[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.5' (ECDSA) to the list of known hosts. 2020/10/20 10:41:30 fuzzer started 2020/10/20 10:41:31 dialing manager at 10.128.0.26:38919 2020/10/20 10:41:31 syscalls: 3450 2020/10/20 10:41:31 code coverage: enabled 2020/10/20 10:41:31 comparison tracing: enabled 2020/10/20 10:41:31 extra coverage: enabled 2020/10/20 10:41:31 setuid sandbox: enabled 2020/10/20 10:41:31 namespace sandbox: enabled 2020/10/20 10:41:31 Android sandbox: /sys/fs/selinux/policy does not exist 2020/10/20 10:41:31 fault injection: enabled 2020/10/20 10:41:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/10/20 10:41:31 net packet injection: enabled 2020/10/20 10:41:31 net device setup: enabled 2020/10/20 10:41:31 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/10/20 10:41:31 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/10/20 10:41:31 USB emulation: enabled 2020/10/20 10:41:31 hci packet injection: enabled 2020/10/20 10:41:31 wifi device emulation: enabled 10:43:33 executing program 0: 10:43:33 executing program 1: 10:43:34 executing program 2: 10:43:34 executing program 3: 10:43:34 executing program 4: 10:43:35 executing program 5: syzkaller login: [ 192.561910][ T6864] IPVS: ftp: loaded support on port[0] = 21 [ 192.789451][ T6866] IPVS: ftp: loaded support on port[0] = 21 [ 193.087853][ T6864] chnl_net:caif_netlink_parms(): no params data found [ 193.168888][ T6868] IPVS: ftp: loaded support on port[0] = 21 [ 193.317878][ T6866] chnl_net:caif_netlink_parms(): no params data found [ 193.399633][ T6870] IPVS: ftp: loaded support on port[0] = 21 [ 193.457447][ T6864] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.467696][ T6864] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.489449][ T6864] device bridge_slave_0 entered promiscuous mode [ 193.557760][ T6864] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.575576][ T6864] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.597469][ T6864] device bridge_slave_1 entered promiscuous mode [ 193.652138][ T6864] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.695741][ T6864] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.731690][ T6872] IPVS: ftp: loaded support on port[0] = 21 [ 193.795421][ T6864] team0: Port device team_slave_0 added [ 193.811297][ T6866] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.820107][ T6866] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.829451][ T6866] device bridge_slave_0 entered promiscuous mode [ 193.840499][ T6866] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.848692][ T6866] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.857524][ T6866] device bridge_slave_1 entered promiscuous mode [ 193.871925][ T6864] team0: Port device team_slave_1 added [ 193.888158][ T6868] chnl_net:caif_netlink_parms(): no params data found [ 193.948035][ T6864] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 193.959289][ T6864] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.989920][ T6864] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 194.004951][ T6866] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.040462][ T6864] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.047758][ T6864] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.074669][ T6864] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.088505][ T6866] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.139343][ T6866] team0: Port device team_slave_0 added [ 194.190002][ T6866] team0: Port device team_slave_1 added [ 194.361815][ T6868] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.403374][ T6868] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.411669][ T6868] device bridge_slave_0 entered promiscuous mode [ 194.451184][ T6864] device hsr_slave_0 entered promiscuous mode [ 194.460381][ T6864] device hsr_slave_1 entered promiscuous mode [ 194.468995][ T6866] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 194.476856][ T6866] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.505104][ T34] Bluetooth: hci0: command 0x0409 tx timeout [ 194.512011][ T6866] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 194.532521][ T7084] IPVS: ftp: loaded support on port[0] = 21 [ 194.546530][ T6868] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.555312][ T6868] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.563986][ T6868] device bridge_slave_1 entered promiscuous mode [ 194.588691][ T6866] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.599452][ T6866] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.628852][ T6866] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.640940][ T6870] chnl_net:caif_netlink_parms(): no params data found [ 194.682394][ T6868] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.743168][ T34] Bluetooth: hci1: command 0x0409 tx timeout [ 194.751101][ T6868] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.828042][ T6866] device hsr_slave_0 entered promiscuous mode [ 194.835149][ T6866] device hsr_slave_1 entered promiscuous mode [ 194.841976][ T6866] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 194.850353][ T6866] Cannot create hsr debugfs directory [ 194.970843][ T6868] team0: Port device team_slave_0 added [ 194.984379][ T34] Bluetooth: hci2: command 0x0409 tx timeout [ 195.010674][ T6868] team0: Port device team_slave_1 added [ 195.020812][ T6872] chnl_net:caif_netlink_parms(): no params data found [ 195.126614][ T6870] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.135281][ T6870] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.142991][ T6870] device bridge_slave_0 entered promiscuous mode [ 195.191647][ T6868] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 195.198871][ T6868] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.226130][ T6868] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 195.238029][ T6870] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.245542][ T6870] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.253698][ T6870] device bridge_slave_1 entered promiscuous mode [ 195.293383][ T6868] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 195.300342][ T6868] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.303223][ T5] Bluetooth: hci3: command 0x0409 tx timeout [ 195.330305][ T6868] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 195.484946][ T6870] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.508986][ T6872] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.517317][ T6872] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.526037][ T6872] device bridge_slave_0 entered promiscuous mode [ 195.548381][ T2647] Bluetooth: hci4: command 0x0409 tx timeout [ 195.553004][ T6870] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.588105][ T6872] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.596436][ T6872] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.604823][ T6872] device bridge_slave_1 entered promiscuous mode [ 195.632413][ T6868] device hsr_slave_0 entered promiscuous mode [ 195.652615][ T6868] device hsr_slave_1 entered promiscuous mode [ 195.660014][ T6868] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 195.667965][ T6868] Cannot create hsr debugfs directory [ 195.791851][ T6864] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 195.811834][ T6870] team0: Port device team_slave_0 added [ 195.826974][ T6872] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.848435][ T7084] chnl_net:caif_netlink_parms(): no params data found [ 195.879321][ T6864] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 195.901106][ T6870] team0: Port device team_slave_1 added [ 195.909349][ T6872] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.951349][ T6864] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 196.022991][ T6864] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 196.072101][ T6870] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 196.079106][ T6870] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.109143][ T6870] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 196.140855][ T6872] team0: Port device team_slave_0 added [ 196.148048][ T6870] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 196.157079][ T6870] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.184532][ T6870] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 196.216222][ T6872] team0: Port device team_slave_1 added [ 196.261001][ T6866] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 196.292359][ T6870] device hsr_slave_0 entered promiscuous mode [ 196.300197][ T6870] device hsr_slave_1 entered promiscuous mode [ 196.307966][ T6870] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 196.316498][ T6870] Cannot create hsr debugfs directory [ 196.341278][ T6866] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 196.353328][ T34] Bluetooth: hci5: command 0x0409 tx timeout [ 196.416090][ T6872] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 196.423051][ T6872] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.453195][ T6872] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 196.474824][ T6866] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 196.495828][ T6866] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 196.507151][ T7084] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.523464][ T7084] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.531673][ T7084] device bridge_slave_0 entered promiscuous mode [ 196.547806][ T6872] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 196.558019][ T6872] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.585055][ T6569] Bluetooth: hci0: command 0x041b tx timeout [ 196.592045][ T6872] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 196.617991][ T7084] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.626686][ T7084] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.636093][ T7084] device bridge_slave_1 entered promiscuous mode [ 196.700235][ T7084] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 196.759721][ T7084] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 196.790628][ T6868] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 196.823201][ T34] Bluetooth: hci1: command 0x041b tx timeout [ 196.851443][ T6868] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 196.872434][ T6872] device hsr_slave_0 entered promiscuous mode [ 196.879394][ T6872] device hsr_slave_1 entered promiscuous mode [ 196.887373][ T6872] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 196.895544][ T6872] Cannot create hsr debugfs directory [ 196.913699][ T7084] team0: Port device team_slave_0 added [ 196.928935][ T6868] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 196.938810][ T6868] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 196.960531][ T7084] team0: Port device team_slave_1 added [ 197.073296][ T2647] Bluetooth: hci2: command 0x041b tx timeout [ 197.091945][ T7084] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 197.106326][ T7084] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 197.132975][ T7084] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 197.187048][ T7084] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 197.195925][ T7084] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 197.225564][ T7084] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 197.250272][ T6864] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.379354][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.383625][ T5] Bluetooth: hci3: command 0x041b tx timeout [ 197.390677][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.417051][ T6864] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.431014][ T7084] device hsr_slave_0 entered promiscuous mode [ 197.439430][ T7084] device hsr_slave_1 entered promiscuous mode [ 197.451707][ T7084] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 197.459753][ T7084] Cannot create hsr debugfs directory [ 197.481612][ T6866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.550001][ T6870] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 197.578251][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.593013][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.602426][ T6569] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.609647][ T6569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.648037][ T6866] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.655001][ T12] Bluetooth: hci4: command 0x041b tx timeout [ 197.665145][ T6870] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 197.689177][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.698056][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.707042][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.715713][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.722753][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.731753][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.739948][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.769893][ T6870] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 197.781443][ T6870] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 197.820636][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.830703][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.843312][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.851915][ T6569] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.859100][ T6569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.872799][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.897641][ T6868] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.926433][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.936888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.946045][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.955918][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.962992][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.970988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.980213][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.989124][ T6872] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 198.000030][ T6872] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 198.039527][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.047902][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.058082][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.068443][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.078394][ T6872] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 198.090172][ T6872] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 198.113306][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.122153][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.132666][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.144426][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.186173][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.196507][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.207462][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.217480][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.227580][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.236929][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.285070][ T6866] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 198.302195][ T6866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.322016][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.330010][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.344008][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.352263][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.361168][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.374564][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.387961][ T6868] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.411236][ T6864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.424299][ T6569] Bluetooth: hci5: command 0x041b tx timeout [ 198.476361][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.489014][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.499082][ T2647] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.506225][ T2647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.561228][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.569809][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.580575][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.589999][ T2479] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.597128][ T2479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.605430][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.612826][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.620853][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.628593][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.649715][ T6866] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.673852][ T34] Bluetooth: hci0: command 0x040f tx timeout [ 198.697096][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.706622][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.723805][ T6864] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.790123][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.798699][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.848340][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.857097][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.867198][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.877713][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.886688][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.905315][ T34] Bluetooth: hci1: command 0x040f tx timeout [ 198.911437][ T7084] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 198.936577][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.949813][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.959728][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.969082][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.984680][ T6868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.992791][ T7084] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 199.025981][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 199.035310][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 199.058052][ T6872] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.065409][ T7084] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 199.075597][ T7084] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 199.119488][ T6866] device veth0_vlan entered promiscuous mode [ 199.143497][ T6569] Bluetooth: hci2: command 0x040f tx timeout [ 199.150387][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 199.160757][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.181883][ T6864] device veth0_vlan entered promiscuous mode [ 199.202564][ T6866] device veth1_vlan entered promiscuous mode [ 199.215150][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.222878][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.233696][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 