[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.233' (ECDSA) to the list of known hosts. 2021/02/05 01:11:06 fuzzer started 2021/02/05 01:11:07 dialing manager at 10.128.0.163:35513 2021/02/05 01:11:11 syscalls: 3470 2021/02/05 01:11:11 code coverage: enabled 2021/02/05 01:11:11 comparison tracing: enabled 2021/02/05 01:11:11 extra coverage: enabled 2021/02/05 01:11:11 setuid sandbox: enabled 2021/02/05 01:11:11 namespace sandbox: enabled 2021/02/05 01:11:11 Android sandbox: /sys/fs/selinux/policy does not exist 2021/02/05 01:11:11 fault injection: enabled 2021/02/05 01:11:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/02/05 01:11:11 net packet injection: enabled 2021/02/05 01:11:11 net device setup: enabled 2021/02/05 01:11:11 concurrency sanitizer: enabled 2021/02/05 01:11:11 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/02/05 01:11:11 USB emulation: enabled 2021/02/05 01:11:11 hci packet injection: enabled 2021/02/05 01:11:11 wifi device emulation: enabled 2021/02/05 01:11:11 fetching corpus: 0, signal 0/0 (executing program) 2021/02/05 01:11:11 fetching corpus: 0, signal 0/0 (executing program) 2021/02/05 01:11:12 starting 6 fuzzer processes 01:11:12 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0xef9e6ac921eca398) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004340)={0x2020}, 0x2020) 01:11:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) write$eventfd(0xffffffffffffffff, 0x0, 0x0) 01:11:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8980, 0x0) 01:11:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000040)=@builtin='builtin_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)=@builtin='builtin_trusted\x00') 01:11:13 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_opts(r0, 0x84, 0x8, 0x0, &(0x7f0000000540)) 01:11:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) syzkaller login: [ 33.820811][ T8440] IPVS: ftp: loaded support on port[0] = 21 [ 33.889281][ T8440] chnl_net:caif_netlink_parms(): no params data found [ 33.933483][ T8440] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.940720][ T8440] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.948048][ T8440] device bridge_slave_0 entered promiscuous mode [ 33.955687][ T8440] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.963189][ T8440] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.973196][ T8440] device bridge_slave_1 entered promiscuous mode [ 33.987083][ T8440] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.005737][ T8442] IPVS: ftp: loaded support on port[0] = 21 [ 34.013114][ T8440] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.030118][ T8440] team0: Port device team_slave_0 added [ 34.036876][ T8440] team0: Port device team_slave_1 added [ 34.051681][ T8440] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.058924][ T8440] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.084865][ T8440] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.097727][ T8440] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.104928][ T8440] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.135755][ T8440] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.179217][ T8440] device hsr_slave_0 entered promiscuous mode [ 34.187905][ T8440] device hsr_slave_1 entered promiscuous mode [ 34.211762][ T8444] IPVS: ftp: loaded support on port[0] = 21 [ 34.226164][ T8442] chnl_net:caif_netlink_parms(): no params data found [ 34.277302][ T8442] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.284857][ T8442] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.312796][ T8442] device bridge_slave_0 entered promiscuous mode [ 34.349537][ T8442] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.356587][ T8442] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.365669][ T8442] device bridge_slave_1 entered promiscuous mode [ 34.374863][ T8446] IPVS: ftp: loaded support on port[0] = 21 [ 34.390007][ T8444] chnl_net:caif_netlink_parms(): no params data found [ 34.417815][ T8442] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.441450][ T8442] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.473953][ T8442] team0: Port device team_slave_0 added [ 34.500501][ T8442] team0: Port device team_slave_1 added [ 34.536337][ T8444] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.548599][ T8444] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.556141][ T8444] device bridge_slave_0 entered promiscuous mode [ 34.571780][ T8440] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 34.587254][ T8446] chnl_net:caif_netlink_parms(): no params data found [ 34.614358][ T8440] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 34.626933][ T8450] IPVS: ftp: loaded support on port[0] = 21 [ 34.627023][ T8444] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.658137][ T8444] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.665587][ T8444] device bridge_slave_1 entered promiscuous mode [ 34.678464][ T8448] IPVS: ftp: loaded support on port[0] = 21 [ 34.683313][ T8444] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.696894][ T8444] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.707109][ T8440] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 34.716171][ T8442] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.723244][ T8442] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.749245][ T8442] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.772157][ T8444] team0: Port device team_slave_0 added [ 34.777911][ T8440] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 34.791071][ T8442] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.798061][ T8442] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.824007][ T8442] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.840350][ T8444] team0: Port device team_slave_1 added [ 34.875008][ T8446] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.883503][ T8446] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.891503][ T8446] device bridge_slave_0 entered promiscuous mode [ 34.900759][ T8446] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.907786][ T8446] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.915215][ T8446] device bridge_slave_1 entered promiscuous mode [ 34.930871][ T8444] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.938971][ T8444] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.965109][ T8444] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.977701][ T8444] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.984987][ T8444] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.010994][ T8444] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.038519][ T8442] device hsr_slave_0 entered promiscuous mode [ 35.044936][ T8442] device hsr_slave_1 entered promiscuous mode [ 35.051382][ T8442] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 35.058954][ T8442] Cannot create hsr debugfs directory [ 35.107859][ T8444] device hsr_slave_0 entered promiscuous mode [ 35.114547][ T8444] device hsr_slave_1 entered promiscuous mode [ 35.121107][ T8444] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 35.128968][ T8444] Cannot create hsr debugfs directory [ 35.135198][ T8446] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.161701][ T8446] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.172265][ T8450] chnl_net:caif_netlink_parms(): no params data found [ 35.242159][ T8446] team0: Port device team_slave_0 added [ 35.251943][ T8446] team0: Port device team_slave_1 added [ 35.257676][ T8448] chnl_net:caif_netlink_parms(): no params data found [ 35.282600][ T8442] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 35.293082][ T8442] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 35.316568][ T8442] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 35.329797][ T8450] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.336832][ T8450] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.344989][ T8450] device bridge_slave_0 entered promiscuous mode [ 35.353455][ T8450] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.360691][ T8450] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.368659][ T8450] device bridge_slave_1 entered promiscuous mode [ 35.375457][ T8446] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.382697][ T8446] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.408960][ T8446] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.420306][ T8442] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 35.448856][ T8446] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.455816][ T8446] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.481778][ T8446] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.503400][ T8446] device hsr_slave_0 entered promiscuous mode [ 35.510386][ T8446] device hsr_slave_1 entered promiscuous mode [ 35.516660][ T8446] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 35.524343][ T8446] Cannot create hsr debugfs directory [ 35.530691][ T8450] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.541889][ T8450] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.558163][ T8450] team0: Port device team_slave_0 added [ 35.571363][ T8444] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 35.580589][ T8450] team0: Port device team_slave_1 added [ 35.586249][ T8444] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 35.620139][ T8440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.633672][ T8444] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 35.641999][ T8448] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.649197][ T8448] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.657190][ T8448] device bridge_slave_0 entered promiscuous mode [ 35.665036][ T8448] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.672162][ T8448] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.679907][ T8448] device bridge_slave_1 entered promiscuous mode [ 35.691722][ T8444] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 35.704510][ T8450] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.713042][ T8450] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.739364][ T8450] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.751401][ T8450] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.758694][ T8450] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.784960][ T8450] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.801464][ T8448] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.812898][ T8448] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.824930][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.832704][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.842206][ T8440] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.875656][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.884600][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.887786][ T4923] Bluetooth: hci0: command 0x0409 tx timeout [ 35.895327][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.905586][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.914405][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.922902][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.931394][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.938445][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.946047][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 35.954953][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.963089][ T8448] team0: Port device team_slave_0 added [ 35.973267][ T8448] team0: Port device team_slave_1 added [ 35.984514][ T8450] device hsr_slave_0 entered promiscuous mode [ 35.991027][ T8450] device hsr_slave_1 entered promiscuous mode [ 35.997304][ T8450] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.004903][ T8450] Cannot create hsr debugfs directory [ 36.026592][ T8442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.041129][ T8448] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.047746][ T2056] Bluetooth: hci1: command 0x0409 tx timeout [ 36.049041][ T8448] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.080914][ T8448] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.093036][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.118324][ T8448] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.125285][ T8448] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.152009][ T8448] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.164564][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.172287][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.193372][ T8442] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.204418][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.209317][ T4923] Bluetooth: hci2: command 0x0409 tx timeout [ 36.214064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.227250][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.235696][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.244308][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.252498][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.260960][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.269200][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.278997][ T8440] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.288052][ T8444] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.304897][ T8448] device hsr_slave_0 entered promiscuous mode [ 36.311585][ T8448] device hsr_slave_1 entered promiscuous mode [ 36.318156][ T8448] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.325722][ T8448] Cannot create hsr debugfs directory [ 