[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.237' (ECDSA) to the list of known hosts. 2020/10/20 08:21:22 fuzzer started 2020/10/20 08:21:22 dialing manager at 10.128.0.26:38919 2020/10/20 08:21:22 syscalls: 3450 2020/10/20 08:21:22 code coverage: enabled 2020/10/20 08:21:22 comparison tracing: enabled 2020/10/20 08:21:22 extra coverage: enabled 2020/10/20 08:21:22 setuid sandbox: enabled 2020/10/20 08:21:22 namespace sandbox: enabled 2020/10/20 08:21:22 Android sandbox: /sys/fs/selinux/policy does not exist 2020/10/20 08:21:22 fault injection: enabled 2020/10/20 08:21:22 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/10/20 08:21:22 net packet injection: enabled 2020/10/20 08:21:22 net device setup: enabled 2020/10/20 08:21:22 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/10/20 08:21:22 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/10/20 08:21:22 USB emulation: enabled 2020/10/20 08:21:22 hci packet injection: enabled 2020/10/20 08:21:22 wifi device emulation: enabled 08:23:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f0000000c80)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 08:23:27 executing program 1: process_vm_writev(0x0, &(0x7f0000000100)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) 08:23:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89b0, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev}}}}) 08:23:27 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) waitid(0x0, 0x0, &(0x7f00000000c0), 0x8, 0x0) 08:23:28 executing program 4: openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nomblk_io_submit='nomblk_io_submit'}, {@block_validity='block_validity'}]}) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x1, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, 0x0, 0x0) 08:23:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891b, &(0x7f0000000200)={'gre0\x00', 0x0}) syzkaller login: [ 190.298501][ T6879] IPVS: ftp: loaded support on port[0] = 21 [ 190.538495][ T6879] chnl_net:caif_netlink_parms(): no params data found [ 190.573407][ T6881] IPVS: ftp: loaded support on port[0] = 21 [ 190.685596][ T6879] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.687412][ T6883] IPVS: ftp: loaded support on port[0] = 21 [ 190.694225][ T6879] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.707249][ T6879] device bridge_slave_0 entered promiscuous mode [ 190.717497][ T6879] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.724753][ T6879] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.733219][ T6879] device bridge_slave_1 entered promiscuous mode [ 190.775923][ T6879] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.820738][ T6879] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 190.914318][ T6885] IPVS: ftp: loaded support on port[0] = 21 [ 190.924786][ T6879] team0: Port device team_slave_0 added [ 190.975520][ T6879] team0: Port device team_slave_1 added [ 191.108513][ T6879] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 191.116491][ T6879] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 191.143843][ T6879] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 191.212782][ T6879] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 191.219763][ T6879] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 191.254905][ T6879] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 191.305191][ T6887] IPVS: ftp: loaded support on port[0] = 21 [ 191.324890][ T6881] chnl_net:caif_netlink_parms(): no params data found [ 191.359653][ T6883] chnl_net:caif_netlink_parms(): no params data found [ 191.397651][ T6879] device hsr_slave_0 entered promiscuous mode [ 191.405563][ T6879] device hsr_slave_1 entered promiscuous mode [ 191.694796][ T6910] IPVS: ftp: loaded support on port[0] = 21 [ 191.697196][ T6883] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.713190][ T6883] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.722813][ T6883] device bridge_slave_0 entered promiscuous mode [ 191.740043][ T6885] chnl_net:caif_netlink_parms(): no params data found [ 191.763724][ T6883] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.770995][ T6883] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.778657][ T6883] device bridge_slave_1 entered promiscuous mode [ 191.849423][ T6881] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.857373][ T6881] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.866180][ T6881] device bridge_slave_0 entered promiscuous mode [ 191.875855][ T6883] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.888954][ T6883] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.918594][ T6881] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.927032][ T6881] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.935536][ T6881] device bridge_slave_1 entered promiscuous mode [ 192.008290][ T6883] team0: Port device team_slave_0 added [ 192.052597][ T6883] team0: Port device team_slave_1 added [ 192.086572][ T6881] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.099178][ T6881] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.163057][ T6883] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 192.170018][ T6883] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.196132][ T6883] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 192.208261][ T48] Bluetooth: hci0: command 0x0409 tx timeout [ 192.261560][ T6883] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 192.268540][ T6883] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.296272][ T6883] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 192.312447][ T6885] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.319497][ T6885] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.328269][ T6885] device bridge_slave_0 entered promiscuous mode [ 192.360006][ T6881] team0: Port device team_slave_0 added [ 192.423018][ T6885] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.430096][ T6885] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.441076][ T7420] Bluetooth: hci1: command 0x0409 tx timeout [ 192.450140][ T6885] device bridge_slave_1 entered promiscuous mode [ 192.470208][ T6887] chnl_net:caif_netlink_parms(): no params data found [ 192.492720][ T6881] team0: Port device team_slave_1 added [ 192.588664][ T6883] device hsr_slave_0 entered promiscuous mode [ 192.598417][ T6883] device hsr_slave_1 entered promiscuous mode [ 192.608302][ T6883] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 192.616530][ T6883] Cannot create hsr debugfs directory [ 192.624646][ T6885] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.688650][ T6885] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.702531][ T48] Bluetooth: hci2: command 0x0409 tx timeout [ 192.717803][ T6881] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 192.725864][ T6881] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.752421][ T6881] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 192.764980][ T6910] chnl_net:caif_netlink_parms(): no params data found [ 192.801860][ T6881] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 192.808829][ T6881] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.844237][ T6881] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 192.884314][ T6879] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 192.896766][ T6885] team0: Port device team_slave_0 added [ 192.920614][ T5] Bluetooth: hci3: command 0x0409 tx timeout [ 192.931604][ T6887] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.938801][ T6887] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.947807][ T6887] device bridge_slave_0 entered promiscuous mode [ 192.956473][ T6879] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 192.971482][ T6885] team0: Port device team_slave_1 added [ 192.977446][ T6879] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 193.024508][ T6887] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.032161][ T6887] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.039826][ T6887] device bridge_slave_1 entered promiscuous mode [ 193.069960][ T6879] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 193.095759][ T6881] device hsr_slave_0 entered promiscuous mode [ 193.103233][ T6881] device hsr_slave_1 entered promiscuous mode [ 193.109775][ T6881] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 193.118258][ T6881] Cannot create hsr debugfs directory [ 193.148418][ T6885] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 193.156599][ T6885] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.182725][ T5] Bluetooth: hci4: command 0x0409 tx timeout [ 193.184704][ T6885] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 193.216922][ T6887] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.248177][ T6885] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 193.257548][ T6885] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.284156][ T6885] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 193.304220][ T6887] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.374409][ T6910] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.382599][ T6910] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.393945][ T6910] device bridge_slave_0 entered promiscuous mode [ 193.419761][ T6885] device hsr_slave_0 entered promiscuous mode [ 193.432242][ T6885] device hsr_slave_1 entered promiscuous mode [ 193.438755][ T6885] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 193.447575][ T6885] Cannot create hsr debugfs directory [ 193.463959][ T6910] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.471836][ T6910] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.479921][ T6910] device bridge_slave_1 entered promiscuous mode [ 193.486879][ T7420] Bluetooth: hci5: command 0x0409 tx timeout [ 193.497157][ T6887] team0: Port device team_slave_0 added [ 193.549162][ T6887] team0: Port device team_slave_1 added [ 193.587934][ T6910] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.647372][ T6887] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 193.659270][ T6887] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.687552][ T6887] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 193.702718][ T6910] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.741431][ T6887] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 193.748410][ T6887] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.776161][ T6887] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 193.864151][ T6883] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 193.877331][ T6883] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 193.906377][ T6910] team0: Port device team_slave_0 added [ 193.924104][ T6887] device hsr_slave_0 entered promiscuous mode [ 193.934020][ T6887] device hsr_slave_1 entered promiscuous mode [ 193.942008][ T6887] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 193.949603][ T6887] Cannot create hsr debugfs directory [ 193.960070][ T6883] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 193.978490][ T6883] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 193.993837][ T6910] team0: Port device team_slave_1 added [ 194.094149][ T6910] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 194.101711][ T6910] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.129516][ T6910] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 194.174228][ T6910] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.189716][ T6910] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.222873][ T6910] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.254200][ T6881] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 194.281572][ T5] Bluetooth: hci0: command 0x041b tx timeout [ 194.317360][ T6881] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 194.336934][ T6881] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 194.376000][ T6910] device hsr_slave_0 entered promiscuous mode [ 194.387230][ T6910] device hsr_slave_1 entered promiscuous mode [ 194.395376][ T6910] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 194.404287][ T6910] Cannot create hsr debugfs directory [ 194.418978][ T6881] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 194.535037][ T48] Bluetooth: hci1: command 0x041b tx timeout [ 194.552056][ T6885] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 194.606548][ T6879] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.615042][ T6885] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 194.677788][ T6885] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 194.707335][ T6879] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.739826][ T6885] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 194.762734][ T7850] Bluetooth: hci2: command 0x041b tx timeout [ 194.785463][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.795192][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.810947][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.819528][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.834908][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.842164][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.857280][ T6887] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 194.922055][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.929915][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.939457][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.948280][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.955428][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.965189][ T6887] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 194.986392][ T6887] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 195.000247][ T6887] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 195.002874][ T2556] Bluetooth: hci3: command 0x041b tx timeout [ 195.050713][ T6883] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.086877][ T6910] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 195.097275][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.139121][ T6910] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 195.148828][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.158747][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.167008][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.184731][ T6883] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.195119][ T6910] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 195.206924][ T6910] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 195.224139][ T6881] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.240774][ T5] Bluetooth: hci4: command 0x041b tx timeout [ 195.247905][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.259425][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.269584][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.292521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.304010][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.311133][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.354210][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.366713][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.376919][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.386928][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.396017][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.405916][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.422162][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.434130][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.443205][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.453095][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.462275][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.469341][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.500593][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.512573][ T6879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.537034][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.554098][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.566503][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.599504][ T2556] Bluetooth: hci5: command 0x041b tx timeout [ 195.631508][ T6881] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.638477][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 195.647488][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 195.655699][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.664976][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.674115][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.689060][ T6879] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.707390][ T6885] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.742309][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.752463][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.761286][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.770002][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.779415][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.786603][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.794690][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.805571][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.814572][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.821698][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.829980][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.865755][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.874578][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.885340][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.894462][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.903519][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.912629][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.974753][ T6887] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.988679][ T6885] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.996998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.007044][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.016512][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.025590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 196.034918][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 196.044523][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.053436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.062455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.070107][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.089280][ T6881] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 196.104481][ T6881] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.118971][ T6883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.148656][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.158376][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.168611][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.181223][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.189494][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.198657][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.207685][ T2556] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.214832][ T2556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.261071][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.268775][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.284140][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.294840][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.305325][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 196.317689][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 196.329512][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 196.340106][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.361335][ T7850] Bluetooth: hci0: command 0x040f tx timeout [ 196.369393][ T6910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.382955][ T6887] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.393178][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.402415][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.411325][ T7850] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.418493][ T7850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.453691][ T6879] device veth0_vlan entered promiscuous mode [ 