[ 1121.744877][ C2] ================================================================== [ 1121.745205][ C2] BUG: KASAN: slab-out-of-bounds in xfrm_lookup_with_ifid+0x9bf/0xa90 [ 1121.745482][ C2] Read of size 8 at addr ffff888007fda1c0 by task socat/12286 [ 1121.745756][ C2] [ 1121.745850][ C2] CPU: 2 UID: 0 PID: 12286 Comm: socat Not tainted 6.12.0-rc1-virtme #1 [ 1121.746121][ C2] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 1121.746526][ C2] Call Trace: [ 1121.746697][ C2] <IRQ> [ 1121.746791][ C2] dump_stack_lvl+0x82/0xd0 [ 1121.746973][ C2] print_address_description.constprop.0+0x2c/0x3b0 [ 1121.747194][ C2] ? xfrm_lookup_with_ifid+0x9bf/0xa90 [ 1121.747370][ C2] print_report+0xb4/0x270 [ 1121.747542][ C2] ? kasan_addr_to_slab+0x25/0x80 [ 1121.747721][ C2] kasan_report+0xbd/0xf0 [ 1121.747854][ C2] ? xfrm_lookup_with_ifid+0x9bf/0xa90 [ 1121.748035][ C2] xfrm_lookup_with_ifid+0x9bf/0xa90 [ 1121.748212][ C2] ? __pfx_xfrm_lookup_with_ifid+0x10/0x10 [ 1121.748432][ C2] ? l4proto_manip_pkt+0x670/0x10f0 [nf_nat] [ 1121.748657][ C2] nf_xfrm_me_harder+0x1a8/0x5e0 [nf_nat] [ 1121.748841][ C2] ? __pfx_nf_xfrm_me_harder+0x10/0x10 [nf_nat] [ 1121.749064][ C2] ? nft_do_chain_ipv4+0x184/0x210 [nf_tables] [ 1121.749329][ C2] ? __pfx_nft_do_chain_ipv4+0x10/0x10 [nf_tables] [ 1121.749583][ C2] nf_nat_ipv4_out+0x3c7/0x470 [nf_nat] [ 1121.749757][ C2] ? __pfx_nf_nat_ipv4_out+0x10/0x10 [nf_nat] [ 1121.749979][ C2] nf_hook_slow+0xba/0x200 [ 1121.750158][ C2] nf_hook+0x374/0x4f0 [ 1121.750299][ C2] ? __pfx_ip_finish_output+0x10/0x10 [ 1121.750471][ C2] ? __pfx_nf_hook+0x10/0x10 [ 1121.750644][ C2] ? __ip_append_data+0x25e4/0x3900 [ 1121.750818][ C2] ? __pfx_ip_finish_output+0x10/0x10 [ 1121.750995][ C2] ip_output+0x172/0x240 [ 1121.751127][ C2] ? __pfx_ip_finish_output+0x10/0x10 [ 1121.751304][ C2] ip_push_pending_frames+0x24b/0x480 [ 1121.751491][ C2] ip_send_unicast_reply+0xac1/0x14b0 [ 1121.751667][ C2] ? mark_lock+0x335/0x3e0 [ 1121.751850][ C2] ? __pfx_ip_send_unicast_reply+0x10/0x10 [ 1121.752069][ C2] ? __lock_acquire+0xb3f/0x1580 [ 1121.752268][ C2] ? lock_acquire.part.0+0xeb/0x330 [ 1121.752444][ C2] ? tcp_v4_send_ack.constprop.0+0x4c4/0x1050 [ 1121.752670][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1121.752846][ C2] ? trace_lock_acquire+0x14d/0x1f0 [ 1121.753028][ C2] tcp_v4_send_ack.constprop.0+0x7c6/0x1050 [ 1121.753251][ C2] ? __pfx_tcp_v4_send_ack.constprop.0+0x10/0x10 [ 1121.753476][ C2] ? __pfx___lock_release+0x10/0x10 [ 1121.753655][ C2] ? mark_held_locks+0x9e/0xe0 [ 1121.753828][ C2] ? tcp_v4_rcv+0x2251/0x3460 [ 1121.754001][ C2] tcp_v4_rcv+0x2251/0x3460 [ 1121.754186][ C2] ? __pfx_tcp_v4_rcv+0x10/0x10 [ 1121.754362][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1121.754540][ C2] ip_protocol_deliver_rcu+0x93/0x360 [ 1121.754722][ C2] ? process_backlog+0x332/0x1180 [ 1121.754905][ C2] ip_local_deliver_finish+0x2af/0x490 [ 1121.755075][ C2] ? process_backlog+0x332/0x1180 [ 1121.755262][ C2] ? __pfx_ip_rcv+0x10/0x10 [ 1121.755439][ C2] __netif_receive_skb_one_core+0x166/0x1b0 [ 1121.755656][ C2] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 1121.755874][ C2] ? process_backlog+0x332/0x1180 [ 1121.756079][ C2] ? lock_acquire+0x32/0xc0 [ 1121.756265][ C2] ? process_backlog+0x332/0x1180 [ 1121.756443][ C2] process_backlog+0x372/0x1180 [ 1121.756621][ C2] __napi_poll.constprop.0+0xa2/0x460 [ 1121.756811][ C2] net_rx_action+0x50e/0xce0 [ 1121.756995][ C2] ? __pfx_net_rx_action+0x10/0x10 [ 1121.757171][ C2] ? __lock_release+0x90/0x460 [ 1121.757350][ C2] ? rcu_core+0x158/0x4f0 [ 1121.757483][ C2] ? __pfx___lock_release+0x10/0x10 [ 1121.757658][ C2] ? hlock_class+0x4e/0x130 [ 1121.757836][ C2] ? mark_lock+0x38/0x3e0 [ 1121.757974][ C2] ? hlock_class+0x4e/0x130 [ 1121.758148][ C2] ? mark_lock+0x38/0x3e0 [ 1121.758292][ C2] ? mark_held_locks+0x9e/0xe0 [ 1121.758468][ C2] handle_softirqs+0x1f6/0x5c0 [ 1121.758645][ C2] ? __dev_queue_xmit+0x78e/0x18b0 [ 1121.758822][ C2] do_softirq+0x4d/0xa0 [ 1121.758954][ C2] </IRQ> [ 1121.759047][ C2] <TASK> [ 1121.759137][ C2] __local_bh_enable_ip+0xf6/0x120 [ 1121.759316][ C2] ? __dev_queue_xmit+0x78e/0x18b0 [ 1121.759491][ C2] __dev_queue_xmit+0x7a3/0x18b0 [ 1121.759673][ C2] ? __lock_release+0x103/0x460 [ 1121.759847][ C2] ? ip_finish_output2+0xac2/0x18f0 [ 1121.760025][ C2] ? __pfx___lock_release+0x10/0x10 [ 1121.760206][ C2] ? hlock_class+0x4e/0x130 [ 1121.760384][ C2] ? __pfx___dev_queue_xmit+0x10/0x10 [ 1121.760562][ C2] ? mark_held_locks+0x9e/0xe0 [ 1121.760735][ C2] ? lockdep_hardirqs_on_prepare+0x275/0x410 [ 1121.760955][ C2] ? neigh_hh_output+0x36f/0x560 [ 1121.761146][ C2] ip_finish_output2+0xac2/0x18f0 [ 1121.761328][ C2] ? __pfx_ip_finish_output2+0x10/0x10 [ 1121.761501][ C2] ? __ip_finish_output+0x10f/0x760 [ 1121.761677][ C2] __ip_queue_xmit+0x64f/0x1790 [ 1121.761858][ C2] ? __skb_clone+0x571/0x750 [ 1121.762033][ C2] __tcp_transmit_skb+0x2291/0x2d10 [ 1121.762220][ C2] ? __pfx___tcp_transmit_skb+0x10/0x10 [ 1121.762391][ C2] ? mark_held_locks+0x9e/0xe0 [ 1121.762579][ C2] ? lockdep_hardirqs_on_prepare+0x275/0x410 [ 1121.762793][ C2] ? tcp_small_queue_check.isra.0+0xe9/0x380 [ 1121.763011][ C2] tcp_write_xmit+0x8a3/0x2cf0 [ 1121.763189][ C2] ? tcp_current_mss+0x40a/0x510 [ 1121.763365][ C2] ? __pfx_tcp_current_mss+0x10/0x10 [ 1121.763537][ C2] ? __alloc_skb+0x23d/0x2e0 [ 1121.763710][ C2] ? __pfx_tcp_write_xmit+0x10/0x10 [ 1121.763888][ C2] ? tcp_set_state+0x10b/0x510 [ 1121.764068][ C2] ? __pfx_tcp_set_state+0x10/0x10 [ 1121.764248][ C2] __tcp_push_pending_frames+0x96/0x320 [ 1121.764428][ C2] inet_shutdown+0x164/0x390 [ 1121.764604][ C2] ? sockfd_lookup_light+0x1a/0x140 [ 1121.764791][ C2] __sys_shutdown+0xcb/0x160 [ 1121.764965][ C2] ? __pfx___sys_shutdown+0x10/0x10 [ 1121.765139][ C2] ? ksys_read+0x17a/0x1e0 [ 1121.765322][ C2] ? __pfx_ksys_read+0x10/0x10 [ 1121.765512][ C2] __x64_sys_shutdown+0x53/0x80 [ 1121.765685][ C2] do_syscall_64+0xc1/0x1d0 [ 1121.765869][ C2] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1121.766091][ C2] RIP: 0033:0x7f082e32abeb [ 1121.766287][ C2] Code: 73 01 c3 48 8b 0d 15 92 1b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 30 