UBSAN: object-size-mismatch in wg_xmit IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready ================================================================================ UBSAN: object-size-mismatch in ./include/linux/skbuff.h:2039:28 member access within address ffffc900000571c0 with insufficient space for an object of type 'struct sk_buff' CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.107-syzkaller-00420-gec7c9ea9d496 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: ipv6_addrconf addrconf_dad_work Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x1e2/0x24b lib/dump_stack.c:118 dump_stack+0x15/0x1d lib/dump_stack.c:135 ubsan_epilogue lib/ubsan.c:148 [inline] handle_object_size_mismatch lib/ubsan.c:297 [inline] ubsan_type_mismatch_common+0x1ed/0x3a0 lib/ubsan.c:310 __ubsan_handle_type_mismatch_v1+0x5b/0x70 lib/ubsan.c:339 __skb_queue_before include/linux/skbuff.h:2039 [inline] __skb_queue_tail include/linux/skbuff.h:2072 [inline] wg_xmit+0x4a2/0xae0 drivers/net/wireguard/device.c:185 __netdev_start_xmit include/linux/netdevice.h:4831 [inline] netdev_start_xmit+0x8a/0x160 include/linux/netdevice.h:4845 xmit_one net/core/dev.c:3591 [inline] dev_hard_start_xmit+0x18d/0x2f0 net/core/dev.c:3607 __dev_queue_xmit+0x100c/0x1c30 net/core/dev.c:4173 dev_queue_xmit+0x17/0x20 net/core/dev.c:4206 neigh_connected_output+0x288/0x2b0 net/core/neighbour.c:1531 neigh_output include/net/neighbour.h:524 [inline] ip6_finish_output2+0xde2/0x1440 net/ipv6/ip6_output.c:145 __ip6_finish_output+0x3e4/0x520 net/ipv6/ip6_output.c:210 ip6_finish_output+0x3f/0x220 net/ipv6/ip6_output.c:220 NF_HOOK_COND include/linux/netfilter.h:293 [inline] ip6_output+0x1f8/0x4b0 net/ipv6/ip6_output.c:243 dst_output include/net/dst.h:443 [inline] NF_HOOK+0xdd/0x280 include/linux/netfilter.h:304 ndisc_send_skb+0x646/0x9f0 net/ipv6/ndisc.c:508 ndisc_send_rs+0x26c/0x360 net/ipv6/ndisc.c:702 addrconf_dad_completed+0x4f3/0x9f0 net/ipv6/addrconf.c:4241 addrconf_dad_work+0x9c1/0x1520 process_one_work+0x3ca/0x660 kernel/workqueue.c:2298 worker_thread+0x709/0xa20 kernel/workqueue.c:2444 kthread+0x389/0x3c0 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 ================================================================================ ================================================================================ UBSAN: object-size-mismatch in ./include/linux/skbuff.h:1932:2 member access within address ffffc900000571c0 with insufficient space for an object of type 'struct sk_buff' CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.107-syzkaller-00420-gec7c9ea9d496 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: ipv6_addrconf addrconf_dad_work Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x1e2/0x24b lib/dump_stack.c:118 dump_stack+0x15/0x1d lib/dump_stack.c:135 ubsan_epilogue lib/ubsan.c:148 [inline] handle_object_size_mismatch lib/ubsan.c:297 [inline] ubsan_type_mismatch_common+0x1ed/0x3a0 lib/ubsan.c:310 __ubsan_handle_type_mismatch_v1+0x5b/0x70 lib/ubsan.c:339 __skb_insert include/linux/skbuff.h:1932 [inline] __skb_queue_before include/linux/skbuff.h:2039 [inline] __skb_queue_tail include/linux/skbuff.h:2072 [inline] wg_xmit+0x513/0xae0 drivers/net/wireguard/device.c:185 __netdev_start_xmit include/linux/netdevice.h:4831 [inline] netdev_start_xmit+0x8a/0x160 include/linux/netdevice.h:4845 xmit_one net/core/dev.c:3591 [inline] dev_hard_start_xmit+0x18d/0x2f0 net/core/dev.c:3607 __dev_queue_xmit+0x100c/0x1c30 net/core/dev.c:4173 dev_queue_xmit+0x17/0x20 net/core/dev.c:4206 neigh_connected_output+0x288/0x2b0 net/core/neighbour.c:1531 neigh_output include/net/neighbour.h:524 [inline] ip6_finish_output2+0xde2/0x1440 net/ipv6/ip6_output.c:145 __ip6_finish_output+0x3e4/0x520 net/ipv6/ip6_output.c:210 ip6_finish_output+0x3f/0x220 net/ipv6/ip6_output.c:220 NF_HOOK_COND include/linux/netfilter.h:293 [inline] ip6_output+0x1f8/0x4b0 net/ipv6/ip6_output.c:243 dst_output include/net/dst.h:443 [inline] NF_HOOK+0xdd/0x280 include/linux/netfilter.h:304 ndisc_send_skb+0x646/0x9f0 net/ipv6/ndisc.c:508 ndisc_send_rs+0x26c/0x360 net/ipv6/ndisc.c:702 addrconf_dad_completed+0x4f3/0x9f0 net/ipv6/addrconf.c:4241 addrconf_dad_work+0x9c1/0x1520 process_one_work+0x3ca/0x660 kernel/workqueue.c:2298 worker_thread+0x709/0xa20 kernel/workqueue.c:2444 kthread+0x389/0x3c0 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 ================================================================================ syzkaller syzkaller login: [ 5.284302][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 15.499163][ T23] kauditd_printk_skb: 60 callbacks suppressed [ 15.499174][ T23] audit: type=1400 audit(1648509443.400:71): avc: denied { transition } for pid=311 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.506708][ T23] audit: type=1400 audit(1648509443.400:72): avc: denied { write } for pid=311 comm="sh" path="pipe:[11500]" dev="pipefs" ino=11500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 15.884153][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 16.274095][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #88!!! [ 17.004232][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #280!!! [ 17.154194][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! Warning: Permanently added '10.128.0.90' (ECDSA) to the list of known hosts. 2022/03/28 23:17:30 fuzzer started 2022/03/28 23:17:30 connecting to host at 10.128.0.163:39765 2022/03/28 23:17:30 checking machine... 2022/03/28 23:17:30 checking revisions... 2022/03/28 23:17:30 testing simple program... [ 22.730344][ T23] audit: type=1400 audit(1648509450.630:73): avc: denied { getattr } for pid=362 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 22.747000][ T370] cgroup: Unknown subsys name 'net' [ 22.753868][ T23] audit: type=1400 audit(1648509450.630:74): avc: denied { read } for pid=362 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 22.779893][ T23] audit: type=1400 audit(1648509450.630:75): avc: denied { open } for pid=362 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 22.780067][ T370] cgroup: Unknown subsys name 'devices' [ 22.803131][ T23] audit: type=1400 audit(1648509450.630:76): avc: denied { read } for pid=362 comm="syz-fuzzer" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.831279][ T23] audit: type=1400 audit(1648509450.630:77): avc: denied { open } for pid=362 comm="syz-fuzzer" path="/dev/raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.854423][ T23] audit: type=1400 audit(1648509450.630:78): avc: denied { mounton } for pid=370 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.878752][ T23] audit: type=1400 audit(1648509450.630:79): avc: denied { mount } for pid=370 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.901121][ T23] audit: type=1400 audit(1648509450.660:80): avc: denied { unmount } for pid=370 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.015678][ T370] cgroup: Unknown subsys name 'hugetlb' [ 23.021316][ T370] cgroup: Unknown subsys name 'rlimit' [ 23.095045][ T23] audit: type=1400 audit(1648509451.000:81): avc: denied { setattr } for pid=370 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.129425][ T23] audit: type=1400 audit(1648509451.030:82): avc: denied { execmem } for pid=372 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.181572][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.189528][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.197317][ T373] device bridge_slave_0 entered promiscuous mode [ 23.204323][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.211470][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.219022][ T373] device bridge_slave_1 entered promiscuous mode [ 23.249188][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.256240][ T373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.263706][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.270784][ T373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.289286][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.297140][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.305505][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.313354][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.324846][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.334140][ T74] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.341264][ T74] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.348640][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.356859][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.363897][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.375418][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.394266][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.402584][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.411096][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.423003][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.434956][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.446668][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.456093][ T5] ================================================================================ [ 23.465424][ T5] UBSAN: object-size-mismatch in ./include/linux/skbuff.h:2039:28 [ 23.473223][ T5] member access within address ffffc900000571c0 with insufficient space [ 23.481576][ T5] for an object of type 'struct sk_buff' [ 23.487232][ T5] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.107-syzkaller-00420-gec7c9ea9d496 #0 [ 23.496925][ T5] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 23.507383][ T5] Workqueue: ipv6_addrconf addrconf_dad_work [ 23.513351][ T5] Call Trace: [ 23.516621][ T5] dump_stack_lvl+0x1e2/0x24b [ 23.521274][ T5] ? show_regs_print_info+0x18/0x18 [ 23.526460][ T5] ? wg_allowedips_lookup_dst+0x190/0x190 [ 23.532155][ T5] dump_stack+0x15/0x1d [ 23.536299][ T5] ubsan_type_mismatch_common+0x1ed/0x3a0 [ 23.541993][ T5] ? __sanitizer_cov_trace_switch+0x74/0x90 [ 23.548298][ T5] __ubsan_handle_type_mismatch_v1+0x5b/0x70 [ 23.554615][ T5] wg_xmit+0x4a2/0xae0 [ 23.558659][ T5] ? wg_stop+0x5d0/0x5d0 [ 23.562875][ T5] ? __sanitizer_cov_trace_const_cmp2+0x19/0x20 [ 23.569090][ T5] netdev_start_xmit+0x8a/0x160 [ 23.573914][ T5] dev_hard_start_xmit+0x18d/0x2f0 [ 23.578997][ T5] __dev_queue_xmit+0x100c/0x1c30 [ 23.583993][ T5] ? dev_queue_xmit+0x20/0x20 [ 23.588643][ T5] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 23.594852][ T5] ? ndisc_constructor+0x690/0x8a0 [ 23.599936][ T5] ? _raw_write_unlock_bh+0x31/0x47 [ 23.605122][ T5] ? ___neigh_create+0x162d/0x1ab0 [ 23.610220][ T5] ? dev_hard_header+0xdb/0xf0 [ 23.614979][ T5] dev_queue_xmit+0x17/0x20 [ 23.619468][ T5] neigh_connected_output+0x288/0x2b0 [ 23.624816][ T5] ip6_finish_output2+0xde2/0x1440 [ 23.629915][ T5] ? __rcu_read_lock+0x50/0x50 [ 23.634661][ T5] ? __ip6_finish_output+0x520/0x520 [ 23.640445][ T5] ? dst_cow_metrics_generic+0x55/0x1d0 [ 23.645964][ T5] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 23.652177][ T5] ? ip6_skb_dst_mtu+0xaf/0x260 [ 23.657002][ T5] __ip6_finish_output+0x3e4/0x520 [ 23.662087][ T5] ip6_finish_output+0x3f/0x220 [ 23.666924][ T5] ? ip6_output+0x1d3/0x4b0 [ 23.671398][ T5] ip6_output+0x1f8/0x4b0 [ 23.675707][ T5] ? asan.module_dtor+0x20/0x20 [ 23.680543][ T5] ? skb_dst+0x40/0x40 [ 23.684586][ T5] ? __rcu_read_lock+0x50/0x50 [ 23.689324][ T5] ? selinux_ipv6_forward+0x50/0x50 [ 23.694498][ T5] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 23.700687][ T5] ? nf_hook_slow+0x150/0x1b0 [ 23.705514][ T5] NF_HOOK+0xdd/0x280 [ 23.709485][ T5] ? addrconf_addr_solict_mult+0xe0/0xe0 [ 23.715095][ T5] ? NF_HOOK+0x280/0x280 [ 23.719318][ T5] ? __rcu_read_lock+0x50/0x50 [ 23.724230][ T5] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 23.730709][ T5] ? ndisc_send_skb+0x547/0x9f0 [ 23.735559][ T5] ? memcpy+0x56/0x70 [ 23.739514][ T5] ndisc_send_skb+0x646/0x9f0 [ 23.744252][ T5] ? slab_post_alloc_hook+0x90/0xa0 [ 23.749512][ T5] ? ndisc_fill_addr_option+0x2f0/0x2f0 [ 23.755046][ T5] ? skb_set_owner_w+0x1a8/0x310 [ 23.759994][ T5] ? __sanitizer_cov_trace_cmp4+0x19/0x20 [ 23.765707][ T5] ? skb_put+0x11d/0x210 [ 23.770237][ T5] ndisc_send_rs+0x26c/0x360 [ 23.774823][ T5] addrconf_dad_completed+0x4f3/0x9f0 [ 23.780367][ T5] ? addrconf_dad_stop+0x430/0x430 [ 23.785597][ T5] ? mutex_unlock+0x34/0x40 [ 23.790198][ T5] addrconf_dad_work+0x9c1/0x1520 [ 23.795423][ T5] ? move_linked_works+0x118/0x130 [ 23.800529][ T5] ? ipv6_use_optimistic_addr+0x1d0/0x1d0 [ 23.806267][ T5] ? __kasan_check_write+0x14/0x20 [ 23.811360][ T5] process_one_work+0x3ca/0x660 [ 23.816196][ T5] worker_thread+0x709/0xa20 [ 23.820763][ T5] kthread+0x389/0x3c0 [ 23.824808][ T5] ? pr_cont_work+0x110/0x110 [ 23.829468][ T5] ? __list_add+0xc0/0xc0 [ 23.833786][ T5] ret_from_fork+0x1f/0x30 [ 23.838213][ T5] ================================================================================ [ 23.847522][ T5] ================================================================================ [ 23.856841][ T5] UBSAN: object-size-mismatch in ./include/linux/skbuff.h:1932:2 [ 23.864582][ T5] member access within address ffffc900000571c0 with insufficient space [ 23.872878][ T5] for an object of type 'struct sk_buff' [ 23.878785][ T5] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.107-syzkaller-00420-gec7c9ea9d496 #0 [ 23.889123][ T5] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 23.899172][ T5] Workqueue: ipv6_addrconf addrconf_dad_work [ 23.905136][ T5] Call Trace: [ 23.908402][ T5] dump_stack_lvl+0x1e2/0x24b [ 23.913053][ T5] ? show_regs_print_info+0x18/0x18 [ 23.918228][ T5] ? wg_allowedips_lookup_dst+0x190/0x190 [ 