FreeBSD Bugzilla – Attachment 246887 Details for
Bug 275616
net80211: ieee80211_mbuf_adjust() et al mbuf assumptions no longer hold [was: bwn driver causes kernel panic after connect]
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
extract from /var/log/messages with KASAN output
messages.panic (text/plain), 665.04 KB, created by
Frank Hilgendorf
on 2023-12-07 22:23:27 UTC
(
hide
)
Description:
extract from /var/log/messages with KASAN output
Filename:
MIME Type:
Creator:
Frank Hilgendorf
Created:
2023-12-07 22:23:27 UTC
Size:
665.04 KB
patch
obsolete
>MACBOOKPRO31-KASAN kernel (with KASAN) >------------------------- > >Booting without bwn_v4_ucode... >... >... > >kldload bwn_v4_ucode >service netif restart >...> > >Dec 3 18:59:37 hilschubookBSD kernel: wlan0: Ethernet address: 00:1e:52:c8:ff:b1 >Dec 3 18:59:37 hilschubookBSD kernel: lo0: link state changed to UP >Dec 3 18:59:37 hilschubookBSD kernel: msk0: link state changed to DOWN >Dec 3 18:59:37 hilschubookBSD wpa_supplicant[1756]: Successfully initialized wpa_supplicant >Dec 3 18:59:38 hilschubookBSD wpa_supplicant[1756]: ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument >Dec 3 18:59:38 hilschubookBSD syslogd: last message repeated 1 times >Dec 3 18:59:39 hilschubookBSD kernel: bwn0: ucode fw: ucode11 >Dec 3 18:59:39 hilschubookBSD kernel: bwn0: firmware version (rev 410 patch 2160 date 0x751a time 0x7c0a) >Dec 3 18:59:39 hilschubookBSD kernel: bwn0: ucode fw: ucode11 >Dec 3 18:59:39 hilschubookBSD kernel: bwn0: firmware version (rev 410 patch 2160 date 0x751a time 0x7c0a) >Dec 3 18:59:39 hilschubookBSD kernel: bwn0: MAC suspend failed >Dec 3 18:59:40 hilschubookBSD syslogd: last message repeated 3 times >Dec 3 18:59:40 hilschubookBSD kernel: bwn0: ucode fw: ucode11 >Dec 3 18:59:40 hilschubookBSD kernel: bwn0: firmware version (rev 410 patch 2160 date 0x751a time 0x7c0a) >Dec 3 18:59:41 hilschubookBSD wpa_supplicant[1757]: wlan0: Trying to associate with 38:10:d5:7d:0a:54 (SSID='HaseNet' freq=2412 MHz) >Dec 3 18:59:41 hilschubookBSD wpa_supplicant[1757]: wlan0: Associated with 38:10:d5:7d:0a:54 >Dec 3 18:59:41 hilschubookBSD kernel: wlan0: link state changed to UP >Dec 3 18:59:41 hilschubookBSD wpa_supplicant[1757]: wlan0: WPA: Key negotiation completed with 38:10:d5:7d:0a:54 [PTK=CCMP GTK=CCMP] >Dec 3 18:59:41 hilschubookBSD wpa_supplicant[1757]: wlan0: CTRL-EVENT-CONNECTED - Connection to 38:10:d5:7d:0a:54 completed [id=0 id_str=] >Dec 3 18:59:41 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c07c4600, UMAUseAfterFree(fd) >Dec 3 18:59:41 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:41 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:41 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:41 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:41 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:41 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:41 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:41 hilschubookBSD kernel: #7 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:41 hilschubookBSD kernel: #8 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:41 hilschubookBSD kernel: #9 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:41 hilschubookBSD kernel: #10 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:41 hilschubookBSD kernel: #11 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:41 hilschubookBSD kernel: #12 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:41 hilschubookBSD kernel: #13 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:41 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c07c4601, UMAUseAfterFree(fd) >Dec 3 18:59:41 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:41 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:41 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:41 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:41 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:41 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:41 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:41 hilschubookBSD kernel: #7 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:41 hilschubookBSD kernel: #8 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:41 hilschubookBSD kernel: #9 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:41 hilschubookBSD kernel: #10 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:41 hilschubookBSD kernel: #11 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:41 hilschubookBSD kernel: #12 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:41 hilschubookBSD kernel: #13 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:41 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe00c07c4602, UMAUseAfterFree(fd) >Dec 3 18:59:41 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:41 hilschubookBSD kernel: msk0: link state changed to UP >Dec 3 18:59:41 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:41 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:41 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:41 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:41 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:41 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:41 hilschubookBSD kernel: #7 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:41 hilschubookBSD kernel: #8 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:41 hilschubookBSD kernel: #9 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:41 hilschubookBSD kernel: #10 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:41 hilschubookBSD kernel: #11 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:41 hilschubookBSD kernel: #12 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:41 hilschubookBSD kernel: #13 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:41 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c4600, UMAUseAfterFree(fd) >Dec 3 18:59:41 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:41 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:41 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:41 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:41 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:41 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:41 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:41 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:41 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:41 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:41 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:41 hilschubookBSD kernel: #11 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:41 hilschubookBSD kernel: #12 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:41 hilschubookBSD kernel: #13 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:41 hilschubookBSD kernel: #14 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:41 hilschubookBSD kernel: #15 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:41 hilschubookBSD kernel: #16 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:41 hilschubookBSD kernel: #17 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:41 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c4601, UMAUseAfterFree(fd) >Dec 3 18:59:41 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:41 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:41 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:41 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:41 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:41 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:41 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:41 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:41 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:41 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:41 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:41 hilschubookBSD kernel: #11 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:41 hilschubookBSD kernel: #12 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:41 hilschubookBSD kernel: #13 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:41 hilschubookBSD kernel: #14 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:41 hilschubookBSD kernel: #15 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:41 hilschubookBSD kernel: #16 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:41 hilschubookBSD kernel: #17 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:41 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c4602, UMAUseAfterFree(fd) >Dec 3 18:59:41 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:41 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:41 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:41 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:41 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:41 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:41 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:41 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c4603, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c4600, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c4601, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c4602, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c4603, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81c2b9bb at amd64_syscall+0x2cb >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff81be879b at fast_syscall_common+0xf8 >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 40-byte read at 0xfffffe00c07c45dc, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff814e39af at bpfwrite+0xd6f >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff80f9549e at devfs_write_f+0x1fe >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff81385e93 at dofilewrite+0x173 >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff813852f2 at kern_writev+0xb2 >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff81385cba at sys_writev+0xca >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c07c7900, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff8136f81b at taskqueue_thread_loop+0x29b >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff81be8eee at fork_trampoline+0xe >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c07c7901, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff8136f81b at taskqueue_thread_loop+0x29b >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff81be8eee at fork_trampoline+0xe >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe00c07c7902, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff8136f81b at taskqueue_thread_loop+0x29b >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff81be8eee at fork_trampoline+0xe >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c7900, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c7901, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c7902, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c7903, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c7900, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:42 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:42 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:42 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:42 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:42 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:42 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:42 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:42 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:42 hilschubookBSD kernel: #12 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:42 hilschubookBSD kernel: #13 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:42 hilschubookBSD kernel: #14 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:42 hilschubookBSD kernel: #15 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:42 hilschubookBSD kernel: #16 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:42 hilschubookBSD kernel: #17 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:42 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c7901, UMAUseAfterFree(fd) >Dec 3 18:59:42 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:42 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:42 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:42 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:43 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:43 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:43 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:43 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:43 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:43 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:43 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:43 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:43 hilschubookBSD kernel: #12 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:43 hilschubookBSD kernel: #13 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:43 hilschubookBSD kernel: #14 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:43 hilschubookBSD kernel: #15 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:43 hilschubookBSD kernel: #16 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:43 hilschubookBSD kernel: #17 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:43 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c7902, UMAUseAfterFree(fd) >Dec 3 18:59:43 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:43 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:43 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:43 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:43 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:43 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:43 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:43 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:43 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:43 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:43 