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e5 91 1b 00 f7 d8 64 89 01 48 [ 1121.766928][ C2] RSP: 002b:00007fffdd9d7948 EFLAGS: 00000202 ORIG_RAX: 0000000000000030 [ 1121.767197][ C2] RAX: ffffffffffffffda RBX: 0000559bf964d610 RCX: 00007f082e32abeb [ 1121.767461][ C2] RDX: 0000000000000008 RSI: 0000000000000002 RDI: 0000000000000008 [ 1121.767729][ C2] RBP: 0000000000000008 R08: 0000000000000001 R09: 0000000000000000 [ 1121.767995][ C2] R10: 0000000000000000 R11: 0000000000000202 R12: ffffffffffffffff [ 1121.768265][ C2] R13: 0000000000000000 R14: 0000559bd4b1610e R15: 0000000000000001 [ 1121.768527][ C2] </TASK> [ 1121.768770][ C2] [ 1121.768860][ C2] The buggy address belongs to the object at ffff888007fda1a0 [ 1121.768860][ C2] which belongs to the cache tw_sock_TCP of size 280 [ 1121.769286][ C2] The buggy address is located 32 bytes inside of [ 1121.769286][ C2] allocated 280-byte region [ffff888007fda1a0, ffff888007fda2b8) [ 1121.769810][ C2] [ 1121.769899][ C2] The buggy address belongs to the physical page: [ 1121.770129][ C2] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888007fda1a0 pfn:0x7fda [ 1121.770594][ C2] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1121.770855][ C2] flags: 0x80000000000240(workingset|head|node=0|zone=1) [ 1121.771082][ C2] page_type: f5(slab) [ 1121.771342][ C2] raw: 0080000000000240 ffff88800398ec40 ffff88800398abc8 ffff88800398abc8 [ 1121.771652][ C2] raw: ffff888007fda1a0 0000000000140001 00000001f5000000 0000000000000000 [ 1121.771957][ C2] head: 0080000000000240 ffff88800398ec40 ffff88800398abc8 ffff88800398abc8 [ 1121.772376][ C2] head: ffff888007fda1a0 0000000000140001 00000001f5000000 0000000000000000 [ 1121.772684][ C2] head: 0080000000000001 ffffea00001ff681 ffffffffffffffff 0000000000000000 [ 1121.773116][ C2] head: ffff888000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 1121.773424][ C2] page dumped because: kasan: bad access detected [ 1121.773647][ C2] [ 1121.773734][ C2] Memory state around the buggy address: [ 1121.773902][ C2] ffff888007fda080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1121.774165][ C2] ffff888007fda100: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc [ 1121.774421][ C2] >ffff888007fda180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1121.774679][ C2] ^ [ 1121.774888][ C2] ffff888007fda200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1121.775146][ C2] ffff888007fda280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1121.775511][ C2] ================================================================== [ 1121.775810][ C2] Disabling lock debugging due to kernel taint [ 1121.776297][ C2] Oops: general protection fault, probably for non-canonical address 0xeb4b474b4b4b4b93: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 1121.776880][ C2] KASAN: maybe wild-memory-access in range [0x5a5a5a5a5a5a5c98-0x5a5a5a5a5a5a5c9f] [ 1121.777277][ C2] CPU: 2 UID: 0 PID: 12286 Comm: socat Tainted: G B 6.12.0-rc1-virtme #1 [ 1121.777595][ C2] Tainted: [B]=BAD_PAGE [ 1121.777727][ C2] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 