196.466903][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 196.475088][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 196.483269][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.499186][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 196.507887][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 196.516384][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.556322][ T6881] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.595103][ T6883] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.602543][ T8186] Bluetooth: hci1: command 0x040f tx timeout [ 196.625134][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.635243][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.648413][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.657609][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.666702][ T7850] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.673865][ T7850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.698304][ T6910] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.709141][ T6879] device veth1_vlan entered promiscuous mode [ 196.727595][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 196.736220][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.752258][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.760101][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.771138][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.779731][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.786872][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.795664][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.804616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.812885][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.822259][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.831522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.850431][ T7420] Bluetooth: hci2: command 0x040f tx timeout [ 196.869874][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.878706][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.888835][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.899042][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.909454][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.918874][ T7420] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.925998][ T7420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.934355][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.943909][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.953418][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.962878][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.018901][ T6887] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 197.030852][ T6887] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 197.049803][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.064192][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.074391][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.084194][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.093971][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.104200][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.113661][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.120776][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.128792][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.137886][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.146541][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.155236][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.163994][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.172501][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.181160][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.206301][ T48] Bluetooth: hci3: command 0x040f tx timeout [ 197.225457][ T6885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.252384][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.262462][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.271535][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.280077][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.289578][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.298896][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.308436][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.317186][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.320871][ T2556] Bluetooth: hci4: command 0x040f tx timeout [ 197.326248][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.339622][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.350582][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.359039][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.390668][ T6887] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.410842][ T6883] device veth0_vlan entered promiscuous mode [ 197.417658][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.428250][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.439081][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.447354][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 197.456707][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 197.465993][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.474028][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.482598][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.492036][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.514487][ T6910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.538380][ T6879] device veth0_macvtap entered promiscuous mode [ 197.586648][ T6883] device veth1_vlan entered promiscuous mode [ 197.594804][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 197.604337][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 197.613459][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.622863][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.632694][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.640148][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.651378][ T17] Bluetooth: hci5: command 0x040f tx timeout [ 197.651383][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.654072][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.682846][ T6885] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.700942][ T6881] device veth0_vlan entered promiscuous mode [ 197.726114][ T6879] device veth1_macvtap entered promiscuous mode [ 197.738871][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 197.755712][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 197.765013][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.776555][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.789471][ T6910] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.803540][ T6881] device veth1_vlan entered promiscuous mode [ 197.833147][ T6879] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 197.862109][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 197.872365][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 197.886189][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 197.925848][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.935028][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.955260][ T6883] device veth0_macvtap entered promiscuous mode [ 197.987159][ T6879] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 198.000267][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 198.012021][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.022372][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 198.031232][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.044278][ T6883] device veth1_macvtap entered promiscuous mode [ 198.073854][ T6879] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 198.085147][ T6879] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 198.103061][ T6879] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 198.114489][ T6879] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 198.129292][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 198.138985][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 198.148312][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.157000][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.166193][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.175443][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.199071][ T6883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 198.215495][ T6883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 198.226923][ T6883] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 198.256716][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.265857][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.274785][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.284652][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.301153][ T6881] device veth0_macvtap entered promiscuous mode [ 198.316194][ T6885] device veth0_vlan entered promiscuous mode [ 198.334210][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 198.347963][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.360109][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 198.376167][ T6883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 198.387819][ T6883] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 198.400528][ T6883] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 198.411628][ T6881] device veth1_macvtap entered promiscuous mode [ 198.437081][ T6885] device veth1_vlan entered promiscuous mode [ 198.447561][ T7420] Bluetooth: hci0: command 0x0419 tx timeout [ 198.462668][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 198.473581][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 198.491066][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 198.499180][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 198.508706][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.517848][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.528575][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.539762][ T6883] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 198.552630][ T6883] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 198.566737][ T6883] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 198.575975][ T6883] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 198.593584][ T6887] device veth0_vlan entered promiscuous mode [ 198.600277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.615937][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.641504][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.649404][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.657629][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.666122][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.676427][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.685698][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.694570][ T17] Bluetooth: hci1: command 0x0419 tx timeout [ 198.744967][ T6910] device veth0_vlan entered promiscuous mode [ 198.775120][ T6881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 198.795759][ T6881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 198.813123][ T6881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 198.824508][ T6881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 198.847317][ T6881] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 198.871174][ T6887] device veth1_vlan entered promiscuous mode [ 198.941124][ T48] Bluetooth: hci2: command 0x0419 tx timeout [ 198.941194][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 198.966108][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.981559][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.990739][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 198.999274][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.011733][ T6881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 199.035133][ T6881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.045381][ T6881] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 199.055858][ T6881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.068690][ T6881] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 199.077703][ T6885] device veth0_macvtap entered promiscuous mode [ 199.094932][ T6910] device veth1_vlan entered promiscuous mode [ 199.123374][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 199.135213][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 199.147265][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 199.162232][ T6881] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.175223][ T6881] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.184649][ T6881] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.193458][ T6881] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.216597][ T6885] device veth1_macvtap entered promiscuous mode [ 199.242153][ T236] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 199.250179][ T236] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 199.266232][ T7420] Bluetooth: hci3: command 0x0419 tx timeout [ 199.325492][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 199.341893][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.356022][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.391493][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.400098][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.416709][ T6885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 199.428306][ T5] Bluetooth: hci4: command 0x0419 tx timeout [ 199.428600][ T6885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.444696][ T6885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 199.455199][ T6885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.465428][ T6885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 199.476030][ T6885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.488648][ T6885] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 199.502908][ T6887] device veth0_macvtap entered promiscuous mode [ 199.535557][ T158] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 199.551694][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 199.560067][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 199.585865][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 199.586115][ T158] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 199.602712][ T236] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 199.605880][ T6885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 199.619152][ T236] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 199.628520][ T6885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.641417][ T6885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 199.652810][ T6885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.664240][ T6885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 199.675729][ T6885] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.687916][ T6885] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 199.698086][ T6887] device veth1_macvtap entered promiscuous mode [ 199.718631][ T6910] device veth0_macvtap entered promiscuous mode [ 199.726594][ T8186] Bluetooth: hci5: command 0x0419 tx timeout [ 199.741037][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.754118][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 199.766510][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 199.775140][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 199.783535][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 199.793113][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 199.806712][ T6885] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.816698][ T6885] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.825533][ T6885] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.834567][ T6885] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.871864][ T236] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 199.875063][ T6910] device veth1_macvtap entered promiscuous mode [ 199.879859][ T236] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 199.938438][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.957093][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 200.005126][ T6887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 08:23:38 executing program 0: [ 200.069986][ T6887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.092206][ T6887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 08:23:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 200.129458][ T6887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.139454][ T6887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.150264][ T6887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.167543][ T6887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.187130][ T6887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.202367][ T6887] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 200.214081][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.231622][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 08:23:38 executing program 0: kexec_load(0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2}], 0x3e0000) [ 200.278195][ T7] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 200.309882][ T6887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.332319][ T7] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 200.352758][ T6887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.381092][ T6887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.403112][ T6887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.415303][ T6887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 08:23:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x5460, 0x0) [ 200.426725][ T6887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.445654][ T6887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.474078][ T6887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.488520][ T6887] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 200.517856][ T6910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 08:23:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0x2, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 200.559635][ T6910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.594409][ T6910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.623153][ T6910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.644235][ T6910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.656021][ T6910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 08:23:39 executing program 0: syz_open_procfs(0x0, &(0x7f0000000480)='numa_maps\x00') [ 200.668051][ T6910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.679899][ T6910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.710790][ T6910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.727121][ T6910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.740149][ T6910] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 200.750662][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 200.759830][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.778311][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.804376][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 08:23:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) [ 200.824548][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.902963][ T6910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.957645][ T6910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.969670][ T6910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.991010][ T6910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.002392][ T6910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.014274][ T6910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.041290][ T6910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.058446][ T6910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.107980][ T6910] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.130708][ T6910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.152369][ T6910] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 201.197415][ T6887] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.207035][ T6887] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.217564][ T6887] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.226732][ T6887] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.249185][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 201.276892][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 201.293778][ T6910] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.307959][ T6910] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.326776][ T6910] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.339969][ T6910] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.364941][ T7] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.377441][ T7] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 201.444725][ T2556] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 201.465244][ T7] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.484624][ T7] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 201.495215][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 08:23:39 executing program 1: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) 08:23:39 executing program 2: bpf$PROG_LOAD(0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 201.680835][ T217] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.688823][ T217] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 201.754493][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 201.776722][ T158] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.807181][ T158] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 201.813859][ T217] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.841877][ T217] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 201.891299][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 201.899934][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 201.958350][ T26] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.969612][ T217] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.980218][ T26] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 08:23:40 executing program 3: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="ffffff7f", @ANYRES16, @ANYBLOB="00032cbd7080fbdbdf250900000004000f0004000b0010006e800400014b8082d100040001000400280087ab5b1175e06b6b49f981dbd294dce75baaae9121"], 0x30}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xca080300, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x3c}}, 0x0) [ 202.011106][ T217] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 202.026613][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 202.045767][ T7420] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:23:40 executing program 4: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0xfa0e2668f8d1446f, 0x0) 08:23:40 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) read$char_raw(r0, 0x0, 0x0) 08:23:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x8, 0x2, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8947, &(0x7f0000000040)={'batadv_slave_0\x00'}) 08:23:40 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000071c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) 08:23:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0x1, &(0x7f0000000100)=@raw=[@alu={0x4}], &(0x7f0000000140)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x541b, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @multicast1}, @qipcrtr, @nl=@unspec}) 08:23:40 executing program 1: bpf$PROG_LOAD(0x2, 0x0, 0x700) 08:23:40 executing program 2: bpf$PROG_LOAD(0x10, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:40 executing program 4: syz_io_uring_setup(0x637, &(0x7f0000000000)={0x0, 0x0, 0x6}, &(0x7f0000f87000/0x2000)=nil, &(0x7f00009ad000/0x4000)=nil, 0x0, 0x0) 08:23:40 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x101a03) 08:23:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x11, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="240000003200012300000000100201000c000000080002"], 0x24}}, 0x0) [ 202.654322][ T8387] [ 202.659458][ T8387] ============================= [ 202.679379][ T8387] WARNING: suspicious RCU usage 08:23:41 executing program 3: mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x5ca1352adb9e94b9, 0xffffffffffffffff, 0x0) [ 202.702916][ T8387] 5.9.0-next-20201016-syzkaller #0 Not tainted [ 202.735599][ T8387] ----------------------------- 08:23:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x0, 0x2, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6c000000}], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 202.757205][ T8387] include/linux/cgroup.h:494 suspicious rcu_dereference_check() usage! [ 202.794170][ T8387] [ 202.794170][ T8387] other info that might help us debug this: [ 202.794170][ T8387] 08:23:41 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x106842) write$cgroup_freezer_state(r0, &(0x7f0000000000)='FREEZING\x00', 0x9) [ 202.847195][ T8387] [ 202.847195][ T8387] rcu_scheduler_active = 2, debug_locks = 1 [ 202.892791][ T8387] no locks held by syz-executor.4/8387. [ 202.918288][ T8387] [ 202.918288][ T8387] stack backtrace: [ 202.941081][ T8387] CPU: 1 PID: 8387 Comm: syz-executor.4 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 202.950650][ T8387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.960701][ T8387] Call Trace: [ 202.964000][ T8387] dump_stack+0x198/0x1fb [ 202.968329][ T8387] io_init_identity+0x3a9/0x450 [ 202.973184][ T8387] io_uring_alloc_task_context+0x176/0x250 [ 202.979010][ T8387] io_uring_setup+0x264a/0x3660 [ 202.983882][ T8387] ? io_sq_thread+0x1400/0x1400 [ 202.988770][ T8387] ? put_timespec64+0xcb/0x120 [ 202.993539][ T8387] ? ns_to_timespec64+0xc0/0xc0 [ 202.998414][ T8387] ? check_preemption_disabled+0x50/0x130 [ 203.004147][ T8387] ? syscall_enter_from_user_mode+0x1d/0x60 [ 203.010139][ T8387] do_syscall_64+0x2d/0x70 [ 203.014564][ T8387] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 203.020459][ T8387] RIP: 0033:0x45de59 [ 203.024364][ T8387] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.043972][ T8387] RSP: 002b:00007fae6b5d0bf8 EFLAGS: 00000206 ORIG_RAX: 00000000000001a9 [ 203.052430][ T8387] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 000000000045de59 [ 203.060405][ T8387] RDX: 00000000209ad000 RSI: 0000000020000000 RDI: 0000000000000637 [ 203.068380][ T8387] RBP: 000000000118bf78 R08: 0000000000000000 R09: 0000000000000000 [ 203.076354][ T8387] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000209ad000 [ 203.084329][ T8387] R13: 0000000020f87000 R14: 0000000000000000 R15: 0000000000000000 08:23:41 executing program 5: pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}}, 0x0) 08:23:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0) 08:23:41 executing program 2: syz_mount_image$romfs(&(0x7f0000000380)='romfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000780)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) read$eventfd(r1, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) 08:23:41 executing program 1: bpf$MAP_CREATE(0xa, &(0x7f0000000000), 0x40) 08:23:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[], 0x13}, 0x300}, 0x0) [ 203.131251][ T8387] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/8387 [ 203.140593][ T8387] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 203.147112][ T8387] CPU: 1 PID: 8387 Comm: syz-executor.4 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 203.156681][ T8387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.166824][ T8387] Call Trace: [ 203.170142][ T8387] dump_stack+0x198/0x1fb [ 203.174497][ T8387] check_preemption_disabled+0x128/0x130 [ 203.180145][ T8387] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 203.185875][ T8387] trace_hardirqs_on+0x5b/0x1c0 [ 203.191267][ T8387] __bad_area_nosemaphore+0xc6/0x4f0 [ 203.196568][ T8387] do_user_addr_fault+0x852/0xbf0 [ 203.201613][ T8387] exc_page_fault+0xa8/0x190 [ 203.206213][ T8387] ? asm_exc_page_fault+0x8/0x30 [ 203.211166][ T8387] asm_exc_page_fault+0x1e/0x30 [ 203.216028][ T8387] RIP: 0033:0x4024cb [ 203.219934][ T8387] Code: 40 41 89 e8 4c 89 ef b9 11 80 00 00 c1 e6 04 03 73 64 8d 14 90 39 f2 48 0f 43 f2 45 31 c9 ba 03 00 00 00 e8 a7 b9 05 00 8b 33 <49> 89 07 41 89 e8 4c 89 e7 41 b9 00 00 00 10 b9 11 80 00 00 ba 03 [ 203.239552][ T8387] RSP: 002b:00007fae6b5d0c00 EFLAGS: 00010207 [ 203.245631][ T8387] RAX: 0000000020f87000 RBX: 0000000020000000 RCX: 000000000045deaa [ 203.253605][ T8387] RDX: 0000000000000003 RSI: 0000000000000800 RDI: 0000000020f87000 [ 203.261578][ T8387] RBP: 0000000000000003 R08: 0000000000000003 R09: 0000000000000000 [ 203.269553][ T8387] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000209ad000 [ 203.277538][ T8387] R13: 0000000020f87000 R14: 0000000000000000 R15: 0000000000000000 [ 203.287034][ T8387] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/8387 [ 203.297211][ T8387] caller is lockdep_hardirqs_on+0x34/0x110 [ 203.303068][ T8387] CPU: 1 PID: 8387 Comm: syz-executor.4 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 203.312525][ T8387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.322579][ T8387] Call Trace: [ 203.325898][ T8387] dump_stack+0x198/0x1fb [ 203.330243][ T8387] check_preemption_disabled+0x128/0x130 [ 203.336006][ T8387] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 203.341479][ T8387] lockdep_hardirqs_on+0x34/0x110 [ 203.346513][ T8387] __bad_area_nosemaphore+0xc6/0x4f0 [ 203.351815][ T8387] do_user_addr_fault+0x852/0xbf0 [ 203.356937][ T8387] exc_page_fault+0xa8/0x190 [ 203.361539][ T8387] ? asm_exc_page_fault+0x8/0x30 [ 203.366579][ T8387] asm_exc_page_fault+0x1e/0x30 [ 203.371430][ T8387] RIP: 0033:0x4024cb [ 203.375335][ T8387] Code: 40 41 89 e8 4c 89 ef b9 11 80 00 00 c1 e6 04 03 73 64 8d 14 90 39 f2 48 0f 43 f2 45 31 c9 ba 03 00 00 00 e8 a7 b9 05 00 8b 33 <49> 89 07 41 89 e8 4c 89 e7 41 b9 00 00 00 10 b9 11 80 00 00 ba 03 [ 203.394941][ T8387] RSP: 002b:00007fae6b5d0c00 EFLAGS: 00010207 [ 203.401032][ T8387] RAX: 0000000020f87000 RBX: 0000000020000000 RCX: 000000000045deaa [ 203.409050][ T8387] RDX: 0000000000000003 RSI: 0000000000000800 RDI: 0000000020f87000 [ 203.419335][ T8387] RBP: 