Warning: Permanently added '10.128.0.165' (ECDSA) to the list of known hosts. 2020/10/29 07:10:27 fuzzer started 2020/10/29 07:10:28 dialing manager at 10.128.0.26:34133 2020/10/29 07:10:28 syscalls: 3449 2020/10/29 07:10:28 code coverage: enabled 2020/10/29 07:10:28 comparison tracing: enabled 2020/10/29 07:10:28 extra coverage: enabled 2020/10/29 07:10:28 setuid sandbox: enabled 2020/10/29 07:10:28 namespace sandbox: enabled 2020/10/29 07:10:28 Android sandbox: /sys/fs/selinux/policy does not exist 2020/10/29 07:10:28 fault injection: enabled 2020/10/29 07:10:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/10/29 07:10:28 net packet injection: enabled 2020/10/29 07:10:28 net device setup: enabled 2020/10/29 07:10:28 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/10/29 07:10:28 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/10/29 07:10:28 USB emulation: enabled 2020/10/29 07:10:28 hci packet injection: enabled 2020/10/29 07:10:28 wifi device emulation: enabled 07:12:09 executing program 0: 07:12:09 executing program 1: 07:12:09 executing program 2: 07:12:09 executing program 3: 07:12:10 executing program 4: 07:12:10 executing program 5: syzkaller login: [ 168.893860][ T8490] IPVS: ftp: loaded support on port[0] = 21 [ 169.139978][ T8490] chnl_net:caif_netlink_parms(): no params data found [ 169.166956][ T8492] IPVS: ftp: loaded support on port[0] = 21 [ 169.235659][ T8490] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.287060][ T8490] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.311965][ T8490] device bridge_slave_0 entered promiscuous mode [ 169.329900][ T8490] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.338354][ T8490] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.349657][ T8490] device bridge_slave_1 entered promiscuous mode [ 169.391325][ T8490] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.396772][ T8494] IPVS: ftp: loaded support on port[0] = 21 [ 169.405089][ T8490] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.490529][ T8496] IPVS: ftp: loaded support on port[0] = 21 [ 169.573136][ T8490] team0: Port device team_slave_0 added [ 169.582161][ T8490] team0: Port device team_slave_1 added [ 169.695201][ T8492] chnl_net:caif_netlink_parms(): no params data found [ 169.719693][ T8490] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 169.741616][ T8490] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 169.777974][ T8490] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 169.826286][ T8498] IPVS: ftp: loaded support on port[0] = 21 [ 169.827707][ T8490] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 169.840434][ T8490] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 169.867243][ T8490] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 170.077504][ T8490] device hsr_slave_0 entered promiscuous mode [ 170.086656][ T8490] device hsr_slave_1 entered promiscuous mode [ 170.113829][ T8511] IPVS: ftp: loaded support on port[0] = 21 [ 170.157713][ T8494] chnl_net:caif_netlink_parms(): no params data found [ 170.220215][ T8492] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.241401][ T8492] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.249440][ T8492] device bridge_slave_0 entered promiscuous mode [ 170.260352][ T8492] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.269445][ T8492] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.278977][ T8492] device bridge_slave_1 entered promiscuous mode [ 170.329814][ T8496] chnl_net:caif_netlink_parms(): no params data found [ 170.349495][ T8492] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.393589][ T8492] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.446038][ T8492] team0: Port device team_slave_0 added [ 170.481900][ T8492] team0: Port device team_slave_1 added [ 170.614430][ T8492] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 170.625206][ T8492] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 170.656504][ T8492] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 170.670115][ T8492] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 170.677875][ T8492] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 170.704658][ T8492] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 170.735604][ T8494] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.743490][ T8494] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.754337][ T8494] device bridge_slave_0 entered promiscuous mode [ 170.765911][ T8494] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.773460][ T8494] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.782919][ T8494] device bridge_slave_1 entered promiscuous mode [ 170.838209][ T8498] chnl_net:caif_netlink_parms(): no params data found [ 170.845876][ T2999] Bluetooth: hci0: command 0x0409 tx timeout [ 170.865474][ T8496] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.874023][ T8496] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.883202][ T8496] device bridge_slave_0 entered promiscuous mode [ 170.897682][ T8494] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.941282][ T8496] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.948494][ T8496] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.964362][ T8496] device bridge_slave_1 entered promiscuous mode [ 170.988637][ T8494] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.012974][ T8492] device hsr_slave_0 entered promiscuous mode [ 171.021806][ T8492] device hsr_slave_1 entered promiscuous mode [ 171.028756][ T8492] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 171.036906][ T8492] Cannot create hsr debugfs directory [ 171.080494][ T8496] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.090287][ T5] Bluetooth: hci1: command 0x0409 tx timeout [ 171.146521][ T8511] chnl_net:caif_netlink_parms(): no params data found [ 171.159022][ T8496] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.181871][ T8494] team0: Port device team_slave_0 added [ 171.234085][ T8490] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 171.264843][ T8494] team0: Port device team_slave_1 added [ 171.301591][ T8490] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 171.321933][ T4156] Bluetooth: hci2: command 0x0409 tx timeout [ 171.362770][ T8496] team0: Port device team_slave_0 added [ 171.389278][ T8494] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 171.397342][ T8494] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.425054][ T8494] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 171.445190][ T8490] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 171.461455][ T8498] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.468567][ T8498] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.478320][ T8498] device bridge_slave_0 entered promiscuous mode [ 171.488653][ T8496] team0: Port device team_slave_1 added [ 171.490990][ T2999] Bluetooth: hci3: command 0x0409 tx timeout [ 171.506610][ T8494] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 171.515068][ T8494] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.542110][ T8494] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 171.554742][ T8490] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 171.576061][ T8498] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.583859][ T8498] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.593085][ T8498] device bridge_slave_1 entered promiscuous mode [ 171.619890][ T8511] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.627514][ T8511] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.638097][ T8511] device bridge_slave_0 entered promiscuous mode [ 171.647684][ T8511] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.655644][ T8511] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.664572][ T8511] device bridge_slave_1 entered promiscuous mode [ 171.708700][ T8498] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.720926][ T2999] Bluetooth: hci4: command 0x0409 tx timeout [ 171.748182][ T8496] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 171.759700][ T8496] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.788042][ T8496] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 171.803054][ T8498] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.831154][ T8511] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.843829][ T8498] team0: Port device team_slave_0 added [ 171.861038][ T8496] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 171.868413][ T8496] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.896984][ T8496] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 171.910365][ T8511] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.937038][ T8494] device hsr_slave_0 entered promiscuous mode [ 171.944385][ T8494] device hsr_slave_1 entered promiscuous mode [ 171.951362][ T8494] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 171.959054][ T8494] Cannot create hsr debugfs directory [ 171.961517][ T3190] Bluetooth: hci5: command 0x0409 tx timeout [ 171.977322][ T8498] team0: Port device team_slave_1 added [ 172.094032][ T8511] team0: Port device team_slave_0 added [ 172.106393][ T8496] device hsr_slave_0 entered promiscuous mode [ 172.126741][ T8496] device hsr_slave_1 entered promiscuous mode [ 172.134570][ T8496] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 172.143157][ T8496] Cannot create hsr debugfs directory [ 172.149896][ T8498] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 172.157637][ T8498] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.184862][ T8498] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 172.198576][ T8498] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 172.206596][ T8498] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.233864][ T8498] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 172.250725][ T8511] team0: Port device team_slave_1 added [ 172.331728][ T8511] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 172.339888][ T8511] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.371600][ T8511] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 172.387456][ T8511] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 172.394807][ T8511] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.421636][ T8511] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 172.468092][ T8498] device hsr_slave_0 entered promiscuous mode [ 172.477341][ T8498] device hsr_slave_1 entered promiscuous mode [ 172.487327][ T8498] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 172.496005][ T8498] Cannot create hsr debugfs directory [ 172.539543][ T8492] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 172.590563][ T8492] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 172.610364][ T8492] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 172.638113][ T8511] device hsr_slave_0 entered promiscuous mode [ 172.647222][ T8511] device hsr_slave_1 entered promiscuous mode [ 172.655176][ T8511] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 172.662926][ T8511] Cannot create hsr debugfs directory [ 172.677692][ T8490] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.698900][ T8492] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 172.806368][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.818649][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.843501][ T8494] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 