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:43 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:43 hilschubookBSD kernel: #12 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:43 hilschubookBSD kernel: #13 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:43 hilschubookBSD kernel: #14 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:43 hilschubookBSD kernel: #15 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:43 hilschubookBSD kernel: #16 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:43 hilschubookBSD kernel: #17 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:43 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07c7903, UMAUseAfterFree(fd) >Dec 3 18:59:43 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:43 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:43 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:43 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:43 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:43 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:43 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:43 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:43 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:43 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:43 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:43 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:43 hilschubookBSD kernel: #12 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:43 hilschubookBSD kernel: #13 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:43 hilschubookBSD kernel: #14 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:43 hilschubookBSD kernel: #15 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:43 hilschubookBSD kernel: #16 0xffffffff81744168 at rtnl_handle_message+0x2e8 >Dec 3 18:59:43 hilschubookBSD kernel: #17 0xffffffff8173f93f at nl_taskqueue_handler+0xfdf >Dec 3 18:59:43 hilschubookBSD kernel: ASan: Invalid access, 40-byte read at 0xfffffe00c07c78dc, UMAUseAfterFree(fd) >Dec 3 18:59:43 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:43 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:43 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:43 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:43 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:43 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:43 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:43 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:43 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:43 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:43 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:43 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:43 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:43 hilschubookBSD kernel: #13 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:43 hilschubookBSD kernel: #14 0xffffffff815f7ee2 at arp_ifinit+0x182 >Dec 3 18:59:43 hilschubookBSD kernel: #15 0xffffffff815a7c33 at ieee80211_ioctl+0x2b3 >Dec 3 18:59:43 hilschubookBSD kernel: #16 0xffffffff81608f74 at in_control_ioctl+0x1524 >Dec 3 18:59:43 hilschubookBSD kernel: #17 0xffffffff8174973c at rtnl_handle_addr+0x66c >Dec 3 18:59:43 hilschubookBSD kernel: bwn0: need multicast update callback >Dec 3 18:59:43 hilschubookBSD dhclient[1807]: New IP Address (wlan0): 10.0.2.39 >Dec 3 18:59:43 hilschubookBSD dhclient[1811]: New Subnet Mask (wlan0): 255.255.0.0 >Dec 3 18:59:43 hilschubookBSD dhclient[1815]: New Broadcast Address (wlan0): 10.0.255.255 >Dec 3 18:59:43 hilschubookBSD dhclient[1819]: New Routers (wlan0): 10.0.1.1 >Dec 3 18:59:43 hilschubookBSD dhclient[1901]: New IP Address (msk0): 10.0.2.30 >Dec 3 18:59:43 hilschubookBSD dhclient[1905]: New Subnet Mask (msk0): 255.255.0.0 >Dec 3 18:59:43 hilschubookBSD dhclient[1909]: New Broadcast Address (msk0): 10.0.255.255 >Dec 3 18:59:43 hilschubookBSD dhclient[1913]: New Routers (msk0): 10.0.1.1 >Dec 3 18:59:44 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cf600, UMAUseAfterFree(fd) >Dec 3 18:59:44 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:44 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:44 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:44 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:44 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:44 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:44 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:44 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:44 hilschubookBSD kernel: #8 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:44 hilschubookBSD kernel: #9 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:44 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:44 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:44 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:44 hilschubookBSD kernel: #13 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:44 hilschubookBSD kernel: #14 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:44 hilschubookBSD kernel: #15 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:44 hilschubookBSD kernel: #16 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:44 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:44 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cf601, UMAUseAfterFree(fd) >Dec 3 18:59:44 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:44 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:44 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:44 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:44 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:44 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:44 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:44 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:44 hilschubookBSD kernel: #8 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:44 hilschubookBSD kernel: #9 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:44 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:44 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:44 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:44 hilschubookBSD kernel: #13 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:44 hilschubookBSD kernel: #14 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:44 hilschubookBSD kernel: #15 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:44 hilschubookBSD kernel: #16 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:44 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:44 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe006f8cf602, UMAUseAfterFree(fd) >Dec 3 18:59:44 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:44 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:44 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:44 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:44 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:44 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:44 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:44 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:44 hilschubookBSD kernel: #8 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:44 hilschubookBSD kernel: #9 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:44 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:44 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:44 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:44 hilschubookBSD kernel: #13 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:44 hilschubookBSD kernel: #14 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:44 hilschubookBSD kernel: #15 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:44 hilschubookBSD kernel: #16 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:44 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:44 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf600, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf601, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf602, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf603, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf600, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf601, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf602, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf603, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81655b3d at tcp_do_segment+0x419d >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 40-byte read at 0xfffffe006f8cf5dc, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c3241400, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c3241401, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe00c3241402, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241400, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:45 hilschubookBSD kernel: #17 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:45 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241401, UMAUseAfterFree(fd) >Dec 3 18:59:45 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:45 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:45 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:45 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:45 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:45 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:45 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:45 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:45 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:45 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:45 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:45 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:45 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:45 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:45 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:45 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241402, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241403, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241400, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241401, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241402, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241403, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 40-byte read at 0xfffffe00c32413dc, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c07cb400, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff815cb478 at ieee80211_encap+0x4f8 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c07cb401, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff815cb485 at ieee80211_encap+0x505 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c07cb402, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c07cb403, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe00c07cb404, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb400, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb401, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:46 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:46 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:46 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:46 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:46 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:46 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:46 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:46 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:46 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:46 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb402, UMAUseAfterFree(fd) >Dec 3 18:59:46 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:46 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:46 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:46 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:46 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:46 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:46 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:46 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb403, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb404, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb405, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb400, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb401, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb402, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb403, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb404, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c07cb405, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 42-byte read at 0xfffffe00c07cb3dc, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:47 hilschubookBSD kernel: #15 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:47 hilschubookBSD kernel: #16 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:47 hilschubookBSD kernel: #17 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe008cf40700, UMAUseAfterFree(fd) >Dec 3 18:59:47 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:47 hilschubookBSD kernel: #1 0xffffffff815cb478 at ieee80211_encap+0x4f8 >Dec 3 18:59:47 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:47 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:47 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:47 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:47 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:47 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:47 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:47 hilschubookBSD kernel: #9 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:47 hilschubookBSD kernel: #10 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:47 hilschubookBSD kernel: #11 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:47 hilschubookBSD kernel: #12 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:47 hilschubookBSD kernel: #13 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:47 hilschubookBSD kernel: #14 0xffffffff81be8eee at fork_trampoline+0xe >Dec 3 18:59:47 