199.241933][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 199.253287][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.261492][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.270608][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.285611][ T6864] device veth1_vlan entered promiscuous mode [ 199.304880][ T6872] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.327609][ T6870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.335668][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.344439][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.352329][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 199.360871][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.369239][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.445147][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.465509][ T8120] Bluetooth: hci3: command 0x040f tx timeout [ 199.466553][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.493897][ T8160] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.500961][ T8160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.518960][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.534345][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.542886][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.563059][ T6868] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.619035][ T6870] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.628108][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.638122][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.650307][ T8120] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.657481][ T8120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.701734][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.711092][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.713635][ T2479] Bluetooth: hci4: command 0x040f tx timeout [ 199.720161][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.736444][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.745378][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.754601][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.762976][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.772568][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.781679][ T6569] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.788819][ T6569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.804104][ T6866] device veth0_macvtap entered promiscuous mode [ 199.821239][ T6864] device veth0_macvtap entered promiscuous mode [ 199.842253][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 199.850760][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 199.859457][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.868469][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.877900][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.917836][ T6864] device veth1_macvtap entered promiscuous mode [ 199.931748][ T6866] device veth1_macvtap entered promiscuous mode [ 199.946836][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.955059][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.962861][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.971684][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.980745][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.989989][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.999039][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.007982][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.017415][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.026368][ T2618] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.033536][ T2618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.041087][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.057751][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.067009][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.098034][ T6872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.150461][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 200.159978][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 200.169690][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.178693][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.188500][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.210275][ T6864] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 200.226252][ T6864] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 200.238223][ T6866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.249608][ T6866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.271767][ T6866] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 200.283906][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.294065][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.302865][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.312993][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.322909][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.332074][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.341871][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.352187][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.361528][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.373754][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.382236][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.399519][ T6864] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.412772][ T6864] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.421560][ T6864] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.441262][ T6864] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.469086][ T6866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.480560][ T6866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.492632][ T6866] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 200.503483][ T34] Bluetooth: hci5: command 0x040f tx timeout [ 200.528167][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.537182][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.551402][ T6866] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.567334][ T6866] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.579607][ T6866] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.588904][ T6866] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.618494][ T7084] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.639503][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 200.651483][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 200.661532][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.672194][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.682217][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 200.690968][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.704404][ T6870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.712486][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.725992][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.747895][ T6868] device veth0_vlan entered promiscuous mode [ 200.753326][ T8160] Bluetooth: hci0: command 0x0419 tx timeout [ 200.766297][ T6872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.806549][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.817591][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.842771][ T7084] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.881850][ T6868] device veth1_vlan entered promiscuous mode [ 200.972982][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 200.985637][ T6569] Bluetooth: hci1: command 0x0419 tx timeout [ 200.987064][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 201.000783][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.010413][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.023092][ T8160] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.030205][ T8160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.038276][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.046299][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.127870][ T6870] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.136370][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.149672][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.161320][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.196775][ T2479] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.203885][ T2479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.222255][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.224168][ T2618] Bluetooth: hci2: command 0x0419 tx timeout [ 201.235326][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.288727][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.325051][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.414540][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.422570][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.432303][ T190] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.441894][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.444015][ T190] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 201.461128][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.470945][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.481593][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.490942][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.510092][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 201.519340][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.529873][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 201.543682][ T5] Bluetooth: hci3: command 0x0419 tx timeout [ 201.554579][ T6868] device veth0_macvtap entered promiscuous mode [ 201.598557][ T6868] device veth1_macvtap entered promiscuous mode [ 201.632435][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 201.650578][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.661221][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.670154][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 201.680148][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.718153][ T7084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.728609][ T99] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.748826][ T99] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 201.784714][ T5] Bluetooth: hci4: command 0x0419 tx timeout [ 201.827451][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 201.844265][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 201.852871][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.878764][ T6868] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.893607][ T6868] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.903562][ T6868] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.914117][ T6868] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.926204][ T6868] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 201.936914][ T99] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.956318][ T6870] device veth0_vlan entered promiscuous mode [ 201.967122][ T99] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 201.984177][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 201.995000][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.002673][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.011440][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 202.020549][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.030304][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.038802][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.055552][ T6868] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.068388][ T6868] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.073789][ T99] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 202.079722][ T6868] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.098492][ T6868] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.100850][ T99] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 202.112670][ T6868] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 202.135530][ T6870] device veth1_vlan entered promiscuous mode [ 202.142455][ T6872] device veth0_vlan entered promiscuous mode [ 202.164376][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.172285][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.182668][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 202.194564][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 202.202536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 202.212964][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.228873][ T6868] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.240055][ T6868] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.256771][ T6868] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 10:43:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x2, &(0x7f0000000100)=@raw=[@initr0], &(0x7f0000000140)='GPL\x00', 0x3, 0xff6, &(0x7f0000000180)=""/4086, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 202.284078][ T6868] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.330722][ T6872] device veth1_vlan entered promiscuous mode [ 202.414119][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 202.436646][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 10:43:44 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2038}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:43:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000002600)={&(0x7f0000002580)={0x58, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x8c, 'source_mac_is_multicast\x00'}, {0x5}}]}, 0x58}}, 0x0) [ 202.470404][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 202.495477][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 202.583033][ T7084] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.593760][ T6569] Bluetooth: hci5: command 0x0419 tx timeout 10:43:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x24, 0x0, 0x0) [ 202.631494][ T6870] device veth0_macvtap entered promiscuous mode [ 202.649427][ T8227] netlink: 'syz-executor.0': attribute type 140 has an invalid length. 10:43:45 executing program 0: socket$inet(0x2, 0x0, 0x0) r0 = syz_io_uring_setup(0x2421, &(0x7f00000000c0)={0x0, 0x0, 0x10, 0x2, 0x234}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x6, 0x11, r0, 0x10000000) clock_gettime(0x0, &(0x7f0000000080)) [ 202.694943][ T8231] netlink: 'syz-executor.0': attribute type 140 has an invalid length. [ 202.713216][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 202.736465][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 202.768327][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 202.795222][ T6870] device veth1_macvtap entered promiscuous mode 10:43:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) [ 202.870162][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 202.889703][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 202.937398][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 202.947373][ T8248] [ 202.950003][ T8248] ============================= [ 202.962542][ T8248] WARNING: suspicious RCU usage [ 202.981173][ T8248] 5.9.0-next-20201016-syzkaller #0 Not tainted [ 202.995136][ T6872] device veth0_macvtap entered promiscuous mode [ 203.009748][ T223] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 203.022842][ T6870] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.035206][ T223] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 203.038044][ T8248] ----------------------------- [ 203.055174][ T6870] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.065854][ T8248] include/linux/cgroup.h:494 suspicious rcu_dereference_check() usage! [ 203.087116][ T8248] [ 203.087116][ T8248] other info that might help us debug this: [ 203.087116][ T8248] [ 203.097740][ T6870] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.132244][ T8248] [ 203.132244][ T8248] rcu_scheduler_active = 2, debug_locks = 1 10:43:45 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_lt={'euid<'}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000006c0)={0x2c, 0x4, 0x0, {0x0, 0xffff, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') openat$bsg(0xffffffffffffff9c, &(0x7f0000000700)='/dev/bsg\x00', 0x0, 0x0) [ 203.134926][ T6870] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.152147][ T6870] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.166130][ T6870] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.177307][ T8248] no locks held by syz-executor.0/8248. [ 203.189997][ T8248] [ 203.189997][ T8248] stack backtrace: [ 203.200753][ T6870] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 203.213096][ T8248] CPU: 1 PID: 8248 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 203.222560][ T8248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.232614][ T8248] Call Trace: [ 203.235913][ T8248] dump_stack+0x198/0x1fb [ 203.240253][ T8248] io_init_identity+0x3a9/0x450 [ 203.245113][ T8248] io_uring_alloc_task_context+0x176/0x250 [ 203.250927][ T8248] io_uring_add_task_file+0x10d/0x180 [ 203.256306][ T8248] io_uring_setup+0x2727/0x3660 [ 203.261172][ T8248] ? io_sq_thread+0x1400/0x1400 [ 203.266031][ T8248] ? io_issue_sqe+0x3d80/0x3d80 [ 203.270888][ T8248] ? io_uring_poll+0x2a0/0x2a0 [ 203.275658][ T8248] ? put_timespec64+0xcb/0x120 [ 203.280435][ T8248] ? ns_to_timespec64+0xc0/0xc0 [ 203.285339][ T8248] ? check_preemption_disabled+0x50/0x130 [ 203.291080][ T8248] ? syscall_enter_from_user_mode+0x1d/0x60 [ 203.296991][ T8248] do_syscall_64+0x2d/0x70 [ 203.301424][ T8248] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 203.307323][ T8248] RIP: 0033:0x45de59 [ 203.311241][ T8248] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.330851][ T8248] RSP: 002b:00007f258206dbf8 EFLAGS: 00000206 ORIG_RAX: 00000000000001a9 [ 203.339301][ T8248] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 000000000045de59 [ 203.347275][ T8248] RDX: 0000000020ffa000 RSI: 00000000200000c0 RDI: 0000000000002421 [ 203.355252][ T8248] RBP: 000000000118c020 R08: 0000000020000140 R09: 0000000020000140 [ 203.363243][ T8248] R10: 0000000020000040 R11: 0000000000000206 R12: 0000000020ffa000 [ 203.371219][ T8248] R13: 0000000020ffc000 R14: 0000000020000140 R15: 0000000020000040 [ 203.399342][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 203.454603][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 203.462680][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 10:43:45 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/nvram\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x7, 0x11, r0, 0x10000000) [ 203.502612][ T2618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.520729][ T6872] device veth1_macvtap entered promiscuous mode [ 203.570199][ T6870] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.613657][ T6870] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.632632][ T6870] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.653462][ T6870] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.672244][ T6870] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.683580][ T6870] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.702272][ T6870] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 203.713549][ T8274] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 203.733322][ C1] hrtimer: interrupt took 43661 ns [ 203.792385][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.835104][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.854231][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.917503][ T6870] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.935066][ T6870] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.964761][ T6870] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.998438][ T6870] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.028555][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 204.043991][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 204.044825][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 204.052821][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 204.085126][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 204.144354][ T6872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.171992][ T6872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:43:46 executing program 2: r0 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0xc01047d0, &(0x7f0000000080)) [ 204.193597][ T6872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.211002][ T6872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.230278][ T6872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.257870][ T6872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.275009][ T6872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.295230][ T6872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.321466][ T6872] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 204.372855][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 204.394341][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.413438][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 204.423265][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.438606][ T6872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.450518][ T6872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.462883][ T6872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.473804][ T6872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.483722][ T6872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.494371][ T6872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.506001][ T6872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.516572][ T6872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.528519][ T6872] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 204.540334][ T7084] device veth0_vlan entered promiscuous mode [ 204.556383][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.564721][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.572608][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 204.582837][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.597804][ T6872] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.609884][ T6872] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.621646][ T6872] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.632576][ T6872] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.689520][ T7084] device veth1_vlan entered promiscuous mode [ 204.796624][ T190] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 204.807164][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 204.820116][ T190] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 204.831293][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 204.842174][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 204.885755][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.896834][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.960231][ T7084] device veth0_macvtap entered promiscuous mode [ 204.991114][ T190] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 205.012869][ T190] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 205.015383][ T7084] device veth1_macvtap entered promiscuous mode [ 205.049765][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 205.074593][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 205.082727][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 205.148101][ T8273] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 205.164853][ T8273] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 205.172997][ T190] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 205.185652][ T190] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 205.194406][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.211078][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.221795][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.243475][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.265528][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.276250][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.286210][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.296789][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.307503][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.320926][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.332757][ T7084] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 205.341331][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 205.350555][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 205.359437][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 205.368362][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.387124][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.433420][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.443249][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 10:43:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0xa, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 10:43:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000200)='|', 0x1}, {&(0x7f0000000140)="99", 0x1}], 0x3) [ 205.494560][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.543278][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.570246][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.600917][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.663427][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.677600][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.689015][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.701784][ T7084] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.718401][ T7084] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.731025][ T7084] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.745343][ T7084] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.760858][ T7084] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.783834][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.794527][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.960182][ T190] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 205.981648][ T190] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 205.996782][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 206.008542][ T223] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 206.031182][ T223] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 206.046416][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 10:43:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @local}, 0x8, {0x2, 0x0, @broadcast}, 'batadv0\x00'}) 10:43:48 executing program 5: perf_event_open$cgroup(&(0x7f0000000000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:43:48 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000002180)={0x2020}, 0x2020) 10:43:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x17, 0x0, 0x0) 10:43:48 executing program 0: prctl$PR_MCE_KILL(0x21, 0x1, 0xc8775b025db1ed74) 10:43:48 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_lt={'euid<'}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000006c0)={0x2c, 0x4, 0x0, {0x0, 0xffff, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') openat$bsg(0xffffffffffffff9c, &(0x7f0000000700)='/dev/bsg\x00', 0x0, 0x0) 10:43:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x21, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 10:43:48 executing program 2: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) mount$overlay(0x0, &(0x7f0000000340)='./bus/file1\x00', 0x0, 0x110000, &(0x7f0000000540)={[{@index_off='index=off'}, {@upperdir={'upperdir', 0x3d, './bus/file1'}}], [{@smackfsdef={'smackfsdef'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20058081) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000c40)=[{0x0}, {&(0x7f0000000640)="c5c23573ab04abb5cde4d18b7317bfac1fec77a88ca2f4783f60aa6c8669a323c0288558fde83a94", 0x28}, {&(0x7f0000000240)="59bafa4932b0bb0e5c5e507802a71cbe3225fb33c485dc9cac864337fbfdabee6fab35775f14f9996161b25e0047ddf80b8b40", 0x33}, {0x0}, {&(0x7f0000000a40)}, {0x0}, {&(0x7f0000000bc0)="d635641bcf5e8af64a381d5d0feb3a3fcec0d8ee79e0dfc2868424c806209f92c0d89fcdcbf66f", 0x27}], 0x7, 0x1) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(0x0) 10:43:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x12, &(0x7f0000000000)={0x10001, {{0x2, 0x0, @multicast1}}}, 0x88) 10:43:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000300)={0x300, 0x10}, 0x300}, 0x300}, 0x0) 10:43:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0xc, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) [ 206.558046][ T8383] netlink: 748 bytes leftover after parsing