172.860537][ T8494] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 172.893450][ T8490] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.920906][ T3190] Bluetooth: hci0: command 0x041b tx timeout [ 172.930066][ T8494] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 172.985146][ T8494] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 172.996295][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.007315][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.017034][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.024642][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.095190][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.105938][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.117187][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.126833][ T4156] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.134989][ T4156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.145154][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.164534][ T5] Bluetooth: hci1: command 0x041b tx timeout [ 173.200008][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.242669][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.265216][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.281882][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.292985][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.304170][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.331409][ T8496] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 173.341513][ T8496] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 173.357774][ T8496] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 173.368611][ T8496] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 173.401221][ T3190] Bluetooth: hci2: command 0x041b tx timeout [ 173.409120][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.420661][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.461327][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.477429][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.489604][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.519270][ T8498] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 173.560925][ T3190] Bluetooth: hci3: command 0x041b tx timeout [ 173.571060][ T8498] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 173.585832][ T8498] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 173.628352][ T8498] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 173.669193][ T8492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.687772][ T8494] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.737976][ T8511] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 173.749023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 173.764474][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 173.772548][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.780283][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.796481][ T8492] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.803648][ T2999] Bluetooth: hci4: command 0x041b tx timeout [ 173.824460][ T8490] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.834451][ T8494] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.843348][ T8511] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 173.857854][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.867232][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.906568][ T8511] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 173.916152][ T8511] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 173.937702][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.946969][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.955606][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.962760][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.970980][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.979749][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.988463][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.995641][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.003491][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.012286][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.020697][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.027857][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.035739][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.056695][ T2999] Bluetooth: hci5: command 0x041b tx timeout [ 174.077160][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.086187][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.095263][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.104408][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.114313][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.124113][ T4156] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.131273][ T4156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.138905][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.151757][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 174.160489][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 174.213427][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.222815][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.232862][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.241891][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.250380][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.260309][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.269657][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.278682][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.288044][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.331819][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.340418][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.349687][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.359065][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.369644][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.378561][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.387838][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.396704][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.417578][ T8496] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.435825][ T8492] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 174.447740][ T8492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.468686][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.477959][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.487427][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 174.496523][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.518047][ T8496] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.541834][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.549662][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.565367][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.573923][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.582206][ T8490] device veth0_vlan entered promiscuous mode [ 174.611622][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.620314][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.629848][ T3190] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.637034][ T3190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.645268][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 174.653202][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 174.678562][ T8494] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.703081][ T8498] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.710042][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.719079][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 174.727800][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 174.735441][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.744838][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.753538][ T9062] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.760615][ T9062] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.774389][ T8490] device veth1_vlan entered promiscuous mode [ 174.797550][ T8492] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.814065][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.857933][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.866528][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.879305][ T8498] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.901006][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.914484][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 174.923720][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 174.990235][ T8511] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.001012][ T5] Bluetooth: hci0: command 0x040f tx timeout [ 175.008336][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.024028][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.036239][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.051357][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.062850][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.081957][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.101254][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.108364][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.129736][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 175.138835][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.148760][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.157906][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.167901][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.175060][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.217366][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.229930][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.238531][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.241508][ T3190] Bluetooth: hci1: command 0x040f tx timeout [ 175.256721][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.266526][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 175.275258][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 175.284275][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.293203][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.302800][ T8490] device veth0_macvtap entered promiscuous mode [ 175.320338][ T8490] device veth1_macvtap entered promiscuous mode [ 175.339904][ T8492] device veth0_vlan entered promiscuous mode [ 175.367169][ T8496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.378536][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 175.388892][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 175.398376][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 175.407752][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.416935][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 175.425867][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.435220][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.444291][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.453278][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.461196][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.470701][ T8494] device veth0_vlan entered promiscuous mode [ 175.481933][ T9062] Bluetooth: hci2: command 0x040f tx timeout [ 175.497929][ T8494] device veth1_vlan entered promiscuous mode [ 175.515669][ T8511] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.528652][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.537589][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.546212][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.554251][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.562928][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 175.588034][ T8492] device veth1_vlan entered promiscuous mode [ 175.610153][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.619843][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.629292][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.638547][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.648125][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.656793][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.665385][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.674011][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.682631][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 175.690093][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 175.701609][ T8490] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 175.723229][ T9062] Bluetooth: hci3: command 0x040f tx timeout [ 175.749613][ T8496] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.759782][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.773581][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.782894][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 175.791958][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.800519][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.810176][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.819991][ T3190] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.827206][ T3190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.834996][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.843878][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.852555][ T3190] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.859645][ T3190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.867423][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.880056][ T8490] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 175.889951][ T5] Bluetooth: hci4: command 0x040f tx timeout [ 175.919844][ T8490] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 175.931448][ T8490] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 175.940164][ T8490] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 175.948952][ T8490] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 175.972168][ T8492] device veth0_macvtap entered promiscuous mode [ 175.979323][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.988615][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 175.998297][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.007056][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.016460][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.025153][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.078641][ T8492] device veth1_macvtap entered promiscuous mode [ 176.086587][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 176.099269][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.107892][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.117151][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.126376][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.130847][ T2999] Bluetooth: hci5: command 0x040f tx timeout [ 176.135599][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.148966][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 176.157712][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.167610][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.190921][ T8498] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.199186][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.218868][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.229881][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 176.242780][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 176.250250][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.266238][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.277755][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.286906][ T9062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.306120][ T8494] device veth0_macvtap entered promiscuous mode [ 176.322128][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.359305][ T8496] device veth0_vlan entered promiscuous mode [ 176.386470][ T8492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 176.397969][ T8492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.411482][ T8492] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 176.422836][ T8494] device veth1_macvtap entered promiscuous mode [ 176.463400][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 176.471992][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.480060][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.497008][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.506079][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.519608][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.530128][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.543951][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.560639][ T8496] device veth1_vlan entered promiscuous mode [ 176.576780][ T8492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.588307][ T8492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.600055][ T8492] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 176.622465][ T8492] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.631549][ T8492] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.640339][ T8492] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.652516][ T8492] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.711379][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.722698][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.732775][ T8494] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 176.744950][ T8494] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.756340][ T8494] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 176.780848][ T8494] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.802267][ T8494] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 176.862249][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.894195][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.907592][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 176.916918][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.936086][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 176.945138][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 176.992341][ T8494] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.012309][ T8494] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.029768][ T8494] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.040689][ T8494] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.053628][ T8494] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 177.063780][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.073585][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.083021][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.091889][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.100504][ T17] Bluetooth: hci0: command 0x0419 tx timeout [ 177.107559][ T8496] device veth0_macvtap entered promiscuous mode [ 177.128831][ T7] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.134093][ T8511] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 177.144584][ T7] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.161631][ T8494] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.170370][ T8494] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.190498][ T8494] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.202824][ T8494] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.238009][ T8496] device veth1_macvtap entered promiscuous mode [ 177.254374][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 177.263788][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.273505][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 177.314756][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 177.324503][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.334666][ T4156] Bluetooth: hci1: command 0x0419 tx timeout [ 177.360407][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.392105][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.392296][ T8498] device veth0_vlan entered promiscuous mode [ 177.433889][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.451796][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.460321][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 177.501902][ T1084] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.509963][ T1084] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.520568][ T8496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 177.533027][ T8496] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.546633][ T8496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 177.557724][ T8496] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.569020][ T9748] Bluetooth: hci2: command 0x0419 tx timeout [ 177.581335][ T8496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 177.596574][ T8496] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.608397][ T8496] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 177.620187][ T8496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.631309][ T8496] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.643833][ T8496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.654669][ T8496] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.666124][ T8496] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.676790][ T8496] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.689438][ T8496] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 177.714511][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 177.723885][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.734453][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.743736][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.753205][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.772513][ T8498] device veth1_vlan entered promiscuous mode [ 177.801413][ T9796] Bluetooth: hci3: command 0x0419 tx timeout [ 177.803938][ T8496] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.817968][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.826997][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.837910][ T8496] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 07:12:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) [ 177.881558][ T8496] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.890302][ T8496] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.932109][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 177.961645][ T9796] Bluetooth: hci4: command 0x0419 tx timeout 07:12:19 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/ocfs2_control\x00', 0x220000, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) [ 178.053563][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 178.066736][ T4156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 07:12:19 executing program 1: syz_open_dev$usbfs(&(0x7f0000000700)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) [ 178.123222][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 178.167775][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 