36.331636][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.339637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.348179][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.356431][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.363467][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.371436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.379371][ T5] Bluetooth: hci3: command 0x0409 tx timeout [ 36.380356][ T8446] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 36.399157][ T8446] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 36.411245][ T8444] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.438059][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.446699][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.456052][ T9177] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.463157][ T9177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.471645][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.479443][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.486942][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.496146][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.508078][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.516339][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.525199][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 36.527542][ T8048] Bluetooth: hci4: command 0x0409 tx timeout [ 36.534069][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 36.547768][ T8446] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 36.557284][ T8446] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 36.582129][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.590333][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 36.597842][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 36.605180][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.613715][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.614112][ T8048] Bluetooth: hci5: command 0x0409 tx timeout [ 36.622021][ T9177] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.634800][ T9177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.642661][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.650870][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.660344][ T8440] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.685689][ T8450] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 36.695663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.704052][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.713878][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.722253][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.729298][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.738388][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.746648][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.771181][ T8442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 36.779916][ T8450] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 36.798164][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.806924][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.815786][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.824842][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.833432][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.841984][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.850685][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 36.866448][ T8448] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 36.886530][ T8440] device veth0_vlan entered promiscuous mode [ 36.896421][ T8450] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 36.908878][ T8450] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 36.921357][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 36.928845][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 36.936213][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.944836][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.953418][ T8448] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 36.963804][ T8442] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.977576][ T8440] device veth1_vlan entered promiscuous mode [ 36.988360][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.995956][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.003693][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.011658][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 37.019816][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 37.028146][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 37.036506][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.044649][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.053498][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.061722][ T8048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.070008][ T8448] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.084534][ T8448] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.095962][ T8444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 37.123232][ T8446] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.137894][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.146305][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.164730][ T8440] device veth0_macvtap entered promiscuous mode [ 37.179032][ T8442] device veth0_vlan entered promiscuous mode [ 37.186340][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.197186][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.205723][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.215612][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.228762][ T8446] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.238591][ T8440] device veth1_macvtap entered promiscuous mode [ 37.253633][ T8442] device veth1_vlan entered promiscuous mode [ 37.262075][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.270094][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.278228][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.285836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.293680][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.301907][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.309936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.317516][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.324878][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.332823][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.341889][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.350725][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.357761][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.379884][ T8444] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.388787][ T8440] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.398774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 37.406671][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 