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe008cf40701, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff815cb485 at ieee80211_encap+0x505 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81be8eee at fork_trampoline+0xe >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe008cf40702, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81be8eee at fork_trampoline+0xe >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe008cf40703, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81be8eee at fork_trampoline+0xe >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe008cf40704, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81be8eee at fork_trampoline+0xe >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40700, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40701, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40702, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40703, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40704, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40705, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40700, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40701, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40702, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40703, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40704, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40705, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff812c915a at softclock_thread+0x27a >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff811fa56c at fork_exit+0xcc >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 42-byte read at 0xfffffe008cf406dc, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff81689f7c at tcp_timer_rexmt+0xb5c >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff81688cfe at tcp_timer_enter+0x21e >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff812c5efb at softclock_call_cc+0x33b >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cff00, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff815cb478 at ieee80211_encap+0x4f8 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cff01, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff815cb485 at ieee80211_encap+0x505 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cff02, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cff03, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe006f8cff04, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff00, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff01, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff02, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff03, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff04, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff05, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff00, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff01, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:48 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:48 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:48 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:48 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:48 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:48 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:48 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:48 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:48 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:48 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:48 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:48 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff02, UMAUseAfterFree(fd) >Dec 3 18:59:48 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:48 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:48 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:48 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:48 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:48 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:49 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:49 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:49 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:49 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:49 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:49 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:49 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:49 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:49 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:49 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:49 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff03, UMAUseAfterFree(fd) >Dec 3 18:59:49 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:49 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:49 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:49 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:49 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:49 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:49 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:49 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:49 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:49 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:49 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:49 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:49 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:49 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:49 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:49 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:49 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff04, UMAUseAfterFree(fd) >Dec 3 18:59:49 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:49 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:49 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:49 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:49 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:49 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:49 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:49 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:49 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:49 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:49 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:49 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:49 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:49 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:49 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:49 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:49 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff05, UMAUseAfterFree(fd) >Dec 3 18:59:49 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:49 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:49 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:49 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:49 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:49 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:49 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:49 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:49 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:49 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:49 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:49 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:49 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:49 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:49 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:49 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:49 hilschubookBSD kernel: ASan: Invalid access, 42-byte read at 0xfffffe006f8cfedc, UMAUseAfterFree(fd) >Dec 3 18:59:49 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:49 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:49 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:49 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:49 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:49 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:49 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:49 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:49 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:49 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:49 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:49 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:49 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:49 hilschubookBSD kernel: #13 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:49 hilschubookBSD kernel: #14 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:49 hilschubookBSD kernel: #15 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #16 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:49 hilschubookBSD kernel: #17 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:49 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cf600, UMAUseAfterFree(fd) >Dec 3 18:59:49 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:49 hilschubookBSD kernel: #1 0xffffffff815cb478 at ieee80211_encap+0x4f8 >Dec 3 18:59:49 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:49 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:49 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:49 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:49 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:49 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:49 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:49 hilschubookBSD kernel: #9 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:49 hilschubookBSD kernel: #10 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:49 hilschubookBSD kernel: #11 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:49 hilschubookBSD kernel: #12 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:49 hilschubookBSD kernel: #13 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:49 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:49 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:49 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cf601, UMAUseAfterFree(fd) >Dec 3 18:59:49 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:49 hilschubookBSD kernel: #1 0xffffffff815cb485 at ieee80211_encap+0x505 >Dec 3 18:59:49 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:49 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:49 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:49 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:49 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:49 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:49 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:49 hilschubookBSD kernel: #9 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:49 hilschubookBSD kernel: #10 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:49 hilschubookBSD kernel: #11 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:49 hilschubookBSD kernel: #12 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:49 hilschubookBSD kernel: #13 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:49 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:49 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:49 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cf602, UMAUseAfterFree(fd) >Dec 3 18:59:49 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:49 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:49 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:49 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:49 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:49 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:49 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:49 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:49 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:49 hilschubookBSD kernel: #9 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:49 hilschubookBSD kernel: #10 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:49 hilschubookBSD kernel: #11 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:49 hilschubookBSD kernel: #12 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:49 hilschubookBSD kernel: #13 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:49 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:49 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:49 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cf603, UMAUseAfterFree(fd) >Dec 3 18:59:49 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:49 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:49 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:49 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:49 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:49 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:49 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:49 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:49 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:49 hilschubookBSD kernel: #9 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:49 hilschubookBSD kernel: #10 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:49 hilschubookBSD kernel: #11 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:49 hilschubookBSD kernel: #12 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:49 hilschubookBSD kernel: #13 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:49 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:49 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:49 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe006f8cf604, UMAUseAfterFree(fd) >Dec 3 18:59:49 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:49 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:49 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:49 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:49 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:49 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:49 