178.202549][ T4156] Bluetooth: hci5: command 0x0419 tx timeout 07:12:19 executing program 0: r0 = socket(0xa, 0x3, 0x6) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={0x0}}, 0x0) [ 178.269119][ T9796] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 178.297328][ T9796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 07:12:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0x5, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="000228bd701affdbdf250400000000000b003b00000000000500ff010000000000000000000000000001000004000200000006000b0010000000a019279309cd89f6cd3ed3d7f1d0a6764ce191229fe3b8a56c9270f96b002f4c2e225c79927a4c238a93e1fbf896e87c8fc196afdcab759ce60910ca94697c6ee97e028941e8107661784911b5c34bb7d727f1f7894d27c82aed292c78655bf4e1d0beed0cf55d14938f9ae83ad69458680c6d3bf43ea631fb66e8"], 0x4c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) [ 178.315766][ T9796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.329887][ T9796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 178.352464][ T9796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 07:12:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x1, 0x401}, 0x14}}, 0x0) [ 178.383463][ T8511] device veth0_vlan entered promiscuous mode [ 178.406072][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 178.416708][ T8498] device veth0_macvtap entered promiscuous mode 07:12:20 executing program 1: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) [ 178.450885][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 178.487182][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.498417][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.523643][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 178.543301][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 178.576260][ T8511] device veth1_vlan entered promiscuous mode [ 178.594031][ T8498] device veth1_macvtap entered promiscuous mode 07:12:20 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/user\x00') [ 178.679638][ T1084] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 178.718288][ T1084] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:12:20 executing program 2: r0 = socket(0x18, 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) [ 178.743476][ T8498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.769251][ T8498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.822312][ T8498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.844884][ T8498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.880594][ T8498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.891571][ T8498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.902784][ T8498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.915312][ T8498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.928947][ T8498] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 178.942414][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 178.950679][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 178.963820][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 178.972954][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 178.982275][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 178.991391][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.033635][ T47] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 179.067706][ T47] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 179.087344][ T8498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.101682][ T8498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.113137][ T8498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.124093][ T8498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.135017][ T8498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.145564][ T8498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.156258][ T8498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.170698][ T8498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.193347][ T8498] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 179.237089][ T8511] device veth0_macvtap entered promiscuous mode [ 179.255075][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 179.273525][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.284115][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.293848][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 179.304057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.314344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 179.334992][ T8498] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.360867][ T8498] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.369630][ T8498] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 07:12:21 executing program 3: shmget(0x3, 0x2000, 0x54000202, &(0x7f0000ffb000/0x2000)=nil) [ 179.394764][ T8498] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.434241][ T8511] device veth1_macvtap entered promiscuous mode [ 179.553287][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.591446][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.610120][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.641795][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.655641][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.667032][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.677494][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.689342][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.700195][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.711576][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.742694][ T8511] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 179.786186][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 179.799089][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 179.808848][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.822878][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.835087][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.845643][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.857080][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.881203][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.899297][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.930931][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.956391][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.967340][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.997765][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.022040][ T8511] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 180.034569][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 180.036947][ T1084] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 180.059530][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.076427][ T8511] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 180.083129][ T1084] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 180.111299][ T8511] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 180.120023][ T8511] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 180.131183][ T8511] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 180.161445][ T3190] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 180.195792][ T47] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 180.215695][ T47] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 180.241890][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 180.308262][ T47] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 180.330556][ T47] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 07:12:22 executing program 4: timer_create(0x7, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{}, {0x0, 0x3938700}}, 0x0) [ 180.354084][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 180.414544][ T1084] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 180.451083][ T1084] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 180.460010][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 07:12:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:12:22 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) 07:12:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x38}}, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 07:12:22 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0xe80}, 0x0, 0x0, &(0x7f0000000140)={0x0}) 07:12:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 07:12:22 executing program 4: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000600)=[{&(0x7f00000001c0)='\n', 0x1}, {&(0x7f0000000280)='9', 0x1, 0xfffffffffffffffb}, {&(0x7f0000000440)="7f", 0x1, 0xf176}], 0x0, 0x0) [ 180.658438][ T9973] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/9973 [ 180.668089][ T9973] caller is lockdep_hardirqs_on_prepare+0x5e/0x410 [ 180.674740][ T9973] CPU: 1 PID: 9973 Comm: syz-executor.4 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 180.684646][ T9973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.694743][ T9973] Call Trace: [ 180.698087][ T9973] dump_stack+0x107/0x163 [ 180.702625][ T9973] check_preemption_disabled+0x123/0x130 [ 180.709070][ T9973] lockdep_hardirqs_on_prepare+0x5e/0x410 [ 180.715161][ T9973] trace_hardirqs_on+0x5b/0x1c0 [ 180.720041][ T9973] __bad_area_nosemaphore+0xc6/0x400 [ 180.725452][ T9973] do_user_addr_fault+0x7d7/0xb40 [ 180.730509][ T9973] exc_page_fault+0x9e/0x180 [ 180.735246][ T9973] ? asm_exc_page_fault+0x8/0x30 [ 180.740217][ T9973] asm_exc_page_fault+0x1e/0x30 [ 180.745089][ T9973] RIP: 0033:0x43c4f6 [ 180.749087][ T9973] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 180.768714][ T9973] RSP: 002b:00007f2363a96a88 EFLAGS: 00010293 [ 180.774814][ T9973] RAX: 0000000000000000 RBX: 00007f2363a96b20 RCX: 0000000000000000 [ 180.782810][ T9973] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 180.790800][ T9973] RBP: 00007f2363a96ae0 R08: 0000000020000648 R09: 0000000000000000 [ 180.798790][ T9973] R10: 000000000000f176 R11: 0000000000000213 R12: 0000000000000000 07:12:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x401, 0x0, 0x0, {0xa}}], {0x14}}, 0x3c}}, 0x0) 07:12:22 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 180.807242][ T9973] R13: 0000000000000000 R14: 0000000020000600 R15: 0000000000000000 [ 180.815412][ T9973] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/9973 [ 180.824848][ T9973] caller is lockdep_hardirqs_on+0x38/0x110 [ 180.830679][ T9973] CPU: 1 PID: 9973 Comm: syz-executor.4 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 180.840585][ T9973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.850655][ T9973] Call Trace: [ 180.854005][ T9973] dump_stack+0x107/0x163 07:12:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x1058}}, 0x0) [ 180.858359][ T9973] check_preemption_disabled+0x123/0x130 [ 180.864014][ T9973] ? __bad_area_nosemaphore+0xc6/0x400 [ 180.869499][ T9973] lockdep_hardirqs_on+0x38/0x110 [ 180.874630][ T9973] __bad_area_nosemaphore+0xc6/0x400 [ 180.879970][ T9973] do_user_addr_fault+0x7d7/0xb40 [ 180.885025][ T9973] exc_page_fault+0x9e/0x180 [ 180.889689][ T9973] ? asm_exc_page_fault+0x8/0x30 [ 180.894734][ T9973] asm_exc_page_fault+0x1e/0x30 [ 180.899601][ T9973] RIP: 0033:0x43c4f6 07:12:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="01"], 0x1c}}, 0x0) [ 180.903518][ T9973] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 180.923140][ T9973] RSP: 002b:00007f2363a96a88 EFLAGS: 00010293 [ 