37.414934][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.423398][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.433119][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.440198][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.447908][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.457102][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.483952][ T8440] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.495387][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 37.505863][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 37.514419][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 37.524424][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 37.533035][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 37.542632][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 37.550976][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.560578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.568746][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.577387][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.589031][ T8448] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.596599][ T8446] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.607707][ T8446] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 37.618971][ T8450] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.633028][ T8442] device veth0_macvtap entered promiscuous mode [ 37.641951][ T8442] device veth1_macvtap entered promiscuous mode [ 37.649154][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 37.656938][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.666099][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.674332][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.682813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.691532][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.699530][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 37.723576][ T8444] device veth0_vlan entered promiscuous mode [ 37.738396][ T8440] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.747764][ T8440] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.757071][ T8440] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.766889][ T8440] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.780131][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.792320][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.802712][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.810901][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.819374][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.826823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.834594][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.842187][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.851152][ T8450] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.860956][ T8444] device veth1_vlan entered promiscuous mode [ 37.868240][ T8442] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 37.879338][ T8442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.890285][ T8442] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.899634][ T8442] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 37.910457][ T8442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 37.921005][ T8442] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.930845][ T8442] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.939892][ T8442] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.949018][ T8442] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.958091][ T8442] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.967249][ T4923] Bluetooth: hci0: command 0x041b tx timeout [ 37.969430][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.981060][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.989918][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 37.998100][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.006673][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.015573][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.023365][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.031203][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.039710][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.058963][ T8448] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.060168][ T8446] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.087174][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 38.095489][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.104736][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.113430][ T4923] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.120619][ T4923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.128633][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.136960][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.145444][ T4923] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.152502][ T4923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.160181][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.168733][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.177423][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.185817][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.193966][ T4923] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.201037][ T4923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.208743][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.217336][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.225548][ T4923] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.232585][ T4923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.240118][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.248660][ T4923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.258685][ T34] Bluetooth: hci1: command 0x041b tx timeout [ 38.285865][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.294980][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.304084][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 38.313499][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 38.323164][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.331756][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.341600][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 38.349878][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 38.360293][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.369300][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.379271][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 38.387629][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 38.395988][ T2056] Bluetooth: hci2: command 0x041b tx timeout [ 38.406853][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 38.415756][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 38.436605][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 