attributes in process `syz-executor.5'. [ 206.648287][ T8379] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8379 [ 206.657816][ T8379] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 206.665330][ T8379] CPU: 0 PID: 8379 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 206.674793][ T8379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.684851][ T8379] Call Trace: [ 206.688150][ T8379] dump_stack+0x198/0x1fb [ 206.692494][ T8379] check_preemption_disabled+0x128/0x130 [ 206.698150][ T8379] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 206.703880][ T8379] trace_hardirqs_on+0x5b/0x1c0 [ 206.708741][ T8379] __bad_area_nosemaphore+0xc6/0x4f0 [ 206.714046][ T8379] do_user_addr_fault+0x852/0xbf0 [ 206.719090][ T8379] exc_page_fault+0xa8/0x190 [ 206.723713][ T8379] ? asm_exc_page_fault+0x8/0x30 [ 206.728655][ T8379] asm_exc_page_fault+0x1e/0x30 [ 206.733544][ T8379] RIP: 0033:0x43c650 [ 206.737450][ T8379] Code: 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 74 48 83 e0 f0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7 [ 206.757086][ T8379] RSP: 002b:00007f1b3bf28ba8 EFLAGS: 00010246 [ 206.763160][ T8379] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 206.771131][ T8379] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000000 [ 206.779101][ T8379] RBP: 0000000000000005 R08: 0000000000000004 R09: 00007f1b3bf28bb0 [ 206.787082][ T8379] R10: 0000000000000000 R11: 000000000000000f R12: 00007f1b3bf28bf0 [ 206.795061][ T8379] R13: 00007ffdbe9abb2f R14: 00007f1b3bf2a9c0 R15: 000000000118bf2c [ 206.803182][ T8379] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8379 [ 206.812532][ T8379] caller is lockdep_hardirqs_on+0x34/0x110 [ 206.818402][ T8379] CPU: 0 PID: 8379 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 206.827866][ T8379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.837920][ T8379] Call Trace: [ 206.841214][ T8379] dump_stack+0x198/0x1fb [ 206.845564][ T8379] check_preemption_disabled+0x128/0x130 [ 206.851207][ T8379] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 206.856678][ T8379] lockdep_hardirqs_on+0x34/0x110 [ 206.861707][ T8379] __bad_area_nosemaphore+0xc6/0x4f0 [ 206.867006][ T8379] do_user_addr_fault+0x852/0xbf0 [ 206.872051][ T8379] exc_page_fault+0xa8/0x190 [ 206.876654][ T8379] ? asm_exc_page_fault+0x8/0x30 [ 206.881611][ T8379] asm_exc_page_fault+0x1e/0x30 [ 206.886461][ T8379] RIP: 0033:0x43c650 [ 206.890371][ T8379] Code: 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 74 48 83 e0 f0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7 [ 206.909980][ T8379] RSP: 002b:00007f1b3bf28ba8 EFLAGS: 00010246 [ 206.916059][ T8379] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 206.924033][ T8379] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000000 [ 206.932010][ T8379] RBP: 0000000000000005 R08: 0000000000000004 R09: 00007f1b3bf28bb0 [ 206.939984][ T8379] R10: 0000000000000000 R11: 000000000000000f R12: 00007f1b3bf28bf0 10:43:49 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_lt={'euid<'}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000006c0)={0x2c, 0x4, 0x0, {0x0, 0xffff, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') openat$bsg(0xffffffffffffff9c, &(0x7f0000000700)='/dev/bsg\x00', 0x0, 0x0) 10:43:49 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={0x0, 0x90}}, 0x0) 10:43:49 executing program 4: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x80108907, 0x0) [ 206.947960][ T8379] R13: 00007ffdbe9abb2f R14: 00007f1b3bf2a9c0 R15: 000000000118bf2c 10:43:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80004, 0xd, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x5051, 0xffff000000000000, 0x859c, 0x3, 0x294, 0x3, 0x6}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="440000001000010400000000000000000000007a", @ANYRES32=0x0, @ANYBLOB="8384030000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB], 0x44}}, 0x0) 10:43:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000300)={0x14, 0x10, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0xa00}}, 0x14}, 0x300}, 0x0) 10:43:49 executing program 4: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x8982, 0x0) 10:43:49 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:43:49 executing program 5: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x894c, 0x0) [ 207.272899][ T8399] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 207.319662][ T8385] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8385 [ 207.329260][ T8385] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 207.335898][ T8385] CPU: 0 PID: 8385 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 207.345362][ T8385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.355424][ T8385] Call Trace: [ 207.358724][ T8385] dump_stack+0x198/0x1fb [ 207.363077][ T8385] check_preemption_disabled+0x128/0x130 [ 207.368722][ T8385] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 207.374475][ T8385] trace_hardirqs_on+0x5b/0x1c0 [ 207.379340][ T8385] __bad_area_nosemaphore+0xc6/0x4f0 [ 207.384642][ T8385] do_user_addr_fault+0x852/0xbf0 [ 207.389714][ T8385] exc_page_fault+0xa8/0x190 [ 207.394344][ T8385] ? asm_exc_page_fault+0x8/0x30 [ 207.399305][ T8385] asm_exc_page_fault+0x1e/0x30 [ 207.404163][ T8385] RIP: 0033:0x43c650 [ 207.408106][ T8385] Code: 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 74 48 83 e0 f0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7 [ 207.427727][ T8385] RSP: 002b:00007f1b3bf07ba8 EFLAGS: 00010246 [ 207.433812][ T8385] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 207.441791][ T8385] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000000 [ 207.449778][ T8385] RBP: 0000000000000004 R08: 0000000000000004 R09: 00007f1b3bf07bb0 [ 207.457780][ T8385] R10: 0000000000000000 R11: 000000000000000f R12: 00007f1b3bf07bf0 [ 207.465760][ T8385] R13: 00007ffdbe9abb2f R14: 00007f1b3bf099c0 R15: 000000000118bfd4 [ 207.473924][ T8385] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8385 [ 207.483272][ T8385] caller is lockdep_hardirqs_on+0x34/0x110 [ 207.489152][ T8385] CPU: 0 PID: 8385 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 207.498607][ T8385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.508660][ T8385] Call Trace: [ 207.511956][ T8385] dump_stack+0x198/0x1fb [ 207.516318][ T8385] check_preemption_disabled+0x128/0x130 [ 207.521963][ T8385] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 207.527431][ T8385] lockdep_hardirqs_on+0x34/0x110 [ 207.532464][ T8385] __bad_area_nosemaphore+0xc6/0x4f0 [ 207.537769][ T8385] do_user_addr_fault+0x852/0xbf0 [ 207.542815][ T8385] exc_page_fault+0xa8/0x190 [ 207.547454][ T8385] ? asm_exc_page_fault+0x8/0x30 [ 207.552401][ T8385] asm_exc_page_fault+0x1e/0x30 [ 207.557284][ T8385] RIP: 0033:0x43c650 [ 207.561190][ T8385] Code: 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 74 48 83 e0 f0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7 [ 207.580806][ T8385] RSP: 002b:00007f1b3bf07ba8 EFLAGS: 00010246 [ 207.586885][ T8385] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 207.594889][ T8385] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000000 [ 207.602865][ T8385] RBP: 0000000000000004 R08: 0000000000000004 R09: 00007f1b3bf07bb0 [ 207.610871][ T8385] R10: 0000000000000000 R11: 000000000000000f R12: 00007f1b3bf07bf0 [ 207.618845][ T8385] R13: 00007ffdbe9abb2f R14: 00007f1b3bf099c0 R15: 000000000118bfd4 10:43:50 executing program 2: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) mount$overlay(0x0, &(0x7f0000000340)='./bus/file1\x00', 0x0, 0x110000, &(0x7f0000000540)={[{@index_off='index=off'}, {@upperdir={'upperdir', 0x3d, './bus/file1'}}], [{@smackfsdef={'smackfsdef'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20058081) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000c40)=[{0x0}, {&(0x7f0000000640)="c5c23573ab04abb5cde4d18b7317bfac1fec77a88ca2f4783f60aa6c8669a323c0288558fde83a94", 0x28}, {&(0x7f0000000240)="59bafa4932b0bb0e5c5e507802a71cbe3225fb33c485dc9cac864337fbfdabee6fab35775f14f9996161b25e0047ddf80b8b40", 0x33}, {0x0}, {&(0x7f0000000a40)}, {0x0}, {&(0x7f0000000bc0)="d635641bcf5e8af64a381d5d0feb3a3fcec0d8ee79e0dfc2868424c806209f92c0d89fcdcbf66f", 0x27}], 0x7, 0x1) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(0x0) 10:43:50 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x541b, 0x0) 10:43:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\'-&+[]})%\xe2{@:@/}.,\x00') r0 = syz_io_uring_setup(0x89, &(0x7f00000013c0)={0x0, 0x92a, 0x10, 0x0, 0x3}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$inet6(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0, 0x20, 0x0, {0x2}}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 10:43:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x11, 0xb, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 10:43:50 executing program 5: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x80) 10:43:50 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_lt={'euid<'}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000006c0)={0x2c, 0x4, 0x0, {0x0, 0xffff, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') openat$bsg(0xffffffffffffff9c, &(0x7f0000000700)='/dev/bsg\x00', 0x0, 0x0) [ 208.074190][ T8430] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8430 [ 208.083689][ T8430] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 208.090254][ T8430] CPU: 0 PID: 8430 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 