180.929316][ T9973] RAX: 0000000000000000 RBX: 00007f2363a96b20 RCX: 0000000000000000 [ 180.937307][ T9973] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 180.945300][ T9973] RBP: 00007f2363a96ae0 R08: 0000000020000648 R09: 0000000000000000 07:12:22 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='numa_maps\x00') [ 180.953295][ T9973] R10: 000000000000f176 R11: 0000000000000213 R12: 0000000000000000 [ 180.961288][ T9973] R13: 0000000000000000 R14: 0000000020000600 R15: 0000000000000000 07:12:22 executing program 3: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000800)) 07:12:22 executing program 2: r0 = socket(0x25, 0x1, 0x0) sendmsg$rds(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) 07:12:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="74000000020701010000000000000000030000090c00034000000000000000800c000240fffffffffff8eff70900010073797a31000000000800054000000001340007800800024000000001080001"], 0x74}}, 0x0) 07:12:22 executing program 0: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 07:12:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40524, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:12:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x890f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 181.254526][T10001] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 181.506337][ T9973] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/9973 [ 181.515841][ T9973] caller is lockdep_hardirqs_on_prepare+0x5e/0x410 [ 181.522519][ T9973] CPU: 0 PID: 9973 Comm: syz-executor.4 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 181.532424][ T9973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.542503][ T9973] Call Trace: [ 181.545823][ T9973] dump_stack+0x107/0x163 [ 181.550187][ T9973] check_preemption_disabled+0x123/0x130 [ 181.555846][ T9973] lockdep_hardirqs_on_prepare+0x5e/0x410 [ 181.561596][ T9973] trace_hardirqs_on+0x5b/0x1c0 [ 181.566480][ T9973] __bad_area_nosemaphore+0xc6/0x400 [ 181.571806][ T9973] do_user_addr_fault+0x7d7/0xb40 [ 181.576869][ T9973] exc_page_fault+0x9e/0x180 [ 181.581483][ T9973] ? asm_exc_page_fault+0x8/0x30 [ 181.586447][ T9973] asm_exc_page_fault+0x1e/0x30 [ 181.591319][ T9973] RIP: 0033:0x43c4f6 [ 181.595263][ T9973] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 181.614895][ T9973] RSP: 002b:00007f2363a96a88 EFLAGS: 00010293 [ 181.620993][ T9973] RAX: 0000000000000000 RBX: 00007f2363a96b20 RCX: 0000000000000000 [ 181.629025][ T9973] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 181.637047][ T9973] RBP: 00007f2363a96ae0 R08: 0000000020000648 R09: 0000000000000000 [ 181.645041][ T9973] R10: 000000000000f176 R11: 0000000000000213 R12: 0000000000000000 [ 181.653035][ T9973] R13: 0000000000000000 R14: 0000000020000600 R15: 0000000000000000 [ 181.663493][ T9973] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.4/9973 [ 181.673491][ T9973] caller is lockdep_hardirqs_on+0x38/0x110 [ 181.679344][ T9973] CPU: 0 PID: 9973 Comm: syz-executor.4 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 181.689619][ T9973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.699704][ T9973] Call Trace: [ 181.703025][ T9973] dump_stack+0x107/0x163 [ 181.707377][ T9973] check_preemption_disabled+0x123/0x130 [ 181.713055][ T9973] ? __bad_area_nosemaphore+0xc6/0x400 [ 181.718538][ T9973] lockdep_hardirqs_on+0x38/0x110 [ 181.723589][ T9973] __bad_area_nosemaphore+0xc6/0x400 [ 181.728906][ T9973] do_user_addr_fault+0x7d7/0xb40 [ 181.735110][ T9973] exc_page_fault+0x9e/0x180 [ 181.739737][ T9973] ? asm_exc_page_fault+0x8/0x30 [ 181.744708][ T9973] asm_exc_page_fault+0x1e/0x30 [ 181.749599][ T9973] RIP: 0033:0x43c4f6 [ 181.753513][ T9973] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 181.773156][ T9973] RSP: 002b:00007f2363a96a88 EFLAGS: 00010293 [ 181.779227][ T9973] RAX: 0000000000000000 RBX: 00007f2363a96b20 RCX: 0000000000000000 [ 181.787386][ T9973] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 181.795369][ T9973] RBP: 00007f2363a96ae0 R08: 0000000020000648 R09: 0000000000000000 [ 181.803370][ T9973] R10: 000000000000f176 R11: 0000000000000213 R12: 0000000000000000 [ 181.811354][ T9973] R13: 0000000000000000 R14: 0000000020000600 R15: 0000000000000000 07:12:23 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x94) 07:12:23 executing program 0: fstat(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000010c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 07:12:23 executing program 2: statx(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0) 07:12:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x5, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 07:12:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x458, 0xd0, 0x218, 0xffffffff, 0x218, 0x2c0, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ip={@dev, @empty, 0x0, 0x0, 'veth1_to_batadv\x00', 'ip6_vti0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@socket3={{0x28, 'socket\x00'}, 0xa}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @private, @broadcast, @icmp_id}}}}, {{@uncond, 0x0, 0x110, 0x148, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00'}}, @common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @loopback, @private, @gre_key}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @private, @broadcast, @gre_key}}}}, {{@ip={@dev, @private, 0x0, 0x0, 'geneve0\x00', 'tunl0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @multicast2, @multicast2, @gre_key, @icmp_id}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b8) 07:12:23 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:12:23 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000100)) 07:12:23 executing program 1: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/card0/oss_mixer\x00', 0x0, 0x0) write$proc_mixer(r0, 0x0, 0x30) 07:12:23 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20002, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@target={'target ', {'PCI:', '0', ':', '11', ':', '14', '.', '1c'}}, 0x16) 07:12:23 executing program 3: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/ocfs2_control\x00', 0x391000, 0x0) [ 182.055054][T10031] x_tables: duplicate underflow at hook 1 07:12:23 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) dup2(r1, r0) 07:12:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x2, 0x1, 0x3}, 0x14}}, 0x0) 07:12:23 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/cgroups\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 07:12:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:24 executing program 2: getresuid(&(0x7f0000000100), 0xfffffffffffffffe, 0x0) 07:12:24 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) dup2(r1, r0) 07:12:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0xa, 0xa, 0x801, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 07:12:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 07:12:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/stat\x00') openat$cgroup_ro(r0, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) 07:12:24 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000180)={0x7}, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 07:12:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:24 executing program 1: read$usbfs(0xffffffffffffffff, 0x0, 0x0) 07:12:24 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001600)='ns/mnt\x00') 07:12:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:24 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x191a00) 07:12:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)={0x14, 0x1, 0x5, 0x801}, 0x14}}, 0x0) 07:12:24 executing program 4: dup(0xffffffffffffffff) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 07:12:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)=@newqdisc={0x24}, 0x24}}, 0x0) [ 183.066445][ C0] hrtimer: interrupt took 96054 ns 07:12:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="02"], 0x1058}}, 0x0) 07:12:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:24 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x6b, 0x3, 0x8, 0x0, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x0, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT, @CTA_TIMEOUT_ICMP_TIMEOUT, @CTA_TIMEOUT_ICMP_TIMEOUT, @CTA_TIMEOUT_ICMP_TIMEOUT, @CTA_TIMEOUT_ICMP_TIMEOUT, @CTA_TIMEOUT_ICMP_TIMEOUT, @CTA_TIMEOUT_ICMP_TIMEOUT]}]}, 0x14}}, 0x0) 07:12:24 executing program 5: r0 = socket(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004980)={'team0\x00'}) 07:12:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x541b, 0x0) 07:12:24 executing program 0: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)='\v', 0x1, 0x80000000}], 0x0, 0x0) 07:12:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:25 executing program 1: syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000600)={[{@part={'part'}}], [{@context={'context', 0x3d, 'sysadm_u'}}]}) [ 183.405311][T10102] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/10102 [ 183.414920][T10102] caller is lockdep_hardirqs_on_prepare+0x5e/0x410 [ 183.421569][T10102] CPU: 1 PID: 10102 Comm: syz-executor.0 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 183.431596][T10102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.441677][T10102] Call Trace: [ 183.445003][T10102] dump_stack+0x107/0x163 [ 183.449363][T10102] check_preemption_disabled+0x123/0x130 [ 183.455026][T10102] lockdep_hardirqs_on_prepare+0x5e/0x410 [ 183.460866][T10102] trace_hardirqs_on+0x5b/0x1c0 [ 183.465791][T10102] __bad_area_nosemaphore+0xc6/0x400 [ 183.471106][T10102] do_user_addr_fault+0x7d7/0xb40 [ 183.476165][T10102] exc_page_fault+0x9e/0x180 [ 183.477328][T10105] hfs: unable to parse mount options [ 183.480918][T10102] ? asm_exc_page_fault+0x8/0x30 [ 183.480936][T10102] asm_exc_page_fault+0x1e/0x30 [ 183.480949][T10102] RIP: 0033:0x43c4f6 07:12:25 executing program 4: sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_DOMAIN={0xb, 0x1, '](@*\\:\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2={0xfc, 0x2, [], 0x1}}, @NLBL_MGMT_A_CLPDOI={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x6044}, 0x810) r0 = syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x6, &(0x7f0000000540)=[{&(0x7f00000001c0)="6e735925e96dac3c36734e91757e5e7659", 0x11, 0x20}, {&(0x7f0000000200)="1d1092ba47aba1903e927035a25c35b9adba09288b6dc33f91770917e35e0f37354fed0357d3fef7ded750d60e210a41d700ad8c434d3aea80b4c6b2fd617b119f03ff59c73a742661cd74509b286619e3b1262c18d0a0039073cf414981055fdb1d152ad0d70187d4e926b281e52ae2656b5256a955f77de834c11b293fd254b2f9c09de275e9727a8d9d2a0071148a60752638f3bc69480170083598479342b3893d37d592e162b52f920344152c913e8f52e2943f8411093ab2b4c04c679a4830", 0xc2, 0x35}, {&(0x7f0000000300)="9d5709e59138b101973aaaa1a2c9872fec2176e36a733ec868d7860a0f39c88b4400ad893dc93b446d0aaaeec6a5c09d0de8a5c2acc1dc0ae11348e1fd7b81ad5485acf74c0e64bcea6401acd9c28a8e8fcb7ac6ab79f9626b670ed9adc7b491d88bf8a53c837d7b6276b789f34b29565058d827e6896f8686c0b35ce2d21afe86b68d6809bf444f3d0a5044f4ccca28d304d9d814583e3337fa5b62fed07eb463a430e35d6951b5c58b2a34c3df6a2949f8daf12bc63b061093d098eacd8b0f2b6938519262bd796e", 0xc9, 0x9}, {&(0x7f0000000400)="bb218ec0285d8ccf", 0x8, 0x8}, {&(0x7f0000000440)="665502e35f062cafe963f455ce7c04db2c5bc42827c08d7be141799553453f23c4de25c4081ac6f14c6b9a456d281b2b3ac3795f9b30e5f0539eb240810fc2fdf2140a1140f9e4536058ca01140a7906997b153461d53be67223a3a1ba19819732de4475cc746859fc1c35395e858ef10354fff2c1fdee7fa25e26a9310772a4c2947485ca0f4c3cce8b2cf07e", 