fc fc [ 55.224735][ T3591] ^ [ 55.232731][ T3591] ffff88806dfbac00: fc 00 00 00 00 00 00 00 fc fc fc fc 00 00 00 00 [ 55.240809][ T3591] ffff88806dfbac80: 00 00 00 fc fc fc fc 00 00 00 00 00 00 00 fc fc [ 55.248874][ T3591] ================================================================== [ 55.256922][ T3591] Disabling lock debugging due to kernel taint [ 55.263391][ T3591] Kernel panic - not syncing: panic_on_warn set ... [ 55.270054][ T3591] CPU: 0 PID: 3591 Comm: syz-executor116 Tainted: G B 5.17.0-rc5-syzkaller-00272-g9137eda53752 #0 [ 55.281936][ T3591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 55.292004][ T3591] Call Trace: [ 55.295283][ T3591] [ 55.298197][ T3591] dump_stack_lvl+0xcd/0x134 [ 55.302788][ T3591] panic+0x2b0/0x6dd [ 55.306665][ T3591] ? __warn_printk+0xf3/0xf3 [ 55.311234][ T3591] ? ipvlan_queue_xmit+0x173f/0x19e0 [ 55.316529][ T3591] ? trace_hardirqs_on+0x38/0x1c0 [ 55.321534][ T3591] ? trace_hardirqs_on+0x51/0x1c0 [ 55.326538][ T3591] ? ipvlan_queue_xmit+0x173f/0x19e0 [ 55.331808][ T3591] ? ipvlan_queue_xmit+0x173f/0x19e0 [ 55.337093][ T3591] end_report.cold+0x63/0x6f [ 55.341794][ T3591] kasan_report.cold+0x71/0xdf [ 55.346547][ T3591] ? ipvlan_queue_xmit+0x173f/0x19e0 [ 55.351825][ T3591] ipvlan_queue_xmit+0x173f/0x19e0 [ 55.357056][ T3591] ? ipvlan_handle_mode_l3+0x140/0x140 [ 55.362516][ T3591] ? skb_network_protocol+0x148/0x580 [ 55.368009][ T3591] ? skb_crc32c_csum_help+0x70/0x70 [ 55.373205][ T3591] ? copyin.part.0+0xeb/0x110 [ 55.377875][ T3591] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 55.384120][ T3591] ? validate_xmit_xfrm+0x498/0x1050 [ 55.389411][ T3591] ? netif_skb_features+0x38d/0xb90 [ 55.394601][ T3591] ipvlan_start_xmit+0x45/0x190 [ 55.399445][ T3591] __dev_direct_xmit+0x52f/0x740 [ 55.404476][ T3591] ? validate_xmit_skb_list+0x120/0x120 [ 55.410005][ T3591] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 55.416281][ T3591] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 55.422512][ T3591] ? netdev_pick_tx+0x14f/0xbe0 [ 55.427363][ T3591] packet_direct_xmit+0x1b8/0x2c0 [ 55.432384][ T3591] packet_sendmsg+0x2226/0x5270 [ 55.437321][ T3591] ? selinux_socket_sendmsg+0x203/0x2b0 [ 55.442861][ T3591] ? selinux_socket_getsockname+0x2b0/0x2b0 [ 55.448877][ T3591] ? tomoyo_socket_sendmsg_permission+0x130/0x3a0 [ 55.455297][ T3591] ? tomoyo_socket_bind_permission+0x330/0x330 [ 55.461447][ T3591] ? packet_lookup_frame.isra.0+0x1c0/0x1c0 [ 55.467329][ T3591] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 55.473564][ T3591] ? packet_lookup_frame.isra.0+0x1c0/0x1c0 [ 55.479464][ T3591] sock_sendmsg+0xcf/0x120 [ 55.483881][ T3591] __sys_sendto+0x21c/0x320 [ 55.488364][ T3591] ? __ia32_sys_getpeername+0xb0/0xb0 [ 55.493717][ T3591] ? __context_tracking_exit+0xb8/0xe0 [ 55.499247][ T3591] ? lock_downgrade+0x6e0/0x6e0 [ 55.504081][ T3591] __x64_sys_sendto+0xdd/0x1b0 [ 55.508827][ T3591] ? lockdep_hardirqs_on+0x79/0x100 [ 55.514012][ T3591] ? syscall_enter_from_user_mode+0x21/0x70 [ 55.519883][ T3591] do_syscall_64+0x35/0xb0 [ 55.524290][ T3591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 55.530176][ T3591] RIP: 0033:0x7f68b39ff799 [ 55.534596][ T3591] Code: 5c 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 55.554189][ T3591] RSP: 002b:00007fff588e8ce8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 55.562584][ T3591] RAX: ffffffffffffffda RBX: 00007f68b3a82e90 RCX: 00007f68b39ff799 [ 55.570542][ T3591] RDX: 000000000000000e RSI: 0000000020000080 RDI: 0000000000000005 [ 55.578494][ T3591] RBP: 0000000000000003 R08: 0000000020000040 R09: 0000000000000014 [ 55.586556][ T3591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff588e8d40 [ 55.594520][ T3591] R13: 00007fff588e8d30 R14: 00007fff588e8d60 R15: 00007fff588e8d24 [ 55.602573][ T3591] [ 55.605773][ T3591] Kernel Offset: disabled [ 55.610086][ T3591] Rebooting in 86400 seconds..