[ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.28' (ECDSA) to the list of known hosts. 2020/10/20 09:29:19 fuzzer started 2020/10/20 09:29:20 dialing manager at 10.128.0.26:38919 2020/10/20 09:29:20 syscalls: 3450 2020/10/20 09:29:20 code coverage: enabled 2020/10/20 09:29:20 comparison tracing: enabled 2020/10/20 09:29:20 extra coverage: enabled 2020/10/20 09:29:20 setuid sandbox: enabled 2020/10/20 09:29:20 namespace sandbox: enabled 2020/10/20 09:29:20 Android sandbox: /sys/fs/selinux/policy does not exist 2020/10/20 09:29:20 fault injection: enabled 2020/10/20 09:29:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/10/20 09:29:20 net packet injection: enabled 2020/10/20 09:29:20 net device setup: enabled 2020/10/20 09:29:20 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/10/20 09:29:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/10/20 09:29:20 USB emulation: enabled 2020/10/20 09:29:20 hci packet injection: enabled 2020/10/20 09:29:20 wifi device emulation: enabled 09:31:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x100007, 0x4) 09:31:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000640)=0x1, 0x4) 09:31:14 executing program 2: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 09:31:15 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xf, 0x0, 0x12}, 0x10}, 0x78) 09:31:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x138c1865c1f99bdb}, 0xc, &(0x7f0000000280)={0x0}}, 0x0) syzkaller login: [ 182.937061][ T6874] IPVS: ftp: loaded support on port[0] = 21 09:31:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000440)) pipe(&(0x7f0000000000)) [ 183.150970][ T6876] IPVS: ftp: loaded support on port[0] = 21 [ 183.355183][ T6874] chnl_net:caif_netlink_parms(): no params data found [ 183.502597][ T6878] IPVS: ftp: loaded support on port[0] = 21 [ 183.743549][ T6880] IPVS: ftp: loaded support on port[0] = 21 [ 183.783681][ T6876] chnl_net:caif_netlink_parms(): no params data found [ 183.817551][ T6874] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.825231][ T6874] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.835067][ T6874] device bridge_slave_0 entered promiscuous mode [ 183.848006][ T6874] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.855139][ T6874] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.871787][ T6874] device bridge_slave_1 entered promiscuous mode [ 184.041829][ T6882] IPVS: ftp: loaded support on port[0] = 21 [ 184.064086][ T6874] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.115330][ T6874] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.197429][ T6874] team0: Port device team_slave_0 added [ 184.258596][ T6874] team0: Port device team_slave_1 added [ 184.267865][ T6876] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.274981][ T6876] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.285015][ T6876] device bridge_slave_0 entered promiscuous mode [ 184.298445][ T6876] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.305738][ T6876] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.314527][ T6876] device bridge_slave_1 entered promiscuous mode [ 184.382343][ T6878] chnl_net:caif_netlink_parms(): no params data found [ 184.394753][ T6874] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 184.402248][ T6874] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.430356][ T6874] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 184.457671][ T6876] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.472902][ T6874] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 184.481387][ T6874] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.533587][ T6874] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 184.623462][ T6876] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.714714][ T6874] device hsr_slave_0 entered promiscuous mode [ 184.728211][ T6874] device hsr_slave_1 entered promiscuous mode [ 184.762768][ T6876] team0: Port device team_slave_0 added [ 184.812995][ T6876] team0: Port device team_slave_1 added [ 184.861466][ T6880] chnl_net:caif_netlink_parms(): no params data found [ 184.867986][ T7026] IPVS: ftp: loaded support on port[0] = 21 [ 184.896317][ T23] Bluetooth: hci0: command 0x0409 tx timeout [ 184.994166][ T6876] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 185.019569][ T6876] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.045950][ T6876] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 185.107284][ T6876] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 185.114283][ T6876] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.140833][ T2705] Bluetooth: hci1: command 0x0409 tx timeout [ 185.143906][ T6876] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 185.215556][ T6878] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.223103][ T6878] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.232054][ T6878] device bridge_slave_0 entered promiscuous mode [ 185.251989][ T6882] chnl_net:caif_netlink_parms(): no params data found [ 185.273074][ T6878] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.282256][ T6878] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.293167][ T6878] device bridge_slave_1 entered promiscuous mode [ 185.381495][ T6878] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.446324][ T2705] Bluetooth: hci2: command 0x0409 tx timeout [ 185.451159][ T6878] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.467444][ T6876] device hsr_slave_0 entered promiscuous mode [ 185.475132][ T6876] device hsr_slave_1 entered promiscuous mode [ 185.482314][ T6876] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 185.490867][ T6876] Cannot create hsr debugfs directory [ 185.566418][ T6880] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.573508][ T6880] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.582811][ T6880] device bridge_slave_0 entered promiscuous mode [ 185.621439][ T6878] team0: Port device team_slave_0 added [ 185.632783][ T6880] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.640547][ T6880] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.649707][ T6880] device bridge_slave_1 entered promiscuous mode [ 185.686090][ T2705] Bluetooth: hci3: command 0x0409 tx timeout [ 185.724339][ T6878] team0: Port device team_slave_1 added [ 185.742079][ T6880] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.754594][ T6880] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.833230][ T6874] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 185.879065][ T6878] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 185.886139][ T6878] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.913968][ T6878] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 185.933747][ T6878] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 185.941021][ T12] Bluetooth: hci4: command 0x0409 tx timeout [ 185.947193][ T6878] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.973412][ T6878] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 186.000310][ T6882] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.007646][ T6882] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.015491][ T6882] device bridge_slave_0 entered promiscuous mode [ 186.026633][ T6874] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 186.080646][ T6880] team0: Port device team_slave_0 added [ 186.090637][ T6880] team0: Port device team_slave_1 added [ 186.104910][ T6882] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.113641][ T6882] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.122543][ T6882] device bridge_slave_1 entered promiscuous mode [ 186.130332][ T6874] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 186.197457][ T6874] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 186.243120][ T6880] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 186.256065][ T6880] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.282723][ T6880] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 186.296406][ T6882] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.309032][ T7026] chnl_net:caif_netlink_parms(): no params data found [ 186.332881][ T6878] device hsr_slave_0 entered promiscuous mode [ 186.339854][ T6878] device hsr_slave_1 entered promiscuous mode [ 186.347124][ T6878] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 186.354699][ T6878] Cannot create hsr debugfs directory [ 186.361155][ T6880] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 186.369131][ T6880] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.396561][ T6880] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 186.413130][ T6882] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.577074][ T6880] device hsr_slave_0 entered promiscuous mode [ 186.584233][ T6880] device hsr_slave_1 entered promiscuous mode [ 186.584832][ T2705] Bluetooth: hci5: command 0x0409 tx timeout [ 186.597081][ T6880] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 186.604666][ T6880] Cannot create hsr debugfs directory [ 186.642293][ T6882] team0: Port device team_slave_0 added [ 186.665505][ T6882] team0: Port device team_slave_1 added [ 186.763917][ T6876] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 186.808710][ T6876] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 186.818945][ T6882] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 186.828581][ T6882] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.857252][ T6882] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 186.874494][ T6882] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 186.881653][ T6882] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.909745][ T6882] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 186.922071][ T7026] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.930409][ T7026] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.939250][ T7026] device bridge_slave_0 entered promiscuous mode [ 186.957964][ T6876] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 186.974279][ T12] Bluetooth: hci0: command 0x041b tx timeout [ 187.007550][ T7026] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.014684][ T7026] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.025071][ T7026] device bridge_slave_1 entered promiscuous mode [ 187.041640][ T6876] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 