23.923923][ T5] dump_stack+0x15/0x1d [ 23.928054][ T5] ubsan_type_mismatch_common+0x1ed/0x3a0 [ 23.933745][ T5] __ubsan_handle_type_mismatch_v1+0x5b/0x70 [ 23.939699][ T5] wg_xmit+0x513/0xae0 [ 23.943741][ T5] ? wg_stop+0x5d0/0x5d0 [ 23.947958][ T5] ? __sanitizer_cov_trace_const_cmp2+0x19/0x20 [ 23.954186][ T5] netdev_start_xmit+0x8a/0x160 [ 23.959023][ T5] dev_hard_start_xmit+0x18d/0x2f0 [ 23.964202][ T5] __dev_queue_xmit+0x100c/0x1c30 [ 23.969216][ T5] ? dev_queue_xmit+0x20/0x20 [ 23.973967][ T5] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 23.980197][ T5] ? ndisc_constructor+0x690/0x8a0 [ 23.985283][ T5] ? _raw_write_unlock_bh+0x31/0x47 [ 23.990457][ T5] ? ___neigh_create+0x162d/0x1ab0 [ 23.995560][ T5] ? dev_hard_header+0xdb/0xf0 [ 24.000332][ T5] dev_queue_xmit+0x17/0x20 [ 24.004816][ T5] neigh_connected_output+0x288/0x2b0 [ 24.010195][ T5] ip6_finish_output2+0xde2/0x1440 [ 24.015301][ T5] ? __rcu_read_lock+0x50/0x50 [ 24.020065][ T5] ? __ip6_finish_output+0x520/0x520 [ 24.025326][ T5] ? dst_cow_metrics_generic+0x55/0x1d0 [ 24.030845][ T5] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 24.037056][ T5] ? ip6_skb_dst_mtu+0xaf/0x260 [ 24.041912][ T5] __ip6_finish_output+0x3e4/0x520 [ 24.046996][ T5] ip6_finish_output+0x3f/0x220 [ 24.051838][ T5] ? ip6_output+0x1d3/0x4b0 [ 24.057470][ T5] ip6_output+0x1f8/0x4b0 [ 24.061771][ T5] ? asan.module_dtor+0x20/0x20 [ 24.066595][ T5] ? skb_dst+0x40/0x40 [ 24.070636][ T5] ? __rcu_read_lock+0x50/0x50 [ 24.075386][ T5] ? selinux_ipv6_forward+0x50/0x50 [ 24.080557][ T5] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 24.086247][ T5] ? nf_hook_slow+0x150/0x1b0 [ 24.090918][ T5] NF_HOOK+0xdd/0x280 [ 24.094903][ T5] ? addrconf_addr_solict_mult+0xe0/0xe0 [ 24.100522][ T5] ? NF_HOOK+0x280/0x280 [ 24.104757][ T5] ? __rcu_read_lock+0x50/0x50 [ 24.109503][ T5] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 24.115723][ T5] ? ndisc_send_skb+0x547/0x9f0 [ 24.120633][ T5] ? memcpy+0x56/0x70 [ 24.124591][ T5] ndisc_send_skb+0x646/0x9f0 [ 24.129247][ T5] ? slab_post_alloc_hook+0x90/0xa0 [ 24.134419][ T5] ? ndisc_fill_addr_option+0x2f0/0x2f0 [ 24.139939][ T5] ? skb_set_owner_w+0x1a8/0x310 [ 24.144857][ T5] ? __sanitizer_cov_trace_cmp4+0x19/0x20 [ 24.150573][ T5] ? skb_put+0x11d/0x210 [ 24.154801][ T5] ndisc_send_rs+0x26c/0x360 [ 24.159480][ T5] addrconf_dad_completed+0x4f3/0x9f0 [ 24.164851][ T5] ? addrconf_dad_stop+0x430/0x430 [ 24.169956][ T5] ? mutex_unlock+0x34/0x40 [ 24.174435][ T5] addrconf_dad_work+0x9c1/0x1520 [ 24.179435][ T5] ? move_linked_works+0x118/0x130 [ 24.184538][ T5] ? ipv6_use_optimistic_addr+0x1d0/0x1d0 [ 24.190232][ T5] ? __kasan_check_write+0x14/0x20 [ 24.195423][ T5] process_one_work+0x3ca/0x660 2022/03/28 23:17:32 building call list... [ 24.200334][ T5] worker_thread+0x709/0xa20 [ 24.204896][ T5] kthread+0x389/0x3c0 [ 24.208952][ T5] ? pr_cont_work+0x110/0x110 [ 24.213614][ T5] ? __list_add+0xc0/0xc0 [ 24.217932][ T5] ret_from_fork+0x1f/0x30 [ 24.222381][ T5] ================================================================================ [ 24.240117][ T373] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.694424][ T7] device bridge_slave_1 left promiscuous mode [ 24.700596][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.708683][ T7] device bridge_slave_0 left promiscuous mode [ 24.714994][ T7] bridge0: port 1(bridge_slave_0) entered disabled state