0000000000000003 R08: 0000000000000003 R09: 0000000000000000 [ 203.427310][ T8387] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000209ad000 [ 203.435293][ T8387] R13: 0000000020f87000 R14: 0000000000000000 R15: 0000000000000000 [ 203.504134][ T8420] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 203.513497][ T8420] VFS: Can't find a romfs filesystem on dev loop2. [ 203.513497][ T8420] [ 203.577553][ T8420] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 203.590738][ T8420] VFS: Can't find a romfs filesystem on dev loop2. [ 203.590738][ T8420] 08:23:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000280)={'ip6gre0\x00', 0x0}) 08:23:42 executing program 4: timer_create(0x3, &(0x7f0000000180)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000001c0)) 08:23:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:23:42 executing program 0: keyctl$search(0xa, 0x0, &(0x7f00000000c0)='big_key\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @multicast1}, @qipcrtr, @nl}) 08:23:42 executing program 1: r0 = openat$vcsa(0xffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x82, 0x0) write$FUSE_LK(r0, &(0x7f0000000080)={0x28}, 0x28) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18}, 0x18) 08:23:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x12}, 0x40) 08:23:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000000c0)="c3", 0x1}], 0x501}, 0x0) 08:23:42 executing program 0: pselect6(0x40, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000240)={0x0, 0x3938700}, 0x0) 08:23:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000003200010000b6a26ed73fc214f7"], 0x20}}, 0x0) 08:23:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x819, 0x0, 0x0, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x1c}}, 0x0) 08:23:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000000)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, 0x0) 08:23:42 executing program 1: io_uring_setup(0x54a9, &(0x7f0000000000)={0x0, 0xb8c2, 0x3f, 0x0, 0xed030000}) 08:23:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x5411, &(0x7f00000003c0)={'sit0\x00', 0x0}) [ 204.484560][ T8459] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 08:23:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8912, &(0x7f00000003c0)={'sit0\x00', 0x0}) 08:23:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r1, 0x819, 0x0, 0x0, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}}, 0x0) 08:23:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x5452, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @multicast1}, @qipcrtr, @nl=@unspec}) 08:23:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @mcast2}}) 08:23:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="240000006c00f1"], 0x24}}, 0x0) 08:23:43 executing program 5: bpf$LINK_GET_NEXT_ID(0xe, 0x0, 0x0) 08:23:43 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x6c000000) 08:23:43 executing program 0: perf_event_open(&(0x7f00000014c0)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000040)={0x9, 0x20000000001, '\v'}, 0x0) 08:23:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891e, &(0x7f00000003c0)={'sit0\x00', 0x0}) 08:23:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x0, 0x2, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5000000}], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 204.837418][ T8481] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 08:23:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000640)=""/139, 0x2a, 0x8b, 0x1}, 0x20) 08:23:43 executing program 5: socket(0x2, 0x0, 0x8000) 08:23:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8912, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) 08:23:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x1e, 0x2, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:43 executing program 5: 08:23:43 executing program 1: 08:23:43 executing program 3: perf_event_open(&(0x7f00000014c0)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSSOFTCAR(r0, 0x541b, &(0x7f0000000180)) 08:23:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 08:23:43 executing program 0: bpf$PROG_LOAD(0x16, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:43 executing program 2: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x80) 08:23:43 executing program 5: bpf$PROG_LOAD(0xa, 0x0, 0x0) 08:23:43 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0xffffe000, 0x0, 0x10, r0, 0x10000000) 08:23:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @private1, @mcast2, 0x0, 0x0, 0x20}}) 08:23:43 executing program 2: syz_io_uring_setup(0x637, &(0x7f0000000000), &(0x7f0000f87000/0x2000)=nil, &(0x7f00009ad000/0x4000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x6421, &(0x7f0000000100), &(0x7f0000f87000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 08:23:43 executing program 1: bpf$PROG_LOAD(0x17, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:44 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setxattr$security_ima(&(0x7f00000001c0)='./bus/file0\x00', &(0x7f0000000280)='security.ima\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') [ 205.844496][ T8530] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8530 [ 205.853995][ T8530] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 205.860594][ T8530] CPU: 0 PID: 8530 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 205.870045][ T8530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.880194][ T8530] Call Trace: [ 205.883500][ T8530] dump_stack+0x198/0x1fb [ 205.887821][ T8530] check_preemption_disabled+0x128/0x130 [ 205.893706][ T8530] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 205.899417][ T8530] trace_hardirqs_on+0x5b/0x1c0 [ 205.904261][ T8530] __bad_area_nosemaphore+0xc6/0x4f0 [ 205.909541][ T8530] do_user_addr_fault+0x852/0xbf0 [ 205.914561][ T8530] exc_page_fault+0xa8/0x190 [ 205.919144][ T8530] ? asm_exc_page_fault+0x8/0x30 [ 205.924079][ T8530] asm_exc_page_fault+0x1e/0x30 [ 205.928916][ T8530] RIP: 0033:0x4024ec [ 205.932823][ T8530] Code: 00 00 e8 a7 b9 05 00 8b 33 49 89 07 41 89 e8 4c 89 e7 41 b9 00 00 00 10 b9 11 80 00 00 ba 03 00 00 00 c1 e6 06 e8 84 b9 05 00 <49> 89 06 48 83 c4 38 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 83 [ 205.952416][ T8530] RSP: 002b:00007fd2601b7c00 EFLAGS: 00010207 [ 205.958469][ T8530] RAX: 00000000209ad000 RBX: 0000000020000000 RCX: 000000000045deaa [ 205.966425][ T8530] RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00000000209ad000 [ 205.974382][ T8530] RBP: 0000000000000003 R08: 0000000000000003 R09: 0000000010000000 [ 205.982340][ T8530] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000209ad000 [ 205.990297][ T8530] R13: 0000000020f87000 R14: 0000000000000000 R15: 0000000020000080 [ 205.998370][ T8530] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8530 [ 206.007721][ T8530] caller is lockdep_hardirqs_on+0x34/0x110 [ 206.013613][ T8530] CPU: 0 PID: 8530 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 206.023070][ T8530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.033125][ T8530] Call Trace: [ 206.036429][ T8530] dump_stack+0x198/0x1fb [ 206.040775][ T8530] check_preemption_disabled+0x128/0x130 [ 206.046421][ T8530] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 206.051889][ T8530] lockdep_hardirqs_on+0x34/0x110 [ 206.056922][ T8530] __bad_area_nosemaphore+0xc6/0x4f0 [ 206.062222][ T8530] do_user_addr_fault+0x852/0xbf0 [ 206.067261][ T8530] exc_page_fault+0xa8/0x190 [ 206.071858][ T8530] ? asm_exc_page_fault+0x8/0x30 [ 206.075604][ T8529] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 206.076794][ T8530] asm_exc_page_fault+0x1e/0x30 [ 206.076808][ T8530] RIP: 0033:0x4024ec [ 206.076825][ T8530] Code: 00 00 e8 a7 b9 05 00 8b 33 49 89 07 41 89 e8 4c 89 e7 41 b9 00 00 00 10 b9 11 80 00 00 ba 03 00 00 00 c1 e6 06 e8 84 b9 05 00 <49> 89 06 48 83 c4 38 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 83 [ 206.076835][ T8530] RSP: 002b:00007fd2601b7c00 EFLAGS: 00010207 [ 206.076850][ T8530] RAX: 00000000209ad000 RBX: 0000000020000000 RCX: 000000000045deaa [ 206.076867][ T8530] RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00000000209ad000 08:23:44 executing program 4: 08:23:44 executing program 3: clock_gettime(0x2, &(0x7f0000000300)) 08:23:44 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) 08:23:44 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x3, &(0x7f0000000100), 0x4) 08:23:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002dbd7000fcdbdf2501"], 0x24}}, 0x0) [ 206.076877][ T8530] RBP: 0000000000000003 R08: 0000000000000003 R09: 0000000010000000 [ 206.076886][ T8530] R10: 0000000000008011 R11: 0000000000000206 R12: 00000000209ad000 [ 206.156159][ T8530] R13: 0000000020f87000 R14: 0000000000000000 R15: 0000000020000080 08:23:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8913, &(0x7f00000003c0)={'sit0\x00', 0x0}) [ 206.208432][ T8543] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 206.243782][ T8548] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 08:23:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000733380cd55d91a"], 0x28}}, 0x0) 08:23:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0x1, &(0x7f0000000100)=@raw=[@ldst], &(0x7f0000000140)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:44 executing program 1: syz_io_uring_setup(0x637, &(0x7f0000000000)={0x0, 0x0, 0x6}, &(0x7f0000f87000/0x2000)=nil, &(0x7f00009ad000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 206.507991][ T8554] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 206.558807][ T8558] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 08:23:44 executing program 5: bpf$PROG_LOAD(0x22, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000580)={&(0x7f0000000280)={0x65}, 0x14}}, 0x800) 08:23:45 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000180)={0x16, 0xfdfdffff, 0x0}) 08:23:45 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000007400)={0x0, 0x0, 0x8}, 0x10) 08:23:45 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}}, 0x0) 08:23:45 executing program 