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:49 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:49 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:49 hilschubookBSD kernel: #9 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:49 hilschubookBSD kernel: #10 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:49 hilschubookBSD kernel: #11 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:49 hilschubookBSD kernel: #12 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:49 hilschubookBSD kernel: #13 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:49 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:49 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:49 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:49 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf600, UMAUseAfterFree(fd) >Dec 3 18:59:49 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:49 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:49 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf601, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf602, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf603, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf604, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf605, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf600, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf601, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf602, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf603, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf604, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cf605, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 42-byte read at 0xfffffe006f8cf5dc, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cff00, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff815cb478 at ieee80211_encap+0x4f8 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81888f4e at svc_sendreply_mbuf+0x12e >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff8108d6ec at nfssvc_program+0x140c >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8188c23c at svc_run_internal+0x1ccc >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8188a11f at svc_run+0x3cf >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cff01, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff815cb485 at ieee80211_encap+0x505 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81888f4e at svc_sendreply_mbuf+0x12e >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff8108d6ec at nfssvc_program+0x140c >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8188c23c at svc_run_internal+0x1ccc >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8188a11f at svc_run+0x3cf >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cff02, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81888f4e at svc_sendreply_mbuf+0x12e >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff8108d6ec at nfssvc_program+0x140c >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8188c23c at svc_run_internal+0x1ccc >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8188a11f at svc_run+0x3cf >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cff03, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81888f4e at svc_sendreply_mbuf+0x12e >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff8108d6ec at nfssvc_program+0x140c >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8188c23c at svc_run_internal+0x1ccc >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8188a11f at svc_run+0x3cf >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe006f8cff04, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81888f4e at svc_sendreply_mbuf+0x12e >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff8108d6ec at nfssvc_program+0x140c >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8188c23c at svc_run_internal+0x1ccc >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff8188a11f at svc_run+0x3cf >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff00, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff01, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff02, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff03, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff04, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff05, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff00, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff01, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff02, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff03, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff04, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cff05, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81893572 at svc_vc_reply+0x2d2 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81888d99 at svc_sendreply_common+0x1a9 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 42-byte read at 0xfffffe006f8cfedc, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff8168cbd3 at tcp_usr_send+0x843 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff813f5dcf at sosend_generic+0xbff >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff813f69fd at sosend+0xad >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cba00, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f6b82 at sousrsend+0x152 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff8140480c at kern_sendit+0x44c >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81404c69 at sendit+0x109 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81404af1 at sys_sendto+0x181 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8cba01, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f6b82 at sousrsend+0x152 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff8140480c at kern_sendit+0x44c >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81404c69 at sendit+0x109 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81404af1 at sys_sendto+0x181 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe006f8cba02, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff813f6b82 at sousrsend+0x152 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff8140480c at kern_sendit+0x44c >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff81404c69 at sendit+0x109 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81404af1 at sys_sendto+0x181 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cba00, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cba01, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cba02, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cba03, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cba00, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cba01, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cba02, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8cba03, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff8169b661 at udp_send+0x15e1 >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff813f4f20 at sosend_dgram+0x7d0 >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 40-byte read at 0xfffffe006f8cb9dc, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #13 0xffffffff815f6ebd at arprequest_internal+0x78d >Dec 3 18:59:51 hilschubookBSD kernel: #14 0xffffffff815f7ae2 at arpresolve+0xa32 >Dec 3 18:59:51 hilschubookBSD kernel: #15 0xffffffff815038d5 at ether_output+0x755 >Dec 3 18:59:51 hilschubookBSD kernel: #16 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #17 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c3241400, UMAUseAfterFree(fd) >Dec 3 18:59:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:51 hilschubookBSD kernel: #1 0xffffffff815cb478 at ieee80211_encap+0x4f8 >Dec 3 18:59:51 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:51 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:51 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:51 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:51 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:51 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:51 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:51 hilschubookBSD kernel: #9 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:51 hilschubookBSD kernel: #10 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:51 hilschubookBSD kernel: #11 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c3241401, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff815cb485 at ieee80211_encap+0x505 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c3241402, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe00c3241403, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe00c3241404, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241400, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241401, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241402, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241403, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241404, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241405, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241400, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241401, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241402, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241403, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241404, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe00c3241405, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff8165198b at tcp_input+0xb >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8162ed6f at ip_input+0x5af >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 42-byte read at 0xfffffe00c32413dc, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff81635c3e at ip_output+0x21fe >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff81669da9 at tcp_default_output+0x3e69 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff816587f0 at tcp_output+0x80 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff81656965 at tcp_do_segment+0x4fc5 >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff81650399 at tcp_input_with_port+0x16d9 >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8d8500, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff815cb478 at ieee80211_encap+0x4f8 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:52 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:52 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:52 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:52 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:52 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:52 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:52 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:52 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:52 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:52 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:52 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:52 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8d8501, UMAUseAfterFree(fd) >Dec 3 18:59:52 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:52 hilschubookBSD kernel: #1 0xffffffff815cb485 at ieee80211_encap+0x505 >Dec 3 18:59:52 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:52 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:52 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:52 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:53 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:53 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:53 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:53 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:53 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:53 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:53 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:53 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:53 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:53 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:53 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8d8502, UMAUseAfterFree(fd) >Dec 3 18:59:53 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:53 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:53 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:53 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:53 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:53 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:53 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:53 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:53 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:53 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:53 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:53 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:53 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:53 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:53 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:53 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:53 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe006f8d8503, UMAUseAfterFree(fd) >Dec 3 18:59:53 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:53 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:53 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:53 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:53 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:53 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:53 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:53 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:53 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:53 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:53 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:53 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:53 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:53 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:53 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:53 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:53 