0x8d, 0x9}, {&(0x7f0000000500)="a3e911bb1feb74e52be2183496028c8f4b7577ffede5fd19d647b293483ad1c64f861951ff96", 0x26, 0x9}], 0x0, &(0x7f0000000600)={[{@type={'type', 0x3d, "6166bea5"}}, {@file_umask={'file_umask', 0x3d, 0x400}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@part={'part', 0x3d, 0x80000001}}, {@type={'type', 0x3d, "1bc92c73"}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '](@*\\:\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, '](@*\\:\x00'}}, {@obj_user={'obj_user', 0x3d, '{'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@uid_lt={'uid<', 0xee00}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@subj_user={'subj_user', 0x3d, '](@*\\:\x00'}}]}) statx(r0, &(0x7f0000000740)='./file0\x00', 0x100, 0x80, &(0x7f0000000780)) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000880)) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000008c0)={0x0, 0x400}) getpeername(0xffffffffffffffff, &(0x7f0000000900)=@qipcrtr, &(0x7f0000000980)=0x80) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f00000009c0)) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000c40)={0x0, 0x4}) 07:12:25 executing program 5: statx(0xffffffffffffffff, &(0x7f0000000280)='\x00', 0x0, 0x0, 0x0) 07:12:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00'}) 07:12:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) [ 183.480966][T10102] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 183.480975][T10102] RSP: 002b:00007eff137c1a88 EFLAGS: 00010293 [ 183.480991][T10102] RAX: 0000000000000000 RBX: 00007eff137c1b20 RCX: 0000000000000000 [ 183.481001][T10102] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 183.481011][T10102] RBP: 00007eff137c1ae0 R08: 0000000020000158 R09: 0000000000000000 [ 183.481021][T10102] R10: 0000000007100000 R11: 0000000000000213 R12: 0000000000000000 [ 183.481030][T10102] R13: 0000000000000000 R14: 0000000020000140 R15: 0000000000000000 [ 183.481648][T10102] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/10102 [ 183.481666][T10102] caller is lockdep_hardirqs_on+0x38/0x110 [ 183.481684][T10102] CPU: 1 PID: 10102 Comm: syz-executor.0 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 183.481694][T10102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.481699][T10102] Call Trace: [ 183.481719][T10102] dump_stack+0x107/0x163 [ 183.481738][T10102] check_preemption_disabled+0x123/0x130 [ 183.481755][T10102] ? __bad_area_nosemaphore+0xc6/0x400 [ 183.481771][T10102] lockdep_hardirqs_on+0x38/0x110 [ 183.481787][T10102] __bad_area_nosemaphore+0xc6/0x400 [ 183.481809][T10102] do_user_addr_fault+0x7d7/0xb40 [ 183.481831][T10102] exc_page_fault+0x9e/0x180 [ 183.481846][T10102] ? asm_exc_page_fault+0x8/0x30 [ 183.481859][T10102] asm_exc_page_fault+0x1e/0x30 [ 183.481878][T10102] RIP: 0033:0x43c4f6 07:12:25 executing program 2: syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') 07:12:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) socketpair$unix(0x1, 0x1, 0x0, 0x0) [ 183.481894][T10102] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 183.674288][T10102] RSP: 002b:00007eff137c1a88 EFLAGS: 00010293 [ 183.680385][T10102] RAX: 0000000000000000 RBX: 00007eff137c1b20 RCX: 0000000000000000 [ 183.688408][T10102] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 183.696404][T10102] RBP: 00007eff137c1ae0 R08: 0000000020000158 R09: 0000000000000000 [ 183.704395][T10102] R10: 0000000007100000 R11: 0000000000000213 R12: 0000000000000000 [ 183.712407][T10102] R13: 0000000000000000 R14: 0000000020000140 R15: 0000000000000000 07:12:25 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:25 executing program 2: syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') [ 183.921167][T10105] hfs: unable to parse mount options 07:12:25 executing program 5: r0 = socket(0x10, 0x2, 0x7) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 07:12:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020301090b0200002dbd7000fddbdf25010218"], 0x1058}}, 0x0) [ 183.952594][T10119] hfs: invalid uid -1 [ 183.972148][T10119] hfs: unable to parse mount options 07:12:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x28, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x18}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @icmp}]}, 0x28}}, 0x0) 07:12:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000100)=ANY=[@ANYBLOB="20000000020a01"], 0x20}}, 0x0) 07:12:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x2c, &(0x7f0000000100)=[@in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e20, 0x0, @local, 0x8}]}, &(0x7f0000000240)=0x10) 07:12:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0xc000) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000240)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000000180)=[{&(0x7f00000002c0)="d9", 0x1}], 0x1}, 0x0) 07:12:25 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:25 executing program 1: r0 = socket(0x10, 0x2, 0x9) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x14}}, 0x0) [ 184.174950][T10144] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 07:12:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 07:12:26 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:26 executing program 0: getgroups(0x1, &(0x7f0000000340)=[0xee01]) 07:12:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000031c0)={0x0, 0x0, &(0x7f0000003180)={&(0x7f0000003140)={0x30, 0x0, 0xb, 0x5, 0x0, 0x0, {0x7}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x9, 0x1, 'v])$\x00'}, @NFTA_COMPAT_REV={0x8}]}, 0x30}}, 0x0) 07:12:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb473ad691ec8fab2) 07:12:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:26 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, 0xffffffffffffffff, 0x0) 07:12:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 07:12:26 executing program 0: syz_open_dev$vim2m(&(0x7f0000000140)='/dev/video#\x00', 0xffffffffffffffff, 0x2) 07:12:26 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000800)={&(0x7f0000000580)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) 07:12:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={0x0}}, 0x44001) 07:12:26 executing program 2: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000300)='/proc/asound/card2/oss_mixer\x00', 0x14001, 0x0) 07:12:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 07:12:26 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:26 executing program 1: getrusage(0x0, &(0x7f0000000480)) 07:12:26 executing program 2: connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 07:12:26 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') 07:12:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) [ 184.937775][T10193] hfs: creator requires a 4 character value [ 184.963215][T10193] hfs: unable to parse mount options 07:12:26 executing program 2: r0 = socket(0x10, 0x2, 0x9) recvmsg$can_raw(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 07:12:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000004940)={0x0, 0x0, &(0x7f0000004900)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_RULE_POSITION={0xc}, @NFTA_RULE_POSITION={0xc}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8}, @NFTA_RULE_COMPAT_FLAGS={0x8}]}, @NFTA_RULE_HANDLE={0xc}]}, @NFT_MSG_DELSETELEM={0xe44, 0xe, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xe24, 0x3, 0x0, 0x1, [{0xe4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_KEY={0xbc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x99, 0x1, "75954803ea35ca102fbb08bad527a0245fd3dbd497f6f0b2d46d1c1aca55289ef61a10275151689663707ef070c9304e9d96e9a30f896a037d3eea0d6bb7a5b2b887ec9909a49186df6c88140c2ba614ff5bfba1f54218c48c5b89cbff9a62a1098b9525f743f8342017754a58b69400fb929d6809a2f6b51591f1be0fb00daa00df6c00d2b4db114d57426e9396e3d425c87c4d6f"}]}, @NFTA_SET_ELEM_USERDATA={0x15, 0x6, 0x1, 0x0, "d7aad933536ca2ff5d85623dec7d86a99a"}]}, {0xd3c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0x14, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0xd09, 0x6, 0x1, 0x0, "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"}]}]}]}], {0x14}}, 0xec4}}, 0x0) 07:12:26 executing program 1: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/ocfs2_control\x00', 0x101000, 0x0) [ 185.061305][T10193] hfs: creator requires a 4 character value [ 185.070659][T10193] hfs: unable to parse mount options 07:12:26 executing program 5: sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 07:12:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:26 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:26 executing program 1: r0 = socket(0x29, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 07:12:27 executing program 2: r0 = socket(0x29, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, 0x0) 07:12:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) 07:12:27 executing program 5: sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) [ 185.399296][T10229] hfs: creator requires a 4 character value [ 185.420937][T10229] hfs: unable to parse mount options 07:12:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:27 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 07:12:27 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:27 executing program 4: timer_create(0x3, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) 07:12:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 07:12:27 executing program 5: sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 07:12:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:27 executing program 1: r0 = socket(0x10, 0x2, 0x9) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 07:12:27 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 07:12:27 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) [ 185.733055][T10247] hfs: creator requires a 4 character value [ 185.758276][T10247] hfs: unable to parse mount options 07:12:27 executing program 4: openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:12:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:27 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x20, 0x2, 0x7, 0x3, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 07:12:27 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 07:12:27 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000080)=0xe95) preadv(r2, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 07:12:27 executing program 2: sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, 0x0, 0x0) 07:12:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) [ 186.065067][T10270] hfs: creator requires a 4 character value 07:12:27 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') [ 186.125267][T10270] hfs: unable to parse mount options 07:12:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0xd, 0xa, 0x101}, 0x14}}, 0x0) 07:12:27 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 07:12:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:28 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:28 executing program 2: r0 = socket(0x10, 0x2, 0x4) sendmsg$rds(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) 07:12:28 executing program 1: syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000280)='9', 0x1, 0xfffffffffffffffb}], 0x2004, &(0x7f00000006c0)) 