4: bpf$PROG_LOAD(0x13, 0x0, 0x0) 08:23:45 executing program 5: socketpair(0xa, 0x0, 0x1000, &(0x7f0000000040)) 08:23:45 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) 08:23:45 executing program 4: bpf$PROG_LOAD(0xf, 0x0, 0x0) 08:23:45 executing program 0: r0 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) close(r0) 08:23:45 executing program 1: socketpair(0x2, 0x2, 0x0, &(0x7f0000000040)) 08:23:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000100)=@framed={{}, [@jmp]}, &(0x7f0000000140)='GPL\x00', 0x5, 0xf3, &(0x7f0000000180)=""/243, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:45 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b80)='pagemap\x00') mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x40010, r0, 0x0) 08:23:45 executing program 3: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) pselect6(0x8b, &(0x7f0000000140), &(0x7f0000000180), 0x0, &(0x7f0000000200), 0x0) 08:23:45 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x101802) read$eventfd(r0, 0x0, 0x0) 08:23:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x0, 0xf4240, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000100873"], 0x24}}, 0x0) 08:23:45 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x100000d, 0x11, r0, 0x10000000) 08:23:45 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x100000d, 0x11, r0, 0x10000000) syz_io_uring_setup(0x10b0, &(0x7f0000000000), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 08:23:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80004507, 0x0) 08:23:45 executing program 5: bpf$PROG_LOAD(0x13, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:45 executing program 1: syz_mount_image$romfs(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:23:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x0, 0x0, 0x2}, 0x40) 08:23:46 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0xdf003000, 0x0, 0x11, r0, 0x10000000) 08:23:46 executing program 4: keyctl$search(0xa, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffa) 08:23:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x0, 0x0, 0x6}, 0x40) [ 207.729411][ T8630] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8630 [ 207.739826][ T8630] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 207.746613][ T8630] CPU: 1 PID: 8630 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 207.756858][ T8630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.766921][ T8630] Call Trace: [ 207.770226][ T8630] dump_stack+0x198/0x1fb 08:23:46 executing program 2: perf_event_open(&(0x7f00000014c0)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5453, 0x0) [ 207.774576][ T8630] check_preemption_disabled+0x128/0x130 [ 207.780230][ T8630] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 207.785962][ T8630] trace_hardirqs_on+0x5b/0x1c0 [ 207.790825][ T8630] __bad_area_nosemaphore+0xc6/0x4f0 [ 207.796135][ T8630] do_user_addr_fault+0x852/0xbf0 [ 207.801269][ T8630] exc_page_fault+0xa8/0x190 [ 207.805882][ T8630] ? asm_exc_page_fault+0x8/0x30 [ 207.810830][ T8630] asm_exc_page_fault+0x1e/0x30 [ 207.815688][ T8630] RIP: 0033:0x43c496 08:23:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000a40)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000025000f0005ffffffbd0301000000000095002000000000006916000000000000bf6700000000000017060000b964b0fd4506feff00200000540600000ee60000bf150000000000000f6500000000000065070000020000002c030000000000001f75000000000000bf540000000000000700000004000000ad430100000000007c000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c27dfef618ecf264e0f84f9f17d3c30e3c7bdd2d17f2f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703d6c4f633a9a4f16d0a3e127bee45a0100000fe9de56c9d8a814261bdb94a05000000c6c60bef0d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5af65727546e7c955ccefa1f6ab689fde4de4e63ede202fa4e0a2127b8b83c71a51445dc8da39e5b0ab7bcb8f512036a5ba6d04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb735fd552bdc268694aeb0743e326c819b6cf5c8ac86f8a297dff0445b13d0045fb3cda32a673a6bb55d8c85f21dce431e56723888fb126a163f16fb2ad9bc1172b84b3ebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb400001e3738270b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154bcb4000000000000000000000000000000bc3af2b170ad3e2b268f4ddc211bc3ebf0bd9d42ca019dd5d03fcf74686e9fbe2562979eaed840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7eab04871bc47287cd31cc43ea0ffb567b40407d000000000000000000000000005f37d83f84e98a523d80bd56a57fa82b82f639601ae899a53f6715a0a62a29ab028acfc1cb26a0f6a5480a55d638a0c544ba0dc828c22fe30000008000000000000000000000000000437d57fcf8295f63a70837f5cd4e5e77964522dc7ca3aa3476b7f2d851d27fd4de6eabb43e0799dc8d9fb7dc6c523ffbd74a6a40e4acb1ac693a27051f2ab759b8dbe8439db2a0426c7e7c0032028c95b29b6ddb551176693a921c76beceff7e4fbfea5011af0a99fa077ffe70cac8b9e44023a1749eb1d0d572b77d6e0d0fcd74035c7a1eb6eb4e1c8ef2629f5ecff4626746d6abe98a255e92c3c4f79bfcd0d9174138c820cfeb73dec68ed56b5d3dfdf0cb8b71ad79000000000000000000000000000000dd434a25e95d0ec29d3adaccf89d0888031ecdfdb4dfbe444673be099ece7e4009c76c716d906fbc3c9b412e0478cfee4485f423c63f49db43833c92eeeb647eebd4d7a93a17bcbb6bae5ff876375d4f18ca372104772a3a35ecedd97fc191d8f64d2b1d60c6d12911aada66c26aa4802c3514c3d92ec9f9f3262cb13f4a2575fbe943a6c400"/1107], &(0x7f0000000100)='GPL\x00'}, 0x48) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 207.819592][ T8630] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 207.839217][ T8630] RSP: 002b:00007f78e948da88 EFLAGS: 00010293 [ 207.845311][ T8630] RAX: 0000000000000000 RBX: 00007f78e948db20 RCX: 0000000000000000 [ 207.853290][ T8630] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 207.861268][ T8630] RBP: 00007f78e948dae0 R08: 0000000000000000 R09: 0000000000000000 [ 207.869240][ T8630] R10: 00007f78e948e9d0 R11: 0000000000000246 R12: 0000000000000000 [ 207.877215][ T8630] R13: 00000000200003c0 R14: 0000000000000000 R15: 0000000000000000 [ 207.885282][ T8630] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8630 [ 207.897138][ T8630] caller is lockdep_hardirqs_on+0x34/0x110 [ 207.903012][ T8630] CPU: 1 PID: 8630 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 207.912505][ T8630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.922558][ T8630] Call Trace: [ 207.925856][ T8630] dump_stack+0x198/0x1fb 08:23:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_SB_POOL_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="1fffffff0000000000000f"], 0x50}}, 0x0) [ 207.930201][ T8630] check_preemption_disabled+0x128/0x130 [ 207.935962][ T8630] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 207.941438][ T8630] lockdep_hardirqs_on+0x34/0x110 [ 207.946478][ T8630] __bad_area_nosemaphore+0xc6/0x4f0 [ 207.951901][ T8630] do_user_addr_fault+0x852/0xbf0 [ 207.956922][ T8630] exc_page_fault+0xa8/0x190 [ 207.961509][ T8630] ? asm_exc_page_fault+0x8/0x30 [ 207.966452][ T8630] asm_exc_page_fault+0x1e/0x30 [ 207.971290][ T8630] RIP: 0033:0x43c496 [ 207.975173][ T8630] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 207.994763][ T8630] RSP: 002b:00007f78e948da88 EFLAGS: 00010293 [ 208.000836][ T8630] RAX: 0000000000000000 RBX: 00007f78e948db20 RCX: 0000000000000000 [ 208.008791][ T8630] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 208.016749][ T8630] RBP: 00007f78e948dae0 R08: 0000000000000000 R09: 0000000000000000 [ 208.024701][ T8630] R10: 00007f78e948e9d0 R11: 0000000000000246 R12: 0000000000000000 [ 208.032656][ T8630] R13: 00000000200003c0 R14: 0000000000000000 R15: 0000000000000000 [ 208.051640][ C0] hrtimer: interrupt took 68656 ns 08:23:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000240)=""/235, 0x32, 0xeb, 0x1}, 0x20) 08:23:46 executing program 2: bpf$PROG_LOAD(0x1b, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 208.185210][ T8630] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8630 [ 208.195027][ T8630] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 208.201692][ T8630] CPU: 1 PID: 8630 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 208.211148][ T8630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.221289][ T8630] Call Trace: [ 208.224592][ T8630] dump_stack+0x198/0x1fb [ 208.228957][ T8630] check_preemption_disabled+0x128/0x130 [ 208.234607][ T8630] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 208.240342][ T8630] trace_hardirqs_on+0x5b/0x1c0 [ 208.245207][ T8630] __bad_area_nosemaphore+0xc6/0x4f0 [ 208.250511][ T8630] do_user_addr_fault+0x852/0xbf0 [ 208.255572][ T8630] exc_page_fault+0xa8/0x190 [ 208.260204][ T8630] ? asm_exc_page_fault+0x8/0x30 [ 208.265149][ T8630] asm_exc_page_fault+0x1e/0x30 [ 208.270004][ T8630] RIP: 0033:0x43c496 08:23:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000032c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 208.273908][ T8630] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 208.293517][ T8630] RSP: 002b:00007f78e948da88 EFLAGS: 00010293 [ 208.299596][ T8630] RAX: 0000000000000000 RBX: 00007f78e948db20 RCX: 0000000000000000 [ 208.307591][ T8630] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 208.315654][ T8630] RBP: 00007f78e948dae0 R08: 0000000000000000 R09: 0000000000000000 [ 208.323640][ T8630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 208.331712][ T8630] R13: 00000000200003c0 R14: 0000000000000000 R15: 0000000000000000 [ 208.340432][ T8630] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/8630 [ 208.349897][ T8630] caller is lockdep_hardirqs_on+0x34/0x110 [ 208.355833][ T8630] CPU: 1 PID: 8630 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 208.365309][ T8630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.375462][ T8630] Call Trace: [ 208.378769][ T8630] dump_stack+0x198/0x1fb 08:23:46 executing program 2: perf_event_open(&(0x7f00000014c0)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getdents(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) fstat(r1, &(0x7f0000000180)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSSOFTCAR(r2, 0x5414, &(0x7f0000000180)) [ 208.383111][ T8630] check_preemption_disabled+0x128/0x130 [ 