187.108493][ T6882] device hsr_slave_0 entered promiscuous mode [ 187.115307][ T6882] device hsr_slave_1 entered promiscuous mode [ 187.122928][ T6882] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 187.132616][ T6882] Cannot create hsr debugfs directory [ 187.165048][ T7026] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.209011][ T7026] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.216084][ T2705] Bluetooth: hci1: command 0x041b tx timeout [ 187.373732][ T7026] team0: Port device team_slave_0 added [ 187.409193][ T7026] team0: Port device team_slave_1 added [ 187.510058][ T7026] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 187.526193][ T12] Bluetooth: hci2: command 0x041b tx timeout [ 187.532701][ T7026] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.559452][ T7026] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 187.577167][ T6878] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 187.588196][ T6878] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 187.603284][ T6878] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 187.614694][ T7026] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 187.630841][ T7026] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.657925][ T7026] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 187.680384][ T6878] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 187.740615][ T7026] device hsr_slave_0 entered promiscuous mode [ 187.748046][ T7026] device hsr_slave_1 entered promiscuous mode [ 187.755728][ T7026] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 187.764772][ T7026] Cannot create hsr debugfs directory [ 187.771714][ T12] Bluetooth: hci3: command 0x041b tx timeout [ 187.792039][ T6874] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.857586][ T6880] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 187.880476][ T6880] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 187.892460][ T6880] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 187.952781][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.963000][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.974053][ T6880] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 187.995598][ T6874] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.016903][ T12] Bluetooth: hci4: command 0x041b tx timeout [ 188.028551][ T6882] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 188.101526][ T6882] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 188.112032][ T6882] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 188.122929][ T6882] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 188.174991][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.184708][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.194473][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.201988][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.211542][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.220825][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.229514][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.236701][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.275246][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.342959][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.361782][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.392161][ T6876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.429205][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.440282][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.450837][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.460974][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.470756][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.524316][ T6874] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 188.536651][ T6874] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.551958][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.563134][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.572638][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.581963][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.592687][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.656243][ T2705] Bluetooth: hci5: command 0x041b tx timeout [ 188.683349][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.692181][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.709624][ T6876] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.746346][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 188.762562][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.770810][ T7026] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 188.789283][ T7026] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 188.803197][ T6880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.819030][ T6874] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.839167][ T7026] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 188.893245][ T7026] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 188.903952][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.913893][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.923586][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.933058][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.942405][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.949578][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.962923][ T6880] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.990293][ T6878] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.997983][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.010704][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.021377][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.031602][ T3975] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.038777][ T3975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.052681][ T6882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.060054][ T12] Bluetooth: hci0: command 0x040f tx timeout [ 189.093177][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.102684][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.112610][ T2647] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.119801][ T2647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.128963][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 189.138295][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 189.147606][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.156910][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.198375][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.210849][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.219239][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.228754][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.237693][ T2647] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.244753][ T2647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.276197][ T6878] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.307070][ T8178] Bluetooth: hci1: command 0x040f tx timeout [ 189.320355][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.331695][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 189.342303][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.352189][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.361668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.370173][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.380056][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.389506][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.430699][ T6874] device veth0_vlan entered promiscuous mode [ 189.438470][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.449624][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.459254][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.466701][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.474606][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.485424][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.494960][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.505300][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.514411][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.521803][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.529947][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.539081][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.548825][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.557726][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.566381][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.574864][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.584314][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.592582][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.624067][ T8179] Bluetooth: hci2: command 0x040f tx timeout [ 189.629447][ T6882] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.696516][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.705669][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.736704][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.745328][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.757028][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.767859][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.776888][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.785426][ T2647] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.792617][ T2647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.803937][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.813665][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.822795][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.832552][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.847072][ T3975] Bluetooth: hci3: command 0x040f tx timeout [ 189.861463][ T6876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.889403][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.898450][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.907287][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.915211][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.930891][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.940024][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.949899][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.968552][ T6874] device veth1_vlan entered promiscuous mode [ 