IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 BUG: sleeping function called from invalid context at net/mac80211/sta_info.c:1850 IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready in_atomic(): 0, irqs_disabled(): 0, pid: 7, name: kworker/u4:0 4 locks held by kworker/u4:0/7: #0: 000000008b1a63c8 ((wq_completion)"%s"wiphy_name(local->hw.wiphy)){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2126 IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready #1: 00000000296de766 ((work_completion)(&sdata->work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2130 #2: 00000000f4457d3b (&wdev->mtx){+.+.}, at: sdata_lock net/mac80211/ieee80211_i.h:990 [inline] #2: 00000000f4457d3b (&wdev->mtx){+.+.}, at: ieee80211_ibss_work+0x85/0xe10 net/mac80211/ibss.c:1675 wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 F2FS-fs (loop2): Found nat_bits in checkpoint wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 #3: 00000000077bd9ee (rcu_read_lock){....}, at: sta_info_insert_finish net/mac80211/sta_info.c:573 [inline] #3: 00000000077bd9ee (rcu_read_lock){....}, at: sta_info_insert_rcu+0x48e/0x2310 net/mac80211/sta_info.c:661 IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready Preemption disabled at: [] rcu_lockdep_current_cpu_online kernel/rcu/tree.c:1076 [inline] [] rcu_lockdep_current_cpu_online+0x32/0x1b0 kernel/rcu/tree.c:1068 IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready CPU: 0 PID: 7 Comm: kworker/u4:0 Not tainted 4.19.159-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 Workqueue: phy10 ieee80211_iface_work Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6196 sta_info_move_state+0x32/0x900 net/mac80211/sta_info.c:1850 sta_info_free+0x55/0x390 net/mac80211/sta_info.c:260 sta_info_insert_rcu+0x517/0x2310 net/mac80211/sta_info.c:667 ieee80211_ibss_finish_sta+0x25b/0x360 net/mac80211/ibss.c:601 ieee80211_ibss_work+0x2b6/0xe10 net/mac80211/ibss.c:1692 ieee80211_iface_work+0x7ba/0x8a0 net/mac80211/iface.c:1366 process_one_work+0x864/0x1570 kernel/workqueue.c:2155 worker_thread+0x64c/0x1130 kernel/workqueue.c:2298 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 F2FS-fs (loop2): Mounted with checkpoint version = 7ad43cd6 wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. audit: type=1804 audit(1606088853.398:8): pid=9798 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir821059251/syzkaller.Jj9PyM/6/bus" dev="sda1" ino=15774 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. can: request_module (can-proto-5) failed. can: request_module (can-proto-5) failed. audit: type=1804 audit(1606088853.568:9): pid=9819 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir821059251/syzkaller.Jj9PyM/6/bus" dev="sda1" ino=15774 res=1 audit: type=1804 audit(1606088853.728:10): pid=9829 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir718461720/syzkaller.DEsvv0/3/bus" dev="sda1" ino=15751 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1606088853.959:11): pid=9835 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir718461720/syzkaller.DEsvv0/3/bus" dev="sda1" ino=15751 res=1 IPVS: ftp: loaded support on port[0] = 21 A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. IPVS: ftp: loaded support on port[0] = 21 mkiss: ax0: crc mode is auto. BTRFS: device fsid d88232b7-c075-4c75-84d4-2c2a6bce9b9c devid 1 transid 7 /dev/loop1 netlink: 'syz-executor.1': attribute type 1 has an invalid length. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. BTRFS info (device loop1): use no compression BTRFS info (device loop1): turning on discard BTRFS info (device loop1): disk space caching is enabled BTRFS info (device loop1): has skinny extents attempt to access beyond end of device loop1: rw=4096, want=2064, limit=267 new mount options do not match the existing superblock, will be ignored BTRFS error (device loop1): failed to read chunk root new mount options do not match the existing superblock, will be ignored BTRFS error (device loop1): open_ctree failed BTRFS info (device loop1): use no compression BTRFS info (device loop1): turning on discard netlink: 'syz-executor.1': attribute type 1 has an invalid length. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. BTRFS info (device loop1): disk space caching is enabled BTRFS info (device loop1): has skinny extents BTRFS error (device loop1): open_ctree failed tmpfs: Bad value 'alwaysü¥‰ñ× Äao}‘¯iòÝ»Q£O^Gõ¶)ÇÒ ÞµJž*g­FFY„dÖ•' for mount option 'huge' kauditd_printk_skb: 3 callbacks suppressed audit: type=1804 audit(1606088857.249:15): pid=10140 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir821059251/syzkaller.Jj9PyM/13/bus" dev="sda1" ino=15778 res=1 audit: type=1800 audit(1606088857.429:16): pid=10151 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15784 res=0 audit: type=1800 audit(1606088857.429:17): pid=10151 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15784 res=0 audit: type=1800 audit(1606088857.449:18): pid=10160 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15784 res=0 syz-executor.1 (10219) used greatest stack depth: 23288 bytes left netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1606088860.619:19): pid=10364 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir718461720/syzkaller.DEsvv0/12/bus" dev="sda1" ino=15805 res=1 overlayfs: failed to resolve './file0': -2 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. overlayfs: workdir and upperdir must reside under the same mount audit: type=1804 audit(1606088860.649:20): pid=10364 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir718461720/syzkaller.DEsvv0/12/bus" dev="sda1" ino=15805 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables xt_connbytes: Forcing CT accounting to be enabled xt_CT: You must specify a L4 protocol and not use inversions on it sd 0:0:1:0: tag#2784 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK sd 0:0:1:0: tag#2784 CDB: Read(6) 08 00 00 00 00 00 overlayfs: filesystem on './bus' not supported as upperdir sd 0:0:1:0: tag#2788 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK sd 0:0:1:0: tag#2788 CDB: Read(6) 08 00 00 00 00 00