208.389103][ T8630] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 208.394575][ T8630] lockdep_hardirqs_on+0x34/0x110 [ 208.399611][ T8630] __bad_area_nosemaphore+0xc6/0x4f0 [ 208.404914][ T8630] do_user_addr_fault+0x852/0xbf0 [ 208.409958][ T8630] exc_page_fault+0xa8/0x190 [ 208.414554][ T8630] ? asm_exc_page_fault+0x8/0x30 [ 208.419585][ T8630] asm_exc_page_fault+0x1e/0x30 [ 208.424440][ T8630] RIP: 0033:0x43c496 [ 208.428359][ T8630] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 208.447979][ T8630] RSP: 002b:00007f78e948da88 EFLAGS: 00010293 [ 208.454057][ T8630] RAX: 0000000000000000 RBX: 00007f78e948db20 RCX: 0000000000000000 [ 208.462032][ T8630] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 208.470018][ T8630] RBP: 00007f78e948dae0 R08: 0000000000000000 R09: 0000000000000000 [ 208.477996][ T8630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 208.485971][ T8630] R13: 00000000200003c0 R14: 0000000000000000 R15: 0000000000000000 08:23:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x2, 0x4) 08:23:46 executing program 0: bpf$PROG_LOAD(0x19, 0x0, 0x0) 08:23:46 executing program 3: bpf$PROG_LOAD(0xc, 0x0, 0x0) 08:23:46 executing program 5: keyctl$search(0x14, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x2}, 0xfffffffffffffffa) 08:23:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12}, 0x40) 08:23:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8971, 0x0) 08:23:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 08:23:47 executing program 0: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 08:23:47 executing program 1: socket$packet(0x11, 0x45a7944ebcf01ec2, 0x300) 08:23:47 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000001240)='children\x00') 08:23:47 executing program 5: perf_event_open(&(0x7f00000014c0)={0x2, 0x70, 0xb1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSSOFTCAR(r0, 0x5412, &(0x7f0000000180)) 08:23:47 executing program 2: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x6, 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) setsockopt(r0, 0x8000000, 0x3ff, &(0x7f0000000240)="f1fd362f3b46e134d963d92703c1604b51dbb065ae3c56a5fd6a9390e297cc70b1df686a07eaedcebee07247f410df0f2f14f4ee76f8114dee7d71cb4708c54cd4d702b4168b402927a81c038b43c65693844abe9a60c458b58f3fa1ab86586efcc106b77f4a", 0x66) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x218}, 0x1c) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') r3 = openat$thread_pidfd(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self\x00', 0x0, 0x0) copy_file_range(r0, 0x0, r3, &(0x7f0000000200)=0x1, 0xc611, 0x0) sendfile(r1, r2, 0x0, 0x0) dup(r0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) 08:23:47 executing program 3: request_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000280)='/!@\x00', 0x0) 08:23:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 08:23:47 executing program 1: socketpair(0x2, 0xb, 0x0, &(0x7f0000000040)) 08:23:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x4}, 0x40) 08:23:47 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000002f40)='fdinfo/3\x00') 08:23:47 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8940, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0xa3, 0x4, 0x1, @ipv4={[], [], @rand_addr=0x64010101}, @private2={0xfc, 0x2, [], 0x1}, 0x20, 0x40, 0x2, 0x9}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="fc010000250000022abd7000fddbdf2500000000", @ANYRES32=r1, @ANYBLOB="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"], 0x1fc}, 0x1, 0x0, 0x0, 0x4080}, 0x20040000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f00000003c0)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB='/\b\x00\x00', @ANYRES16=r3, @ANYBLOB="100025bd7000fcdbdf250100000008000200080000000800020002000000"], 0x24}}, 0x4008040) read$char_usb(0xffffffffffffffff, &(0x7f00000004c0)=""/4096, 0x1000) 08:23:47 executing program 1: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 08:23:47 executing program 4: request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 08:23:47 executing program 0: bpf$PROG_LOAD(0xd, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:47 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x101802) write$cgroup_freezer_state(r0, &(0x7f0000000040)='FREEZING\x00', 0xffffffffffffff06) 08:23:47 executing program 1: syz_io_uring_setup(0x73c, &(0x7f0000000100)={0x0, 0x5882, 0x8}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 08:23:48 executing program 2: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x6, 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) setsockopt(r0, 0x8000000, 0x3ff, &(0x7f0000000240)="f1fd362f3b46e134d963d92703c1604b51dbb065ae3c56a5fd6a9390e297cc70b1df686a07eaedcebee07247f410df0f2f14f4ee76f8114dee7d71cb4708c54cd4d702b4168b402927a81c038b43c65693844abe9a60c458b58f3fa1ab86586efcc106b77f4a", 0x66) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x218}, 0x1c) r1 = socket$unix(0x1, 0x1, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') r3 = openat$thread_pidfd(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self\x00', 0x0, 0x0) copy_file_range(r0, 0x0, r3, &(0x7f0000000200)=0x1, 0xc611, 0x0) sendfile(r1, r2, 0x0, 0x0) dup(r0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) 08:23:48 executing program 1: io_uring_setup(0x7db3, &(0x7f00000066c0)={0x0, 0x0, 0x2, 0x0, 0x3e8}) syz_open_procfs(0xffffffffffffffff, 0x0) 08:23:48 executing program 5: bpf$PROG_LOAD(0x1a, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:48 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 08:23:48 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0xef713dc438107b6b) 08:23:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0x2, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1, 0x4}], &(0x7f0000000140)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x2}, 0x40) 08:23:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x2}, 0x40) 08:23:48 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, r0+60000000}}, 0x0) 08:23:48 executing program 1: syz_io_uring_setup(0x787, &(0x7f0000000100), &(0x7f00009ad000/0x4000)=nil, &(0x7f00009ad000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 08:23:48 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x402c4580, &(0x7f0000000000)={0x0, 0x0, 0x0, {}, {}, @rumble}) 08:23:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0x2, &(0x7f0000000040)=@raw=[@map={0x19, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000140)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x8a4, 0x1, 0x1, 0x1}, 0x40) 08:23:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) read$eventfd(r1, &(0x7f0000000480), 0x8) 08:23:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x0, 0x0, 0x0, 0x487}, 0x40) 08:23:49 executing program 0: bpf$PROG_LOAD(0x3, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:49 executing program 5: r0 = openat$vcsa(0xffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x82, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18}, 0x18) 08:23:49 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/llc/core\x00') 08:23:49 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000340)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) 08:23:49 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x80041270) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x11, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xb01001f1}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYRES64, @ANYRESHEX=r3, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES32=r3], 0xc63b9e72) 08:23:49 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x26080, 0x0) 08:23:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@cred={{0x18, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}], 0x18}, 0x0) 08:23:49 executing program 5: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:23:49 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}}, 0x0) 08:23:50 executing program 4: syz_io_uring_setup(0x71f6, &(0x7f0000000000), &(0x7f00009af000/0x3000)=nil, &(0x7f00009ad000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 08:23:50 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x101802) write$cgroup_freezer_state(r0, &(0x7f0000000000)='FREEZING\x00', 0x9) write$cgroup_freezer_state(r0, &(0x7f0000000040)='FREEZING\x00', 0x9) 08:23:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000000c0)="c3", 0x200000c1}], 0x1}, 0x0) 08:23:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000640)) 08:23:50 executing program 0: socket(0x2c, 0x3, 0x5) 08:23:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @multicast1}, @qipcrtr, @nl=@unspec, 0x60}) 08:23:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:23:50 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x80041270) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x11, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xb01001f1}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYRES64, @ANYRESHEX=r3, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES32=r3], 0xc63b9e72) 08:23:50 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x80041270) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x11, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xb01001f1}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYRES64, @ANYRESHEX=r3, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES32=r3], 0xc63b9e72) 08:23:50 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x80041270) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x11, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xb01001f1}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYRES64, @ANYRESHEX=r3, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES32=r3], 0xc63b9e72) 08:23:50 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, r0+60000000}}, 0x0) 08:23:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000140)='user\x00', &(0x7f0000000000)={'syz', 0x2}, r3) 08:23:50 executing program 1: r0 = openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x81, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0)