189.993959][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.004058][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.014307][ T8179] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.021705][ T8179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.036472][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.051174][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.084994][ T6880] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.096954][ T3975] Bluetooth: hci4: command 0x040f tx timeout [ 190.113977][ T6880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.137185][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.147190][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.155612][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.171408][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.181308][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.197819][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.205434][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.214874][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.259148][ T6876] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.271836][ T6878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.290164][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.302011][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.312173][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.322748][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.389409][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.398583][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 190.413179][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 190.422702][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.432974][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.442139][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.451525][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.482686][ T7026] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.522746][ T6874] device veth0_macvtap entered promiscuous mode [ 190.544027][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 190.553449][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.562330][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.570813][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.583239][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.592986][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.602424][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.611440][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.620258][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.634419][ T6880] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.654444][ T6878] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.670197][ T6882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.709381][ T7026] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.722171][ T6874] device veth1_macvtap entered promiscuous mode [ 190.729358][ T8178] Bluetooth: hci5: command 0x040f tx timeout [ 190.772597][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 190.781497][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 190.795699][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.808494][ T6876] device veth0_vlan entered promiscuous mode [ 190.818209][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.828667][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.847818][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.858227][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.902579][ T6876] device veth1_vlan entered promiscuous mode [ 190.913725][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.923581][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.933358][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.941550][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.950573][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.960385][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.969537][ T8179] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.976710][ T8179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.989262][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.005283][ T6882] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.034308][ T6874] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 191.045306][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.056807][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.065284][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.077324][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.088559][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.097702][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.124559][ T6880] device veth0_vlan entered promiscuous mode [ 191.132404][ T12] Bluetooth: hci0: command 0x0419 tx timeout [ 191.164936][ T6874] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 191.178676][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.189148][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.198826][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.209724][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.219559][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.229114][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.237793][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.246831][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 191.278940][ T6878] device veth0_vlan entered promiscuous mode [ 191.298765][ T6874] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.309400][ T6874] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.326314][ T6874] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.335038][ T6874] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.357172][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.365024][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.375201][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.384159][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.392290][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.401196][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.410396][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.419481][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.437249][ T23] Bluetooth: hci1: command 0x0419 tx timeout [ 191.447388][ T6880] device veth1_vlan entered promiscuous mode [ 191.462914][ T6878] device veth1_vlan entered promiscuous mode [ 191.500172][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 191.509551][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 191.522114][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.531545][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.542266][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.551230][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.560595][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.569637][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.578537][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.622078][ T6876] device veth0_macvtap entered promiscuous mode [ 191.662184][ T7026] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.686349][ T8179] Bluetooth: hci2: command 0x0419 tx timeout [ 191.689983][ T6876] device veth1_macvtap entered promiscuous mode [ 191.719085][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 191.728723][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 191.738792][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 191.748819][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 191.758119][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.768499][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.784641][ T6880] device veth0_macvtap entered promiscuous mode [ 191.848874][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.865418][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.900084][ T6878] device veth0_macvtap entered promiscuous mode [ 191.925104][ T6878] device veth1_macvtap entered promiscuous mode [ 191.932598][ T2647] Bluetooth: hci3: command 0x0419 tx timeout [ 191.959574][ T6880] device veth1_macvtap entered promiscuous mode [ 191.974506][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 191.986725][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 192.005593][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.019584][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.029405][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 192.039971][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 192.058770][ T6876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 192.074508][ T6876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.091245][ T6876] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 192.147591][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 192.156827][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.178993][ T23] Bluetooth: hci4: command 0x0419 tx timeout [ 192.196595][ T7026] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.206573][ T6876] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 192.232806][ T6876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.258587][ T6876] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 192.281727][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.302053][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.312130][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 192.321909][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.332702][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.341284][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.354254][ T6878] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 192.366873][ T460] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 192.375554][ T460] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 192.378421][ T6878] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.394845][ T6878] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 192.407135][ T6878] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.423405][ T6878] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 192.433679][ T6882] device veth0_vlan entered promiscuous mode [ 192.447034][ T6876] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.456821][ T6876] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.465547][ T6876] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.474436][ T6876] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.504204][ T6880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 192.514954][ T6880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.528718][ T6880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 192.539593][ T6880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.549661][ T6880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 192.560215][ T6880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.572574][ T6880] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 192.582426][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 192.590976][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 192.600103][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.609447][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 192.618578][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.633670][ T6878] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 192.651728][ T6878] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.663042][ T6878] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 192.673951][ T6878] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.685574][ T6878] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 192.701411][ T6882] device veth1_vlan entered promiscuous mode [ 192.724912][ T6880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 192.738216][ T6880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.748976][ T6880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 192.764156][ T6880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.774966][ T6880] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 192.787508][ T6880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.800145][ T6880] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 192.808299][ T8179] Bluetooth: hci5: command 0x0419 tx timeout [ 192.814941][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 192.824645][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.835441][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.845190][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.854431][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.868791][ T6878] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.882807][ T6878] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.892468][ T6878] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.901661][ T6878] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.940993][ T6880] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.953634][ T6880] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.963731][ T6880] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.973196][ T6880] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.039734][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.054151][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.089576][ T460] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 193.110019][ T460] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 193.196110][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 193.204254][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 193.208619][ T68] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 193.234533][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.254386][ T68] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 193.263884][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 193.273383][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.282471][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 193.302362][ T6882] device veth0_macvtap entered promiscuous mode [ 193.356316][ T6882] device veth1_macvtap entered promiscuous mode [ 193.379780][ T7026] device veth0_vlan entered promiscuous mode [ 193.387840][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.405449][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.419160][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 09:31:26 executing program 0: syz_io_uring_setup(0x4be2, &(0x7f0000000140)={0x0, 0x8d7b}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff8000/0x8000)=nil, 0x0, 0x0) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xb) [ 193.447489][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 193.514592][ T7026] device veth1_vlan entered promiscuous mode [ 193.547800][ T8237] [ 193.550271][ T8237] ============================= [ 193.559995][ T8237] WARNING: suspicious RCU usage [ 193.572985][ T8237] 5.9.0-next-20201016-syzkaller #0 Not tainted [ 193.583089][ T6882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.590240][ T8237] ----------------------------- [ 193.599555][ T8237] include/linux/cgroup.h:494 suspicious rcu_dereference_check() usage! [ 193.608750][ T8237] [ 193.608750][ T8237] other info that might help us debug this: [ 193.608750][ T8237] [ 193.620748][ T8237] [ 193.620748][ T8237] rcu_scheduler_active = 2, debug_locks = 1 [ 193.630672][ T8237] no locks held by syz-executor.0/8237. [ 193.638548][ T6882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.650566][ T8237] [ 193.650566][ T8237] stack backtrace: [ 193.657553][ T8237] CPU: 0 PID: 8237 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 193.667025][ T8237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.677086][ T8237] Call Trace: [ 193.680391][ T8237] dump_stack+0x198/0x1fb [ 193.684739][ T8237] io_init_identity+0x3a9/0x450 [ 193.689603][ T8237] io_uring_alloc_task_context+0x176/0x250 [ 193.695419][ T8237] io_uring_add_task_file+0x10d/0x180 [ 193.700804][ T8237] io_uring_setup+0x2727/0x3660 [ 193.705702][ T8237] ? io_sq_thread+0x1400/0x1400 [ 193.710565][ T8237] ? io_issue_sqe+0x3d80/0x3d80 [ 193.715453][ T8237] ? io_uring_poll+0x2a0/0x2a0 [ 193.720236][ T8237] ? put_timespec64+0xcb/0x120 [ 193.725011][ T8237] ? ns_to_timespec64+0xc0/0xc0 [ 193.729887][ T8237] ? check_preemption_disabled+0x50/0x130 [ 193.731285][ T6882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.735620][ T8237] ? syscall_enter_from_user_mode+0x1d/0x60 [ 193.751926][ T8237] do_syscall_64+0x2d/0x70 [ 193.756358][ T8237] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 193.762266][ T8237] RIP: 0033:0x45de59 [ 193.766172][ T8237] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.774902][ T6882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.785783][ T8237] RSP: 002b:00007f472dfa4bf8 EFLAGS: 00000206 ORIG_RAX: 00000000000001a9 [ 193.785804][ T8237] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 000000000045de59 [ 193.785813][ T8237] RDX: 0000000020ff8000 RSI: 0000000020000140 RDI: 0000000000004be2 [ 193.785822][ T8237] RBP: 000000000118bf78 R08: 0000000000000000 R09: 0000000000000000 [ 193.785832][ T8237] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020ff8000 [ 193.785841][ T8237] R13: 0000000020ffa000 R14: 0000000000000000 R15: 0000000000000000 [ 193.832772][ T8237] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8237 [ 193.854702][ T8237] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 193.861325][ T8237] CPU: 0 PID: 8237 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 193.870792][ T8237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.880855][ T8237] Call Trace: [ 193.884176][ T8237] dump_stack+0x198/0x1fb [ 193.888529][ T8237] check_preemption_disabled+0x128/0x130 [ 193.894211][ T8237] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 193.899945][ T8237] trace_hardirqs_on+0x5b/0x1c0 [ 193.904806][ T8237] __bad_area_nosemaphore+0xc6/0x4f0 [ 193.910142][ T8237] do_user_addr_fault+0x852/0xbf0 [ 193.915131][ T6882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.915270][ T8237] exc_page_fault+0xa8/0x190 [ 193.930285][ T8237] ? asm_exc_page_fault+0x8/0x30 [ 193.935240][ T8237] asm_exc_page_fault+0x1e/0x30 [ 193.940104][ T8237] RIP: 0033:0x4024cb [ 193.944011][ T8237] Code: 40 41 89 e8 4c 89 ef b9 11 80 00 00 c1 e6 04 03 73 64 8d 14 90 39 f2 48 0f 43 f2 45 31 c9 ba 03 00 00 00 e8 a7 b9 05 00 8b 33 <49> 89 07 41 89 e8 4c 89 e7 41 b9 00 00 00 10 b9 11 80 00 00 ba 03 [ 193.960903][ T6882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.963640][ T8237] RSP: 002b:00007f472dfa4c00 EFLAGS: 00010207 [ 193.963660][ T8237] RAX: 0000000020ffa000 RBX: 0000000020000140 RCX: 000000000045deaa [ 193.963671][ T8237] RDX: 0000000000000003 RSI: 0000000000008000 RDI: 0000000020ffa000 [ 193.963680][ T8237] RBP: 0000000000000003 R08: 0000000000000003 R09: 0000000000000000 [ 193.963701][ T8237] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020ff8000 [ 193.988975][ T6882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.996182][ T8237] R13: 0000000020ffa000 R14: 0000000000000000 R15: 0000000000000000 [ 193.996306][ T8237] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8237 [ 193.996329][ T8237] caller is lockdep_hardirqs_on+0x34/0x110 [ 193.996347][ T8237] CPU: 0 PID: 8237 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 193.996357][ T8237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.996363][ T8237] Call Trace: [ 193.996384][ T8237] dump_stack+0x198/0x1fb [ 193.996411][ T8237] check_preemption_disabled+0x128/0x130 [ 194.019486][ T6882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.022789][ T8237] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 194.022810][ T8237] lockdep_hardirqs_on+0x34/0x110 [ 194.022835][ T8237] __bad_area_nosemaphore+0xc6/0x4f0 [ 194.045131][ T6882] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 194.045903][ T8237] do_user_addr_fault+0x852/0xbf0 [ 194.045932][ T8237] exc_page_fault+0xa8/0x190 [ 194.045950][ T8237] ? asm_exc_page_fault+0x8/0x30 [ 194.045964][ T8237] asm_exc_page_fault+0x1e/0x30 [ 194.045979][ T8237] RIP: 0033:0x4024cb [ 194.045996][ T8237] Code: 40 41 89 e8 4c 89 ef b9 11 80 00 00 c1 e6 04 03 73 64 8d 14 90 39 f2 48 0f 43 f2 45 31 c9 ba 03 00 00 00 e8 a7 b9 05 00 8b 33 <49> 89 07 41 89 e8 4c 89 e7 41 b9 00 00 00 10 b9 11 80 00 00 ba 03 [ 194.046006][ T8237] RSP: 002b:00007f472dfa4c00 EFLAGS: 00010207 [ 194.046024][ T8237] RAX: 0000000020ffa000 RBX: 0000000020000140 RCX: 000000000045deaa [ 194.046043][ T8237] RDX: 0000000000000003 RSI: 0000000000008000 RDI: 0000000020ffa000 [ 194.046053][ T8237] RBP: 0000000000000003 R08: 0000000000000003 R09: 0000000000000000 [ 194.046064][ T8237] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020ff8000 [ 194.046074][ T8237] R13: 0000000020ffa000 R14: 0000000000000000 R15: 0000000000000000 [ 194.069495][ T8237] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8237 [ 194.119040][ T6882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.123224][ T8237] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 194.135933][ T6882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.136971][ T8237] CPU: 0 PID: 8237 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 194.169357][ T6882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.170809][ T8237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.170816][ T8237] Call Trace: [ 194.170839][ T8237] dump_stack+0x198/0x1fb [ 194.170867][ T8237] check_preemption_disabled+0x128/0x130 [ 194.200018][ T6882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.202749][ T8237] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 194.202776][ T8237] trace_hardirqs_on+0x5b/0x1c0 [ 194.224854][ T6882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.228959][ T8237] __bad_area_nosemaphore+0xc6/0x4f0 [ 194.228985][ T8237] do_user_addr_fault+0x852/0xbf0 [ 194.229013][ T8237] exc_page_fault+0xa8/0x190 [ 194.229029][ T8237] ? asm_exc_page_fault+0x8/0x30 [ 194.229044][ T8237] asm_exc_page_fault+0x1e/0x30 [ 194.229059][ T8237] RIP: 0033:0x4024cb [ 194.229077][ T8237] Code: 40 41 89 e8 4c 89 ef b9 11 80 00 00 c1 e6 04 03 73 64 8d 14 90 39 f2 48 0f 43 f2 45 31 c9 ba 03 00 00 00 e8 a7 b9 05 00 8b 33 <49> 89 07 41 89 e8 4c 89 e7 41 b9 00 00 00 10 b9 11 80 00 00 ba 03 [ 194.229087][ T8237] RSP: 002b:00007f472dfa4c00 EFLAGS: 00010207 [ 194.257712][ T6882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.259130][ T8237] RAX: 0000000020ffa000 RBX: 0000000020000140 RCX: 000000000045deaa [ 194.259142][ T8237] RDX: 0000000000000003 RSI: 0000000000008000 RDI: 0000000020ffa000 [ 194.259151][ T8237] RBP: 0000000000000003 R08: 0000000000000003 R09: 0000000000000000 [ 194.259172][ T8237] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020ff8000 [ 194.281987][ T6882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.282428][ T8237] R13: 0000000020ffa000 R14: 0000000000000000 R15: 0000000000000000 [ 194.282554][ T8237] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8237 [ 194.310452][ T6882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.314067][ T8237] caller is lockdep_hardirqs_on+0x34/0x110 [ 194.349243][ T6882] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 194.362403][ T8237] CPU: 0 PID: 8237 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 09:31:27 executing program 0: munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) [ 194.362414][ T8237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.362421][ T8237] Call Trace: [ 194.362448][ T8237] dump_stack+0x198/0x1fb [ 194.362473][ T8237] check_preemption_disabled+0x128/0x130 [ 194.362492][ T8237] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 194.362511][ T8237] lockdep_hardirqs_on+0x34/0x110 [ 194.362529][ T8237] __bad_area_nosemaphore+0xc6/0x4f0 [ 194.362553][ T8237] do_user_addr_fault+0x852/0xbf0 [ 194.362578][ T8237] exc_page_fault+0xa8/0x190 [ 194.362595][ T8237] ? asm_exc_page_fault+0x8/0x30 [ 194.362609][ T8237] asm_exc_page_fault+0x1e/0x30 [ 194.362633][ T8237] RIP: 0033:0x4024cb [ 194.421095][ T460] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 194.428755][ T8237] Code: 40 41 89 e8 4c 89 ef b9 11 80 00 00 c1 e6 04 03 73 64 8d 14 90 39 f2 48 0f 43 f2 45 31 c9 ba 03 00 00 00 e8 a7 b9 05 00 8b 33 <49> 89 07 41 89 e8 4c 89 e7 41 b9 00 00 00 10 b9 11 80 00 00 ba 03 [ 194.428767][ T8237] RSP: 002b:00007f472dfa4c00 EFLAGS: 00010207 09:31:27 executing program 0: r0 = socket(0x2, 0x2, 0x0) connect$rds(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) [ 194.428783][ T8237] RAX: 0000000020ffa000 RBX: 0000000020000140 RCX: 000000000045deaa [ 194.428793][ T8237] RDX: 0000000000000003 RSI: 0000000000008000 RDI: 0000000020ffa000 [ 194.428801][ T8237] RBP: 0000000000000003 R08: 0000000000000003 R09: 0000000000000000 [ 194.428811][ T8237] R10: 0000000000008011 R11: 0000000000000206 R12: 0000000020ff8000 [ 194.428820][ T8237] R13: 0000000020ffa000 R14: 0000000000000000 R15: 0000000000000000 [ 194.621873][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 194.632271][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 194.640818][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 194.657229][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 09:31:27 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, 0x0) [ 194.670785][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 194.696833][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 194.740861][ T6882] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.756391][ T6882] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.765095][ T6882] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.802080][ T460] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 194.805781][ T6882] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 09:31:27 executing program 0: clone3(0x0, 0x0) clone3(&(0x7f0000000640)={0x8000000, 0x0, 0x0, 0x0, {}, &(0x7f0000000140)=""/208, 0xd0, 0x0, &(0x7f0000000600)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x58) [ 194.867422][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 194.900856][ T460] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 194.931847][ T460] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 195.000367][ T8264] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 195.015223][ T8264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 09:31:27 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x2c, 0x0, 0x0) [ 195.041810][ T8264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 195.065292][ T7026] device veth0_macvtap entered promiscuous mode [ 195.128907][ T7] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 195.138480][ T150] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 195.142062][ T7026] device veth1_macvtap entered promiscuous mode [ 195.166116][ T7] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 195.167771][ T150] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 195.212433][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 195.222952][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 195.236352][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 195.244628][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:31:28 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x5}, {0x16}]}) 09:31:28 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x6, 0x21, 0x0, 0x4) [ 195.379298][ T7026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.425833][ T7026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.435693][ T7026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 09:31:28 executing program 2: syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000001300)='./file0\x00', &(0x7f0000001340)=ANY=[@ANYBLOB='Y'], 0x0, 0x0) [ 195.480198][ T7026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.511837][ T7026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.544976][ T7026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.563402][ T28] audit: type=1326 audit(1603186288.367:2): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=8309 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x0 [ 195.593836][ T7026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.616548][ T7026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.645660][ T7026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.660801][ T8315] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8315 [ 195.670237][ T8315] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 195.676884][ T8315] CPU: 0 PID: 8315 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 195.686386][ T8315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.696455][ T8315] Call Trace: [ 195.699764][ T8315] dump_stack+0x198/0x1fb [ 195.704152][ T8315] check_preemption_disabled+0x128/0x130 [ 195.709811][ T8315] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 195.715668][ T8315] trace_hardirqs_on+0x5b/0x1c0 [ 195.720549][ T8315] __bad_area_nosemaphore+0xc6/0x4f0 [ 195.725949][ T8315] do_user_addr_fault+0x852/0xbf0 [ 195.731004][ T8315] exc_page_fault+0xa8/0x190 [ 195.735618][ T8315] ? asm_exc_page_fault+0x8/0x30 [ 195.740589][ T8315] asm_exc_page_fault+0x1e/0x30 [ 195.745486][ T8315] RIP: 0033:0x43c496 [ 195.749396][ T8315] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 195.769015][ T8315] RSP: 002b:00007efd142aea88 EFLAGS: 00010293 [ 195.775119][ T8315] RAX: 0000000000000000 RBX: 00007efd142aeb20 RCX: 0000000000000000 [ 195.783116][ T8315] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 195.791102][ T8315] RBP: 00007efd142aeae0 R08: 0000000000000000 R09: 0000000000000000 [ 195.799084][ T8315] R10: 00007efd142af9d0 R11: 0000000000000246 R12: 0000000000000000 [ 195.807411][ T8315] R13: 0000000020000080 R14: 0000000000000000 R15: 0000000000000000 [ 195.818103][ T8315] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8315 [ 195.828428][ T8315] caller is lockdep_hardirqs_on+0x34/0x110 [ 195.834249][ T8315] CPU: 0 PID: 8315 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 195.843699][ T8315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.853762][ T8315] Call Trace: [ 195.857068][ T8315] dump_stack+0x198/0x1fb [ 195.861417][ T8315] check_preemption_disabled+0x128/0x130 [ 195.867067][ T8315] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 195.872558][ T8315] lockdep_hardirqs_on+0x34/0x110 [ 195.875206][ T7026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.877679][ T8315] __bad_area_nosemaphore+0xc6/0x4f0 [ 195.877704][ T8315] do_user_addr_fault+0x852/0xbf0 [ 195.877731][ T8315] exc_page_fault+0xa8/0x190 [ 195.877748][ T8315] ? asm_exc_page_fault+0x8/0x30 [ 195.877764][ T8315] asm_exc_page_fault+0x1e/0x30 [ 195.877779][ T8315] RIP: 0033:0x43c496 [ 195.877797][ T8315] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 195.877807][ T8315] RSP: 002b:00007efd142aea88 EFLAGS: 00010293 [ 195.877825][ T8315] RAX: 0000000000000000 RBX: 00007efd142aeb20 RCX: 0000000000000000 [ 195.877835][ T8315] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 195.877845][ T8315] RBP: 00007efd142aeae0 R08: 0000000000000000 R09: 