07:12:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, 0x0, 0x0) [ 186.551903][T10292] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/10292 [ 186.561779][T10292] caller is lockdep_hardirqs_on_prepare+0x5e/0x410 [ 186.568313][T10292] CPU: 0 PID: 10292 Comm: syz-executor.0 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 186.578333][T10292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.588405][T10292] Call Trace: [ 186.591719][T10292] dump_stack+0x107/0x163 [ 186.596074][T10292] check_preemption_disabled+0x123/0x130 [ 186.601733][T10292] lockdep_hardirqs_on_prepare+0x5e/0x410 [ 186.607529][T10292] trace_hardirqs_on+0x5b/0x1c0 [ 186.612426][T10292] __bad_area_nosemaphore+0xc6/0x400 [ 186.617781][T10292] do_user_addr_fault+0x7d7/0xb40 [ 186.622845][T10292] exc_page_fault+0x9e/0x180 [ 186.627465][T10292] ? asm_exc_page_fault+0x8/0x30 [ 186.632430][T10292] asm_exc_page_fault+0x1e/0x30 [ 186.637333][T10292] RIP: 0033:0x4067a6 07:12:28 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) [ 186.641247][T10292] Code: 00 48 3d e0 00 00 00 0f 87 67 01 00 00 4c 89 fe 48 89 df ba e0 00 00 00 e8 a7 9b ff ff bf 77 0c 4d 00 b9 08 00 00 00 4c 89 e6 a6 0f 85 ea 00 00 00 48 8b 44 24 10 48 83 c8 01 48 89 44 24 10 [ 186.660873][T10292] RSP: 002b:00007eff137c1a90 EFLAGS: 00010206 [ 186.666964][T10292] RAX: 00007eff137c1b20 RBX: 00007eff137c1b20 RCX: 0000000000000008 [ 186.674957][T10292] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004d0c77 [ 186.682948][T10292] RBP: 00007eff137c1ae0 R08: 0000000000000000 R09: 0000000000000000 [ 186.690943][T10292] R10: 00007eff137c1adc R11: 000000000051e020 R12: 0000000000000000 [ 186.698936][T10292] R13: 0000000020000100 R14: 0000000020000140 R15: 00000000200001c0 [ 186.708101][T10292] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/10292 [ 186.718096][T10292] caller is lockdep_hardirqs_on+0x38/0x110 [ 186.724042][T10292] CPU: 0 PID: 10292 Comm: syz-executor.0 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 186.734026][T10292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.744095][T10292] Call Trace: [ 186.747404][T10292] dump_stack+0x107/0x163 07:12:28 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000080)=0xe95) preadv(r2, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 07:12:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) [ 186.751756][T10292] check_preemption_disabled+0x123/0x130 [ 186.757432][T10292] ? __bad_area_nosemaphore+0xc6/0x400 [ 186.762941][T10292] lockdep_hardirqs_on+0x38/0x110 [ 186.767992][T10292] __bad_area_nosemaphore+0xc6/0x400 [ 186.773343][T10292] do_user_addr_fault+0x7d7/0xb40 [ 186.778401][T10292] exc_page_fault+0x9e/0x180 [ 186.783017][T10292] ? asm_exc_page_fault+0x8/0x30 [ 186.787976][T10292] asm_exc_page_fault+0x1e/0x30 [ 186.792850][T10292] RIP: 0033:0x4067a6 07:12:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) [ 186.796797][T10292] Code: 00 48 3d e0 00 00 00 0f 87 67 01 00 00 4c 89 fe 48 89 df ba e0 00 00 00 e8 a7 9b ff ff bf 77 0c 4d 00 b9 08 00 00 00 4c 89 e6 a6 0f 85 ea 00 00 00 48 8b 44 24 10 48 83 c8 01 48 89 44 24 10 [ 186.816424][T10292] RSP: 002b:00007eff137c1a90 EFLAGS: 00010206 [ 186.822549][T10292] RAX: 00007eff137c1b20 RBX: 00007eff137c1b20 RCX: 0000000000000008 [ 186.830541][T10292] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004d0c77 [ 186.838536][T10292] RBP: 00007eff137c1ae0 R08: 0000000000000000 R09: 0000000000000000 [ 186.846528][T10292] R10: 00007eff137c1adc R11: 000000000051e020 R12: 0000000000000000 [ 186.854604][T10292] R13: 0000000020000100 R14: 0000000020000140 R15: 00000000200001c0 07:12:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, 0x0, 0x0) 07:12:28 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:28 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000080)=0xe95) preadv(r2, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 07:12:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:28 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/ipc\x00') [ 187.286667][T10324] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/10324 [ 187.296725][T10324] caller is lockdep_hardirqs_on_prepare+0x5e/0x410 [ 187.303547][T10324] CPU: 1 PID: 10324 Comm: syz-executor.0 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 187.313584][T10324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.323678][T10324] Call Trace: [ 187.326989][T10324] dump_stack+0x107/0x163 [ 187.331346][T10324] check_preemption_disabled+0x123/0x130 07:12:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, 0x0, 0x0) [ 187.337031][T10324] lockdep_hardirqs_on_prepare+0x5e/0x410 [ 187.342795][T10324] trace_hardirqs_on+0x5b/0x1c0 [ 187.347685][T10324] __bad_area_nosemaphore+0xc6/0x400 [ 187.353176][T10324] do_user_addr_fault+0x7d7/0xb40 [ 187.358231][T10324] exc_page_fault+0x9e/0x180 [ 187.362842][T10324] ? asm_exc_page_fault+0x8/0x30 [ 187.367799][T10324] asm_exc_page_fault+0x1e/0x30 [ 187.372667][T10324] RIP: 0033:0x4067a6 [ 187.376589][T10324] Code: 00 48 3d e0 00 00 00 0f 87 67 01 00 00 4c 89 fe 48 89 df ba e0 00 00 00 e8 a7 9b ff ff bf 77 0c 4d 00 b9 08 00 00 00 4c 89 e6 a6 0f 85 ea 00 00 00 48 8b 44 24 10 48 83 c8 01 48 89 44 24 10 [ 187.396208][T10324] RSP: 002b:00007eff137c1a90 EFLAGS: 00010206 [ 187.402297][T10324] RAX: 00007eff137c1b20 RBX: 00007eff137c1b20 RCX: 0000000000000008 [ 187.410285][T10324] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004d0c77 [ 187.418273][T10324] RBP: 00007eff137c1ae0 R08: 0000000000000000 R09: 0000000000000000 [ 187.426264][T10324] R10: 00007eff137c1adc R11: 000000000051e020 R12: 0000000000000000 [ 187.434280][T10324] R13: 0000000020000100 R14: 0000000020000140 R15: 00000000200001c0 [ 187.442404][T10324] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/10324 [ 187.451862][T10324] caller is lockdep_hardirqs_on+0x38/0x110 [ 187.457689][T10324] CPU: 1 PID: 10324 Comm: syz-executor.0 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 187.467677][T10324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.477770][T10324] Call Trace: [ 187.481079][T10324] dump_stack+0x107/0x163 07:12:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) [ 187.485428][T10324] check_preemption_disabled+0x123/0x130 [ 187.491075][T10324] ? __bad_area_nosemaphore+0xc6/0x400 [ 187.496552][T10324] lockdep_hardirqs_on+0x38/0x110 [ 187.501608][T10324] __bad_area_nosemaphore+0xc6/0x400 [ 187.506930][T10324] do_user_addr_fault+0x7d7/0xb40 [ 187.511988][T10324] exc_page_fault+0x9e/0x180 [ 187.516643][T10324] ? asm_exc_page_fault+0x8/0x30 [ 187.521606][T10324] asm_exc_page_fault+0x1e/0x30 [ 187.526494][T10324] RIP: 0033:0x4067a6 07:12:29 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x2042008, &(0x7f0000000980)) [ 187.530432][T10324] Code: 00 48 3d e0 00 00 00 0f 87 67 01 00 00 4c 89 fe 48 89 df ba e0 00 00 00 e8 a7 9b ff ff bf 77 0c 4d 00 b9 08 00 00 00 4c 89 e6 a6 0f 85 ea 00 00 00 48 8b 44 24 10 48 83 c8 01 48 89 44 24 10 [ 187.550053][T10324] RSP: 002b:00007eff137c1a90 EFLAGS: 00010206 [ 187.556144][T10324] RAX: 00007eff137c1b20 RBX: 00007eff137c1b20 RCX: 0000000000000008 [ 187.564133][T10324] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004d0c77 [ 187.572120][T10324] RBP: 00007eff137c1ae0 R08: 0000000000000000 R09: 0000000000000000 [ 187.580135][T10324] R10: 00007eff137c1adc R11: 000000000051e020 R12: 0000000000000000 07:12:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 187.588125][T10324] R13: 0000000020000100 R14: 0000000020000140 R15: 00000000200001c0 07:12:29 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000080)=0xe95) preadv(r2, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 07:12:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) 07:12:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 07:12:29 executing program 2: r0 = socket(0x11, 0x2, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, 0x0}, 0x0) 07:12:29 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:29 executing program 1: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x841, 0x0) 07:12:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 07:12:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x1c, "07d0e4e8c82f1d85d2230471d4553e45dbaba972356460a15fcecdb7"}, &(0x7f0000000000)=0x24) [ 188.058668][T10348] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/10348 [ 188.068362][T10348] caller is lockdep_hardirqs_on_prepare+0x5e/0x410 [ 188.075135][T10348] CPU: 0 PID: 10348 Comm: syz-executor.0 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 188.085129][T10348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.095232][T10348] Call Trace: [ 188.098546][T10348] dump_stack+0x107/0x163 [ 188.102899][T10348] check_preemption_disabled+0x123/0x130 [ 188.108577][T10348] lockdep_hardirqs_on_prepare+0x5e/0x410 [ 188.114332][T10348] trace_hardirqs_on+0x5b/0x1c0 [ 188.119237][T10348] __bad_area_nosemaphore+0xc6/0x400 [ 188.124551][T10348] do_user_addr_fault+0x7d7/0xb40 [ 188.129636][T10348] exc_page_fault+0x9e/0x180 [ 188.134250][T10348] ? asm_exc_page_fault+0x8/0x30 [ 188.139212][T10348] asm_exc_page_fault+0x1e/0x30 [ 188.144083][T10348] RIP: 0033:0x4067a6 [ 188.148025][T10348] Code: 00 48 3d e0 00 00 00 0f 87 67 01 00 00 4c 89 fe 48 89 df ba e0 00 00 00 e8 a7 9b ff ff bf 77 0c 4d 00 b9 08 00 00 00 4c 89 e6 a6 0f 85 ea 00 00 00 48 8b 44 24 10 48 83 c8 01 48 89 44 24 10 [ 188.167761][T10348] RSP: 002b:00007eff137c1a90 EFLAGS: 00010206 [ 188.173855][T10348] RAX: 00007eff137c1b20 RBX: 00007eff137c1b20 RCX: 0000000000000008 [ 188.181873][T10348] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004d0c77 [ 188.189867][T10348] RBP: 00007eff137c1ae0 R08: 0000000000000000 R09: 0000000000000000 [ 188.197858][T10348] R10: 00007eff137c1adc R11: 000000000051e020 R12: 0000000000000000 [ 188.205848][T10348] R13: 0000000020000100 R14: 0000000020000140 R15: 00000000200001c0 [ 188.213966][T10348] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.0/10348 [ 188.223411][T10348] caller is lockdep_hardirqs_on+0x38/0x110 [ 188.229269][T10348] CPU: 0 PID: 10348 Comm: syz-executor.0 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 188.239247][T10348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.249365][T10348] Call Trace: [ 188.252685][T10348] dump_stack+0x107/0x163 [ 188.257033][T10348] check_preemption_disabled+0x123/0x130 [ 188.262677][T10348] ? __bad_area_nosemaphore+0xc6/0x400 [ 188.268157][T10348] lockdep_hardirqs_on+0x38/0x110 [ 188.273194][T10348] __bad_area_nosemaphore+0xc6/0x400 [ 188.278494][T10348] do_user_addr_fault+0x7d7/0xb40 [ 188.283536][T10348] exc_page_fault+0x9e/0x180 [ 188.288164][T10348] ? asm_exc_page_fault+0x8/0x30 [ 188.293197][T10348] asm_exc_page_fault+0x1e/0x30 [ 188.298081][T10348] RIP: 0033:0x4067a6 [ 188.301979][T10348] Code: 00 48 3d e0 00 00 00 0f 87 67 01 00 00 4c 89 fe 48 89 df ba e0 00 00 00 e8 a7 9b ff ff bf 77 0c 4d 00 b9 08 00 00 00 4c 89 e6 a6 0f 85 ea 00 00 00 48 8b 44 24 10 48 83 c8 01 48 89 44 24 10 [ 188.321590][T10348] RSP: 002b:00007eff137c1a90 EFLAGS: 00010206 [ 188.327670][T10348] RAX: 00007eff137c1b20 RBX: 00007eff137c1b20 RCX: 0000000000000008 [ 188.335652][T10348] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004d0c77 [ 188.343639][T10348] RBP: 00007eff137c1ae0 R08: 0000000000000000 R09: 0000000000000000 [ 188.351634][T10348] R10: 00007eff137c1adc R11: 000000000051e020 R12: 0000000000000000 