38.445331][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 38.454129][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.462658][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.471081][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.479496][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.489396][ T8444] device veth0_macvtap entered promiscuous mode [ 38.490231][ T34] Bluetooth: hci3: command 0x041b tx timeout [ 38.512354][ T8446] device veth0_vlan entered promiscuous mode [ 38.521945][ T8448] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 38.535791][ T8444] device veth1_macvtap entered promiscuous mode [ 38.545484][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 38.555191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 38.563734][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.572231][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.580762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.589383][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.598307][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.609718][ T8450] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.617506][ T19] Bluetooth: hci4: command 0x041b tx timeout [ 38.623138][ T8450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 38.640934][ T37] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 38.648975][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.658592][ T37] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 38.666210][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.675209][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 38.684708][ T8446] device veth1_vlan entered promiscuous mode [ 38.687011][ T2056] Bluetooth: hci5: command 0x041b tx timeout [ 38.700176][ T8444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.712270][ T8444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.722193][ T8444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 38.732810][ T8444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.743501][ T8444] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.759735][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 38.768718][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.779280][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.793326][ T8450] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.803623][ T8444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.814731][ T8444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.825012][ T8444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 38.835892][ T8444] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 38.846820][ T8444] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.861733][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 38.869721][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 38.877146][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 38.879680][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 38.892211][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 38.899656][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 38.907124][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 38.914521][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.923064][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.931919][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 38.944658][ T8448] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.958418][ T8444] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.972093][ T8444] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.980901][ T8444] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.990049][ T8444] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.006082][ T8446] device veth0_macvtap entered promiscuous mode [ 39.013531][ T37] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.025016][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 01:11:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) write$eventfd(0xffffffffffffffff, 0x0, 0x0) 01:11:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) write$eventfd(0xffffffffffffffff, 0x0, 0x0) [ 39.040471][ T37] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.053351][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.077554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 39.085467][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 39.121537][ T8446] device veth1_macvtap entered promiscuous mode [ 39.196878][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 39.204704][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 39.219412][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.220863][ C1] hrtimer: interrupt took 36521 ns 01:11:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) write$eventfd(0xffffffffffffffff, 0x0, 0x0) [ 39.239070][ T8446] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.253496][ T8446] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.263617][ T8446] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.276079][ T8446] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.286327][ T8446] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.297175][ T8446] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.308314][ T8446] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.320993][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 01:11:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) write$eventfd(0xffffffffffffffff, 0x0, 0x0) [ 39.348514][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.358108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 39.369495][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.380405][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 39.389145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.413577][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.423136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 39.432896][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.445575][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.453785][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 01:11:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) write$eventfd(0xffffffffffffffff, 0x0, 0x0) [ 39.466996][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.480550][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.492144][ T8446] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.493841][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.510621][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.526719][ T8446] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.536559][ T8446] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.567025][ T8446] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.577301][ T8446] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 39.588090][ T8446] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.608535][ T8446] batman_adv: batadv0: Interface activated: batadv_slave_1 01:11:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) write$eventfd(0xffffffffffffffff, 0x0, 0x0) [ 39.621443][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 39.631221][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 39.656644][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.690351][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.701249][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 39.709296][ T35] audit: type=1804 audit(1612487479.701:2): pid=9842 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir836003939/syzkaller.C96qRk/0/bus" dev="sda1" ino=14192 res=1 errno=0 [ 39.739118][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.749274][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.757297][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.763002][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 39.785346][ T8448] device veth0_vlan entered promiscuous mode [ 39.794745][ T8450] device veth0_vlan entered promiscuous mode [ 39.821015][ T8446] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.831436][ T8446] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.840577][ T8446] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.851645][ T8446] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.884153][ T8450] device veth1_vlan entered promiscuous mode [ 39.904321][ T8448] device veth1_vlan entered promiscuous mode [ 39.996150][ T8450] device veth0_macvtap entered promiscuous mode [ 40.037446][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 40.047563][ T4923] Bluetooth: hci0: command 0x040f tx timeout [ 40.047784][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 40.087022][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.105909][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.116310][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.127609][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.141792][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 40.154156][ T8450] device veth1_macvtap entered promiscuous mode [ 40.165998][ T8448] device veth0_macvtap entered promiscuous mode [ 40.179247][ T37] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 40.189278][ T37] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 40.204662][ T8450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.220342][ T8450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.231764][ T8450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.244102][ T8450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.255692][ T8450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.268012][ T8450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.279363][ T8450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.286705][ T4923] Bluetooth: hci1: command 0x040f tx timeout [ 40.291986][ T8450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.307803][ T8450] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.321545][ T8448] device veth1_macvtap entered promiscuous mode [ 40.339707][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.351840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 40.371110][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.391417][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 40.407313][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.427086][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.438467][ T8450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.446547][ T4923] Bluetooth: hci2: command 0x040f tx timeout [ 40.450308][ T8450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.476419][ T8450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.526634][ T4923] Bluetooth: hci3: command 0x040f tx timeout [ 40.528930][ T8450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 01:11:20 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0xef9e6ac921eca398) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004340)={0x2020}, 0x2020) 01:11:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) write$eventfd(0xffffffffffffffff, 0x0, 0x0) [ 40.559728][ T35] audit: type=1804 audit(1612487480.561:3): pid=9842 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir836003939/syzkaller.C96qRk/0/bus" dev="sda1" ino=14192 res=1 errno=0 [ 40.562416][ T8450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.610270][ T8450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.639044][ T8450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.662755][ T8450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.679166][ T8450] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.686760][ T4923] Bluetooth: hci4: command 0x040f tx timeout [ 40.702639][ T37] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 40.706343][ T8448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.715719][ T37] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 40.743626][ T8448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.753820][ T8448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.766910][ T4923] Bluetooth: hci5: command 0x040f tx timeout [ 40.767189][ T8448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.783361][ T8448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.795116][ T8448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.808927][ T35] audit: type=1804 audit(1612487480.811:4): pid=9888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir836003939/syzkaller.C96qRk/1/bus" dev="sda1" ino=14198 res=1 errno=0 [ 40.814076][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 40.862633][ T8448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.896026][ T8448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.927553][ T8448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.938926][ T8448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.969735][ T8448] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.977869][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.987461][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.996330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 41.004958][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.020216][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.043641][ T8450] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.058327][ T8450] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.071373][ T8450] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.084323][ T8450] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.101212][ T8448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.112846][ T8448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.123347][ T8448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.134779][ T8448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.145523][ T8448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.157987][ T8448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.168433][ T8448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.179314][ T8448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.189683][ T8448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.200839][ T8448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.212759][ T8448] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.223631][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.233664][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.264767][ T8448] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.278913][ T8448] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.313277][ T8448] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.349354][ T8448] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 01:11:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8980, 0x0) 01:11:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) write$eventfd(0xffffffffffffffff, 0x0, 0x0) [ 41.469101][ T37] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.492816][ T37] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 41.548037][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 41.622832][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.630740][ T37] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.644743][ T37] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 41.655259][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 41.678724][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 41.686800][ T2056] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 41.700241][ T37] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.715705][ T37] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 01:11:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_opts(r0, 0x84, 0x8, 0x0, &(0x7f0000000540)) [ 41.727651][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 01:11:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000040)=@builtin='builtin_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)=@builtin='builtin_trusted\x00') 01:11:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca59d5bdbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c33367d2eabe07f4d16fee49613327a14076dd26b4053a755b8fe46a0bd3871bc24c2c17be5b6ce40fb88824431a0d00b76a55e6e21837b68c575485c29582a6134fd2aea2fef1cc7a049d7d6b362c500f0000c802afab791b91c597d8779da9281d303693ebdb1427e3b3c189f7346fde70d13a058856d7772bcbedcd1655e36aa17c32decf372403761ea1cd5ce59876169bed9ab9243b27de505af7fd104f562cd3f3525fc8ea2bffddb1eb96c69ce3d98cacabbb989cbba78b1e4d4aae6ecc4c27f06e511caeb3fe9d8e37a7160fcd6f45656162d4c2dc34d5a3bbd82c32214345fba154cc4aa4a4eafdc4f14241e1bb92420c0237b7f7f498d7ab7482219d9dd9c7bdfad56159e179ad875c04baf8d7b5526293ea2985c4dd9c8144958ac8ebe1a53f2dc94ba62cf81032de4ae97a"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8980, 0x0) 01:11:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb83, 0x0) dup2(r0, r1) write$eventfd(0xffffffffffffffff, 0x0, 0x0) 01:11:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_opts(r0, 0x84, 0x8, 0x0, &(0x7f0000000540)) 01:11:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000040)=@builtin='builtin_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)=@builtin='builtin_trusted\x00') 01:11:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8980, 0x0) 01:11:22 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0xef9e6ac921eca398) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004340)={0x2020}, 0x2020) 01:11:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_opts(r0, 0x84, 0x8, 0x0, &(0x7f0000000540)) [ 41.925646][ T9888] syz-executor.0 (9888) used greatest stack depth: 9360 bytes left 01:11:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000040)=@builtin='builtin_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)=@builtin='builtin_trusted\x00') 01:11:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_opts(r0, 0x84, 0x8, 0x0, &(0x7f0000000540)) 01:11:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) [ 42.126390][ T2056] Bluetooth: hci0: command 0x0419 tx timeout [ 42.238119][ T35] audit: type=1804 audit(1612487482.241:5): pid=9987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir836003939/syzkaller.C96qRk/2/bus" dev="sda1" ino=14212 res=1 errno=0 [ 42.274052][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 42.366512][ T2056] Bluetooth: hci1: command 0x0419 tx timeout [ 42.526260][ T4923] Bluetooth: hci2: command 0x0419 tx timeout [ 42.606604][ T4923] Bluetooth: hci3: command 0x0419 tx timeout [ 42.766217][ T4923] Bluetooth: hci4: command 0x0419 tx timeout [ 42.846213][ T4923] Bluetooth: hci5: command 0x0419 tx timeout 01:11:23 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0xef9e6ac921eca398) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004340)={0x2020}, 0x2020) 01:11:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca59d5bdbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c33367d2eabe07f4d16fee49613327a14076dd26b4053a755b8fe46a0bd3871bc24c2c17be5b6ce40fb88824431a0d00b76a55e6e21837b68c575485c29582a6134fd2aea2fef1cc7a049d7d6b362c500f0000c802afab791b91c597d8779da9281d303693ebdb1427e3b3c189f7346fde70d13a058856d7772bcbedcd1655e36aa17c32decf372403761ea1cd5ce59876169bed9ab9243b27de505af7fd104f562cd3f3525fc8ea2bffddb1eb96c69ce3d98cacabbb989cbba78b1e4d4aae6ecc4c27f06e511caeb3fe9d8e37a7160fcd6f45656162d4c2dc34d5a3bbd82c32214345fba154cc4aa4a4eafdc4f14241e1bb92420c0237b7f7f498d7ab7482219d9dd9c7bdfad56159e179ad875c04baf8d7b5526293ea2985c4dd9c8144958ac8ebe1a53f2dc94ba62cf81032de4ae97a"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8980, 0x0) 01:11:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_opts(r0, 0x84, 0x8, 0x0, &(0x7f0000000540)) 01:11:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8980, 0x0) 01:11:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8980, 0x0) 01:11:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="6800000010000300"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000480012800e0001006970366772657461700000003400028006000f00070000000800040000000000080014030000000008000400ffffffff080015002d71000006000e"], 0x68}}, 0x0) 01:11:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8980, 0x0) 01:11:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca59d5bdbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c33367d2eabe07f4d16fee49613327a14076dd26b4053a755b8fe46a0bd3871bc24c2c17be5b6ce40fb88824431a0d00b76a55e6e21837b68c575485c29582a6134fd2aea2fef1cc7a049d7d6b362c500f0000c802afab791b91c597d8779da9281d303693ebdb1427e3b3c189f7346fde70d13a058856d7772bcbedcd1655e36aa17c32decf372403761ea1cd5ce59876169bed9ab9243b27de505af7fd104f562cd3f3525fc8ea2bffddb1eb96c69ce3d98cacabbb989cbba78b1e4d4aae6ecc4c27f06e511caeb3fe9d8e37a7160fcd6f45656162d4c2dc34d5a3bbd82c32214345fba154cc4aa4a4eafdc4f14241e1bb92420c0237b7f7f498d7ab7482219d9dd9c7bdfad56159e179ad875c04baf8d7b5526293ea2985c4dd9c8144958ac8ebe1a53f2dc94ba62cf81032de4ae97a"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8980, 