0000000000000000 [ 195.877856][ T8315] R10: 00007efd142af9d0 R11: 0000000000000246 R12: 0000000000000000 [ 195.877866][ T8315] R13: 0000000020000080 R14: 0000000000000000 R15: 0000000000000000 [ 196.031956][ T7026] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 196.051420][ T7] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 196.062268][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 196.063457][ T7] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 196.080578][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 196.097669][ T8315] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8315 [ 196.108933][ T8315] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 196.115454][ T8315] CPU: 0 PID: 8315 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 196.124938][ T8315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.135058][ T8315] Call Trace: [ 196.138373][ T8315] dump_stack+0x198/0x1fb [ 196.142992][ T8315] check_preemption_disabled+0x128/0x130 [ 196.148687][ T8315] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 196.154458][ T8315] trace_hardirqs_on+0x5b/0x1c0 [ 196.159331][ T8315] __bad_area_nosemaphore+0xc6/0x4f0 [ 196.164644][ T8315] do_user_addr_fault+0x852/0xbf0 [ 196.169697][ T8315] exc_page_fault+0xa8/0x190 [ 196.174311][ T8315] ? asm_exc_page_fault+0x8/0x30 [ 196.179263][ T8315] asm_exc_page_fault+0x1e/0x30 [ 196.184120][ T8315] RIP: 0033:0x43c496 [ 196.188026][ T8315] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 196.207667][ T8315] RSP: 002b:00007efd142aea88 EFLAGS: 00010293 [ 196.214627][ T8315] RAX: 0000000000000000 RBX: 00007efd142aeb20 RCX: 0000000000000000 [ 196.222640][ T8315] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 196.230634][ T8315] RBP: 00007efd142aeae0 R08: 0000000000000000 R09: 0000000000000000 [ 196.238624][ T8315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 196.246612][ T8315] R13: 0000000020000080 R14: 0000000000000000 R15: 0000000000000000 [ 196.294837][ T8315] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8315 [ 196.304615][ T8315] caller is lockdep_hardirqs_on+0x34/0x110 [ 196.310542][ T8315] CPU: 0 PID: 8315 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 196.320003][ T8315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.330066][ T8315] Call Trace: [ 196.333376][ T8315] dump_stack+0x198/0x1fb [ 196.335996][ T28] audit: type=1326 audit(1603186289.087:3): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=8309 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cba code=0x0 [ 196.337722][ T8315] check_preemption_disabled+0x128/0x130 [ 196.337742][ T8315] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 196.337767][ T8315] lockdep_hardirqs_on+0x34/0x110 [ 196.374012][ T8315] __bad_area_nosemaphore+0xc6/0x4f0 [ 196.379334][ T8315] do_user_addr_fault+0x852/0xbf0 [ 196.384413][ T8315] exc_page_fault+0xa8/0x190 [ 196.389021][ T8315] ? asm_exc_page_fault+0x8/0x30 [ 196.393984][ T8315] asm_exc_page_fault+0x1e/0x30 [ 196.398846][ T8315] RIP: 0033:0x43c496 [ 196.402936][ T8315] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 196.422555][ T8315] RSP: 002b:00007efd142aea88 EFLAGS: 00010293 [ 196.428991][ T8315] RAX: 0000000000000000 RBX: 00007efd142aeb20 RCX: 0000000000000000 [ 196.437024][ T8315] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 196.445015][ T8315] RBP: 00007efd142aeae0 R08: 0000000000000000 R09: 0000000000000000 [ 196.453001][ T8315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 196.461013][ T8315] R13: 0000000020000080 R14: 0000000000000000 R15: 0000000000000000 [ 196.480335][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 196.512097][ T7026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 196.516448][ T68] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 196.548330][ T7026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.567876][ T68] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 196.602301][ T7026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 196.625431][ T7026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.635761][ T7026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 196.648609][ T7026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 09:31:29 executing program 3: r0 = socket(0x2, 0x2, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 196.678136][ T7026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 196.690813][ T7026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.713546][ T7026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 196.732405][ T7026] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.747536][ T7026] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 196.793555][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 196.827274][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 196.850340][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 196.921449][ T7026] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 196.933345][ T7026] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 196.949759][ T7026] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 196.963070][ T7026] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 196.985289][ T68] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 196.995282][ T68] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 197.028682][ T3975] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:31:30 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0x3}, {0x20}]}) [ 197.192170][ T7] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 197.229617][ T7] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 197.279109][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 197.331099][ T150] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 197.345755][ T150] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 197.355185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:31:30 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x5, 0x0, 0x4) 09:31:30 executing program 4: socket(0x1d, 0x2, 0x2) 09:31:30 executing program 3: r0 = socket(0xa, 0x3, 0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x5, 0x0, 0x4) 09:31:30 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, [0x2]}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:31:30 executing program 1: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x7000) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8) 09:31:30 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)=ANY=[@ANYBLOB="01003d"]) 09:31:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x74, 0x0, &(0x7f0000000200)=0x29) 09:31:30 executing program 1: sigaltstack(&(0x7f0000ffb000/0x3000)=nil, 0x0) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) 09:31:30 executing program 4: syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000001300)='./file0\x00', &(0x7f0000001340)=ANY=[], 0x0, 0x0) 09:31:30 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 09:31:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 09:31:30 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x43, 0x0, 0x0) 09:31:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 09:31:30 executing program 1: clone3(&(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0x0], 0x1}, 0x58) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:31:30 executing program 3: socketpair(0x21, 0x0, 0x0, &(0x7f0000002000)) 09:31:30 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x35}]}) 09:31:30 executing program 0: r0 = fsopen(&(0x7f0000000000)='msdos\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 09:31:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x6, 0x0, 0x0) [ 198.052805][ T8391] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 09:31:31 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 09:31:31 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x4d, 0x0, 0x0) 09:31:31 executing program 2: munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xc) 09:31:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x4ef, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, 0x0) 09:31:31 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x13, 0x0, 0x4) 09:31:31 executing program 4: r0 = socket(0xa, 0x1, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000000) 09:31:31 executing program 0: r0 = syz_io_uring_setup(0x244d, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x5a219000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x44fc6c79bb1413b, 0xffffffffffffffff, 0x8000000) 09:31:31 executing program 1: socket(0x1e, 0x5, 0x0) 09:31:31 executing program 2: eventfd2(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) 09:31:31 executing program 3: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x4ef, 0xa0001) 09:31:31 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x16, 0x0, 0x0) 09:31:31 executing program 4: r0 = fsopen(&(0x7f0000000240)='gfs2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 09:31:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback=0x7f000008}]}, &(0x7f00000000c0)=0x10) 09:31:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) 09:31:31 executing program 3: r0 = fsopen(&(0x7f0000000000)='pipefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 09:31:31 executing program 5: socket(0x21, 0x2, 0x2) 09:31:31 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x45}]}) [ 198.883883][ T8450] check_preemption_disabled: 4 callbacks suppressed [ 198.883900][ T8450] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8450 [ 198.902382][ T8450] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 198.909851][ T8450] CPU: 1 PID: 8450 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 198.920302][ T8450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 09:31:31 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) 09:31:31 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x12) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x13) [ 198.931612][ T8450] Call Trace: [ 198.935128][ T8450] dump_stack+0x198/0x1fb [ 198.939705][ T8450] check_preemption_disabled+0x128/0x130 [ 198.945472][ T8450] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 198.951485][ T8450] trace_hardirqs_on+0x5b/0x1c0 [ 198.956650][ T8450] __bad_area_nosemaphore+0xc6/0x4f0 [ 198.962559][ T8450] do_user_addr_fault+0x852/0xbf0 [ 198.967927][ T8450] exc_page_fault+0xa8/0x190 [ 198.973002][ T8450] ? asm_exc_page_fault+0x8/0x30 [ 198.978245][ T8450] asm_exc_page_fault+0x1e/0x30 [ 198.983139][ T8450] RIP: 0033:0x43c650 [ 198.987425][ T8450] Code: 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 74 48 83 e0 f0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7 [ 199.007813][ T8450] RSP: 002b:00007f472dfa3ba8 EFLAGS: 00010246 [ 199.014338][ T8450] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 199.022532][ T8450] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000000 09:31:31 executing program 1: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000340)=""/90) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 199.030537][ T8450] RBP: 0000000000000004 R08: 0000000000000004 R09: 00007f472dfa3bb0 [ 199.038699][ T8450] R10: 0000000000000000 R11: 000000000000000f R12: 00007f472dfa3bf0 [ 199.047249][ T8450] R13: 00007ffe160a1aaf R14: 00007f472dfa59c0 R15: 000000000118bf2c [ 199.056033][ T8450] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/8450 [ 199.065790][ T8450] caller is lockdep_hardirqs_on+0x34/0x110 [ 199.072194][ T8450] CPU: 1 PID: 8450 Comm: syz-executor.0 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 199.082370][ T8450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.093285][ T8450] Call Trace: [ 199.096946][ T8450] dump_stack+0x198/0x1fb [ 199.101499][ T8450] check_preemption_disabled+0x128/0x130 [ 199.107404][ T8450] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 199.112929][ T8450] lockdep_hardirqs_on+0x34/0x110 [ 199.117989][ T8450] __bad_area_nosemaphore+0xc6/0x4f0 [ 199.123908][ T8450] do_user_addr_fault+0x852/0xbf0 [ 199.129185][ T8450] exc_page_fault+0xa8/0x190 [ 199.134103][ T8450] ? asm_exc_page_fault+0x8/0x30 [ 199.139732][ T8450] asm_exc_page_fault+0x1e/0x30 [ 199.144790][ T8450] RIP: 0033:0x43c650 [ 199.148883][ T8450] Code: 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 74 48 83 e0 f0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7 [ 199.169111][ T8450] RSP: 002b:00007f472dfa3ba8 EFLAGS: 00010246 [ 199.175694][ T8450] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 199.183810][ T8450] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000000 [ 199.191992][ T8450] RBP: 0000000000000004 R08: 0000000000000004 R09: 00007f472dfa3bb0 [ 199.200320][ T8450] R10: 0000000000000000 R11: 000000000000000f R12: 00007f472dfa3bf0 [ 199.208814][ T8450] R13: 00007ffe160a1aaf R14: 00007f472dfa59c0 R15: 000000000118bf2c 09:31:32 executing program 2: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x9) 09:31:32 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x12) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x13) 09:31:32 executing program 3: r0 = socket(0x1, 0x2, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x803e0000}}, 0x0) 09:31:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0xfffffffffffffff9) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @empty}, 0x1c) io_setup(0xb, &(0x7f0000000080)=0x0) r2 = dup(r0) write$P9_RAUTH(r2, 0x0, 0x0) io_submit(r1, 0x34, &(0x7f0000000480)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x2}]) 09:31:32 executing program 2: syz_mount_image$bfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8}, 0x0, 0x0) [ 199.611393][ T8479] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8479 [ 199.622580][ T8479] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 199.629811][ T8479] CPU: 1 PID: 8479 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 199.640087][ T8479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.650815][ T8479] Call Trace: [ 199.654462][ T8479] dump_stack+0x198/0x1fb [ 199.658854][ T8479] check_preemption_disabled+0x128/0x130 [ 199.664874][ T8479] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 199.670808][ T8479] trace_hardirqs_on+0x5b/0x1c0 [ 199.675809][ T8479] __bad_area_nosemaphore+0xc6/0x4f0 [ 199.682020][ T8479] do_user_addr_fault+0x852/0xbf0 [ 199.687320][ T8479] exc_page_fault+0xa8/0x190 [ 199.692607][ T8479] ? asm_exc_page_fault+0x8/0x30 [ 199.698085][ T8479] asm_exc_page_fault+0x1e/0x30 [ 199.703128][ T8479] RIP: 0033:0x43c496 [ 199.707212][ T8479] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 199.728142][ T8479] RSP: 002b:00007efd142aea88 EFLAGS: 00010293 [ 199.734595][ T8479] RAX: 0000000000000000 RBX: 00007efd142aeb20 RCX: 0000000000000000 [ 199.742759][ T8479] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 199.751623][ T8479] RBP: 00007efd142aeae0 R08: 0000000000000000 R09: 0000000000000000 [ 199.760059][ T8479] R10: 00007efd142af9d0 R11: 0000000000000246 R12: 0000000000000000 [ 199.769228][ T8479] R13: 00000000200002c0 R14: 0000000000000000 R15: 0000000000000000 [ 199.777865][ T8479] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8479 [ 199.787910][ T8479] caller is lockdep_hardirqs_on+0x34/0x110 [ 199.793864][ T8479] CPU: 1 PID: 8479 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 199.803956][ T8479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.814603][ T8479] Call Trace: [ 199.818146][ T8479] dump_stack+0x198/0x1fb [ 199.822523][ T8479] check_preemption_disabled+0x128/0x130 [ 199.828366][ T8479] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 199.833869][ T8479] lockdep_hardirqs_on+0x34/0x110 [ 199.839357][ T8479] __bad_area_nosemaphore+0xc6/0x4f0 [ 199.844963][ T8479] do_user_addr_fault+0x852/0xbf0 [ 199.850409][ T8479] exc_page_fault+0xa8/0x190 [ 199.855829][ T8479] ? asm_exc_page_fault+0x8/0x30 [ 199.860896][ T8479] asm_exc_page_fault+0x1e/0x30 [ 199.866060][ T8479] RIP: 0033:0x43c496 [ 199.869989][ T8479] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 199.890836][ T8479] RSP: 002b:00007efd142aea88 EFLAGS: 00010293 [ 199.897280][ T8479] RAX: 0000000000000000 RBX: 00007efd142aeb20 RCX: 0000000000000000 [ 199.906013][ T8479] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 199.915396][ T8479] RBP: 00007efd142aeae0 R08: 0000000000000000 R09: 0000000000000000 [ 199.923983][ T8479] R10: 00007efd142af9d0 R11: 0000000000000246 R12: 0000000000000000 [ 199.932303][ T8479] R13: 00000000200002c0 R14: 0000000000000000 R15: 0000000000000000 [ 199.969819][ T8479] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8479 [ 199.980975][ T8479] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 199.988610][ T8479] CPU: 1 PID: 8479 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 199.998827][ T8479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.009009][ T8479] Call Trace: [ 200.012905][ T8479] dump_stack+0x198/0x1fb [ 200.017460][ T8479] check_preemption_disabled+0x128/0x130 [ 200.023650][ T8479] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 200.029708][ T8479] trace_hardirqs_on+0x5b/0x1c0 [ 200.034683][ T8479] __bad_area_nosemaphore+0xc6/0x4f0 [ 200.040200][ T8479] do_user_addr_fault+0x852/0xbf0 [ 200.045366][ T8479] exc_page_fault+0xa8/0x190 [ 200.050200][ T8479] ? asm_exc_page_fault+0x8/0x30 [ 200.055374][ T8479] asm_exc_page_fault+0x1e/0x30 [ 200.060537][ T8479] RIP: 0033:0x43c496 [ 200.065398][ T8479] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 200.086552][ T8479] RSP: 002b:00007efd142aea88 EFLAGS: 00010293 [ 200.093017][ T8479] RAX: 0000000000000000 RBX: 00007efd142aeb20 RCX: 0000000000000000 [ 200.101453][ T8479] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 200.109721][ T8479] RBP: 00007efd142aeae0 R08: 0000000000000000 R09: 0000000000000000 [ 200.118171][ T8479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 200.126608][ T8479] R13: 00000000200002c0 R14: 0000000000000000 R15: 0000000000000000 [ 200.136464][ T8479] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8479 [ 200.146913][ T8479] caller is lockdep_hardirqs_on+0x34/0x110 [ 200.153584][ T8479] CPU: 1 PID: 8479 Comm: syz-executor.2 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 200.163789][ T8479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.173966][ T8479] Call Trace: [ 200.177288][ T8479] dump_stack+0x198/0x1fb [ 200.181810][ T8479] check_preemption_disabled+0x128/0x130 [ 200.188450][ T8479] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 200.194997][ T8479] lockdep_hardirqs_on+0x34/0x110 [ 200.200696][ T8479] __bad_area_nosemaphore+0xc6/0x4f0 [ 200.206409][ T8479] do_user_addr_fault+0x852/0xbf0 [ 200.211723][ T8479] exc_page_fault+0xa8/0x190 09:31:33 executing program 0: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x12) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x13) 09:31:33 executing program 3: socket(0x23, 0x5, 0x2) [ 200.218397][ T8479] ? asm_exc_page_fault+0x8/0x30 [ 200.223482][ T8479] asm_exc_page_fault+0x1e/0x30 [ 200.228829][ T8479] RIP: 0033:0x43c496 [ 200.232861][ T8479] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 200.255193][ T8479] RSP: 002b:00007efd142aea88 EFLAGS: 00010293 [ 200.261721][ T8479] RAX: 0000000000000000 RBX: 00007efd142aeb20 RCX: 0000000000000000 [ 200.269977][ T8479] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 200.278484][ T8479] RBP: 00007efd142aeae0 R08: 0000000000000000 R09: 0000000000000000 [ 200.286758][ T8479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 200.295360][ T8479] R13: 00000000200002c0 R14: 0000000000000000 R15: 0000000000000000 09:31:33 executing program 3: syz_io_uring_setup(0x22b80, &(0x7f0000000000)={0x0, 0x0, 0x10}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000100)) 09:31:33 executing program 5: r0 = socket(0xa, 0x3, 0x8) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 09:31:33 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000700)='/dev/bsg\x00', 0x0, 0x0) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 09:31:33 executing program 0: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) get_mempolicy(0x0, &(0x7f0000000040), 0x7f, &(0x7f0000ffc000/0x4000)=nil, 0x4) 09:31:33 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) 09:31:33 executing program 4: clone3(&(0x7f0000000640)={0x8000000, 0x0, 0x0, 0x0, {}, &(0x7f0000000140)=""/208, 0xd0, 0x0, 0x0}, 0x58) 09:31:33 executing program 5: r0 = fsopen(&(0x7f0000000040)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 09:31:33 executing program 0: mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) [ 200.706497][ T8520] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/8520 [ 200.717750][ T8520] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 