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe006f8d8504, UMAUseAfterFree(fd) >Dec 3 18:59:53 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:53 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:53 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:53 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:53 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:53 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:53 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:53 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:53 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:53 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:53 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:53 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:53 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:53 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:53 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:53 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:53 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8500, UMAUseAfterFree(fd) >Dec 3 18:59:53 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:53 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:53 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:53 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:53 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:53 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:53 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:53 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:53 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:53 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:53 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:53 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:53 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:53 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:53 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:53 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:53 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8501, UMAUseAfterFree(fd) >Dec 3 18:59:53 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:53 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:53 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:53 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:53 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:53 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:53 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:53 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:53 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:53 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:53 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:53 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:53 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:53 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:53 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:53 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:53 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8502, UMAUseAfterFree(fd) >Dec 3 18:59:53 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:53 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:53 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:53 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:53 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:53 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:53 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:53 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:53 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:53 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:53 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:53 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:53 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:53 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:53 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:53 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:53 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8503, UMAUseAfterFree(fd) >Dec 3 18:59:53 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:53 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:53 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:53 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:53 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:53 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:53 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:53 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:53 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:53 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:53 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:53 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:53 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:53 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:53 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:53 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:53 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8504, UMAUseAfterFree(fd) >Dec 3 18:59:53 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:53 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:53 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:53 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:53 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:53 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:53 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:53 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:53 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:53 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:53 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:53 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:53 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:53 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:53 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:53 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:53 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8505, UMAUseAfterFree(fd) >Dec 3 18:59:53 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:53 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:53 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:53 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:53 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:53 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:53 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:53 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:53 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:53 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:53 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:53 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:53 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:53 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:53 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8500, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8501, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8502, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8503, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8504, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe006f8d8505, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580953 at ccmp_encap+0xf53 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 42-byte read at 0xfffffe006f8d84dc, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff812fc4c9 at kasan_memmove+0x1b9 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff813d9415 at m_copydata+0x165 >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff813dce00 at m_defrag+0x260 >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c41787 at bwn_tx_start+0x1127 >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff84c3f29f at bwn_start+0x1af >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe008cf40700, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff815cb478 at ieee80211_encap+0x4f8 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe008cf40701, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff815cb485 at ieee80211_encap+0x505 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe008cf40702, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff815cb492 at ieee80211_encap+0x512 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte write at 0xfffffe008cf40703, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff815cb49f at ieee80211_encap+0x51f >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 2-byte write at 0xfffffe008cf40704, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff815cb4d0 at ieee80211_encap+0x550 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff815ca8cd at ieee80211_vap_pkt_send_dest+0x5bd >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff815ebac7 at sta_input+0x1217 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff84c40160 at bwn_rxeof+0x9b0 >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff84c3306d at bwn_intrtask+0x1cfd >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff8136ca2c at taskqueue_run_locked+0x47c >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40700, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40701, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40702, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40703, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40704, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: wlan0: link state changed to DOWN >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD wpa_supplicant[1757]: wlan0: CTRL-EVENT-DISCONNECTED bssid=38:10:d5:7d:0a:54 reason=0 >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 1-byte read at 0xfffffe008cf40705, UMAUseAfterFree(fd) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff81580899 at ccmp_encap+0xe99 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff81504dbd at ether_input+0x11d >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e598, MallocRedZone(fb) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 18:59:54 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 18:59:54 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 18:59:54 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 18:59:54 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 18:59:54 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 18:59:54 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 18:59:54 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 18:59:54 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 18:59:54 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 18:59:54 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 18:59:54 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 18:59:54 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 18:59:54 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 18:59:54 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 18:59:54 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 18:59:54 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 18:59:54 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e59c, MallocRedZone(fb) >Dec 3 18:59:54 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5a0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5a4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5a8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5ac, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5b0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5b4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5b8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5bc, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5c0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5c4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5c8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5cc, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5d0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5d4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5d8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5dc, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5e0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5e4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5e8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5ec, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5f0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5f4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5f8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351e5fc, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fb98, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fb9c, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fba0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fba4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fba8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbac, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbb0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbb4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbb8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbbc, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbc0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbc4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbc8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbcc, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbd0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbd4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbd8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbdc, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbe0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbe4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbe8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbec, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbf0, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbf4, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbf8, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a351fbfc, MallocRedZone(fb) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3527fc8, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3527fcc, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3527fd0, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3527fd4, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3527fd8, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3527fdc, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3528fc8, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3528fcc, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3528fd0, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3528fd4, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3528fd8, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3528fdc, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3529fc8, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3529fcc, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3529fd0, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3529fd4, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3529fd8, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3529fdc, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a352afc8, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a352afcc, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a352afd0, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a352afd4, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a352afd8, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a352afdc, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a352bfc8, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a352bfcc, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a352bfd0, UMAUseAfterFree(fd) >Dec 