1121.778222][ C2] RIP: 0010:xfrm_sk_policy_lookup+0x10f/0x4e0 [ 1121.778452][ C2] Code: 48 89 44 24 18 0f b7 44 24 06 89 44 24 28 e9 a9 01 00 00 4d 85 ed 0f 84 2f 02 00 00 49 8d bd 3e 02 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 8c [ 1121.779176][ C2] RSP: 0018:ffffc90000240150 EFLAGS: 00010206 [ 1121.779397][ C2] RAX: 0b4b4b4b4b4b4b93 RBX: dffffc0000000000 RCX: ffffffff9e9174c8 [ 1121.779656][ C2] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 5a5a5a5a5a5a5c98 [ 1121.779914][ C2] RBP: ffff888007fda008 R08: 0000000000000000 R09: 0000000000000000 [ 1121.780176][ C2] R10: ffffffffa097388f R11: 205d324320202020 R12: 0000000000000000 [ 1121.780444][ C2] R13: 5a5a5a5a5a5a5a5a R14: ffff888007fda008 R15: ffffc90000240340 [ 1121.780694][ C2] FS: 00007f082e29c740(0000) GS:ffff88802f700000(0000) knlGS:0000000000000000 [ 1121.780991][ C2] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1121.781321][ C2] CR2: 0000559bf9653b88 CR3: 0000000006286002 CR4: 0000000000772ef0 [ 1121.781589][ C2] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1121.781848][ C2] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1121.782215][ C2] PKRU: 55555554 [ 1121.782344][ C2] Call Trace: [ 1121.782472][ C2] <IRQ> [ 1121.782560][ C2] ? die_addr+0x41/0xa0 [ 1121.782691][ C2] ? exc_general_protection+0x14d/0x230 [ 1121.782868][ C2] ? asm_exc_general_protection+0x26/0x30 [ 1121.783154][ C2] ? xfrm_sk_policy_lookup+0x4c8/0x4e0 [ 1121.783330][ C2] ? xfrm_sk_policy_lookup+0x10f/0x4e0 [ 1121.783498][ C2] ? __pfx_xfrm_sk_policy_lookup+0x10/0x10 [ 1121.783710][ C2] ? xfrm_lookup_with_ifid+0x9bf/0xa90 [ 1121.783882][ C2] xfrm_lookup_with_ifid+0x154/0xa90 [ 1121.784054][ C2] ? __pfx_xfrm_lookup_with_ifid+0x10/0x10 [ 1121.784265][ C2] ? l4proto_manip_pkt+0x670/0x10f0 [nf_nat] [ 1121.784488][ C2] nf_xfrm_me_harder+0x1a8/0x5e0 [nf_nat] [ 1121.784660][ C2] ? __pfx_nf_xfrm_me_harder+0x10/0x10 [nf_nat] [ 1121.784879][ C2] ? nft_do_chain_ipv4+0x184/0x210 [nf_tables] [ 1121.785116][ C2] ? __pfx_nft_do_chain_ipv4+0x10/0x10 [nf_tables] [ 1121.785461][ C2] nf_nat_ipv4_out+0x3c7/0x470 [nf_nat] [ 1121.785635][ C2] ? __pfx_nf_nat_ipv4_out+0x10/0x10 [nf_nat] [ 1121.785854][ C2] nf_hook_slow+0xba/0x200 [ 1121.786028][ C2] nf_hook+0x374/0x4f0 [ 1121.786259][ C2] ? __pfx_ip_finish_output+0x10/0x10 [ 1121.786427][ C2] ? __pfx_nf_hook+0x10/0x10 [ 1121.786600][ C2] ? __ip_append_data+0x25e4/0x3900 [ 1121.786795][ C2] ? __pfx_ip_finish_output+0x10/0x10 [ 1121.787091][ C2] ip_output+0x172/0x240 [ 1121.787227][ C2] ? __pfx_ip_finish_output+0x10/0x10 [ 1121.787407][ C2] ip_push_pending_frames+0x24b/0x480 [ 1121.787595][ C2] ip_send_unicast_reply+0xac1/0x14b0 [ 1121.787766][ C2] ? mark_lock+0x335/0x3e0 [ 1121.788042][ C2] ? __pfx_ip_send_unicast_reply+0x10/0x10 [ 1121.788266][ C2] ? __lock_acquire+0xb3f/0x1580 [ 1121.788442][ C2] ? lock_acquire.part.0+0xeb/0x330 [ 1121.788616][ C2] ? tcp_v4_send_ack.constprop.0+0x4c4/0x1050 [ 1121.788830][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1121.789007][ C2] ? trace_lock_acquire+0x14d/0x1f0 [ 1121.789179][ C2] tcp_v4_send_ack.constprop.0+0x7c6/0x1050 [ 1121.789400][ C2] ? __pfx_tcp_v4_send_ack.constprop.0+0x10/0x10 [ 1121.789724][ C2] ? __pfx___lock_release+0x10/0x10 [ 1121.789899][ C2] ? mark_held_locks+0x9e/0xe0 [ 1121.790068][ C2] ? tcp_v4_rcv+0x2251/0x3460 [ 1121.790244][ C2] tcp_v4_rcv+0x2251/0x3460 [ 1121.790523][ C2] ? __pfx_tcp_v4_rcv+0x10/0x10 [ 1121.790695][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1121.790876][ C2] ip_protocol_deliver_rcu+0x93/0x360 [ 1121.791052][ C2] ? process_backlog+0x332/0x1180 [ 1121.791325][ C2] ip_local_deliver_finish+0x2af/0x490 [ 1121.791498][ C2] ? process_backlog+0x332/0x1180 [ 1121.791682][ C2] ? __pfx_ip_rcv+0x10/0x10 [ 1121.791850][ C2] __netif_receive_skb_one_core+0x166/0x1b0 [ 1121.792160][ C2] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 1121.792382][ C2] ? process_backlog+0x332/0x1180 [ 1121.792556][ C2] ? lock_acquire+0x32/0xc0 [ 1121.792729][ C2] ? process_backlog+0x332/0x1180 [ 1121.793007][ C2] process_backlog+0x372/0x1180 [ 1121.793179][ C2] __napi_poll.constprop.0+0xa2/0x460 [ 1121.793349][ C2] net_rx_action+0x50e/0xce0 [ 1121.793521][ C2] ? __pfx_net_rx_action+0x10/0x10 [ 1121.793688][ C2] ? __lock_release+0x90/0x460 [ 1121.793863][ C2] ? rcu_core+0x158/0x4f0 [ 1121.793996][ C2] ? __pfx___lock_release+0x10/0x10 [ 1121.794166][ C2] ? hlock_class+0x4e/0x130 [ 1121.794343][ C2] ? mark_lock+0x38/0x3e0 [ 1121.794477][ C2] ? hlock_class+0x4e/0x130 [ 1121.794647][ C2] ? mark_lock+0x38/0x3e0 [ 1121.794781][ C2] ? mark_held_locks+0x9e/0xe0 [ 1121.794949][ C2] handle_softirqs+0x1f6/0x5c0 [ 1121.795223][ C2] ? __dev_queue_xmit+0x78e/0x18b0 [ 1121.795406][ C2] do_softirq+0x4d/0xa0 [ 1121.795536][ C2] </IRQ> [ 1121.795625][ C2] <TASK> [ 1121.795715][ C2] __local_bh_enable_ip+0xf6/0x120 [ 1121.795880][ C2] ? __dev_queue_xmit+0x78e/0x18b0 [ 1121.796154][ C2] __dev_queue_xmit+0x7a3/0x18b0 [ 1121.796341][ C2] ? __lock_release+0x103/0x460 [ 1121.796522][ C2] ? ip_finish_output2+0xac2/0x18f0 [ 1121.796716][ C2] ? __pfx___lock_release+0x10/0x10 [ 1121.797013][ C2] ? hlock_class+0x4e/0x130 [ 1121.797187][ C2] ? __pfx___dev_queue_xmit+0x10/0x10 [ 1121.797367][ C2] ? mark_held_locks+0x9e/0xe0 [ 1121.797541][ C2] ? lockdep_hardirqs_on_prepare+0x275/0x410 [ 1121.797750][ C2] ? neigh_hh_output+0x36f/0x560 [ 1121.797925][ C2] ip_finish_output2+0xac2/0x18f0 [ 1121.798100][ C2] ? __pfx_ip_finish_output2+0x10/0x10 [ 1121.798275][ C2] ? __ip_finish_output+0x10f/0x760 [ 1121.798451][ C2] __ip_queue_xmit+0x64f/0x1790 [ 1121.798625][ C2] ? __skb_clone+0x571/0x750 [ 1121.798799][ C2] __tcp_transmit_skb+0x2291/0x2d10 [ 1121.798973][ C2] ? __pfx___tcp_transmit_skb+0x10/0x10 [ 1121.799145][ C2] ? mark_held_locks+0x9e/0xe0 [ 1121.799420][ C2] ? lockdep_hardirqs_on_prepare+0x275/0x410 [ 1121.799632][ C2] ? tcp_small_queue_check.isra.0+0xe9/0x380 [ 1121.799849][ C2] tcp_write_xmit+0x8a3/0x2cf0 [ 1121.800121][ C2] ? tcp_current_mss+0x40a/0x510 [ 1121.800303][ C2] ? __pfx_tcp_current_mss+0x10/0x10 [ 1121.800498][ C2] ? __alloc_skb+0x23d/0x2e0 [ 1121.800692][ C2] ? __pfx_tcp_write_xmit+0x10/0x10 [ 1121.800876][ C2] ? tcp_set_state+0x10b/0x510 [ 1121.801167][ C2] ? __pfx_tcp_set_state+0x10/0x10 [ 1121.801357][ C2] __tcp_push_pending_frames+0x96/0x320 [ 1121.801548][ C2] inet_shutdown+0x164/0x390 [ 1121.801733][ C2] ? sockfd_lookup_light+0x1a/0x140 [ 1121.801926][ C2] __sys_shutdown+0xcb/0x160 [ 1121.802114][ C2] ? __pfx___sys_shutdown+0x10/0x10 [ 1121.802303][ C2] ? ksys_read+0x17a/0x1e0 [ 1121.802491][ C2] ? __pfx_ksys_read+0x10/0x10 [ 1121.802778][ C2] __x64_sys_shutdown+0x53/0x80 [ 1121.802961][ C2] do_syscall_64+0xc1/0x1d0 [ 1121.803145][ C2] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1121.803378][ C2] RIP: 0033:0x7f082e32abeb [ 1121.803683][ C2] Code: 73 01 c3 48 8b 0d 15 92 1b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 30 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e5 91 1b 00 f7 d8 64 89 01 48 [ 1121.804316][ C2] RSP: 002b:00007fffdd9d7948 EFLAGS: 00000202 ORIG_RAX: 0000000000000030 [ 1121.804703][ C2] RAX: ffffffffffffffda RBX: 0000559bf964d610 RCX: 00007f082e32abeb [ 1121.804983][ C2] RDX: 0000000000000008 RSI: 0000000000000002 RDI: 0000000000000008 [ 1121.805252][ C2] RBP: 0000000000000008 R08: 0000000000000001 R09: 0000000000000000 [ 1121.805630][ C2] R10: 0000000000000000 R11: 0000000000000202 R12: ffffffffffffffff [ 1121.805903][ C2] R13: 0000000000000000 R14: 0000559bd4b1610e R15: 0000000000000001 [ 1121.806276][ C2] </TASK> [ 1121.806421][ C2] Modules linked in: nft_masq nft_chain_nat nf_nat nf_conntrack_netlink nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 tcp_diag inet_diag veth nf_tables libcrc32c [ 1121.807058][ C2] ---[ end trace 0000000000000000 ]--- [ 1121.807350][ C2] RIP: 0010:xfrm_sk_policy_lookup+0x10f/0x4e0 [ 1121.807599][ C2] Code: 48 89 44 24 18 0f b7 44 24 06 89 44 24 28 e9 a9 01 00 00 4d 85 ed 0f 84 2f 02 00 00 49 8d bd 3e 02 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 8c [ 1121.808276][ C2] RSP: 0018:ffffc90000240150 EFLAGS: 00010206 [ 1121.808636][ C2] RAX: 0b4b4b4b4b4b4b93 RBX: dffffc0000000000 RCX: ffffffff9e9174c8 [ 1121.808942][ C2] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 5a5a5a5a5a5a5c98 [ 1121.809372][ C2] RBP: ffff888007fda008 R08: 0000000000000000 R09: 0000000000000000 [ 1121.809664][ C2] R10: ffffffffa097388f R11: 205d324320202020 R12: 0000000000000000 [ 1121.809942][ C2] R13: 5a5a5a5a5a5a5a5a R14: ffff888007fda008 R15: ffffc90000240340 [ 1121.810332][ C2] FS: 00007f082e29c740(0000) GS:ffff88802f700000(0000) knlGS:0000000000000000 [ 1121.810758][ C2] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1121.811003][ C2] CR2: 0000559bf9653b88 CR3: 0000000006286002 CR4: 0000000000772ef0 [ 1121.811297][ C2] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1121.811576][ C2] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1121.811856][ C2] PKRU: 55555554 [ 1121.812005][ C2] Kernel panic - not syncing: Fatal exception in interrupt [ 1121.812488][ C2] Kernel Offset: 0x1b000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1121.813137][ C2] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]--- WAIT TIMEOUT stderr Ctrl-C stderr Ctrl-C stderr WAIT TIMEOUT stderr