200.724842][ T8520] CPU: 0 PID: 8520 Comm: syz-executor.4 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 200.735104][ T8520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.745552][ T8520] Call Trace: [ 200.749473][ T8520] dump_stack+0x198/0x1fb [ 200.754285][ T8520] check_preemption_disabled+0x128/0x130 [ 200.761223][ T8520] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 200.767114][ T8520] trace_hardirqs_on+0x5b/0x1c0 [ 200.772196][ T8520] __bad_area_nosemaphore+0xc6/0x4f0 [ 200.778088][ T8520] do_user_addr_fault+0x852/0xbf0 [ 200.783287][ T8520] exc_page_fault+0xa8/0x190 [ 200.788248][ T8520] ? asm_exc_page_fault+0x8/0x30 [ 200.793309][ T8520] asm_exc_page_fault+0x1e/0x30 [ 200.798594][ T8520] RIP: 0033:0x0 [ 200.802384][ T8520] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. [ 200.810736][ T8520] RSP: 002b:0000000020000218 EFLAGS: 00010217 [ 200.817734][ T8520] RAX: 0000000000000000 RBX: 0000000000002000 RCX: 000000000045de59 [ 200.827886][ T8520] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000640 [ 200.836486][ T8520] RBP: 000000000118bf58 R08: 0000000000000000 R09: 0000000000000000 [ 200.845124][ T8520] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c 09:31:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x64}]}) [ 200.853703][ T8520] R13: 00007fff3c96d43f R14: 00007faa0aba39c0 R15: 000000000118bf2c [ 200.864829][ T8520] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/8520 [ 200.875938][ T8520] caller is lockdep_hardirqs_on+0x34/0x110 [ 200.882340][ T8520] CPU: 0 PID: 8520 Comm: syz-executor.4 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 200.892891][ T8520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.903663][ T8520] Call Trace: [ 200.906993][ T8520] dump_stack+0x198/0x1fb [ 200.911369][ T8520] check_preemption_disabled+0x128/0x130 [ 200.917036][ T8520] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 200.922540][ T8520] lockdep_hardirqs_on+0x34/0x110 [ 200.927604][ T8520] __bad_area_nosemaphore+0xc6/0x4f0 [ 200.933018][ T8520] do_user_addr_fault+0x852/0xbf0 [ 200.938185][ T8520] exc_page_fault+0xa8/0x190 [ 200.942988][ T8520] ? asm_exc_page_fault+0x8/0x30 [ 200.948568][ T8520] asm_exc_page_fault+0x1e/0x30 [ 200.953932][ T8520] RIP: 0033:0x0 [ 200.957756][ T8520] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. [ 200.966103][ T8520] RSP: 002b:0000000020000218 EFLAGS: 00010217 [ 200.972328][ T8520] RAX: 0000000000000000 RBX: 0000000000002000 RCX: 000000000045de59 [ 200.980682][ T8520] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000640 [ 200.989145][ T8520] RBP: 000000000118bf58 R08: 0000000000000000 R09: 0000000000000000 [ 200.997319][ T8520] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 201.005420][ T8520] R13: 00007fff3c96d43f R14: 00007faa0aba39c0 R15: 000000000118bf2c 09:31:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x39, 0x0, 0x0) 09:31:34 executing program 1: r0 = socket(0x1, 0x1, 0x0) recvmsg$can_j1939(r0, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}, 0x0) 09:31:34 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x1a, 0x0, 0x0) 09:31:34 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x12) syz_genetlink_get_family_id$batadv(0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 09:31:34 executing program 0: r0 = socket(0x1, 0x2, 0x0) recvmsg$can_j1939(r0, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}, 0x40010001) 09:31:34 executing program 4: r0 = socket(0xa, 0x3, 0x8) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, 0x0, 0x0) 09:31:34 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x48, 0x0, 0x4) [ 201.416793][ T8542] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.5/8542 [ 201.426652][ T8542] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 201.433540][ T8542] CPU: 0 PID: 8542 Comm: syz-executor.5 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 201.443497][ T8542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.454253][ T8542] Call Trace: [ 201.457923][ T8542] dump_stack+0x198/0x1fb [ 201.463702][ T8542] check_preemption_disabled+0x128/0x130 [ 201.469727][ T8542] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 201.476411][ T8542] trace_hardirqs_on+0x5b/0x1c0 [ 201.481656][ T8542] __bad_area_nosemaphore+0xc6/0x4f0 [ 201.487511][ T8542] do_user_addr_fault+0x852/0xbf0 [ 201.492585][ T8542] exc_page_fault+0xa8/0x190 [ 201.497606][ T8542] ? asm_exc_page_fault+0x8/0x30 [ 201.502671][ T8542] asm_exc_page_fault+0x1e/0x30 [ 201.507757][ T8542] RIP: 0033:0x43c650 09:31:34 executing program 2: r0 = socket(0x11, 0x2, 0x0) accept(r0, 0x0, 0x0) [ 201.511681][ T8542] Code: 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 74 48 83 e0 f0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7 [ 201.532026][ T8542] RSP: 002b:00007f6744582ba8 EFLAGS: 00010246 [ 201.538484][ T8542] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 201.547793][ T8542] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000000 [ 201.556462][ T8542] RBP: 0000000000000003 R08: 0000000000000004 R09: 00007f6744582bb0 [ 201.564806][ T8542] R10: 0000000000000000 R11: 000000000000000f R12: 00007f6744582bf0 [ 201.573174][ T8542] R13: 00007ffd834444bf R14: 00007f67445849c0 R15: 000000000118bfd4 [ 201.583225][ T8542] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.5/8542 [ 201.594558][ T8542] caller is lockdep_hardirqs_on+0x34/0x110 [ 201.600700][ T8542] CPU: 0 PID: 8542 Comm: syz-executor.5 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 201.611328][ T8542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.621937][ T8542] Call Trace: [ 201.625459][ T8542] dump_stack+0x198/0x1fb [ 201.630088][ T8542] check_preemption_disabled+0x128/0x130 [ 201.636227][ T8542] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 201.642718][ T8542] lockdep_hardirqs_on+0x34/0x110 [ 201.648156][ T8542] __bad_area_nosemaphore+0xc6/0x4f0 [ 201.653584][ T8542] do_user_addr_fault+0x852/0xbf0 [ 201.658744][ T8542] exc_page_fault+0xa8/0x190 09:31:34 executing program 1: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x12) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x13) [ 201.664193][ T8542] ? asm_exc_page_fault+0x8/0x30 [ 201.669696][ T8542] asm_exc_page_fault+0x1e/0x30 [ 201.674976][ T8542] RIP: 0033:0x43c650 [ 201.679096][ T8542] Code: 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 74 48 83 e0 f0 <66> 0f 74 00 66 0f 74 48 10 66 0f 74 50 20 66 0f 74 58 30 66 0f d7 [ 201.701883][ T8542] RSP: 002b:00007f6744582ba8 EFLAGS: 00010246 [ 201.708447][ T8542] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 09:31:34 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x8, 0x0, 0x4) [ 201.716830][ T8542] RDX: 0000000000000000 RSI: 000000000000000f RDI: 0000000000000000 [ 201.725118][ T8542] RBP: 0000000000000003 R08: 0000000000000004 R09: 00007f6744582bb0 [ 201.733385][ T8542] R10: 0000000000000000 R11: 000000000000000f R12: 00007f6744582bf0 [ 201.742128][ T8542] R13: 00007ffd834444bf R14: 00007f67445849c0 R15: 000000000118bfd4 09:31:34 executing program 0: munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) 09:31:34 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) read$qrtrtun(r0, &(0x7f0000000040)=""/232, 0xe8) read$qrtrtun(r0, &(0x7f0000000180)=""/100, 0x64) 09:31:34 executing program 2: munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x4000)=nil) 09:31:34 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x2f, 0x0, 0x0) 09:31:34 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x35, 0x0, 0x4) 09:31:35 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x3d}]}) 09:31:35 executing program 4: syz_mount_image$bfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x81, 0x0, "010b3338ba05e46103a723676290f798d95a2cb873031a36ae54461db184d2330cd104dd4d8cdabfcb03d68786daa1370180072561a2e9ccdc6fb5149505f9a0231e44bab585a53a1592d985908d215bc78e87574de4de5c87174fd5cf75c0cb837f6c262ee363c4c37010cc0c8e30e4107c231912c76375c1"}, 0x0, 0x0) 09:31:35 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x94}]}) 09:31:35 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 09:31:35 executing program 2: r0 = socket(0x1, 0x2, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 09:31:35 executing program 0: r0 = socket(0xa, 0x1, 0x0) recvmsg$can_j1939(r0, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x40000}, 0x0) 09:31:35 executing program 3: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, 0x0) 09:31:35 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 09:31:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 09:31:35 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x17, 0x0, 0x0) 09:31:35 executing program 0: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) 09:31:35 executing program 5: socketpair(0x41, 0x0, 0x0, &(0x7f0000001880)) 09:31:35 executing program 3: r0 = socket(0x21, 0x2, 0x2) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0, 0x14}}, 0x0) 09:31:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x13, 0x0, 0x0) 09:31:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x60}]}) 09:31:35 executing program 4: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000fed000/0x12000)=nil, 0x5000) 09:31:35 executing program 5: r0 = socket(0xa, 0x1, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={0x0, 0x30}}, 0x24004840) 09:31:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x10, 0x0, &(0x7f0000000200)=0x29) 09:31:35 executing program 3: clone3(&(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0x0], 0x1}, 0x58) clone3(&(0x7f00000008c0)={0x500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:31:36 executing program 1: clone3(&(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {0x22}, &(0x7f0000000140)=""/208, 0xd0, &(0x7f0000000240)=""/71, &(0x7f0000000600)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) 09:31:36 executing program 0: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) 09:31:36 executing program 5: r0 = socket(0x21, 0x2, 0x2) accept(r0, 0x0, 0x0) 09:31:36 executing program 4: munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 09:31:36 executing program 2: r0 = socket(0x1e, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x6, 0xd, 0x0, 0x4) 09:31:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x6d, 0x0, &(0x7f0000000200)=0x8)