3 19:00:00 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:00 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:00 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:00 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:00 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:00 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:00 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:00 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:00 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:00 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:00 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:00 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:00 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:00 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:00 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:00 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:00 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:00 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a352bfd4, UMAUseAfterFree(fd) >Dec 3 19:00:50 hilschubookBSD kernel: 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353815c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538160, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538164, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538168, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353816c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538170, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538174, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538178, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353817c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382c0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382c4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382c8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382cc, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382d0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382d4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382d8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382dc, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382e0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382e4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382e8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382ec, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382f0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382f4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382f8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35382fc, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538440, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538444, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538448, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353844c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538450, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538454, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538458, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353845c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538460, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538464, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538468, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353846c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538470, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538474, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538478, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353847c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385c0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385c4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385c8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385cc, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385d0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385d4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385d8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385dc, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385e0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385e4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385e8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385ec, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385f0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385f4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385f8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35385fc, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538740, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538744, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538748, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353874c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538750, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538754, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538758, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353875c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538760, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538764, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538768, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353876c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538770, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538774, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538778, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a353877c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388c0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388c4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388c8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388cc, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388d0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388d4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388d8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388dc, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388e0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388e4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388e8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388ec, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388f0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388f4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388f8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a35388fc, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a40, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a44, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a48, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a4c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a50, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a54, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a58, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a5c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a60, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a64, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a68, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a6c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a70, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a74, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a78, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538a7c, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538bc0, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538bc4, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599e36 at rijndaelEncrypt+0x626 >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:50 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:50 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:50 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:50 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538bc8, MallocRedZone(fb) >Dec 3 19:00:50 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:50 hilschubookBSD kernel: #1 0xffffffff80599a6c at rijndaelEncrypt+0x25c >Dec 3 19:00:50 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:50 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:50 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:50 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:50 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:50 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:50 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:50 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:50 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:50 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:50 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:50 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:51 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:51 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:51 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538bcc, MallocRedZone(fb) >Dec 3 19:00:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:51 hilschubookBSD kernel: #1 0xffffffff80599af7 at rijndaelEncrypt+0x2e7 >Dec 3 19:00:51 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:51 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:51 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:51 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:51 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:51 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:51 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:51 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:51 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:51 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:51 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:51 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:51 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:51 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:51 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538bd0, MallocRedZone(fb) >Dec 3 19:00:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:51 hilschubookBSD kernel: #1 0xffffffff80599b7c at rijndaelEncrypt+0x36c >Dec 3 19:00:51 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:51 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:51 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:51 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:51 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:51 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:51 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:51 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:51 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:51 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:51 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:51 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:51 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:51 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:51 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538bd4, MallocRedZone(fb) >Dec 3 19:00:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:51 hilschubookBSD kernel: #1 0xffffffff80599c01 at rijndaelEncrypt+0x3f1 >Dec 3 19:00:51 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:51 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:51 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:51 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:51 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:51 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:51 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:51 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:51 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:51 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:51 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:51 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:51 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:51 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:51 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538bd8, MallocRedZone(fb) >Dec 3 19:00:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:51 hilschubookBSD kernel: #1 0xffffffff80599ca5 at rijndaelEncrypt+0x495 >Dec 3 19:00:51 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:51 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:51 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:51 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:51 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:51 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:51 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:51 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:51 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:51 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:51 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:51 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:51 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:51 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:51 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538bdc, MallocRedZone(fb) >Dec 3 19:00:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:51 hilschubookBSD kernel: #1 0xffffffff80599d2c at rijndaelEncrypt+0x51c >Dec 3 19:00:51 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:51 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:51 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:51 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:51 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:51 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:51 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:51 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:51 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:51 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:51 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 >Dec 3 19:00:51 hilschubookBSD kernel: #13 0xffffffff815fbd55 at arpintr+0x12a5 >Dec 3 19:00:51 hilschubookBSD kernel: #14 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: #15 0xffffffff81504624 at ether_demux+0x2d4 >Dec 3 19:00:51 hilschubookBSD kernel: #16 0xffffffff8150702c at ether_nh_input+0x69c >Dec 3 19:00:51 hilschubookBSD kernel: #17 0xffffffff8153e262 at netisr_dispatch_src+0x1a2 >Dec 3 19:00:51 hilschubookBSD kernel: ASan: Invalid access, 4-byte read at 0xfffffe00a3538be0, MallocRedZone(fb) >Dec 3 19:00:51 hilschubookBSD kernel: #0 0xffffffff81319165 at kasan_report+0x35 >Dec 3 19:00:51 hilschubookBSD kernel: #1 0xffffffff80599db1 at rijndaelEncrypt+0x5a1 >Dec 3 19:00:51 hilschubookBSD kernel: #2 0xffffffff815808df at ccmp_encap+0xedf >Dec 3 19:00:51 hilschubookBSD kernel: #3 0xffffffff8157f02f at ieee80211_crypto_encap+0xbf >Dec 3 19:00:51 hilschubookBSD kernel: #4 0xffffffff84c3f28c at bwn_start+0x19c >Dec 3 19:00:51 hilschubookBSD kernel: #5 0xffffffff84c4703c at bwn_transmit+0x1fc >Dec 3 19:00:51 hilschubookBSD kernel: #6 0xffffffff8158a42a at ieee80211_parent_xmitpkt+0x2a >Dec 3 19:00:51 hilschubookBSD kernel: #7 0xffffffff815ca8f4 at ieee80211_vap_pkt_send_dest+0x5e4 >Dec 3 19:00:51 hilschubookBSD kernel: #8 0xffffffff815cc99d at ieee80211_vap_transmit+0x53d >Dec 3 19:00:51 hilschubookBSD kernel: #9 0xffffffff815042da at ether_output_frame+0x2aa >Dec 3 19:00:51 hilschubookBSD kernel: #10 0xffffffff81503f11 at ether_output+0xd91 >Dec 3 19:00:51 hilschubookBSD kernel: #11 0xffffffff815ccf1f at ieee80211_output+0x1df >Dec 3 19:00:51 hilschubookBSD kernel: #12 0xffffffff815fd0e7 at arp_check_update_lle+0x6f7 > >Kernel panic > >MACBOOKPRO31 kernel (without KASAN) > >Dec 3 19:36:34 hilschubookBSD syslogd: kernel boot file is /boot/kernel/kernel >Dec 3 19:36:34 hilschubookBSD kernel: ---<<BOOT>>--- >Dec 3 19:36:34 hilschubookBSD kernel: Copyright (c) 1992-2023 The FreeBSD Project. >Dec 3 19:36:34 hilschubookBSD kernel: Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 >Dec 3 19:36:34 hilschubookBSD kernel: The Regents of the University of California. All rights reserved. >Dec 3 19:36:34 hilschubookBSD kernel: FreeBSD is a registered trademark of The FreeBSD Foundation. >Dec 3 19:36:34 hilschubookBSD kernel: FreeBSD 14.0-RELEASE #2 n265380-f9716eee8ab4: Sun Dec 3 19:26:01 CET 2023 >Dec 3 19:36:34 hilschubookBSD kernel: root@hilschubookBSD:/usr/obj/usr/src/amd64.amd64/sys/MACBOOKPRO31 amd64 >Dec 3 19:36:34 hilschubookBSD kernel: FreeBSD clang version 16.0.6 (https://github.com/llvm/llvm-project.git llvmorg-16.0.6-0-g7cbf1a259152) >Dec 3 19:36:34 hilschubookBSD kernel: VT(vga): resolution 640x480 >Dec 3 19:36:34 hilschubookBSD kernel: CPU: Intel(R) Core(TM)2 Duo CPU T7700 @ 2.40GHz (2394.15-MHz K8-class CPU) >Dec 3 19:36:34 hilschubookBSD kernel: Origin="GenuineIntel" Id=0x6fa Family=0x6 Model=0xf Stepping=10 >Dec 3 19:36:34 hilschubookBSD kernel: Features=0xbfebfbff<FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CLFLUSH,DTS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,PBE> >Dec 3 19:36:34 hilschubookBSD kernel: Features2=0xe3bd<SSE3,DTES64,MON,DS_CPL,VMX,EST,TM2,SSSE3,CX16,xTPR,PDCM> >Dec 3 19:36:34 hilschubookBSD kernel: AMD Features=0x20100800<SYSCALL,NX,LM> >Dec 3 19:36:34 hilschubookBSD kernel: AMD Features2=0x1<LAHF> >Dec 3 19:36:34 hilschubookBSD kernel: VT-x: HLT,PAUSE >Dec 3 19:36:34 hilschubookBSD kernel: TSC: P-state invariant, performance statistics >Dec 3 19:36:34 hilschubookBSD kernel: real memory = 4294967296 (4096 MB) >Dec 3 19:36:34 hilschubookBSD kernel: avail memory = 4081061888 (3892 MB) >Dec 3 19:36:34 hilschubookBSD kernel: Event timer "LAPIC" quality 100 >Dec 3 19:36:34 hilschubookBSD kernel: ACPI APIC Table: <APPLE Apple00> >Dec 3 19:36:34 hilschubookBSD kernel: FreeBSD/SMP: Multiprocessor System Detected: 2 CPUs >Dec 3 19:36:34 hilschubookBSD kernel: FreeBSD/SMP: 1 package(s) x 2 core(s) >Dec 3 19:36:34 hilschubookBSD kernel: random: unblocking device. >Dec 3 19:36:34 hilschubookBSD kernel: ioapic0: MADT APIC ID 1 != hw id 0 >Dec 3 19:36:34 hilschubookBSD kernel: ioapic0 <Version 2.0> irqs 0-23 >Dec 3 19:36:34 hilschubookBSD kernel: Launching APs: 1 >Dec 3 19:36:34 hilschubookBSD kernel: random: entropy device external interface >Dec 3 19:36:34 hilschubookBSD kernel: kbd0 at kbdmux0 >Dec 3 19:36:34 hilschubookBSD kernel: vtvga0: <VT VGA driver> >Dec 3 19:36:34 hilschubookBSD kernel: smbios0: <System Management BIOS> at iomem 0xfe110-0xfe12e >Dec 3 19:36:34 hilschubookBSD kernel: smbios0: Version: 2.4, BCD Revision: 2.4 >Dec 3 19:36:34 hilschubookBSD kernel: aesni0: No AES or SHA support. >Dec 3 19:36:34 hilschubookBSD kernel: acpi0: <APPLE Apple00> >Dec 3 19:36:34 hilschubookBSD kernel: acpi_ec0: <Embedded Controller: GPE 0x17, ECDT> port 0x62,0x66 on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: acpi0: Power Button (fixed) >Dec 3 19:36:34 hilschubookBSD kernel: hpet0: <High Precision Event Timer> iomem 0xfed00000-0xfed003ff irq 0,8 on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: Timecounter "HPET" frequency 14318180 Hz quality 950 >Dec 3 19:36:34 hilschubookBSD kernel: Event timer "HPET" frequency 14318180 Hz quality 450 >Dec 3 19:36:34 hilschubookBSD kernel: Event timer "HPET1" frequency 14318180 Hz quality 440 >Dec 3 19:36:34 hilschubookBSD kernel: Event timer "HPET2" frequency 14318180 Hz quality 440 >Dec 3 19:36:34 hilschubookBSD kernel: cpu0: <ACPI CPU> on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: atrtc0: <AT realtime clock> port 0x70-0x77 on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: atrtc0: Warning: Couldn't map I/O. >Dec 3 19:36:34 hilschubookBSD kernel: atrtc0: registered as a time-of-day clock, resolution 1.000000s >Dec 3 19:36:34 hilschubookBSD kernel: Event timer "RTC" frequency 32768 Hz quality 0 >Dec 3 19:36:34 hilschubookBSD kernel: attimer0: <AT timer> port 0x40-0x43,0x50-0x53 on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: Timecounter "i8254" frequency 1193182 Hz quality 0 >Dec 3 19:36:34 hilschubookBSD kernel: Event timer "i8254" frequency 1193182 Hz quality 100 >Dec 3 19:36:34 hilschubookBSD kernel: Timecounter "ACPI-fast" frequency 3579545 Hz quality 900 >Dec 3 19:36:34 hilschubookBSD kernel: acpi_timer0: <24-bit timer at 3.579545MHz> port 0x408-0x40b on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: acpi_acad0: <AC Adapter> on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: acpi_lid0: <Control Method Lid Switch> on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: acpi_button0: <Power Button> on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: acpi_button1: <Sleep Button> on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: pcib0: <ACPI Host-PCI bridge> port 0xcf8-0xcff on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: pci0: <ACPI PCI bus> on pcib0 >Dec 3 19:36:34 hilschubookBSD kernel: pcib1: <ACPI PCI-PCI bridge> at device 1.0 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: pci1: <ACPI PCI bus> on pcib1 >Dec 3 19:36:34 hilschubookBSD kernel: vgapci0: <VGA-compatible display> port 0x5000-0x507f mem 0xd2000000-0xd2ffffff,0xc0000000-0xcfffffff,0xd0000000-0xd1ffffff irq 16 at device 0.0 on pci1 >Dec 3 19:36:34 hilschubookBSD kernel: vgapci0: Boot video device >Dec 3 19:36:34 hilschubookBSD kernel: uhci0: <Intel 82801H (ICH8) USB controller USB-D> port 0x60c0-0x60df irq 20 at device 26.0 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus0 on uhci0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus0: 12Mbps Full Speed USB v1.0 >Dec 3 19:36:34 hilschubookBSD kernel: uhci1: <Intel 82801H (ICH8) USB controller USB-E> port 0x60a0-0x60bf irq 16 at device 26.1 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus1 on uhci1 >Dec 3 19:36:34 hilschubookBSD kernel: usbus1: 12Mbps Full Speed USB v1.0 >Dec 3 19:36:34 hilschubookBSD kernel: ehci0: <Intel 82801H (ICH8) USB 2.0 controller USB2-B> mem 0xdb704c00-0xdb704fff irq 21 at device 26.7 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus2: EHCI version 1.0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus2 on ehci0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus2: 480Mbps High Speed USB v2.0 >Dec 3 19:36:34 hilschubookBSD kernel: hdac0: <Intel 82801H HDA Controller> mem 0xdb700000-0xdb703fff irq 20 at device 27.0 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: pcib2: <PCI-PCI bridge> at device 28.0 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: pcib3: <ACPI PCI-PCI bridge> at device 28.2 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: pcib3: failed to allocate initial I/O port window: 0x4000-0x4fff >Dec 3 19:36:34 hilschubookBSD kernel: pci2: <ACPI PCI bus> on pcib3 >Dec 3 19:36:34 hilschubookBSD kernel: xhci0: <NEC uPD720202 USB 3.0 controller> mem 0xd7500000-0xd7501fff irq 18 at device 0.0 on pci2 >Dec 3 19:36:34 hilschubookBSD kernel: xhci0: 64 bytes context size, 64-bit DMA >Dec 3 19:36:34 hilschubookBSD kernel: usbus3 on xhci0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus3: 5.0Gbps Super Speed USB v3.0 >Dec 3 19:36:34 hilschubookBSD kernel: pcib4: <ACPI PCI-PCI bridge> at device 28.4 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: pci3: <ACPI PCI bus> on pcib4 >Dec 3 19:36:34 hilschubookBSD kernel: pci3: <network> at device 0.0 (no driver attached) >Dec 3 19:36:34 hilschubookBSD kernel: pcib5: <ACPI PCI-PCI bridge> at device 28.5 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: pci4: <ACPI PCI bus> on pcib5 >Dec 3 19:36:34 hilschubookBSD kernel: mskc0: <Marvell Yukon 88E8058 Gigabit Ethernet> port 0x3000-0x30ff mem 0xd7300000-0xd7303fff irq 17 at device 0.0 on pci4 >Dec 3 19:36:34 hilschubookBSD kernel: msk0: <Marvell Technology Group Ltd. Yukon EC Ultra Id 0xb4 Rev 0x03> on mskc0 >Dec 3 19:36:34 hilschubookBSD kernel: msk0: Using defaults for TSO: 65518/35/2048 >Dec 3 19:36:34 hilschubookBSD kernel: msk0: Ethernet address: 00:1b:63:93:ce:85 >Dec 3 19:36:34 hilschubookBSD kernel: miibus0: <MII bus> on msk0 >Dec 3 19:36:34 hilschubookBSD kernel: e1000phy0: <Marvell 88E1149 Gigabit PHY> PHY 0 on miibus0 >Dec 3 19:36:34 hilschubookBSD kernel: e1000phy0: none, 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto, auto-flow >Dec 3 19:36:34 hilschubookBSD kernel: uhci2: <Intel 82801H (ICH8) USB controller USB-A> port 0x6080-0x609f irq 16 at device 29.0 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus4 on uhci2 >Dec 3 19:36:34 hilschubookBSD kernel: usbus4: 12Mbps Full Speed USB v1.0 >Dec 3 19:36:34 hilschubookBSD kernel: uhci3: <Intel 82801H (ICH8) USB controller USB-B> port 0x6060-0x607f irq 18 at device 29.1 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus5 on uhci3 >Dec 3 19:36:34 hilschubookBSD kernel: usbus5: 12Mbps Full Speed USB v1.0 >Dec 3 19:36:34 hilschubookBSD kernel: uhci4: <Intel 82801H (ICH8) USB controller USB-C> port 0x6040-0x605f irq 21 at device 29.2 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: uhci4: LegSup = 0x3000 >Dec 3 19:36:34 hilschubookBSD kernel: usbus6 on uhci4 >Dec 3 19:36:34 hilschubookBSD kernel: usbus6: 12Mbps Full Speed USB v1.0 >Dec 3 19:36:34 hilschubookBSD kernel: ehci1: <Intel 82801H (ICH8) USB 2.0 controller USB2-A> mem 0xdb704800-0xdb704bff irq 20 at device 29.7 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus7: EHCI version 1.0 >Dec 3 19:36:34 hilschubookBSD kernel: usbus7 on ehci1 >Dec 3 19:36:34 hilschubookBSD kernel: usbus7: 480Mbps High Speed USB v2.0 >Dec 3 19:36:34 hilschubookBSD kernel: pcib6: <ACPI PCI-PCI bridge> at device 30.0 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: pci5: <ACPI PCI bus> on pcib6 >Dec 3 19:36:34 hilschubookBSD kernel: pci5: <serial bus, FireWire> at device 3.0 (no driver attached) >Dec 3 19:36:34 hilschubookBSD kernel: isab0: <PCI-ISA bridge> at device 31.0 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: isa0: <ISA bus> on isab0 >Dec 3 19:36:34 hilschubookBSD kernel: atapci0: <Intel ICH8M UDMA100 controller> port 0x1f0-0x1f7,0x3f6,0x170-0x177,0x376,0x60e0-0x60ef irq 21 at device 31.1 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: ata0: <ATA channel> at channel 0 on atapci0 >Dec 3 19:36:34 hilschubookBSD kernel: atapci1: <Intel ICH8M SATA300 controller> port 