208.099711][ T8430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.109776][ T8430] Call Trace: [ 208.113078][ T8430] dump_stack+0x198/0x1fb [ 208.117436][ T8430] check_preemption_disabled+0x128/0x130 [ 208.123088][ T8430] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 208.128843][ T8430] trace_hardirqs_on+0x5b/0x1c0 [ 208.133705][ T8430] __bad_area_nosemaphore+0xc6/0x4f0 [ 208.139021][ T8430] do_user_addr_fault+0x852/0xbf0 [ 208.144097][ T8430] exc_page_fault+0xa8/0x190 [ 208.148700][ T8430] ? asm_exc_page_fault+0x8/0x30 [ 208.153680][ T8430] asm_exc_page_fault+0x1e/0x30 [ 208.158568][ T8430] RIP: 0033:0x4450c7 [ 208.162502][ T8430] Code: 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e <89> 0f 48 83 c6 04 48 83 c7 04 f6 c2 08 74 0e 48 8b 0e 48 89 0f 48 [ 208.182113][ T8430] RSP: 002b:00007f258206dc68 EFLAGS: 00010202 [ 208.188196][ T8430] RAX: 0000000000000040 RBX: 000000000118bfc8 RCX: 000000000000307e [ 208.196187][ T8430] RDX: 0000000000000004 RSI: 0000000020000140 RDI: 0000000000000040 [ 208.204176][ T8430] RBP: 000000000118c018 R08: 0000000000000004 R09: 0000000000000000 [ 208.212176][ T8430] R10: 00007f258206e9d0 R11: 0000000000000246 R12: 000000000118bfd4 [ 208.220158][ T8430] R13: 00007ffc0d7c6c5f R14: 00007f258206e9c0 R15: 000000000118bfd4 [ 208.229927][ T8430] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8430 [ 208.239923][ T8430] caller is lockdep_hardirqs_on+0x34/0x110 [ 208.245871][ T8430] CPU: 0 PID: 8430 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 208.255365][ T8430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.265419][ T8430] Call Trace: [ 208.268719][ T8430] dump_stack+0x198/0x1fb [ 208.273087][ T8430] check_preemption_disabled+0x128/0x130 [ 208.278731][ T8430] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 208.284198][ T8430] lockdep_hardirqs_on+0x34/0x110 [ 208.289259][ T8430] __bad_area_nosemaphore+0xc6/0x4f0 [ 208.294561][ T8430] do_user_addr_fault+0x852/0xbf0 [ 208.299624][ T8430] exc_page_fault+0xa8/0x190 [ 208.304231][ T8430] ? asm_exc_page_fault+0x8/0x30 [ 208.309175][ T8430] asm_exc_page_fault+0x1e/0x30 [ 208.314033][ T8430] RIP: 0033:0x4450c7 [ 208.317940][ T8430] Code: 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e <89> 0f 48 83 c6 04 48 83 c7 04 f6 c2 08 74 0e 48 8b 0e 48 89 0f 48 [ 208.337550][ T8430] RSP: 002b:00007f258206dc68 EFLAGS: 00010202 [ 208.343631][ T8430] RAX: 0000000000000040 RBX: 000000000118bfc8 RCX: 000000000000307e [ 208.351646][ T8430] RDX: 0000000000000004 RSI: 0000000020000140 RDI: 0000000000000040 [ 208.359617][ T8430] RBP: 000000000118c018 R08: 0000000000000004 R09: 0000000000000000 [ 208.367615][ T8430] R10: 00007f258206e9d0 R11: 0000000000000246 R12: 000000000118bfd4 10:43:50 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:43:50 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) 10:43:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x2f}, 0xc, &(0x7f0000000280)={0x0}}, 0x0) [ 208.375608][ T8430] R13: 00007ffc0d7c6c5f R14: 00007f258206e9c0 R15: 000000000118bfd4 [ 208.453573][ T8437] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 10:43:51 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x8906, 0x0) 10:43:51 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:43:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) [ 208.736823][ T8445] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8445 [ 208.747293][ T8445] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 208.753897][ T8445] CPU: 1 PID: 8445 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 208.763352][ T8445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.773411][ T8445] Call Trace: [ 208.776712][ T8445] dump_stack+0x198/0x1fb [ 208.781066][ T8445] check_preemption_disabled+0x128/0x130 [ 208.786729][ T8445] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 208.792462][ T8445] trace_hardirqs_on+0x5b/0x1c0 [ 208.797324][ T8445] __bad_area_nosemaphore+0xc6/0x4f0 [ 208.802627][ T8445] do_user_addr_fault+0x852/0xbf0 [ 208.807689][ T8445] exc_page_fault+0xa8/0x190 [ 208.812287][ T8445] ? asm_exc_page_fault+0x8/0x30 [ 208.817229][ T8445] asm_exc_page_fault+0x1e/0x30 [ 208.822080][ T8445] RIP: 0033:0x43c650 [ 208.825978][ T8445] Code: 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 74 48 83 e0 f0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7 [ 208.845591][ T8445] RSP: 002b:00007f1b3bf07ba8 EFLAGS: 00010246 [ 208.851659][ T8445] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 208.859624][ T8445] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000000 [ 208.867593][ T8445] RBP: 0000000000000005 R08: 0000000000000004 R09: 00007f1b3bf07bb0 [ 208.875559][ T8445] R10: 0000000000000000 R11: 000000000000000f R12: 00007f1b3bf07bf0 [ 208.883543][ T8445] R13: 00007ffdbe9abb2f R14: 00007f1b3bf099c0 R15: 000000000118bfd4 [ 208.892001][ T8445] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8445 [ 208.901337][ T8445] caller is lockdep_hardirqs_on+0x34/0x110 [ 208.907222][ T8445] CPU: 1 PID: 8445 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 208.916718][ T8445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.926773][ T8445] Call Trace: [ 208.930075][ T8445] dump_stack+0x198/0x1fb [ 208.934418][ T8445] check_preemption_disabled+0x128/0x130 [ 208.940064][ T8445] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 208.945543][ T8445] lockdep_hardirqs_on+0x34/0x110 [ 208.950576][ T8445] __bad_area_nosemaphore+0xc6/0x4f0 [ 208.955875][ T8445] do_user_addr_fault+0x852/0xbf0 [ 208.960914][ T8445] exc_page_fault+0xa8/0x190 [ 208.965508][ T8445] ? asm_exc_page_fault+0x8/0x30 [ 208.970448][ T8445] asm_exc_page_fault+0x1e/0x30 [ 208.975338][ T8445] RIP: 0033:0x43c650 [ 208.979241][ T8445] Code: 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 74 48 83 e0 f0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7 [ 208.998872][ T8445] RSP: 002b:00007f1b3bf07ba8 EFLAGS: 00010246 [ 209.004947][ T8445] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 209.012924][ T8445] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000000 [ 209.020900][ T8445] RBP: 0000000000000005 R08: 0000000000000004 R09: 00007f1b3bf07bb0 [ 209.028956][ T8445] R10: 0000000000000000 R11: 000000000000000f R12: 00007f1b3bf07bf0 [ 209.036934][ T8445] R13: 00007ffdbe9abb2f R14: 00007f1b3bf099c0 R15: 000000000118bfd4 10:43:51 executing program 2: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) mount$overlay(0x0, &(0x7f0000000340)='./bus/file1\x00', 0x0, 0x110000, &(0x7f0000000540)={[{@index_off='index=off'}, {@upperdir={'upperdir', 0x3d, './bus/file1'}}], [{@smackfsdef={'smackfsdef'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20058081) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000c40)=[{0x0}, {&(0x7f0000000640)="c5c23573ab04abb5cde4d18b7317bfac1fec77a88ca2f4783f60aa6c8669a323c0288558fde83a94", 0x28}, {&(0x7f0000000240)="59bafa4932b0bb0e5c5e507802a71cbe3225fb33c485dc9cac864337fbfdabee6fab35775f14f9996161b25e0047ddf80b8b40", 0x33}, {0x0}, {&(0x7f0000000a40)}, {0x0}, {&(0x7f0000000bc0)="d635641bcf5e8af64a381d5d0feb3a3fcec0d8ee79e0dfc2868424c806209f92c0d89fcdcbf66f", 0x27}], 0x7, 0x1) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(0x0) 10:43:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\'-&+[]})%\xe2{@:@/}.,\x00') r0 = syz_io_uring_setup(0x89, &(0x7f00000013c0)={0x0, 0x92a, 0x10, 0x0, 0x3}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$inet6(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0, 0x20, 0x0, {0x2}}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 10:43:51 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000002180)={0x2020}, 0x2020) 10:43:51 executing program 4: syz_io_uring_setup(0x4, &(0x7f00000003c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000000440), &(0x7f0000000480)) 10:43:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x3, 0x0, 0x0) [ 209.481394][ T8471] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8471 [ 209.491050][ T8471] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 209.497657][ T8471] CPU: 1 PID: 8471 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 209.507110][ T8471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.517155][ T8471] Call Trace: [ 209.520443][ T8471] dump_stack+0x198/0x1fb [ 209.524802][ T8471] check_preemption_disabled+0x128/0x130 [ 209.530483][ T8471] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 209.536217][ T8471] trace_hardirqs_on+0x5b/0x1c0 [ 209.541084][ T8471] __bad_area_nosemaphore+0xc6/0x4f0 [ 209.546379][ T8471] do_user_addr_fault+0x852/0xbf0 [ 209.551417][ T8471] exc_page_fault+0xa8/0x190 [ 209.556006][ T8471] ? asm_exc_page_fault+0x8/0x30 [ 209.560941][ T8471] asm_exc_page_fault+0x1e/0x30 [ 209.565815][ T8471] RIP: 0033:0x4450c7 [ 209.569710][ T8471] Code: 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e <89> 0f 48 83 c6 04 48 83 c7 04 f6 c2 08 74 0e 48 8b 0e 48 89 0f 48 [ 209.589314][ T8471] RSP: 002b:00007f258206dc68 EFLAGS: 00010202 [ 209.595469][ T8471] RAX: 0000000000000040 RBX: 000000000118bfc8 RCX: 000000000000307e [ 209.603536][ T8471] RDX: 0000000000000004 RSI: 0000000020000140 RDI: 0000000000000040 [ 209.611501][ T8471] RBP: 000000000118c018 R08: 0000000000000004 R09: 0000000000000000 [ 209.619466][ T8471] R10: 00007f258206e9d0 R11: 0000000000000246 R12: 000000000118bfd4 [ 209.627444][ T8471] R13: 00007ffc0d7c6c5f R14: 00007f258206e9c0 R15: 000000000118bfd4 [ 209.635538][ T8471] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8471 [ 209.644866][ T8471] caller is lockdep_hardirqs_on+0x34/0x110 [ 209.650678][ T8471] CPU: 1 PID: 8471 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 209.660163][ T8471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.670229][ T8471] Call Trace: [ 209.673543][ T8471] dump_stack+0x198/0x1fb [ 209.677887][ T8471] check_preemption_disabled+0x128/0x130 [ 209.683544][ T8471] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 209.689027][ T8471] lockdep_hardirqs_on+0x34/0x110 [ 209.694087][ T8471] __bad_area_nosemaphore+0xc6/0x4f0 [ 209.699403][ T8471] do_user_addr_fault+0x852/0xbf0 [ 209.704449][ T8471] exc_page_fault+0xa8/0x190 [ 209.709050][ T8471] ? asm_exc_page_fault+0x8/0x30 [ 209.713993][ T8471] asm_exc_page_fault+0x1e/0x30 [ 209.718848][ T8471] RIP: 0033:0x4450c7 [ 209.722770][ T8471] Code: 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e <89> 0f 48 83 c6 04 48 83 c7 04 f6 c2 08 74 0e 48 8b 0e 48 89 0f 48 [ 209.742379][ T8471] RSP: 002b:00007f258206dc68 EFLAGS: 00010202 [ 209.748460][ T8471] RAX: 0000000000000040 RBX: 000000000118bfc8 RCX: 000000000000307e [ 209.756448][ T8471] RDX: 0000000000000004 RSI: 0000000020000140 RDI: 0000000000000040 [ 209.764450][ T8471] RBP: 000000000118c018 R08: 0000000000000004 R09: 0000000000000000 [ 209.772436][ T8471] R10: 00007f258206e9d0 R11: 0000000000000246 R12: 000000000118bfd4 10:43:52 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_lt={'euid<'}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000006c0)={0x2c, 0x4, 0x0, {0x0, 0xffff, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') 10:43:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x11, 0xa, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 10:43:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x11, 0x68, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 10:43:52 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x10, 0x0, 0xe48}}) [ 209.780408][ T8471] R13: 00007ffc0d7c6c5f R14: 00007f258206e9c0 R15: 000000000118bfd4 10:43:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x11, 0x65, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 10:43:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0xd, 0x0, 0x0) 10:43:52 executing program 5: timer_create(0x3, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000240)) 10:43:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:43:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\'-&+[]})%\xe2{@:@/}.,\x00') r0 = syz_io_uring_setup(0x89, &(0x7f00000013c0)={0x0, 0x92a, 0x10, 0x0, 0x3}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$inet6(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0, 0x20, 0x0, {0x2}}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 10:43:53 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000002380)={0x0, 0xfb, 0x15, 0x0, 0x0, "8a906c2ef814a0dbddeba4e9031af981"}, 0x15, 0x0) 10:43:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = io_uring_setup(0x2724, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x362}) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x10000000) 10:43:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) syz_open_dev$ptys(0xc, 0x3, 0x1) 10:43:53 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_lt={'euid<'}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000006c0)={0x2c, 0x4, 0x0, {0x0, 0xffff, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') 10:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0xc, 0x0, 0x0) 10:43:53 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:43:53 executing program 3: ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x7}) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x86) 10:43:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\'-&+[]})%\xe2{@:@/}.,\x00') r0 = syz_io_uring_setup(0x89, &(0x7f00000013c0)={0x0, 0x92a, 0x10, 0x0, 0x3}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = socket$inet6(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0, 0x20, 0x0, {0x2}}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 10:43:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000800, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) 10:43:53 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:43:53 executing program 2: mq_unlink(&(0x7f0000000080)='.*\x00') 10:43:53 executing program 3: r0 = socket$inet(0x2, 0x3, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x8941, 0x0) [ 211.079548][ T8528] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 10:43:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\'-&+[]})%\xe2{@:@/}.,\x00') r0 = syz_io_uring_setup(0x89, &(0x7f00000013c0)={0x0, 0x92a, 0x10, 0x0, 0x3}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socket$inet6(0x10, 0x3, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 10:43:53 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./bus/file1\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000000)=@v2, 0x14, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_lt={'euid<'}}, {@measure='measure'}]}) setxattr$security_ima(&(0x7f0000000100)='./bus/file1\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000440)=ANY=[], 0x33, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000600)='./bus/file1\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000006c0)={0x2c, 0x4, 0x0, {0x0, 0xffff, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') 10:43:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x13, &(0x7f0000000000)={0x7, {{0x2, 0x0, @multicast1}}}, 0x88) 10:43:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0xa, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x3) 10:43:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) write$vhost_msg(r0, &(0x7f00000001c0)={0x1, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x48) [ 211.728997][ T8555] check_preemption_disabled: 8 callbacks suppressed [ 211.729013][ T8555] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8555 [ 211.745277][ T8555] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 211.751790][ T8555] CPU: 1 PID: 8555 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 211.761249][ T8555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.771301][ T8555] Call Trace: [ 211.774597][ T8555] dump_stack+0x198/0x1fb 10:43:54 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@mcast2, 0x0, r2}) [ 211.779052][ T8555] check_preemption_disabled+0x128/0x130 [ 211.784714][ T8555] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 211.790445][ T8555] trace_hardirqs_on+0x5b/0x1c0 [ 211.795307][ T8555] __bad_area_nosemaphore+0xc6/0x4f0 [ 211.800617][ T8555] do_user_addr_fault+0x852/0xbf0 [ 211.805663][ T8555] exc_page_fault+0xa8/0x190 [ 211.810281][ T8555] ? asm_exc_page_fault+0x8/0x30 [ 211.815277][ T8555] asm_exc_page_fault+0x1e/0x30 [ 211.820158][ T8555] RIP: 0033:0x4450c7 [ 211.824066][ T8555] Code: 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e <89> 0f 48 83 c6 04 48 83 c7 04 f6 c2 08 74 0e 48 8b 0e 48 89 0f 48 [ 211.843675][ T8555] RSP: 002b:00007f258206dc68 EFLAGS: 00010202 [ 211.849753][ T8555] RAX: 0000000000000040 RBX: 000000000118bfc8 RCX: 000000000000307e [ 211.857732][ T8555] RDX: 0000000000000004 RSI: 0000000020000140 RDI: 0000000000000040 [ 211.865722][ T8555] RBP: 000000000118c018 R08: 0000000000000004 R09: 0000000000000000 [ 211.873698][ T8555] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 211.881695][ T8555] R13: 00007ffc0d7c6c5f R14: 00007f258206e9c0 R15: 000000000118bfd4 [ 211.889780][ T8555] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8555 [ 211.899127][ T8555] caller is lockdep_hardirqs_on+0x34/0x110 [ 211.905011][ T8555] CPU: 1 PID: 8555 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 211.914461][ T8555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.924515][ T8555] Call Trace: 10:43:54 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x0, 0x6}, @jmp], &(0x7f0000000040)='syzkaller\x00', 0x3, 0xbb, &(0x7f0000000140)=""/187, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, &(0x7f0000000280), 0x10}, 0x31) [ 211.927812][ T8555] dump_stack+0x198/0x1fb [ 211.932160][ T8555] check_preemption_disabled+0x128/0x130 [ 211.937797][ T8555] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 211.943281][ T8555] lockdep_hardirqs_on+0x34/0x110 [ 211.948315][ T8555] __bad_area_nosemaphore+0xc6/0x4f0 [ 211.953632][ T8555] do_user_addr_fault+0x852/0xbf0 [ 211.958678][ T8555] exc_page_fault+0xa8/0x190 [ 211.963298][ T8555] ? asm_exc_page_fault+0x8/0x30 [ 211.968248][ T8555] asm_exc_page_fault+0x1e/0x30 [ 211.973101][ T8555] RIP: 0033:0x4450c7 [ 211.977008][ T8555] Code: 0b 0f b6 0e 88 0f 48 ff c6 48 ff c7 f6 c2 02 74 12 0f b7 0e 66 89 0f 48 83 c6 02 48 83 c7 02 0f 1f 40 00 f6 c2 04 74 0c 8b 0e <89> 0f 48 83 c6 04 48 83 c7 04 f6 c2 08 74 0e 48 8b 0e 48 89 0f 48 [ 211.996613][ T8555] RSP: 002b:00007f258206dc68 EFLAGS: 00010202 [ 212.002746][ T8555] RAX: 0000000000000040 RBX: 000000000118bfc8 RCX: 000000000000307e [ 212.010721][ T8555] RDX: 0000000000000004 RSI: 0000000020000140 RDI: 0000000000000040 [ 212.018693][ T8555] RBP: 000000000118c018 R08: 0000000000000004 R09: 0000000000000000 [ 212.026673][ T8555] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bfd4 [ 212.034673][ T8555] R13: 00007ffc0d7c6c5f R14: 00007f258206e9c0 R15: 000000000118bfd4 10:43:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x15, &(0x7f0000000000)={0x10001, {{0x2, 0x0, @multicast1}}}, 0x88)