0x0) 01:11:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_opts(r0, 0x84, 0x8, 0x0, &(0x7f0000000540)) 01:11:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8980, 0x0) [ 43.337829][ T35] audit: type=1804 audit(1612487483.342:6): pid=10033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir836003939/syzkaller.C96qRk/3/bus" dev="sda1" ino=14192 res=1 errno=0 [ 43.344517][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 43.617374][T10030] ================================================================== [ 43.625446][T10030] BUG: KCSAN: data-race in __xa_clear_mark / find_get_pages_range_tag [ 43.633580][T10030] [ 43.635887][T10030] write to 0xffff88810fb72b30 of 8 bytes by task 68 on cpu 0: [ 43.643318][T10030] __xa_clear_mark+0xff/0x1e0 [ 43.647976][T10030] test_clear_page_writeback+0x321/0x520 [ 43.653592][T10030] end_page_writeback+0xd7/0x260 [ 43.658511][T10030] ext4_finish_bio+0x429/0x480 [ 43.663270][T10030] ext4_release_io_end+0x98/0x200 [ 43.668274][T10030] ext4_end_io_rsv_work+0x306/0x360 [ 43.673451][T10030] process_one_work+0x3e1/0x950 [ 43.678279][T10030] worker_thread+0x616/0xa70 [ 43.682872][T10030] kthread+0x20b/0x230 [ 43.686940][T10030] ret_from_fork+0x1f/0x30 [ 43.691342][T10030] [ 43.693648][T10030] read to 0xffff88810fb72b30 of 8 bytes by task 10030 on cpu 1: [ 43.701248][T10030] find_get_pages_range_tag+0x35c/0x600 [ 43.706768][T10030] pagevec_lookup_range_tag+0x37/0x50 [ 43.712116][T10030] __filemap_fdatawait_range+0xab/0x1b0 [ 43.717647][T10030] file_write_and_wait_range+0xea/0x120 [ 43.723167][T10030] ext4_sync_file+0x105/0x6e0 [ 43.727836][T10030] vfs_fsync_range+0x107/0x120 [ 43.732664][T10030] ext4_buffered_write_iter+0x38f/0x3e0 [ 43.738188][T10030] ext4_file_write_iter+0x47a/0x1060 [ 43.743452][T10030] do_iter_readv_writev+0x2cb/0x360 [ 43.748662][T10030] do_iter_write+0x112/0x4c0 [ 43.753267][T10030] vfs_iter_write+0x4c/0x70 [ 43.757757][T10030] iter_file_splice_write+0x41a/0x770 [ 43.763125][T10030] direct_splice_actor+0x80/0xa0 [ 43.768043][T10030] splice_direct_to_actor+0x345/0x650 [ 43.773395][T10030] do_splice_direct+0xf5/0x170 [ 43.778142][T10030] do_sendfile+0x5e0/0xcf0 [ 43.782557][T10030] __x64_sys_sendfile64+0xf2/0x130 [ 43.787650][T10030] do_syscall_64+0x39/0x80 [ 43.792052][T10030] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 43.797924][T10030] [ 43.800233][T10030] Reported by Kernel Concurrency Sanitizer on: [ 43.806355][T10030] CPU: 1 PID: 10030 Comm: syz-executor.0 Not tainted 5.11.0-rc6-syzkaller #0 [ 43.815087][T10030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 43.825119][T10030] ================================================================== [ 43.833151][T10030] Kernel panic - not syncing: panic_on_warn set ... [ 43.839712][T10030] CPU: 1 PID: 10030 Comm: syz-executor.0 Not tainted 5.11.0-rc6-syzkaller #0 [ 43.848448][T10030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 43.858490][T10030] Call Trace: [ 43.861751][T10030] dump_stack+0x116/0x15d [ 43.866100][T10030] panic+0x1e7/0x5fa [ 43.869979][T10030] ? vprintk_emit+0x2e2/0x360 [ 43.874661][T10030] kcsan_report+0x67b/0x680 [ 43.879158][T10030] ? kcsan_setup_watchpoint+0x472/0x4d0 [ 43.884681][T10030] ? find_get_pages_range_tag+0x35c/0x600 [ 43.890382][T10030] ? pagevec_lookup_range_tag+0x37/0x50 [ 43.895905][T10030] ? __filemap_fdatawait_range+0xab/0x1b0 [ 43.901628][T10030] ? file_write_and_wait_range+0xea/0x120 [ 43.907329][T10030] ? ext4_sync_file+0x105/0x6e0 [ 43.912175][T10030] ? vfs_fsync_range+0x107/0x120 [ 43.917095][T10030] ? ext4_buffered_write_iter+0x38f/0x3e0 [ 43.922800][T10030] ? ext4_file_write_iter+0x47a/0x1060 [ 43.928236][T10030] ? do_iter_readv_writev+0x2cb/0x360 [ 43.933584][T10030] ? do_iter_write+0x112/0x4c0 [ 43.938325][T10030] ? vfs_iter_write+0x4c/0x70 [ 43.942983][T10030] ? iter_file_splice_write+0x41a/0x770 [ 43.948531][T10030] ? direct_splice_actor+0x80/0xa0 [ 43.953629][T10030] ? splice_direct_to_actor+0x345/0x650 [ 43.959155][T10030] ? do_splice_direct+0xf5/0x170 [ 43.964080][T10030] ? do_sendfile+0x5e0/0xcf0 [ 43.968649][T10030] ? __x64_sys_sendfile64+0xf2/0x130 [ 43.973911][T10030] ? do_syscall_64+0x39/0x80 [ 43.978493][T10030] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 43.984543][T10030] ? _raw_spin_unlock_irq+0x22/0x40 [ 43.989744][T10030] ? finish_task_switch+0xc0/0x2a0 [ 43.994840][T10030] ? __schedule+0x3c1/0x580 [ 43.999330][T10030] kcsan_setup_watchpoint+0x472/0x4d0 [ 44.004708][T10030] find_get_pages_range_tag+0x35c/0x600 [ 44.010247][T10030] pagevec_lookup_range_tag+0x37/0x50 [ 44.015598][T10030] __filemap_fdatawait_range+0xab/0x1b0 [ 44.021148][T10030] file_write_and_wait_range+0xea/0x120 [ 44.026671][T10030] ext4_sync_file+0x105/0x6e0 [ 44.031337][T10030] ? tsan.module_ctor+0x10/0x10 [ 44.036163][T10030] vfs_fsync_range+0x107/0x120 [ 44.040925][T10030] ext4_buffered_write_iter+0x38f/0x3e0 [ 44.046454][T10030] ext4_file_write_iter+0x47a/0x1060 [ 44.051721][T10030] ? generic_file_buffered_read+0x981/0x9c0 [ 44.057591][T10030] do_iter_readv_writev+0x2cb/0x360 [ 44.062773][T10030] do_iter_write+0x112/0x4c0 [ 44.067382][T10030] ? kmalloc_array+0x2d/0x40 [ 44.071969][T10030] vfs_iter_write+0x4c/0x70 [ 44.076462][T10030] iter_file_splice_write+0x41a/0x770 [ 44.081849][T10030] ? splice_from_pipe+0xc0/0xc0 [ 44.086699][T10030] direct_splice_actor+0x80/0xa0 [ 44.091635][T10030] splice_direct_to_actor+0x345/0x650 [ 44.097006][T10030] ? do_splice_direct+0x170/0x170 [ 44.102028][T10030] do_splice_direct+0xf5/0x170 [ 44.106796][T10030] do_sendfile+0x5e0/0xcf0 [ 44.111229][T10030] __x64_sys_sendfile64+0xf2/0x130 [ 44.116353][T10030] do_syscall_64+0x39/0x80 [ 44.120778][T10030] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 44.126681][T10030] RIP: 0033:0x465b09 [ 44.130575][T10030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 44.150182][T10030] RSP: 002b:00007ff997592188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 44.158590][T10030] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 [ 44.166556][T10030] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 44.174521][T10030] RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 [ 44.182483][T10030] R10: 00008080fffffffe R11: 0000000000000246 R12: 000000000056bf60 [ 44.190453][T10030] R13: 00007ffdadf7456f R14: 00007ff997592300 R15: 0000000000022000 [ 44.199035][T10030] Kernel Offset: disabled [ 44.203344][T10030] Rebooting in 86400 seconds..