0x60f8-0x60ff,0x6114-0x6117,0x60f0-0x60f7,0x6110-0x6113,0x6020-0x602f,0x4000-0x400f irq 18 at device 31.2 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: ata2: <ATA channel> at channel 0 on atapci1 >Dec 3 19:36:34 hilschubookBSD kernel: ata3: <ATA channel> at channel 1 on atapci1 >Dec 3 19:36:34 hilschubookBSD kernel: battery0: <ACPI Control Method Battery> on acpi0 >Dec 3 19:36:34 hilschubookBSD kernel: est0: <Enhanced SpeedStep Frequency Control> on cpu0 >Dec 3 19:36:34 hilschubookBSD kernel: Timecounter "TSC-low" frequency 1196999985 Hz quality 1000 >Dec 3 19:36:34 hilschubookBSD kernel: Timecounters tick every 1.000 msec >Dec 3 19:36:34 hilschubookBSD kernel: ZFS filesystem version: 5 >Dec 3 19:36:34 hilschubookBSD kernel: ZFS storage pool version: features support (5000) >Dec 3 19:36:34 hilschubookBSD kernel: ugen1.1: <Intel UHCI root HUB> at usbus1 >Dec 3 19:36:34 hilschubookBSD kernel: ugen6.1: <Intel UHCI root HUB> at usbus6 >Dec 3 19:36:34 hilschubookBSD kernel: ugen7.1: <Intel EHCI root HUB> at usbus7 >Dec 3 19:36:34 hilschubookBSD kernel: uhub0 on usbus6 >Dec 3 19:36:34 hilschubookBSD kernel: uhub0: <Intel UHCI root HUB, class 9/0, rev 1.00/1.00, addr 1> on usbus6 >Dec 3 19:36:34 hilschubookBSD kernel: ugen4.1: <Intel UHCI root HUB> at usbus4 >Dec 3 19:36:34 hilschubookBSD kernel: ugen5.1: <Intel UHCI root HUB> at usbus5 >Dec 3 19:36:34 hilschubookBSD kernel: uhub1 on usbus4 >Dec 3 19:36:34 hilschubookBSD kernel: uhub1: <Intel UHCI root HUB, class 9/0, rev 1.00/1.00, addr 1> on usbus4 >Dec 3 19:36:34 hilschubookBSD kernel: ugen3.1: <(0x1912) XHCI root HUB> at usbus3 >Dec 3 19:36:34 hilschubookBSD kernel: ugen2.1: <Intel EHCI root HUB> at usbus2 >Dec 3 19:36:34 hilschubookBSD kernel: uhub2 on usbus3 >Dec 3 19:36:34 hilschubookBSD kernel: uhub2: <(0x1912) XHCI root HUB, class 9/0, rev 3.00/1.00, addr 1> on usbus3 >Dec 3 19:36:34 hilschubookBSD kernel: ugen0.1: <Intel UHCI root HUB> at usbus0 >Dec 3 19:36:34 hilschubookBSD kernel: uhub3 on usbus1 >Dec 3 19:36:34 hilschubookBSD kernel: uhub4 on usbus2 >Dec 3 19:36:34 hilschubookBSD kernel: uhub4: <Intel EHCI root HUB, class 9/0, rev 2.00/1.00, addr 1> on usbus2 >Dec 3 19:36:34 hilschubookBSD kernel: uhub5 on usbus7 >Dec 3 19:36:34 hilschubookBSD kernel: uhub5: <Intel EHCI root HUB, class 9/0, rev 2.00/1.00, addr 1> on usbus7 >Dec 3 19:36:34 hilschubookBSD kernel: uhub6 on usbus0 >Dec 3 19:36:34 hilschubookBSD kernel: uhub6: <Intel UHCI root HUB, class 9/0, rev 1.00/1.00, addr 1> on usbus0 >Dec 3 19:36:34 hilschubookBSD kernel: uhub7 on usbus5 >Dec 3 19:36:34 hilschubookBSD kernel: uhub7: <Intel UHCI root HUB, class 9/0, rev 1.00/1.00, addr 1> on usbus5 >Dec 3 19:36:34 hilschubookBSD kernel: hdacc0: <Realtek ALC889A HDA CODEC> at cad 0 on hdac0 >Dec 3 19:36:34 hilschubookBSD kernel: hdaa0: <Realtek ALC889A Audio Function Group> at nid 1 on hdacc0 >Dec 3 19:36:34 hilschubookBSD kernel: pcm0: <Realtek ALC889A (Internal Analog 3.1/2.0)> at nid 20,22 and 24 on hdaa0 >Dec 3 19:36:34 hilschubookBSD kernel: pcm1: <Realtek ALC889A (Rear Analog)> at nid 21 and 26 on hdaa0 >Dec 3 19:36:34 hilschubookBSD kernel: pcm2: <Realtek ALC889A (Rear Digital)> at nid 30 and 31 on hdaa0 >Dec 3 19:36:34 hilschubookBSD kernel: uhub3: <Intel UHCI root HUB, class 9/0, rev 1.00/1.00, addr 1> on usbus1 >Dec 3 19:36:34 hilschubookBSD kernel: Trying to mount root from zfs:zroot/ROOT/default []... >Dec 3 19:36:34 hilschubookBSD kernel: uhub2: 4 ports with 4 removable, self powered >Dec 3 19:36:34 hilschubookBSD kernel: uhub0: 2 ports with 2 removable, self powered >Dec 3 19:36:34 hilschubookBSD kernel: uhub1: 2 ports with 2 removable, self powered >Dec 3 19:36:34 hilschubookBSD kernel: uhub6: 2 ports with 2 removable, self powered >Dec 3 19:36:34 hilschubookBSD kernel: uhub7: 2 ports with 2 removable, self powered >Dec 3 19:36:34 hilschubookBSD kernel: uhub3: 2 ports with 2 removable, self powered >Dec 3 19:36:34 hilschubookBSD kernel: uhub4: 4 ports with 4 removable, self powered >Dec 3 19:36:34 hilschubookBSD kernel: Root mount waiting for: usbus2 usbus7 CAM >Dec 3 19:36:34 hilschubookBSD kernel: ada0 at ata2 bus 0 scbus1 target 0 lun 0 >Dec 3 19:36:34 hilschubookBSD kernel: ada0: <OCZ-PETROL 3.15.1> ATA8-ACS SATA 3.x device >Dec 3 19:36:34 hilschubookBSD kernel: ada0: Serial Number OCZ-73MYK979H31439D8 >Dec 3 19:36:34 hilschubookBSD kernel: ada0: 150.000MB/s transfers (SATA, UDMA5, PIO 8192bytes) >Dec 3 19:36:34 hilschubookBSD kernel: ada0: 244198MB (500118192 512 byte sectors) >Dec 3 19:36:34 hilschubookBSD kernel: cd0 at ata0 bus 0 scbus0 target 1 lun 0 >Dec 3 19:36:34 hilschubookBSD kernel: cd0: <MATSHITA DVD-RAM UJ-875S 1.00> Removable CD-ROM SCSI device >Dec 3 19:36:34 hilschubookBSD kernel: cd0: Serial Number fE06EA99 >Dec 3 19:36:34 hilschubookBSD kernel: cd0: 66.700MB/s transfers (UDMA4, ATAPI 12bytes, PIO 65534bytes) >Dec 3 19:36:34 hilschubookBSD kernel: cd0: Attempt to query device size failed: NOT READY, Medium not present >Dec 3 19:36:34 hilschubookBSD kernel: uhub5: 6 ports with 6 removable, self powered >Dec 3 19:36:34 hilschubookBSD kernel: ugen0.2: <vendor 0x05ac product 0x1000> at usbus0 >Dec 3 19:36:34 hilschubookBSD kernel: ukbd0 on uhub6 >Dec 3 19:36:34 hilschubookBSD kernel: ukbd0: <vendor 0x05ac product 0x1000, class 0/0, rev 2.00/19.65, addr 2> on usbus0 >Dec 3 19:36:34 hilschubookBSD kernel: kbd1 at ukbd0 >Dec 3 19:36:34 hilschubookBSD kernel: Root mount waiting for: usbus7 >Dec 3 19:36:34 hilschubookBSD syslogd: last message repeated 1 times >Dec 3 19:36:34 hilschubookBSD kernel: ugen7.2: <Apple Inc. product 0x8502> at usbus7 >Dec 3 19:36:34 hilschubookBSD kernel: ugen6.2: <Apple Computer, Inc. IR Receiver> at usbus6 >Dec 3 19:36:34 hilschubookBSD kernel: ichsmb0: <Intel 82801H (ICH8) SMBus controller> port 0xefa0-0xefbf mem 0xdb705000-0xdb7050ff irq 20 at device 31.3 on pci0 >Dec 3 19:36:34 hilschubookBSD kernel: smbus0: <System Management Bus> on ichsmb0 >Dec 3 19:36:34 hilschubookBSD kernel: bwn_pci0: <Broadcom BCM4321 802.11n Dual-Band Wireless> mem 0xd7400000-0xd7403fff,0xd7100000-0xd71fffff irq 16 at device 0.0 on pci3 >Dec 3 19:36:34 hilschubookBSD kernel: bhndb0: <PCI-BHND bridge> on bwn_pci0 >Dec 3 19:36:34 hilschubookBSD kernel: bhndb0: Using MSI interrupts on bwn_pci0 >Dec 3 19:36:34 hilschubookBSD kernel: bhnd_nvram0: <SPROM/OTP> mem 0xd7401000-0xd7401fff on bhndb0 >Dec 3 19:36:34 hilschubookBSD kernel: bhnd0: <BCM4321 SIBA bus> on bhndb0 >Dec 3 19:36:34 hilschubookBSD kernel: bhnd_chipc0: <Broadcom ChipCommon I/O Controller, rev 19> mem 0x18000000-0x18000dff,0x18000f00-0x18000fff,0x18000e00-0x18000eff irq 0 at core 0 on bhnd0 >Dec 3 19:36:34 hilschubookBSD kernel: bhnd_pwrctl0: <ChipCommon Power Control> on bhnd_chipc0 >Dec 3 19:36:34 hilschubookBSD kernel: gpio0: <Broadcom ChipCommon GPIO> mem 0x18000000-0x18000dff on bhnd_chipc0 >Dec 3 19:36:34 hilschubookBSD kernel: bhnd_hostb0: <Broadcom PCIe-G1 Host-PCI bridge, rev 4> mem 0x18002000-0x18002dff,0-0x7fffffff,0x18002f00-0x18002fff,0x18002e00-0x18002eff irq 2 at core 2 on bhnd0 >Dec 3 19:36:34 hilschubookBSD kernel: bwn0: <Broadcom 802.11 MAC/PHY/Radio, rev 12> mem 0x18001000-0x18001dff,0x18001f00-0x18001fff,0x18001e00-0x18001eff irq 1 at core 1 on bhnd0 >Dec 3 19:36:34 hilschubookBSD kernel: bwn0: WLAN (BCM4321 rev 12 sromrev 4) PHY (analog 5 type 4 rev 2) RADIO (manuf 0x17f ver 0x2055 rev 4) >Dec 3 19:36:34 hilschubookBSD kernel: bwn0: DMA (64 bits) >Dec 3 19:36:34 hilschubookBSD kernel: bwn0: Note: compiled with BWN_GPL_PHY; includes GPLv2 code >Dec 3 19:36:34 hilschubookBSD kernel: wlan0: Ethernet address: 00:1e:52:c8:ff:b1 >Dec 3 19:36:34 hilschubookBSD kernel: lo0: link state changed to UP >Dec 3 19:36:34 hilschubookBSD kernel: msk0: link state changed to DOWN >Dec 3 19:36:34 hilschubookBSD kernel: ugen6.3: <Apple Computer Apple Internal Keyboard / Trackpad> at usbus6 >Dec 3 19:36:34 hilschubookBSD kernel: ukbd1 on uhub0 >Dec 3 19:36:34 hilschubookBSD kernel: bwn0: ucode fw: ucode11 >Dec 3 19:36:34 hilschubookBSD kernel: bwn_v4_ucode11: could not load firmware image, error 2 >Dec 3 19:36:34 hilschubookBSD kernel: bwn0: the fw file(bwn_v4_ucode11) not found >Dec 3 19:36:34 hilschubookBSD kernel: bwn0: ucode fw: ucode11 >Dec 3 19:36:34 hilschubookBSD kernel: bwn-open_v4_ucode11: could not load firmware image, error 2 >Dec 3 19:36:34 hilschubookBSD kernel: bwn0: the fw file(bwn-open_v4_ucode11) not found >Dec 3 19:36:34 hilschubookBSD kernel: ukbd1: <Apple Internal Keyboard> on usbus6 >Dec 3 19:36:34 hilschubookBSD kernel: kbd2 at ukbd1 >Dec 3 19:36:34 hilschubookBSD kernel: ums0 on uhub6 >Dec 3 19:36:34 hilschubookBSD kernel: ums0: <vendor 0x05ac product 0x1000, class 0/0, rev 2.00/19.65, addr 2> on usbus0 >Dec 3 19:36:34 hilschubookBSD kernel: ums0: 5 buttons and [XY] coordinates ID=0 >Dec 3 19:36:34 hilschubookBSD kernel: uhid0 on uhub0 >Dec 3 19:36:34 hilschubookBSD kernel: uhid0: <Apple Computer, Inc. IR Receiver, class 0/0, rev 2.00/0.16, addr 2> on usbus6 >Dec 3 19:36:34 hilschubookBSD kernel: ums1 on uhub0 >Dec 3 19:36:34 hilschubookBSD kernel: ums1: <Touchpad> on usbus6 >Dec 3 19:36:34 hilschubookBSD kernel: ums1: 3 buttons and [XY] coordinates ID=2 >Dec 3 19:36:34 hilschubookBSD kernel: uhid1 on uhub0 >Dec 3 19:36:34 hilschubookBSD kernel: uhid1: <Apple Internal Keyboard> on usbus6 >Dec 3 19:36:34 hilschubookBSD kernel: msk0: link state changed to UP >Dec 3 19:36:34 hilschubookBSD ntpd[1219]: ntpd 4.2.8p16-a (1): Starting >Dec 3 19:36:34 hilschubookBSD kernel: Security policy loaded: MAC/ntpd (mac_ntpd) >Dec 3 19:36:34 hilschubookBSD ntpd[1219]: Command line: /usr/sbin/ntpd -p /var/db/ntp/ntpd.pid -c /etc/ntp.conf -f /var/db/ntp/ntpd.drift >Dec 3 19:36:34 hilschubookBSD ntpd[1219]: ---------------------------------------------------- >Dec 3 19:36:34 hilschubookBSD ntpd[1219]: ntp-4 is maintained by Network Time Foundation, >Dec 3 19:36:34 hilschubookBSD ntpd[1219]: Inc. (NTF), a non-profit 501(c)(3) public-benefit >Dec 3 19:36:34 hilschubookBSD ntpd[1219]: corporation. Support and training for ntp-4 are >Dec 3 19:36:34 hilschubookBSD ntpd[1219]: available at https://www.nwtime.org/support >Dec 3 19:36:34 hilschubookBSD ntpd[1219]: ---------------------------------------------------- >Dec 3 19:36:34 hilschubookBSD ntpd[1220]: pid file /var/db/ntp/ntpd.pid: Permission denied >Dec 3 19:36:34 hilschubookBSD ntpd[1220]: leapsecond file ('/var/db/ntpd.leap-seconds.list'): good hash signature >Dec 3 19:36:34 hilschubookBSD ntpd[1220]: leapsecond file ('/var/db/ntpd.leap-seconds.list'): loaded, expire=2022-06-28T00:00:00Z last=2017-01-01T00:00:00Z ofs=37 >Dec 3 19:36:34 hilschubookBSD ntpd[1220]: leapsecond file ('/var/db/ntpd.leap-seconds.list'): expired 524 days ago >Dec 3 19:36:40 hilschubookBSD login[1315]: ROOT LOGIN (root) ON ttyv0 >Dec 3 19:37:36 hilschubookBSD kernel: lo0: link state changed to DOWN >Dec 3 19:37:36 hilschubookBSD dhclient[916]: My address (10.0.2.30) was deleted, dhclient exiting >Dec 3 19:37:36 hilschubookBSD dhclient[916]: short write: wanted 20 got 0 bytes >Dec 3 19:37:36 hilschubookBSD dhclient[916]: exiting. >Dec 3 19:37:36 hilschubookBSD wpa_supplicant[326]: wlan0: CTRL-EVENT-DSCP-POLICY clear_all >Dec 3 19:37:36 hilschubookBSD syslogd: last message repeated 1 times >Dec 3 19:37:36 hilschubookBSD wpa_supplicant[326]: wlan0: CTRL-EVENT-TERMINATING >Dec 3 19:37:36 hilschubookBSD kernel: wlan0: Ethernet address: 00:1e:52:c8:ff:b1 >Dec 3 19:37:36 hilschubookBSD kernel: lo0: link state changed to UP >Dec 3 19:37:36 hilschubookBSD kernel: msk0: link state changed to DOWN >Dec 3 19:37:36 hilschubookBSD wpa_supplicant[1624]: Successfully initialized wpa_supplicant >Dec 3 19:37:36 hilschubookBSD wpa_supplicant[1624]: ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument >Dec 3 19:37:36 hilschubookBSD syslogd: last message repeated 1 times >Dec 3 19:37:39 hilschubookBSD kernel: bwn0: ucode fw: ucode11 >Dec 3 19:37:39 hilschubookBSD kernel: bwn0: firmware version (rev 410 patch 2160 date 0x751a time 0x7c0a) >Dec 3 19:37:39 hilschubookBSD kernel: bwn0: ucode fw: ucode11 >Dec 3 19:37:39 hilschubookBSD kernel: bwn0: firmware version (rev 410 patch 2160 date 0x751a time 0x7c0a) >Dec 3 19:37:39 hilschubookBSD kernel: bwn0: MAC suspend failed >Dec 3 19:37:39 hilschubookBSD syslogd: last message repeated 3 times >Dec 3 19:37:39 hilschubookBSD kernel: bwn0: ucode fw: ucode11 >Dec 3 19:37:39 hilschubookBSD kernel: bwn0: firmware version (rev 410 patch 2160 date 0x751a time 0x7c0a) >Dec 3 19:37:40 hilschubookBSD wpa_supplicant[1625]: wlan0: Trying to associate with 38:10:d5:7d:0a:54 (SSID='HaseNet' freq=2412 MHz) >Dec 3 19:37:40 hilschubookBSD wpa_supplicant[1625]: wlan0: Associated with 38:10:d5:7d:0a:54 >Dec 3 19:37:40 hilschubookBSD kernel: wlan0: link state changed to UP >Dec 3 19:37:40 hilschubookBSD wpa_supplicant[1625]: wlan0: WPA: Key negotiation completed with 38:10:d5:7d:0a:54 [PTK=CCMP GTK=CCMP] >Dec 3 19:37:40 hilschubookBSD wpa_supplicant[1625]: wlan0: CTRL-EVENT-CONNECTED - Connection to 38:10:d5:7d:0a:54 completed [id=0 id_str=] >Dec 3 19:37:40 hilschubookBSD dhclient[1675]: New IP Address (wlan0): 10.0.2.39 >Dec 3 19:37:40 hilschubookBSD kernel: bwn0: need multicast update callback >Dec 3 19:37:40 hilschubookBSD dhclient[1679]: New Subnet Mask (wlan0): 255.255.0.0 >Dec 3 19:37:40 hilschubookBSD dhclient[1683]: New Broadcast Address (wlan0): 10.0.255.255 >Dec 3 19:37:40 hilschubookBSD dhclient[1687]: New Routers (wlan0): 10.0.1.1 >Dec 3 19:37:40 hilschubookBSD kernel: msk0: link state changed to UP >Dec 3 19:37:40 hilschubookBSD dhclient[1769]: New IP Address (msk0): 10.0.2.30 >Dec 3 19:37:40 hilschubookBSD dhclient[1773]: New Subnet Mask (msk0): 255.255.0.0 >Dec 3 19:37:40 hilschubookBSD dhclient[1777]: New Broadcast Address (msk0): 10.0.255.255 >Dec 3 19:37:40 hilschubookBSD dhclient[1781]: New Routers (msk0): 10.0.1.1 >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 275616
: 246887 |
246904
|
246905
|
246957