07:12:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 07:12:30 executing program 1: socket(0x2, 0x0, 0x8927851) 07:12:30 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/uts\x00') 07:12:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000000)) [ 188.359634][T10348] R13: 0000000020000100 R14: 0000000020000140 R15: 00000000200001c0 07:12:30 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000080)=0xe95) preadv(r2, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 07:12:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000000)) 07:12:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 07:12:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, 0x0, 0xb, 0x5, 0x0, 0x0, {0x2}, [@NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x3}]}, 0x2c}}, 0x0) 07:12:30 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:30 executing program 2: perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:12:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000000)) 07:12:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xccc18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc00, 0x0, 0x0, 0x0, 0x6fa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:12:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 07:12:30 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:30 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-neon\x00'}, 0x58) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) 07:12:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200), &(0x7f0000000000)=0x8) 07:12:30 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 07:12:30 executing program 1: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000800), 0x4) 07:12:30 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x0, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 07:12:30 executing program 2: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x4, &(0x7f0000000540)=[{&(0x7f00000001c0)='n', 0x1, 0x20}, {&(0x7f0000000200)="1d1092ba47aba1903e927035a25c35b9adba09288b6dc33f91770917e35e0f37354fed0357d3fef7ded750d60e210a41d700ad8c434d", 0x36, 0x35}, {0x0}, {&(0x7f0000000400)="bb", 0x1}], 0x0, &(0x7f0000000600)) 07:12:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200), &(0x7f0000000000)=0x8) [ 189.271191][T10406] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/10406 [ 189.280709][T10406] caller is lockdep_hardirqs_on_prepare+0x5e/0x410 [ 189.287389][T10406] CPU: 0 PID: 10406 Comm: syz-executor.2 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 189.297377][T10406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.307451][T10406] Call Trace: [ 189.310766][T10406] dump_stack+0x107/0x163 [ 189.315125][T10406] check_preemption_disabled+0x123/0x130 [ 189.320783][T10406] lockdep_hardirqs_on_prepare+0x5e/0x410 [ 189.326560][T10406] trace_hardirqs_on+0x5b/0x1c0 [ 189.331463][T10406] __bad_area_nosemaphore+0xc6/0x400 [ 189.336783][T10406] do_user_addr_fault+0x7d7/0xb40 [ 189.341848][T10406] exc_page_fault+0x9e/0x180 [ 189.346494][T10406] ? asm_exc_page_fault+0x8/0x30 [ 189.351462][T10406] asm_exc_page_fault+0x1e/0x30 [ 189.356334][T10406] RIP: 0033:0x4067a6 [ 189.360253][T10406] Code: 00 48 3d e0 00 00 00 0f 87 67 01 00 00 4c 89 fe 48 89 df ba e0 00 00 00 e8 a7 9b ff ff bf 77 0c 4d 00 b9 08 00 00 00 4c 89 e6 a6 0f 85 ea 00 00 00 48 8b 44 24 10 48 83 c8 01 48 89 44 24 10 [ 189.379885][T10406] RSP: 002b:00007f01c5d92a90 EFLAGS: 00010206 [ 189.385980][T10406] RAX: 00007f01c5d92b20 RBX: 00007f01c5d92b20 RCX: 0000000000000008 [ 189.393972][T10406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004d0c77 [ 189.401994][T10406] RBP: 00007f01c5d92ae0 R08: 0000000000000000 R09: 0000000000000000 [ 189.409989][T10406] R10: 0000000000000000 R11: 000000000051e020 R12: 0000000000000000 07:12:30 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$rds(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000300)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/39, 0x27}], 0x3, 0x0, 0xbab2438aaf772fb1}, 0x0) 07:12:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200), &(0x7f0000000000)=0x8) 07:12:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x600) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x1c) 07:12:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x0, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) [ 189.417981][T10406] R13: 0000000000000000 R14: 0000000020000540 R15: 0000000020000600 [ 189.426778][T10406] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/10406 [ 189.436481][T10406] caller is lockdep_hardirqs_on+0x38/0x110 [ 189.442386][T10406] CPU: 0 PID: 10406 Comm: syz-executor.2 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 189.452395][T10406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.462463][T10406] Call Trace: [ 189.465784][T10406] dump_stack+0x107/0x163 [ 189.470135][T10406] check_preemption_disabled+0x123/0x130 [ 189.475787][T10406] ? __bad_area_nosemaphore+0xc6/0x400 [ 189.481275][T10406] lockdep_hardirqs_on+0x38/0x110 [ 189.486334][T10406] __bad_area_nosemaphore+0xc6/0x400 [ 189.491659][T10406] do_user_addr_fault+0x7d7/0xb40 [ 189.497445][T10406] exc_page_fault+0x9e/0x180 [ 189.502063][T10406] ? asm_exc_page_fault+0x8/0x30 [ 189.507024][T10406] asm_exc_page_fault+0x1e/0x30 [ 189.511927][T10406] RIP: 0033:0x4067a6 07:12:31 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) [ 189.515835][T10406] Code: 00 48 3d e0 00 00 00 0f 87 67 01 00 00 4c 89 fe 48 89 df ba e0 00 00 00 e8 a7 9b ff ff bf 77 0c 4d 00 b9 08 00 00 00 4c 89 e6 a6 0f 85 ea 00 00 00 48 8b 44 24 10 48 83 c8 01 48 89 44 24 10 [ 189.535486][T10406] RSP: 002b:00007f01c5d92a90 EFLAGS: 00010206 [ 189.541614][T10406] RAX: 00007f01c5d92b20 RBX: 00007f01c5d92b20 RCX: 0000000000000008 [ 189.549605][T10406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004d0c77 [ 189.557623][T10406] RBP: 00007f01c5d92ae0 R08: 0000000000000000 R09: 0000000000000000 07:12:31 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) [ 189.565636][T10406] R10: 0000000000000000 R11: 000000000051e020 R12: 0000000000000000 [ 189.573657][T10406] R13: 0000000000000000 R14: 0000000020000540 R15: 0000000020000600 [ 189.682795][T10406] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/10406 [ 189.692333][T10406] caller is lockdep_hardirqs_on_prepare+0x5e/0x410 [ 189.698861][T10406] CPU: 1 PID: 10406 Comm: syz-executor.2 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 189.708848][T10406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.718919][T10406] Call Trace: [ 189.722233][T10406] dump_stack+0x107/0x163 [ 189.726604][T10406] check_preemption_disabled+0x123/0x130 [ 189.732264][T10406] lockdep_hardirqs_on_prepare+0x5e/0x410 [ 189.738009][T10406] trace_hardirqs_on+0x5b/0x1c0 [ 189.742881][T10406] __bad_area_nosemaphore+0xc6/0x400 [ 189.748199][T10406] do_user_addr_fault+0x7d7/0xb40 [ 189.753251][T10406] exc_page_fault+0x9e/0x180 [ 189.757864][T10406] ? asm_exc_page_fault+0x8/0x30 [ 189.762825][T10406] asm_exc_page_fault+0x1e/0x30 [ 189.767692][T10406] RIP: 0033:0x4067a6 [ 189.771638][T10406] Code: 00 48 3d e0 00 00 00 0f 87 67 01 00 00 4c 89 fe 48 89 df ba e0 00 00 00 e8 a7 9b ff ff bf 77 0c 4d 00 b9 08 00 00 00 4c 89 e6 a6 0f 85 ea 00 00 00 48 8b 44 24 10 48 83 c8 01 48 89 44 24 10 [ 189.791393][T10406] RSP: 002b:00007f01c5d92a90 EFLAGS: 00010206 [ 189.797515][T10406] RAX: 00007f01c5d92b20 RBX: 00007f01c5d92b20 RCX: 0000000000000008 [ 189.805511][T10406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004d0c77 [ 189.813539][T10406] RBP: 00007f01c5d92ae0 R08: 0000000000000000 R09: 0000000000000000 [ 189.821558][T10406] R10: 0000000000000000 R11: 000000000051e020 R12: 0000000000000000 [ 189.829583][T10406] R13: 0000000000000000 R14: 0000000020000540 R15: 0000000020000600 [ 189.841455][T10406] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/10406 [ 189.853751][T10406] caller is lockdep_hardirqs_on+0x38/0x110 [ 189.859635][T10406] CPU: 1 PID: 10406 Comm: syz-executor.2 Not tainted 5.10.0-rc1-next-20201028-syzkaller #0 [ 189.869621][T10406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.879716][T10406] Call Trace: [ 189.883025][T10406] dump_stack+0x107/0x163 [ 189.887375][T10406] check_preemption_disabled+0x123/0x130 [ 189.893015][T10406] ? __bad_area_nosemaphore+0xc6/0x400 [ 189.898514][T10406] lockdep_hardirqs_on+0x38/0x110 [ 189.903596][T10406] __bad_area_nosemaphore+0xc6/0x400 [ 189.908917][T10406] do_user_addr_fault+0x7d7/0xb40 [ 189.913974][T10406] exc_page_fault+0x9e/0x180 [ 189.918588][T10406] ? asm_exc_page_fault+0x8/0x30 [ 189.923581][T10406] asm_exc_page_fault+0x1e/0x30 [ 189.928449][T10406] RIP: 0033:0x4067a6 07:12:31 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 07:12:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xe, "07d0e4e8c82f1d85d2230471d455"}, &(0x7f0000000000)=0x16) 07:12:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x28, 0x2, 0x7, 0x0, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}]}]}, 0x28}}, 0x0) 07:12:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x600) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x1c) [ 189.932359][T10406] Code: 00 48 3d e0 00 00 00 0f 87 67 01 00 00 4c 89 fe 48 89 df ba e0 00 00 00 e8 a7 9b ff ff bf 77 0c 4d 00 b9 08 00 00 00 4c 89 e6 a6 0f 85 ea 00 00 00 48 8b 44 24 10 48 83 c8 01 48 89 44 24 10 [ 189.951983][T10406] RSP: 002b:00007f01c5d92a90 EFLAGS: 00010206 [ 189.958078][T10406] RAX: 00007f01c5d92b20 RBX: 00007f01c5d92b20 RCX: 0000000000000008 [ 189.966074][T10406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004d0c77 [ 189.974070][T10406] RBP: 00007f01c5d92ae0 R08: 0000000000000000 R09: 0000000000000000 [ 189.982062][T10406] R10: 0000000000000000 R11: 000000000051e020 R12: 0000000000000000 [ 189.990055][T10406] R13: 0000000000000000 R14: 0000000020000540 R15: 0000000020000600 07:12:31 executing program 2: r0 = socket(0x2, 0x3, 0x5) sendmsg$nl_route_sched(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x0) 07:12:31 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="63726561746f723d0e"]) 07:12:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xe, "07d0e4e8c82f1d85d2230471d455"}, &(0x7f0000000000)=0x16) 07:12:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x600) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x1c) 07:12:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, 0x2, 0x7, 0x201}, 0x14}}, 0x0) 07:12:31 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) 07:12:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xe, "07d0e4e8c82f1d85d2230471d455"}, &(0x7f0000000000)=0x16) 07:12:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, 0x2, 0x7, 0x201}, 0x14}}, 0x0) 07:12:32 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x34e, 0x0, 0x0) 07:12:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x600) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x1c) 07:12:32 executing program 2: r0 = socket(0x11, 0xa, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x14}}, 0x0) 07:12:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x15, "07d0e4e8c82f1d85d2230471d4553e45dbaba97235"}, &(0x7f0000000000)=0x1d) 07:12:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, 0x2, 0x7, 0x201}, 0x14}}, 0x0) 07:12:32 executing program 0: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) 07:12:32 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/xfrm_stat\x00')